Long pages

Jump to navigation Jump to search

Showing below up to 250 results in range #271 to #520.

View ( | ) (20 | 50 | 100 | 250 | 500)

  1. (hist) ‎State Child pornography legislation ‎[4,181 bytes]
  2. (hist) ‎Outline of issues involving search and seizure—Not pursuant to warrant ‎[4,174 bytes]
  3. (hist) ‎PO4.11: ‎[4,167 bytes]
  4. (hist) ‎Determining factors ‎[4,163 bytes]
  5. (hist) ‎PO4.5: ‎[4,143 bytes]
  6. (hist) ‎SOX.5.1.13: ‎[4,131 bytes]
  7. (hist) ‎PO1.3: ‎[4,131 bytes]
  8. (hist) ‎PO10.3: ‎[4,102 bytes]
  9. (hist) ‎31 CFR 1010.340 ‎[4,088 bytes]
  10. (hist) ‎Malicious Code Prevention ‎[4,061 bytes]
  11. (hist) ‎44 USC 3535 ‎[4,053 bytes]
  12. (hist) ‎Sample Protection Standards: ‎[4,043 bytes]
  13. (hist) ‎Voir-dire questions checklist ‎[4,032 bytes]
  14. (hist) ‎Sample Encryption Standard: ‎[4,025 bytes]
  15. (hist) ‎Manage Document Metadata ‎[4,023 bytes]
  16. (hist) ‎GLBA Policy References: ‎[4,011 bytes]
  17. (hist) ‎PO2.4: ‎[4,004 bytes]
  18. (hist) ‎Privacy Laws in Costa Rica ‎[3,972 bytes]
  19. (hist) ‎AI1.1: ‎[3,970 bytes]
  20. (hist) ‎DS7.2: ‎[3,965 bytes]
  21. (hist) ‎DS5.6: ‎[3,961 bytes]
  22. (hist) ‎Taking of information ‎[3,960 bytes]
  23. (hist) ‎Risk management plan ‎[3,958 bytes]
  24. (hist) ‎Physical and Environmental Security: ‎[3,955 bytes]
  25. (hist) ‎AI6.3: ‎[3,954 bytes]
  26. (hist) ‎Configuration Mangement: ‎[3,941 bytes]
  27. (hist) ‎DS13.1: ‎[3,908 bytes]
  28. (hist) ‎Service Desk Management: ‎[3,907 bytes]
  29. (hist) ‎Laws and Regulations: ‎[3,904 bytes]
  30. (hist) ‎Witnesses testifying as to documents ‎[3,858 bytes]
  31. (hist) ‎PCI 10: ‎[3,838 bytes]
  32. (hist) ‎DS12.2: ‎[3,787 bytes]
  33. (hist) ‎Availability ‎[3,780 bytes]
  34. (hist) ‎AI7.3: ‎[3,774 bytes]
  35. (hist) ‎DS1.1: ‎[3,766 bytes]
  36. (hist) ‎IT Change Management ‎[3,762 bytes]
  37. (hist) ‎PCI-4.1.1: ‎[3,758 bytes]
  38. (hist) ‎DS9.1: ‎[3,726 bytes]
  39. (hist) ‎Zero-day exploit ‎[3,715 bytes]
  40. (hist) ‎AI2.5: ‎[3,663 bytes]
  41. (hist) ‎Sample New Hire Security Awareness Standard: ‎[3,622 bytes]
  42. (hist) ‎AI3.1: ‎[3,611 bytes]
  43. (hist) ‎PCI-3.4 ‎[3,604 bytes]
  44. (hist) ‎PO4.3: ‎[3,600 bytes]
  45. (hist) ‎Sample Information Systems and Technology Security Policy: ‎[3,594 bytes]
