Pages with the fewest revisions

Jump to navigation Jump to search

Showing below up to 500 results in range #501 to #1,000.

View ( | ) (20 | 50 | 100 | 250 | 500)

  1. PO10.13:‏‎ (1 revision)
  2. PO10.14:‏‎ (1 revision)
  3. PO10.4:‏‎ (1 revision)
  4. PO10.5:‏‎ (1 revision)
  5. PO10.7:‏‎ (1 revision)
  6. PO10.8:‏‎ (1 revision)
  7. PO10:‏‎ (1 revision)
  8. PO1:‏‎ (1 revision)
  9. PO2.1:‏‎ (1 revision)
  10. PO2.4:‏‎ (1 revision)
  11. PO2:‏‎ (1 revision)
  12. PO3.5:‏‎ (1 revision)
  13. PO3:‏‎ (1 revision)
  14. PO4.12:‏‎ (1 revision)
  15. PO4.13:‏‎ (1 revision)
  16. PO4.14:‏‎ (1 revision)
  17. PO4.15:‏‎ (1 revision)
  18. PO4.2:‏‎ (1 revision)
  19. PO4.4:‏‎ (1 revision)
  20. PO4.6:‏‎ (1 revision)
  21. PO4.8:‏‎ (1 revision)
  22. PO4.9:‏‎ (1 revision)
  23. PO4:‏‎ (1 revision)
  24. PO5.1:‏‎ (1 revision)
  25. PO5.2:‏‎ (1 revision)
  26. PO5.3:‏‎ (1 revision)
  27. PO5.4:‏‎ (1 revision)
  28. PO5:‏‎ (1 revision)
  29. PO6.2:‏‎ (1 revision)
  30. PO6.5:‏‎ (1 revision)
  31. PO6:‏‎ (1 revision)
  32. PO7.2:‏‎ (1 revision)
  33. PO7.3:‏‎ (1 revision)
  34. PO7.5:‏‎ (1 revision)
  35. PO7.7:‏‎ (1 revision)
  36. PO7:‏‎ (1 revision)
  37. PO8.1:‏‎ (1 revision)
  38. PO8.4:‏‎ (1 revision)
  39. PO8.5:‏‎ (1 revision)
  40. PO8.6:‏‎ (1 revision)
  41. PO8:‏‎ (1 revision)
  42. PO9.2:‏‎ (1 revision)
  43. PO9.4:‏‎ (1 revision)
  44. PO9.5:‏‎ (1 revision)
  45. PO9.6:‏‎ (1 revision)
  46. PO9:‏‎ (1 revision)
  47. Personal harm‏‎ (1 revision)
  48. Persuading defendant to accept plea bargain‏‎ (1 revision)
  49. Physical taking offenses‏‎ (1 revision)
  50. Plea bargain checklist‏‎ (1 revision)
  51. Plea bargain issues‏‎ (1 revision)
  52. Police reports of the computer crime‏‎ (1 revision)
  53. Possession of hardware designed for illegal purpose‏‎ (1 revision)
  54. Preemption‏‎ (1 revision)
  55. Preface‏‎ (1 revision)
  56. Preliminary Matters in general‏‎ (1 revision)
  57. Preliminary Tactics in general‏‎ (1 revision)
  58. Presence and effect of pretrial publicity‏‎ (1 revision)
  59. Presentation of the defense case‏‎ (1 revision)
  60. Privacy: Statutory Protections‏‎ (1 revision)
  61. Privacy And Data Collection‏‎ (1 revision)
  62. Privacy Laws in British Virgin Islands‏‎ (1 revision)
  63. Privacy Laws in Cayman Islands‏‎ (1 revision)
  64. Privacy Laws in Costa Rica‏‎ (1 revision)
  65. Privacy Laws in Panama‏‎ (1 revision)
  66. Problem Management:‏‎ (1 revision)
  67. Procedure; generally‏‎ (1 revision)
  68. Proceedings After Trial in general‏‎ (1 revision)
  69. Proceedings Before Grand Jury in general‏‎ (1 revision)
  70. Proceedings by Way of Preliminary Hearing in general‏‎ (1 revision)
  71. Prosecution's need to prove elements of crime‏‎ (1 revision)
  72. Protected computer‏‎ (1 revision)
  73. Proving computer damage‏‎ (1 revision)
