Long pages

Jump to navigation Jump to search

Showing below up to 500 results in range #1 to #500.

View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)

  1. (hist) ‎Searching and Seizing Computers Without a Warrant ‎[157,588 bytes]
  2. (hist) ‎USA PATRIOT Act ‎[145,903 bytes]
  3. (hist) ‎Searching and Seizing Computers With a Warrant ‎[140,916 bytes]
  4. (hist) ‎Electronic Surveillance in Communications Networks ‎[99,134 bytes]
  5. (hist) ‎FN2 ‎[86,886 bytes]
  6. (hist) ‎Search and Seizure Appendices ‎[85,364 bytes]
  7. (hist) ‎Access Control: ‎[79,664 bytes]
  8. (hist) ‎User’s Security Handbook -- RFC 2504 February 1999 ‎[76,490 bytes]
  9. (hist) ‎Information Technology Auditor's Glossary: ‎[76,073 bytes]
  10. (hist) ‎Computer Fraud and Abuse Act (CFAA) ‎[54,028 bytes]
  11. (hist) ‎Net Neutrality ‎[53,091 bytes]
  12. (hist) ‎Intellectual property ‎[47,403 bytes]
  13. (hist) ‎Corporate Governance ‎[45,614 bytes]
  14. (hist) ‎Risk Assessment and Treatment: ‎[44,375 bytes]
  15. (hist) ‎Evidence ‎[43,542 bytes]
  16. (hist) ‎Horsewiki/index.php ‎[41,991 bytes]
  17. (hist) ‎Trademark ‎[40,233 bytes]
  18. (hist) ‎ME2.6: ‎[40,231 bytes]
  19. (hist) ‎Sarbanes-Oxley ‎[39,235 bytes]
  20. (hist) ‎Judicial Decisions on CDA ‎[38,865 bytes]
  21. (hist) ‎Identity theft ‎[37,997 bytes]
  22. (hist) ‎ITIL ‎[37,458 bytes]
  23. (hist) ‎Security Management: ‎[32,737 bytes]
  24. (hist) ‎First Amendment ‎[32,550 bytes]
  25. (hist) ‎Audit Guidance Examination Procedures ‎[32,455 bytes]
  26. (hist) ‎HIPAA ‎[32,262 bytes]
  27. (hist) ‎Copyright Fair Use ‎[31,894 bytes]
  28. (hist) ‎Government Agency Regulation ‎[31,427 bytes]
  29. (hist) ‎Corporate governance ‎[29,694 bytes]
  30. (hist) ‎18 USC 2518 ‎[29,658 bytes]
  31. (hist) ‎Trademark of Domain Names ‎[29,297 bytes]
  32. (hist) ‎Database Application Best Practice Configuration Samples: ‎[29,094 bytes]
  33. (hist) ‎Audit Booklet ‎[28,965 bytes]
  34. (hist) ‎Risk management ‎[28,052 bytes]
  35. (hist) ‎Copyright Infringement Issues ‎[27,925 bytes]
  36. (hist) ‎Trademark Links, Frames, Search Engines And Meta-Tags ‎[27,272 bytes]
  37. (hist) ‎Digital Millennium Copyright Act (DMCA) ‎[27,110 bytes]
  38. (hist) ‎Cryptography ‎[26,231 bytes]
  39. (hist) ‎CAN-SPAM ‎[26,165 bytes]
  40. (hist) ‎Credit card fraud ‎[25,397 bytes]
  41. (hist) ‎Statutory Protections ‎[23,399 bytes]
  42. (hist) ‎IT Security Risk Management Demystified ‎[23,119 bytes]
  43. (hist) ‎American Bar Association Digital Signature Guidelines ‎[22,924 bytes]
  44. (hist) ‎Oracle Database Asset Protection Standards: ‎[22,584 bytes]
  45. (hist) ‎Privacy: Statutory Protections ‎[22,440 bytes]
  46. (hist) ‎Software Configuration Management ‎[22,181 bytes]