  46. (hist) ‎PO1.5: ‎[3,592 bytes]
  47. (hist) ‎Discrediting expert witnesses—Illustrative cross-examination of systems analyst ‎[3,580 bytes]
  48. (hist) ‎Service Level Agreement ‎[3,553 bytes]
  49. (hist) ‎Insurance: ‎[3,551 bytes]
  50. (hist) ‎SB-1386 ‎[3,531 bytes]
  51. (hist) ‎Outline of issues involving search and seizure—Pursuant to warrant ‎[3,481 bytes]
  52. (hist) ‎Microsoft Operations Framework ‎[3,480 bytes]
  53. (hist) ‎AI7.6: ‎[3,480 bytes]
  54. (hist) ‎DS3.3: ‎[3,476 bytes]
  55. (hist) ‎PO1.6: ‎[3,474 bytes]
  56. (hist) ‎Persuading defendant to accept plea bargain ‎[3,468 bytes]
  57. (hist) ‎Change control ‎[3,461 bytes]
  58. (hist) ‎SOX.6.1.1: ‎[3,458 bytes]
  59. (hist) ‎Compliance ‎[3,455 bytes]
  60. (hist) ‎PO5.5: ‎[3,434 bytes]
  61. (hist) ‎Sample Acceptable Use Policy: ‎[3,383 bytes]
  62. (hist) ‎North Carolina Identity Theft Protection Act of 2005 ‎[3,379 bytes]
  63. (hist) ‎PCI 8: ‎[3,373 bytes]
  64. (hist) ‎DS11.5: ‎[3,360 bytes]
  65. (hist) ‎Motion to exclude computer-generated evidence ‎[3,349 bytes]
  66. (hist) ‎DS13.2: ‎[3,331 bytes]
  67. (hist) ‎PO8.2: ‎[3,304 bytes]
  68. (hist) ‎Electronic Communications Privacy Act ‎[3,302 bytes]
  69. (hist) ‎Sample Auditing Standard: ‎[3,291 bytes]
  70. (hist) ‎Sample Security Awareness Policy: ‎[3,291 bytes]
  71. (hist) ‎DS4.1: ‎[3,286 bytes]
  72. (hist) ‎Preface ‎[3,285 bytes]
  73. (hist) ‎SOX Policy References: ‎[3,272 bytes]
  74. (hist) ‎PO9.3: ‎[3,268 bytes]
  75. (hist) ‎DS10.2: ‎[3,243 bytes]
  76. (hist) ‎PCI-10.4: ‎[3,241 bytes]
  77. (hist) ‎Intent ‎[3,232 bytes]
  78. (hist) ‎PO6.5: ‎[3,211 bytes]
  79. (hist) ‎PO3.5: ‎[3,211 bytes]
  80. (hist) ‎AI5.1: ‎[3,198 bytes]
  81. (hist) ‎SOX.4.2.1.9: ‎[3,189 bytes]
  82. (hist) ‎PCI-3.1 ‎[3,186 bytes]
  83. (hist) ‎SOX.4.2.1.10: ‎[3,182 bytes]
  84. (hist) ‎DS4.4: ‎[3,182 bytes]
  85. (hist) ‎Client interview checklist ‎[3,181 bytes]
  86. (hist) ‎Business Impact Analysis ‎[3,180 bytes]
  87. (hist) ‎DS9.2: ‎[3,151 bytes]
  88. (hist) ‎AI3.4: ‎[3,129 bytes]
  89. (hist) ‎PO6.3: ‎[3,106 bytes]
  90. (hist) ‎AI6.5: ‎[3,099 bytes]
  91. (hist) ‎PCI-11.2: ‎[3,098 bytes]
  92. (hist) ‎PO6.4: ‎[3,096 bytes]
  93. (hist) ‎Factors affecting amount of fee ‎[3,090 bytes]
  94. (hist) ‎PO4.6: ‎[3,084 bytes]
