Information technology law / Diane Rowland, Elizabeth Macdonald.
By: Rowland, Diane
.
Contributor(s): Macdonald, Elizabeth, LL. B [(j.a.)]
.
Publisher: London : Cavendish Pub., 2000Edition: 2nd ed.Description: xlv, 554 p. : 24 cm.ISBN: 1859415644 (pbk.).Subject(s): Computer crimes -- Great Britain![](/opac-tmpl/bootstrap/images/filefind.png)
![](/opac-tmpl/bootstrap/images/filefind.png)
![](/opac-tmpl/bootstrap/images/filefind.png)
![](/opac-tmpl/bootstrap/images/filefind.png)
Item type | Current location | Shelf location | Call number | Copy number | Status | Notes | Date due | Barcode | Remark |
---|---|---|---|---|---|---|---|---|---|
Main Collection | TU External Storage-LCS | 343.42099 ROW (Browse shelf) | 1 | Available | TBSxx,34004,03,GR | 1000500960 | Please fill up online form at https://taylorslibrary.taylors.edu.my/services/external_storage1 | ||
Main Collection | TU External Storage-LCS | 343.42099 ROW (Browse shelf) | 1 | Available | TBSxx,34001,03,GR | 1000500959 | Please fill up online form at https://taylorslibrary.taylors.edu.my/services/external_storage1 | ||
Main Collection | TU External Storage-LCS | 343.42099 ROW (Browse shelf) | 1 | Available | TBSxx,34007,03,GR | 1000500958 | Please fill up online form at https://taylorslibrary.taylors.edu.my/services/external_storage1 | ||
Main Collection | Taylor's Library-TU |
Floor 3, Shelf 8 , Side 1, TierNo 4, BayNo 3 |
343.42099 ROW (Browse shelf) | 1 | Available | TBSxx,18002,03,GR | 5000015952 |
Browsing Taylor's Library-TU Shelves Close shelf browser
343.42099 ROW Information technology law / | 343.42099 ROW Information technology law / | 343.42099 ROW Information technology law / | 343.42099 ROW Information technology law / | 343.420999 BAI Introduction to computer law / | 343.420999 BAI Introduction to computer law / | 343.420999 BAI Introduction to computer law / |
The law is stated as at 1July 2000.
Preface. - Acknowledgments. - Table of cases. - Table of legislation. - Table of Statutory Instruments. - Table of EC Legislation. - Table of Abbreviations. - 1. Introduction. - Pt. 1. The Challenge of Computer Software. - 2. Protecting and Exploiting Rights in Software - Intellectual Property Rights. - 3. Protecting and Exploiting Rights in Software - Contract. - 4. Defective Software - Contract. - 5. Defective Software - Product Liability and Tort. - Pt. II. The Challenges of Computer Networks. - 6. E-Commerce. - 7. Protecting the Private Individual. - 8. Policing 'Cyberspace'. - 9. Aspects of the Protection of Intellectual Property Rights on the Internet. - Index.