2 | -- | 4 | Martin Wasik. The law commission's working paper on computer misuse |
4 | -- | 0 | Martin Wasik. CBI Conference on combating computer crime - increasing computer security: Centre Point, London, 27th October 1988 |
8 | -- | 0 | David Davies. Dramatic review: "The hacker and the malevolent employee"; performed at COMPSEC '88 |
13 | -- | 14 | Mark Tantum. Section 69 and all that |
15 | -- | 17 | David Davies. Continuing the series by David Davies Part IV: Why have a strategy |
18 | -- | 20 | Christopher Millard. Software escrow arrangements and the insolvency act 1986 |
21 | -- | 22 | . Custom software source code ownership and access |
23 | -- | 26 | Simon Chalton. Product testing: liability, acceptance, contract terms |
27 | -- | 28 | Michael J. Shpizner. Congress passes new legislation protecting licensees of intellectual property |
28 | -- | 0 | Anthony Korn. Data protection in Ireland: The Netherlands and Switzerland: Privacy Laws and Business Seminar, Mayfair Hotel, London, Wednesday, 19 October 1988 |
34 | -- | 35 | Bernard P. Zajac Jr.. Virus hits major US computer network |
40 | -- | 41 | David Greaves. Eurodynamics systems PLC-V-general automation ltd. (As yet unreported - September 1988) |
42 | -- | 43 | Stephen Saxby. European Study Conferences Ltd: The Royal Automobile Club, London, Thursday, 13 October 1988 |