  47. (hist) ‎DS2.4: ‎[21,923 bytes]
  48. (hist) ‎Key Privacy Cases ‎[21,713 bytes]
  49. (hist) ‎Information Security Audit ‎[21,066 bytes]
  50. (hist) ‎Disaster Recovery Requirements Analysis ‎[20,321 bytes]
  51. (hist) ‎Jurisdiction ‎[20,238 bytes]
  52. (hist) ‎Law ‎[20,032 bytes]
  53. (hist) ‎Basel 2 ‎[19,955 bytes]
  54. (hist) ‎Privacy ‎[19,793 bytes]
  55. (hist) ‎Communications and Operations Management: ‎[19,676 bytes]
  56. (hist) ‎International Issues ‎[19,564 bytes]
  57. (hist) ‎Generalized Torts Outline ‎[19,405 bytes]
  58. (hist) ‎Electronic data interchange ‎[18,754 bytes]
  59. (hist) ‎Privacy Laws in Mexico ‎[18,657 bytes]
  60. (hist) ‎Click Wrap Licenses ‎[18,559 bytes]
  61. (hist) ‎MySQL Database Asset Protection Standards: ‎[18,514 bytes]
  62. (hist) ‎FOIA ‎[18,377 bytes]
  63. (hist) ‎Privacy Laws in Canada ‎[18,196 bytes]
  64. (hist) ‎AES ‎[18,051 bytes]
  65. (hist) ‎Trademark in General ‎[17,867 bytes]
  66. (hist) ‎Selected Defamation Defenses ‎[16,960 bytes]
  67. (hist) ‎Sample Life Cycle Management Standard: ‎[16,880 bytes]
  68. (hist) ‎Legal-Technology White Papers ‎[16,046 bytes]
  69. (hist) ‎Marketing Issues of Promotions ‎[16,007 bytes]
  70. (hist) ‎Anonymity ‎[15,830 bytes]
  71. (hist) ‎Business continuity planning ‎[15,668 bytes]
  72. (hist) ‎FFIEC: ‎[15,633 bytes]
  73. (hist) ‎Continuous auditing ‎[15,507 bytes]
  74. (hist) ‎Directive 95/46/EC ‎[15,443 bytes]
  75. (hist) ‎Fraud ‎[15,260 bytes]
  76. (hist) ‎GLBA: ‎[15,118 bytes]
  77. (hist) ‎USC 18 1030 ‎[14,955 bytes]
  78. (hist) ‎Data Terminology ‎[14,589 bytes]
  79. (hist) ‎Sample Electronic Fraud Prevention Guidelines: ‎[14,482 bytes]
  80. (hist) ‎Sample Remote Access Standard: ‎[14,265 bytes]
  81. (hist) ‎Computer Fraud and Abuse Act ‎[14,263 bytes]
  82. (hist) ‎Copyright in General ‎[14,155 bytes]
  83. (hist) ‎Web Application Auditing: ‎[14,126 bytes]
  84. (hist) ‎Privacy Laws in United States ‎[13,983 bytes]
  85. (hist) ‎Bank Secrecy Act: ‎[13,374 bytes]
  86. (hist) ‎Encryption ‎[13,084 bytes]
  87. (hist) ‎Copyright Trespass to Chattels ‎[13,062 bytes]
  88. (hist) ‎Recovery Point Objective ‎[13,053 bytes]
  89. (hist) ‎Capability Maturity Model ‎[12,771 bytes]
  90. (hist) ‎Personally identifiable information ‎[12,734 bytes]
  91. (hist) ‎Sample Threat Monitoring Standard: ‎[12,532 bytes]
  92. (hist) ‎Sample Physical Access Standard: ‎[12,517 bytes]
  93. (hist) ‎Sample System Development Life Cycle Standard: ‎[12,457 bytes]
  94. (hist) ‎Sample Change Control Standard: ‎[12,447 bytes]
  95. (hist) ‎Fair Credit Reporting Act ‎[12,093 bytes]
  96. (hist) ‎It-governance ‎[11,939 bytes]
  97. (hist) ‎Development and Acquisition Booklet ‎[11,803 bytes]
  98. (hist) ‎The Stored Communications Act ‎[11,741 bytes]