  95. (hist) ‎Electronic Signatures in Global and National Commerce Act ‎[3,080 bytes]
  96. (hist) ‎AI5.4: ‎[3,075 bytes]
  97. (hist) ‎AI7.5: ‎[3,074 bytes]
  98. (hist) ‎'''Information Technology Risk Calculator''' ‎[3,071 bytes]
  99. (hist) ‎FERPA ‎[3,054 bytes]
  100. (hist) ‎Drafting instructions to jury—key terms ‎[3,053 bytes]
  101. (hist) ‎AI2.6: ‎[3,040 bytes]
  102. (hist) ‎Release on own recognizance ‎[3,024 bytes]
  103. (hist) ‎SOX.4.2.1.8: ‎[3,016 bytes]
  104. (hist) ‎Problem Management: ‎[3,011 bytes]
  105. (hist) ‎Acquisition and Implementation: ‎[2,992 bytes]
  106. (hist) ‎PO1.4: ‎[2,976 bytes]
  107. (hist) ‎Search and Seizure Preface and Acknowledgments ‎[2,949 bytes]
  108. (hist) ‎Cross-examination of prosecution witnesses for the Prosecution ‎[2,923 bytes]
  109. (hist) ‎SOX.1.25: ‎[2,920 bytes]
  110. (hist) ‎Sample Asset Management Policy: ‎[2,915 bytes]
  111. (hist) ‎PCI-12.8.3: ‎[2,912 bytes]
  112. (hist) ‎SOX.2.0.18: ‎[2,912 bytes]
  113. (hist) ‎DS5.8: ‎[2,906 bytes]
  114. (hist) ‎SOX.1.1.1: ‎[2,902 bytes]
  115. (hist) ‎DS2.2: ‎[2,901 bytes]
  116. (hist) ‎SOX.2.0.22: ‎[2,900 bytes]
  117. (hist) ‎DS5.1: ‎[2,899 bytes]
  118. (hist) ‎Interviewing witnesses ‎[2,897 bytes]
  119. (hist) ‎SOX.1.1: ‎[2,893 bytes]
  120. (hist) ‎SOX.2.0.25: ‎[2,891 bytes]
  121. (hist) ‎SOX.2.0.15: ‎[2,885 bytes]
  122. (hist) ‎PO10.9: ‎[2,876 bytes]
  123. (hist) ‎44 USC 3501 ‎[2,872 bytes]
  124. (hist) ‎PCI-2.1.1: ‎[2,859 bytes]
  125. (hist) ‎PO4.4: ‎[2,854 bytes]
  126. (hist) ‎SOX.6.1.4: ‎[2,840 bytes]
  127. (hist) ‎Law enforcement witnesses for the Prosecution ‎[2,835 bytes]
  128. (hist) ‎44 USC 3533 ‎[2,824 bytes]
  129. (hist) ‎PCI-9.2: ‎[2,824 bytes]
  130. (hist) ‎Experts ‎[2,820 bytes]
  131. (hist) ‎Legal Electronic Data Exchange Standard ‎[2,812 bytes]
  132. (hist) ‎SOX.2.7.11: ‎[2,811 bytes]
  133. (hist) ‎PO9.1: ‎[2,806 bytes]
  134. (hist) ‎ME4.1: ‎[2,804 bytes]
  135. (hist) ‎SOX.4.4.8: ‎[2,803 bytes]
  136. (hist) ‎AI5.3: ‎[2,802 bytes]
  137. (hist) ‎PCI-2.2.3: ‎[2,798 bytes]
  138. (hist) ‎PCI-12.9.1: ‎[2,793 bytes]
  139. (hist) ‎PCI-11.5: ‎[2,784 bytes]
  140. (hist) ‎AI7.12: ‎[2,780 bytes]
  141. (hist) ‎PO3.1: ‎[2,771 bytes]
  142. (hist) ‎ME4.2: ‎[2,763 bytes]
  143. (hist) ‎DS11.3: ‎[2,758 bytes]