  74. Proving computer trespass‏‎ (1 revision)
  75. Proving invasion of privacy‏‎ (1 revision)
  76. Punishments and Penalties in general‏‎ (1 revision)
  77. Purpose of computer crime laws‏‎ (1 revision)
  78. Putting client at ease‏‎ (1 revision)
  79. Recklessness‏‎ (1 revision)
  80. Reconstructing the crime‏‎ (1 revision)
  81. Recovery Time Actual‏‎ (1 revision)
  82. Release Management:‏‎ (1 revision)
  83. Release on own recognizance‏‎ (1 revision)
  84. Release on own recognizance—Questions checklist‏‎ (1 revision)
  85. Restricting interrogation of defendant‏‎ (1 revision)
  86. Return of exhibits‏‎ (1 revision)
  87. Risk Analysis‏‎ (1 revision)
  88. Risk mitigation‏‎ (1 revision)
  89. SB-1386‏‎ (1 revision)
  90. SOX.1.24:‏‎ (1 revision)
  91. SOX.1.7:‏‎ (1 revision)
  92. SOX.2.0.19:‏‎ (1 revision)
  93. SOX.2.0.24:‏‎ (1 revision)
  94. SOX.2.0.27:‏‎ (1 revision)
  95. SOX.2.0.28:‏‎ (1 revision)
  96. SOX.2.0.29:‏‎ (1 revision)
  97. SOX.2.0.30:‏‎ (1 revision)
  98. SOX.2.0.32:‏‎ (1 revision)
  99. SOX.2.0.5:‏‎ (1 revision)
  100. SOX.2.0.7:‏‎ (1 revision)
  101. SOX.2.0.8:‏‎ (1 revision)
  102. SOX.2.7.15:‏‎ (1 revision)
  103. SOX.2.7.6:‏‎ (1 revision)
  104. SOX.2.7.7:‏‎ (1 revision)
  105. SOX.2.7.8:‏‎ (1 revision)
  106. SOX.4.2.1.10:‏‎ (1 revision)
  107. SOX.4.2.4.15:‏‎ (1 revision)
  108. SOX.6.1.5:‏‎ (1 revision)
  109. Sample Asset Protection Standard:‏‎ (1 revision)
  110. Sample Management Security Awareness Standard:‏‎ (1 revision)
  111. Sample On Premise Wireless Access Technology Guideline‏‎ (1 revision)
  112. Sample Protection Standards:‏‎ (1 revision)
  113. Scenario analysis‏‎ (1 revision)
  114. Search and Seizure Appendices‏‎ (1 revision)
  115. Search and Seizure Introduction‏‎ (1 revision)
  116. Search and Seizure Preface and Acknowledgments‏‎ (1 revision)
  117. Searching and Seizing Computers‏‎ (1 revision)
  118. Searching and Seizing Computers With a Warrant‏‎ (1 revision)
  119. Searching and Seizing Computers Without a Warrant‏‎ (1 revision)
  120. Seating arrangement in courtroom‏‎ (1 revision)
  121. Security Best Practices and Addressing Regulatory Mandates Testing Template:‏‎ (1 revision)
  122. Security Best Practices and Addressing Regulatory Mandates Testing Template (Answer Key):‏‎ (1 revision)
  123. Security Freeze‏‎ (1 revision)
  124. Selected Defamation Defenses‏‎ (1 revision)
  125. Selecting the Jury in general‏‎ (1 revision)
  126. Sentencing hearing—illustrative argument and response‏‎ (1 revision)
  127. Separate trial‏‎ (1 revision)
  128. Service Desk Management:‏‎ (1 revision)
  129. Service Level Agreement‏‎ (1 revision)
  130. Service Level Management:‏‎ (1 revision)
  131. Sitesupport-url‏‎ (1 revision)
  132. Sovereignty‏‎ (1 revision)
  133. State Attempts At Regulation‏‎ (1 revision)
