Source: Computer Law and Security Report, Volume 15, Number 4, 8 July 1999, pp. 253-253(1)
This article is hosted on another website.
You may be required to register, activate a subscription or purchase the article before you can obtain the full text.
Document Type: Book Review
Publication date: July 8, 1999