  144. (hist) ‎Sample Threat Assessment and Monitoring Policy: ‎[2,756 bytes]
  145. (hist) ‎DS2.1: ‎[2,755 bytes]
  146. (hist) ‎ME4.3: ‎[2,751 bytes]
  147. (hist) ‎Preliminary Tactics in general ‎[2,748 bytes]
  148. (hist) ‎PCI-1.1.5: ‎[2,743 bytes]
  149. (hist) ‎SOX.2.0.17: ‎[2,724 bytes]
  150. (hist) ‎Communications Decency Act - Obscene Materials ‎[2,712 bytes]
  151. (hist) ‎AI7.10: ‎[2,711 bytes]
  152. (hist) ‎PO10.6: ‎[2,709 bytes]
  153. (hist) ‎PCI-6.5.5: ‎[2,708 bytes]
  154. (hist) ‎PCI-6.5.3: ‎[2,706 bytes]
  155. (hist) ‎PCI-6.5.2: ‎[2,705 bytes]
  156. (hist) ‎Online Auctions ‎[2,704 bytes]
  157. (hist) ‎SOX.1.2: ‎[2,704 bytes]
  158. (hist) ‎PCI-12.8.4: ‎[2,703 bytes]
  159. (hist) ‎PCI-12.8.1: ‎[2,703 bytes]
  160. (hist) ‎IBM OS/400 Asset Protection Standards: ‎[2,702 bytes]
  161. (hist) ‎PCI 11: ‎[2,702 bytes]
  162. (hist) ‎PCI-6.5.6: ‎[2,697 bytes]
  163. (hist) ‎PCI-2.3: ‎[2,695 bytes]
  164. (hist) ‎PCI-12.8.5: ‎[2,692 bytes]
  165. (hist) ‎AI2.4: ‎[2,687 bytes]
  166. (hist) ‎PCI-6.5.10: ‎[2,684 bytes]
  167. (hist) ‎PO2.3: ‎[2,684 bytes]
  168. (hist) ‎PCI-11.1: ‎[2,678 bytes]
  169. (hist) ‎In general; locating witnesses ‎[2,675 bytes]
  170. (hist) ‎PCI-6.5.1: ‎[2,671 bytes]
  171. (hist) ‎PCI-6.5.7: ‎[2,670 bytes]
  172. (hist) ‎PCI-6.5.4: ‎[2,670 bytes]
  173. (hist) ‎12 USC 3407 ‎[2,669 bytes]
  174. (hist) ‎PCI-9.1.1: ‎[2,669 bytes]
  175. (hist) ‎PCI-6.5.9: ‎[2,667 bytes]
  176. (hist) ‎PCI-6.5.8: ‎[2,666 bytes]
  177. (hist) ‎PCI-12.8.2: ‎[2,664 bytes]
  178. (hist) ‎PCI-1.3.10: ‎[2,656 bytes]
  179. (hist) ‎AI4.2: ‎[2,653 bytes]
  180. (hist) ‎SOX.1.7: ‎[2,652 bytes]
  181. (hist) ‎SOX.1.22: ‎[2,650 bytes]
  182. (hist) ‎PO4.8: ‎[2,647 bytes]
  183. (hist) ‎PCI-8.5.1: ‎[2,641 bytes]
  184. (hist) ‎SOX.4.2.1.7: ‎[2,637 bytes]
  185. (hist) ‎PO7.8: ‎[2,627 bytes]
  186. (hist) ‎PCI-1.3.9: ‎[2,617 bytes]
  187. (hist) ‎SOX.2.3.4: ‎[2,610 bytes]
  188. (hist) ‎DS5.7: ‎[2,606 bytes]
  189. (hist) ‎KY DOI A.1: ‎[2,601 bytes]
  190. (hist) ‎PO10.13: ‎[2,590 bytes]
  191. (hist) ‎ME1.2: ‎[2,585 bytes]
  192. (hist) ‎AI2.8: ‎[2,585 bytes]
  193. (hist) ‎PCI-8.5.8: ‎[2,583 bytes]
  194. (hist) ‎PCI-2.2.2: ‎[2,576 bytes]
  195. (hist) ‎PO10.2: ‎[2,572 bytes]
  196. (hist) ‎PO4.2: ‎[2,568 bytes]
  197. (hist) ‎44 USC 3532 ‎[2,565 bytes]
  198. (hist) ‎PCI-5.2: ‎[2,559 bytes]