  134. State Child pornography legislation‏‎ (1 revision)
  135. State Child protection legislation; solicitation and importuning‏‎ (1 revision)
  136. State Laws in general‏‎ (1 revision)
  137. State consumer protection laws‏‎ (1 revision)
  138. Statute of limitations‏‎ (1 revision)
  139. Statutory Protections‏‎ (1 revision)
  140. Strategy‏‎ (1 revision)
  141. Subjects of discovery; checklist‏‎ (1 revision)
  142. Sustainable Risk Reduction Through Information Security Process Test Template (Answer Key):‏‎ (1 revision)
  143. Sustainable Risk Reduction Through Information Security Process Testing Template:‏‎ (1 revision)
  144. Systems Development and Maintenance:‏‎ (1 revision)
  145. TR-39 Audit‏‎ (1 revision)
  146. Table formatting help‏‎ (1 revision)
  147. Taking of information‏‎ (1 revision)
  148. Tape recording initial client interview‏‎ (1 revision)
  149. Texas DOI:‏‎ (1 revision)
  150. Text formatting help‏‎ (1 revision)
  151. The Wiretap Act (Title III)‏‎ (1 revision)
  152. The possibility of restitution‏‎ (1 revision)
  153. Timing of plea bargain request‏‎ (1 revision)
  154. Tools:‏‎ (1 revision)
  155. Trade secret statutes‏‎ (1 revision)
  156. Trademark Links, Frames, Search Engines And Meta-Tags‏‎ (1 revision)
  157. Trademark in General‏‎ (1 revision)
  158. Trademark of Domain Names‏‎ (1 revision)
  159. Trespass‏‎ (1 revision)
  160. Trial brief‏‎ (1 revision)
  161. USAM 9-7.111‏‎ (1 revision)
  162. USA PATRIOT Act‏‎ (1 revision)
  163. Uncertainty as to applicability of the law‏‎ (1 revision)
  164. Uncertainty as to effect of case on a jury‏‎ (1 revision)
  165. Use of computer security consultants, EDP auditors, and computer professionals‏‎ (1 revision)
  166. Use of computer services; larceny‏‎ (1 revision)
  167. Use of discovery‏‎ (1 revision)
  168. Use of independent laboratory tests‏‎ (1 revision)
  169. Use of photographs and motion pictures‏‎ (1 revision)
  170. Use of private investigators‏‎ (1 revision)
  171. User’s Security Handbook -- RFC 2504 February 1999‏‎ (1 revision)
  172. Using electronically obtained evidence‏‎ (1 revision)
  173. Venue‏‎ (1 revision)
  174. Violation of privacy‏‎ (1 revision)
  175. Voir-dire questions checklist‏‎ (1 revision)
  176. Waiver or assertion of right to speedy trial‏‎ (1 revision)
  177. Why you need an intelligent file transfer solution.‏‎ (1 revision)
  178. Wisconsin DOI:‏‎ (1 revision)
  179. Witness preparation—Expert witnesses‏‎ (1 revision)
  180. Witness preparation—in general‏‎ (1 revision)
  181. Witnesses testifying as to documents‏‎ (1 revision)
  182. Zero-day exploit‏‎ (1 revision)
  183. 3.2.2.4: OS/400‏‎ (2 revisions)
  184. 44 USC 3501‏‎ (2 revisions)
  185. 44 USC 3501-3549‏‎ (2 revisions)
  186. AI1.2:‏‎ (2 revisions)
  187. AI2.1:‏‎ (2 revisions)
  188. AI2.3:‏‎ (2 revisions)
  189. AI2.4:‏‎ (2 revisions)
