Review of methods, D.J.Grover; disk protection, R.Sather; physical protection devices, J.G.W.Phipps; cryptography, D.W.Davies; intelligent modules, G.I.Parkin and B.W.Wichmann; program identification, D.J.Grover; hacking, M.Samociuk; copyright and patents, R.J.Hart; licensing issues, J.R.Cartwright; user opinion of software protection in the UK, S.M.Elsom.