  199. (hist) ‎DS3.5: ‎[2,559 bytes]
  200. (hist) ‎PCI-3.6.6: ‎[2,554 bytes]
  201. (hist) ‎PCI-6.3.7: ‎[2,553 bytes]
  202. (hist) ‎Proving computer theft ‎[2,549 bytes]
  203. (hist) ‎SOX.2.0.28: ‎[2,544 bytes]
  204. (hist) ‎SOX.2.0.26: ‎[2,541 bytes]
  205. (hist) ‎PCI-8.2: ‎[2,539 bytes]
  206. (hist) ‎PO3.2: ‎[2,535 bytes]
  207. (hist) ‎SOX.2.0.31: ‎[2,531 bytes]
  208. (hist) ‎PCI-7.2: ‎[2,527 bytes]
  209. (hist) ‎PCI-3.6.10: ‎[2,517 bytes]
  210. (hist) ‎SOX.2.0.24: ‎[2,516 bytes]
  211. (hist) ‎SOX.2.7.15: ‎[2,507 bytes]
  212. (hist) ‎AI1.3: ‎[2,503 bytes]
  213. (hist) ‎PCI-9.10.1: ‎[2,501 bytes]
  214. (hist) ‎PCI-8.5.13: ‎[2,501 bytes]
  215. (hist) ‎Department of Defense Information Assurance Certification and Accreditation Process ‎[2,499 bytes]
  216. (hist) ‎PO5.1: ‎[2,498 bytes]
  217. (hist) ‎PO4.15: ‎[2,497 bytes]
  218. (hist) ‎PCI-8.5.16: ‎[2,491 bytes]
  219. (hist) ‎PCI-8.5.12: ‎[2,488 bytes]
  220. (hist) ‎PCI-8.5.9: ‎[2,487 bytes]
  221. (hist) ‎SOX.2.0.30: ‎[2,486 bytes]
  222. (hist) ‎PO5.2: ‎[2,486 bytes]
  223. (hist) ‎Proceedings by Way of Preliminary Hearing in general ‎[2,483 bytes]
  224. (hist) ‎SOX.2.7.6: ‎[2,483 bytes]
  225. (hist) ‎SOX.2.0.21: ‎[2,483 bytes]
  226. (hist) ‎PCI-11.4: ‎[2,477 bytes]
  227. (hist) ‎PCI-1.1.7: ‎[2,473 bytes]
  228. (hist) ‎PCI-2.2.4: ‎[2,471 bytes]
  229. (hist) ‎SOX.2.0.19: ‎[2,467 bytes]
  230. (hist) ‎AI6.2: ‎[2,467 bytes]
  231. (hist) ‎Integrity ‎[2,465 bytes]
  232. (hist) ‎PCI-10.7: ‎[2,465 bytes]
  233. (hist) ‎PCI-9.6: ‎[2,462 bytes]
  234. (hist) ‎PCI-6.3.4: ‎[2,462 bytes]
  235. (hist) ‎PCI-3.6.9: ‎[2,462 bytes]
  236. (hist) ‎PO10.1: ‎[2,462 bytes]
  237. (hist) ‎DS12.1: ‎[2,461 bytes]
  238. (hist) ‎44 USC 3501-3549 ‎[2,460 bytes]
  239. (hist) ‎PCI 4: ‎[2,460 bytes]
  240. (hist) ‎SOX.2.7.9: ‎[2,458 bytes]
  241. (hist) ‎ME4.6: ‎[2,458 bytes]
  242. (hist) ‎PCI-3.6.8: ‎[2,457 bytes]
  243. (hist) ‎PCI-1.4.2: ‎[2,457 bytes]
  244. (hist) ‎SOX.2.0.13: ‎[2,455 bytes]
  245. (hist) ‎Data Privacy Laws and Regulations ‎[2,454 bytes]
  246. (hist) ‎PCI-3.6.7: ‎[2,454 bytes]
  247. (hist) ‎PCI-12.7: ‎[2,453 bytes]
  248. (hist) ‎PCI-12.5.2: ‎[2,451 bytes]
  249. (hist) ‎PCI-7.1: ‎[2,445 bytes]
  250. (hist) ‎PO4.7: ‎[2,443 bytes]

View ( | ) (20 | 50 | 100 | 250 | 500)