  190. AI2.9:‏‎ (2 revisions)
  191. AI4.2:‏‎ (2 revisions)
  192. AI6.4:‏‎ (2 revisions)
  193. AI7.6:‏‎ (2 revisions)
  194. AI7.7:‏‎ (2 revisions)
  195. Anti-cybersquatting Consumer Protection Act‏‎ (2 revisions)
  196. Character witnesses‏‎ (2 revisions)
  197. Communications Decency Act‏‎ (2 revisions)
  198. Computer network‏‎ (2 revisions)
  199. DB2 Database Asset Protection Standards:‏‎ (2 revisions)
  200. DS1.3:‏‎ (2 revisions)
  201. DS1.4:‏‎ (2 revisions)
  202. DS1.5:‏‎ (2 revisions)
  203. DS1.6:‏‎ (2 revisions)
  204. DS10.2:‏‎ (2 revisions)
  205. DS11.3:‏‎ (2 revisions)
  206. DS12.5:‏‎ (2 revisions)
  207. DS1:‏‎ (2 revisions)
  208. DS3:‏‎ (2 revisions)
  209. DS4.10:‏‎ (2 revisions)
  210. DS4.2:‏‎ (2 revisions)
  211. DS4.3:‏‎ (2 revisions)
  212. DS4.5:‏‎ (2 revisions)
  213. DS4:‏‎ (2 revisions)
  214. DS5.1:‏‎ (2 revisions)
  215. DS5.9:‏‎ (2 revisions)
  216. DS5:‏‎ (2 revisions)
  217. DS6.1:‏‎ (2 revisions)
  218. DS6.2:‏‎ (2 revisions)
  219. DS6.3:‏‎ (2 revisions)
  220. DS7.1:‏‎ (2 revisions)
  221. DS7.2:‏‎ (2 revisions)
  222. DS7.3:‏‎ (2 revisions)
  223. DS8.2:‏‎ (2 revisions)
  224. DS8.3:‏‎ (2 revisions)
  225. DS8.4:‏‎ (2 revisions)
  226. DS8.5:‏‎ (2 revisions)
  227. DS:2‏‎ (2 revisions)
  228. Department of Defense Information Assurance Certification and Accreditation Process‏‎ (2 revisions)
  229. Electronic Signatures in Global and National Commerce Act‏‎ (2 revisions)
  230. FN1‏‎ (2 revisions)
  231. FN10‏‎ (2 revisions)
  232. FN11‏‎ (2 revisions)
  233. FN12‏‎ (2 revisions)
  234. FN13‏‎ (2 revisions)
  235. FN14‏‎ (2 revisions)
  236. FN15‏‎ (2 revisions)
  237. FN16‏‎ (2 revisions)
  238. FN17‏‎ (2 revisions)
  239. FN18‏‎ (2 revisions)
  240. FN19‏‎ (2 revisions)
  241. FN20‏‎ (2 revisions)
  242. FN21‏‎ (2 revisions)
  243. FN22‏‎ (2 revisions)
  244. FN23‏‎ (2 revisions)
  245. FN24‏‎ (2 revisions)
  246. FN25‏‎ (2 revisions)
  247. FN26‏‎ (2 revisions)
  248. FN27‏‎ (2 revisions)
  249. FN28‏‎ (2 revisions)
  250. FN29‏‎ (2 revisions)
  251. FN3‏‎ (2 revisions)
  252. FN30‏‎ (2 revisions)
  253. FN31‏‎ (2 revisions)
  254. FN32‏‎ (2 revisions)
  255. FN33‏‎ (2 revisions)
  256. FN34‏‎ (2 revisions)
  257. FN35‏‎ (2 revisions)
  258. FN36‏‎ (2 revisions)
  259. FN37‏‎ (2 revisions)
  260. FN38‏‎ (2 revisions)
  261. FN39‏‎ (2 revisions)
  262. FN4‏‎ (2 revisions)
  263. FN40‏‎ (2 revisions)
  264. FN41‏‎ (2 revisions)
  265. FN42‏‎ (2 revisions)
  266. FN43‏‎ (2 revisions)
  267. FN44‏‎ (2 revisions)
  268. FN45‏‎ (2 revisions)
  269. FN46‏‎ (2 revisions)
  270. FN47‏‎ (2 revisions)
  271. FN48‏‎ (2 revisions)
  272. FN49‏‎ (2 revisions)
  273. FN5‏‎ (2 revisions)
  274. FN50‏‎ (2 revisions)
  275. FN51‏‎ (2 revisions)
  276. FN52‏‎ (2 revisions)
  277. FN53‏‎ (2 revisions)
  278. FN54‏‎ (2 revisions)