  99. (hist) ‎Security through obscurity ‎[11,601 bytes]
  100. (hist) ‎Right of Publicity ‎[11,421 bytes]
  101. (hist) ‎E-Banking Booklet ‎[11,140 bytes]
  102. (hist) ‎Search and Seizure Introduction ‎[10,943 bytes]
  103. (hist) ‎44 USC 3544 ‎[10,916 bytes]
  104. (hist) ‎Sample Vulnerability Assessment Standard: ‎[10,895 bytes]
  105. (hist) ‎Enterprise Open-Source Policy Sample: ‎[10,893 bytes]
  106. (hist) ‎Sample Telecommunication Acceptable Use Standard: ‎[10,673 bytes]
  107. (hist) ‎44 USC 3534 ‎[10,643 bytes]
  108. (hist) ‎Copyright Non-Preemptable Common Law Claims ‎[10,498 bytes]
  109. (hist) ‎Clinger-Cohen-Act ‎[10,447 bytes]
  110. (hist) ‎Risk assessment ‎[10,402 bytes]
  111. (hist) ‎References: ‎[10,348 bytes]
  112. (hist) ‎DS5.2: ‎[10,265 bytes]
  113. (hist) ‎Physical and Environmental Protection ‎[10,260 bytes]
  114. (hist) ‎SSAE 16 ‎[10,196 bytes]
  115. (hist) ‎AI6.1: ‎[10,146 bytes]
  116. (hist) ‎Searching and Seizing Computers and Obtaining Electronic Evidence Manual ‎[10,142 bytes]
  117. (hist) ‎Human Resources Security: ‎[10,111 bytes]
  118. (hist) ‎Personnel Security: ‎[10,019 bytes]
  119. (hist) ‎Sample Third Party Security Awareness Standard: ‎[9,908 bytes]
  120. (hist) ‎Sample Asset Protection Standard: ‎[9,889 bytes]
  121. (hist) ‎Sample BYOD Acceptable Use Standard: ‎[9,880 bytes]
  122. (hist) ‎Anti-cybersquatting Consumer Protection Act ‎[9,791 bytes]
  123. (hist) ‎Uniform Electronic Transactions Act ‎[9,700 bytes]
  124. (hist) ‎The Defense of a Computer Crime Case ‎[9,691 bytes]
  125. (hist) ‎FISMA ‎[9,635 bytes]
  126. (hist) ‎Social Computing Guidelines ‎[9,633 bytes]
  127. (hist) ‎Business Continuity Management: ‎[9,610 bytes]
  128. (hist) ‎Incident Management: ‎[9,514 bytes]
  129. (hist) ‎Computer Crime Statues by State ‎[9,457 bytes]
  130. (hist) ‎Defamation in General ‎[9,360 bytes]
  131. (hist) ‎Federal Child pornography legislation ‎[9,224 bytes]
  132. (hist) ‎Child pornography legislation ‎[9,216 bytes]
  133. (hist) ‎Main Page ‎[9,170 bytes]
  134. (hist) ‎Text formatting help ‎[9,101 bytes]
  135. (hist) ‎The Wiretap Act (Title III) ‎[9,075 bytes]
  136. (hist) ‎HITECH ‎[9,067 bytes]
  137. (hist) ‎PO1.2: ‎[8,921 bytes]
  138. (hist) ‎Information Systems Acquisition, Development and Maintenance: ‎[8,899 bytes]
  139. (hist) ‎31 USC 5321 ‎[8,878 bytes]
  140. (hist) ‎Sample Legal Hold Standards: ‎[8,854 bytes]
  141. (hist) ‎Sample Vulnerability Management Standard: ‎[8,758 bytes]
  142. (hist) ‎Data Security ‎[8,755 bytes]
  143. (hist) ‎PCI: ‎[8,608 bytes]
  144. (hist) ‎Sample Internet Acceptable Use Policy: ‎[8,593 bytes]
  145. (hist) ‎Sample Threat Assessment Standard: ‎[8,522 bytes]