  279. FN55‏‎ (2 revisions)
  280. FN56‏‎ (2 revisions)
  281. FN6‏‎ (2 revisions)
  282. FN69‏‎ (2 revisions)
  283. FN7‏‎ (2 revisions)
  284. FN8‏‎ (2 revisions)
  285. FN9‏‎ (2 revisions)
  286. Federal Laws in general‏‎ (2 revisions)
  287. Generalized Contract Law Outline‏‎ (2 revisions)
  288. IBM OS/400 Asset Protection Standards:‏‎ (2 revisions)
  289. ISO/IEC 17799‏‎ (2 revisions)
  290. ISO/IEC 27002‏‎ (2 revisions)
  291. Industry Self-Regulation‏‎ (2 revisions)
  292. Information Risk Guide‏‎ (2 revisions)
  293. Infrastructure Best Practice Configuration Samples:‏‎ (2 revisions)
  294. Integrity‏‎ (2 revisions)
  295. Intent—knowledge‏‎ (2 revisions)
  296. International Issues‏‎ (2 revisions)
  297. International Organization for Standardization Security Standard:‏‎ (2 revisions)
  298. Jurisdiction‏‎ (2 revisions)
  299. KY DOI A.1:‏‎ (2 revisions)
  300. Libel‏‎ (2 revisions)
  301. Logical Security‏‎ (2 revisions)
  302. ME1.2:‏‎ (2 revisions)
  303. ME1.4:‏‎ (2 revisions)
  304. ME2.1:‏‎ (2 revisions)
  305. ME2.3:‏‎ (2 revisions)
  306. ME2.4:‏‎ (2 revisions)
  307. ME2.5:‏‎ (2 revisions)
  308. Miscellaneous federal laws‏‎ (2 revisions)
  309. Motion in limine‏‎ (2 revisions)
  310. Outline of issues involving search and seizure—Pursuant to warrant‏‎ (2 revisions)
  311. PCI-1.1.7:‏‎ (2 revisions)
  312. PCI-1.1.8:‏‎ (2 revisions)
  313. PCI-1.1.9:‏‎ (2 revisions)
  314. PCI-1.3.10:‏‎ (2 revisions)
  315. PCI-1.3.9:‏‎ (2 revisions)
  316. PCI-1.3:‏‎ (2 revisions)
  317. PCI-1.4.1:‏‎ (2 revisions)
  318. PCI-1.4.2:‏‎ (2 revisions)
  319. PCI-1.4:‏‎ (2 revisions)
  320. PCI-1.5:‏‎ (2 revisions)
  321. PCI-10.1:‏‎ (2 revisions)
  322. PCI-10.2.2:‏‎ (2 revisions)
  323. PCI-10.2.3:‏‎ (2 revisions)
  324. PCI-10.2.4:‏‎ (2 revisions)
  325. PCI-10.2.5:‏‎ (2 revisions)
  326. PCI-10.2.6:‏‎ (2 revisions)
  327. PCI-10.2.7:‏‎ (2 revisions)
  328. PCI-10.3.2:‏‎ (2 revisions)
  329. PCI-10.3.3:‏‎ (2 revisions)
  330. PCI-10.3.4:‏‎ (2 revisions)
  331. PCI-10.3.5:‏‎ (2 revisions)
  332. PCI-10.3.6:‏‎ (2 revisions)
  333. PCI-10.5.1:‏‎ (2 revisions)
  334. PCI-10.5.2:‏‎ (2 revisions)
  335. PCI-10.5.3:‏‎ (2 revisions)
  336. PCI-10.5.4:‏‎ (2 revisions)
  337. PCI-10.5.5:‏‎ (2 revisions)
  338. PCI-10.6:‏‎ (2 revisions)
  339. PCI-11.5:‏‎ (2 revisions)
  340. PCI-12.1.1:‏‎ (2 revisions)
  341. PCI-12.1.2:‏‎ (2 revisions)
  342. PCI-12.7:‏‎ (2 revisions)
  343. PCI-12.9.1:‏‎ (2 revisions)
  344. PCI-12.9.2:‏‎ (2 revisions)
  345. PCI-2.2.3:‏‎ (2 revisions)
  346. PCI-2.3:‏‎ (2 revisions)
  347. PCI-3.1‏‎ (2 revisions)
  348. PCI-3.4‏‎ (2 revisions)
  349. PCI-4.1.1:‏‎ (2 revisions)
  350. PCI-6.5.1:‏‎ (2 revisions)
  351. PCI-7.1:‏‎ (2 revisions)
  352. PCI-8.5.5:‏‎ (2 revisions)
  353. PCI-9.1.1:‏‎ (2 revisions)
  354. PCI-9.1.3:‏‎ (2 revisions)
  355. PCI-9.10.2:‏‎ (2 revisions)
  356. PCI-9.3.2:‏‎ (2 revisions)
  357. PCI 7:‏‎ (2 revisions)
  358. PCI 8:‏‎ (2 revisions)
  359. PO1.3:‏‎ (2 revisions)
  360. PO1.6:‏‎ (2 revisions)
  361. PO10.11:‏‎ (2 revisions)
  362. PO10.1:‏‎ (2 revisions)
  363. PO10.2:‏‎ (2 revisions)
  364. PO10.6:‏‎ (2 revisions)
  365. PO10.9:‏‎ (2 revisions)
  366. PO2.2:‏‎ (2 revisions)
  367. PO3.1:‏‎ (2 revisions)
  368. PO3.2:‏‎ (2 revisions)
  369. PO3.3:‏‎ (2 revisions)
  370. PO3.4:‏‎ (2 revisions)
  371. PO4.5:‏‎ (2 revisions)
  372. PO4.7:‏‎ (2 revisions)
  373. PO6.3:‏‎ (2 revisions)
  374. PO7.1:‏‎ (2 revisions)
  375. PO7.4:‏‎ (2 revisions)
  376. PO7.6:‏‎ (2 revisions)
  377. Plaintext‏‎ (2 revisions)
  378. Privacy Laws in United States‏‎ (2 revisions)
  379. Privilege (computer science)‏‎ (2 revisions)
  380. Proving computer theft‏‎ (2 revisions)
  381. Quality assurance‏‎ (2 revisions)
  382. Recovery Time Objective‏‎ (2 revisions)
  383. Requests‏‎ (2 revisions)
  384. Right of Publicity‏‎ (2 revisions)
  385. Russian copulation‏‎ (2 revisions)
  386. SAS 70‏‎ (2 revisions)
  387. SOX.1.23:‏‎ (2 revisions)
  388. SOX.1.2:‏‎ (2 revisions)
  389. SOX.1.5:‏‎ (2 revisions)
  390. SOX.2.0.20:‏‎ (2 revisions)
  391. SOX.2.0.22:‏‎ (2 revisions)
  392. SOX.2.0.25:‏‎ (2 revisions)
  393. SOX.2.0.31:‏‎ (2 revisions)
  394. SOX.2.7.10:‏‎ (2 revisions)
  395. SOX.2.7.12:‏‎ (2 revisions)
  396. SOX.2.7.13:‏‎ (2 revisions)
  397. SOX.2.7.14:‏‎ (2 revisions)
  398. SOX.2.7.17:‏‎ (2 revisions)
  399. SOX.4.2.1.8:‏‎ (2 revisions)
  400. SOX.4.2.1.9:‏‎ (2 revisions)
  401. SOX Policy References:‏‎ (2 revisions)
  402. Sample BYOD Acceptable Use Standard:‏‎ (2 revisions)
  403. Sample Integrity Protection Standard:‏‎ (2 revisions)
  404. Sample Legal Hold Standards:‏‎ (2 revisions)
  405. Sample Misuse Reporting Standard:‏‎ (2 revisions)
  406. Sample Security Awareness Accessibility Standard:‏‎ (2 revisions)
  407. Sample Third Party Security Awareness Standard:‏‎ (2 revisions)
  408. Sample Threat Monitoring Standard:‏‎ (2 revisions)
  409. Sample Vulnerability Management Standard:‏‎ (2 revisions)
  410. Sarbanes-Oxley‏‎ (2 revisions)
  411. Sarbanes-Oxley Policy Samples:‏‎ (2 revisions)
  412. Spam‏‎ (2 revisions)
  413. The Copyright Act‏‎ (2 revisions)
  414. The HIPAA Security and the Risk Dilemma:‏‎ (2 revisions)
  415. The Stored Communications Act‏‎ (2 revisions)
  416. USAM 9-7.200‏‎ (2 revisions)
  417. USC 18 1030‏‎ (2 revisions)
  418. USC 2701‏‎ (2 revisions)
  419. Uniform Computer Information Transactions Act‏‎ (2 revisions)
  420. 12 CFR 229.21‏‎ (3 revisions)
  421. 24‏‎ (3 revisions)
  422. 3.2.1.1: Routers‏‎ (3 revisions)
  423. 3.2.1.2: Firewalls‏‎ (3 revisions)
  424. 3.2.1.3: VPN‏‎ (3 revisions)
  425. 3.2.1.4: Managed Switches‏‎ (3 revisions)
  426. 3.2.1.5: Intrusion Detection or Prevention System‏‎ (3 revisions)
  427. 3.2.2.2: Windows‏‎ (3 revisions)
  428. 44 USC 3542‏‎ (3 revisions)
  429. AI1.1:‏‎ (3 revisions)
  430. AI2.2:‏‎ (3 revisions)
  431. AI2.6:‏‎ (3 revisions)
  432. AI3.3:‏‎ (3 revisions)
  433. AI3.4:‏‎ (3 revisions)
  434. AI5.3:‏‎ (3 revisions)
  435. AI5.4:‏‎ (3 revisions)
  436. AI7.12:‏‎ (3 revisions)
  437. AI7.3:‏‎ (3 revisions)
  438. AI7.5:‏‎ (3 revisions)
  439. Acquisition and Implementation:‏‎ (3 revisions)
  440. Availability‏‎ (3 revisions)
  441. Backup site‏‎ (3 revisions)
  442. Burden of proof‏‎ (3 revisions)
  443. Business-IT Alignment‏‎ (3 revisions)
  444. Business Continuity Planning Booklet‏‎ (3 revisions)
  445. Change Management:‏‎ (3 revisions)
  446. Change control‏‎ (3 revisions)
  447. Cleartext‏‎ (3 revisions)
  448. Configuration Mangement:‏‎ (3 revisions)
  449. Continuity Management:‏‎ (3 revisions)
  450. DS11.4:‏‎ (3 revisions)
  451. DS11.5:‏‎ (3 revisions)
  452. DS12.2:‏‎ (3 revisions)
  453. DS4.6:‏‎ (3 revisions)
  454. DS5.10:‏‎ (3 revisions)
  455. DS5.5:‏‎ (3 revisions)
  456. DS6.4:‏‎ (3 revisions)
  457. DS8.1:‏‎ (3 revisions)
  458. DS9.3:‏‎ (3 revisions)
  459. Discovery in general‏‎ (3 revisions)
  460. FN2‏‎ (3 revisions)
  461. FOIA‏‎ (3 revisions)
  462. Financial Management:‏‎ (3 revisions)
  463. GLBA Policy References:‏‎ (3 revisions)
  464. Gramm-Leach-Bliley:‏‎ (3 revisions)
  465. Health Insurance Portability and Accountability:‏‎ (3 revisions)
  466. IT Change Management‏‎ (3 revisions)
  467. Information Systems Acquisition, Development and Maintenance:‏‎ (3 revisions)
  468. ME4.3:‏‎ (3 revisions)
  469. Malicious Code Prevention‏‎ (3 revisions)
  470. PCI-1.1.1:‏‎ (3 revisions)
  471. PCI-1.1.4:‏‎ (3 revisions)
  472. PCI-1.1.6:‏‎ (3 revisions)
  473. PCI-1.2.2:‏‎ (3 revisions)
  474. PCI-1.2.3:‏‎ (3 revisions)
  475. PCI-1.3.3:‏‎ (3 revisions)
  476. PCI-1.3.5:‏‎ (3 revisions)
  477. PCI-1.3.6:‏‎ (3 revisions)
  478. PCI-1.3.7:‏‎ (3 revisions)
  479. PCI-1.3.8:‏‎ (3 revisions)
  480. PCI-10.2.1:‏‎ (3 revisions)
  481. PCI-10.4:‏‎ (3 revisions)
  482. PCI-12.8.3:‏‎ (3 revisions)
  483. PCI-6.3.1:‏‎ (3 revisions)
  484. PCI-9.1.2:‏‎ (3 revisions)
  485. PCI-9.3.1:‏‎ (3 revisions)
  486. PCI 6:‏‎ (3 revisions)
  487. PCI 9:‏‎ (3 revisions)
  488. PO1.4:‏‎ (3 revisions)
  489. PO2.3:‏‎ (3 revisions)
  490. PO6.1:‏‎ (3 revisions)
  491. PO6.4:‏‎ (3 revisions)
  492. PO7.8:‏‎ (3 revisions)
  493. PO9.3:‏‎ (3 revisions)
  494. Personally identifiable information‏‎ (3 revisions)
  495. Personnel Security:‏‎ (3 revisions)
  496. Privacy Laws in Canada‏‎ (3 revisions)
  497. Privacy Laws in Honduras‏‎ (3 revisions)
  498. RED/BLACK concept‏‎ (3 revisions)
  499. Recovery Consistency Objective‏‎ (3 revisions)
  500. Recovery Point Objective‏‎ (3 revisions)

View ( | ) (20 | 50 | 100 | 250 | 500)