  146. (hist) ‎Generalized Contract Law Outline ‎[8,423 bytes]
  147. (hist) ‎Sample On Premise Wireless Access Technology Guideline ‎[8,376 bytes]
  148. (hist) ‎ISO/IEC 27002 ‎[8,375 bytes]
  149. (hist) ‎DS5.9: ‎[8,345 bytes]
  150. (hist) ‎Assessments ‎[8,256 bytes]
  151. (hist) ‎Spam ‎[8,238 bytes]
  152. (hist) ‎Sample Access Control Standard: ‎[8,172 bytes]
  153. (hist) ‎Liability For Trademark Infringement ‎[8,136 bytes]
  154. (hist) ‎Security Policy: ‎[8,117 bytes]
  155. (hist) ‎Sample Asset Identification and Classification Policy: ‎[8,036 bytes]
  156. (hist) ‎International Organization for Standardization Security Standard: ‎[8,020 bytes]
  157. (hist) ‎Privacy Laws in Panama ‎[7,997 bytes]
  158. (hist) ‎Organizing Information Security: ‎[7,810 bytes]
  159. (hist) ‎KY EXHIBIT C: ‎[7,760 bytes]
  160. (hist) ‎State Child protection legislation; solicitation and importuning ‎[7,578 bytes]
  161. (hist) ‎Sample Integrity Protection Standard: ‎[7,546 bytes]
  162. (hist) ‎Information assurance ‎[7,535 bytes]
  163. (hist) ‎BS 25999 ‎[7,434 bytes]
  164. (hist) ‎PCI 12: ‎[7,410 bytes]
  165. (hist) ‎Microsoft SQL Database Asset Protection Standards: ‎[7,257 bytes]
  166. (hist) ‎Misappropriation Of Trade Secrets ‎[7,167 bytes]
  167. (hist) ‎DS5.5: ‎[7,073 bytes]
  168. (hist) ‎3.2.1.5: Intrusion Detection or Prevention System ‎[7,061 bytes]
  169. (hist) ‎Logical Security ‎[7,057 bytes]
  170. (hist) ‎3.2.1.4: Managed Switches ‎[7,044 bytes]
  171. (hist) ‎Sample Software Acceptable Use Standard: ‎[6,968 bytes]
  172. (hist) ‎Sample Electronic Mail Acceptable Use Standard: ‎[6,936 bytes]
  173. (hist) ‎DS2.3: ‎[6,930 bytes]
  174. (hist) ‎3.2.2.1: Unix ‎[6,924 bytes]
  175. (hist) ‎Configuration Management: ‎[6,831 bytes]
  176. (hist) ‎Copyright Rights Acquisition ‎[6,611 bytes]
  177. (hist) ‎Best Practices Research Reports: ‎[6,603 bytes]
  178. (hist) ‎ISO/IEC 17799 ‎[6,588 bytes]
  179. (hist) ‎Sample Misuse Reporting Standard: ‎[6,448 bytes]
  180. (hist) ‎AI2.10: ‎[6,443 bytes]
  181. (hist) ‎3.2.1.2: Firewalls ‎[6,401 bytes]
  182. (hist) ‎3.2.2.4: OS/400 ‎[6,392 bytes]
  183. (hist) ‎Burden of proof ‎[6,328 bytes]
  184. (hist) ‎Illustrative summation ‎[6,327 bytes]
  185. (hist) ‎PO8.3: ‎[6,267 bytes]
  186. (hist) ‎Defamation In Cyberspace ‎[6,233 bytes]
  187. (hist) ‎Obscenity ‎[6,194 bytes]
  188. (hist) ‎DS5.3: ‎[6,176 bytes]
  189. (hist) ‎Service Provider Oversight ‎[6,106 bytes]
  190. (hist) ‎3.2.2.2: Windows ‎[6,086 bytes]
  191. (hist) ‎DS5.4: ‎[6,082 bytes]
  192. (hist) ‎Motion to suppress illegally obtained evidence; checklist ‎[6,068 bytes]
  193. (hist) ‎Compliance: ‎[6,016 bytes]
  194. (hist) ‎AI3.3: ‎[6,002 bytes]
  195. (hist) ‎Sample Management Awareness Standard: ‎[5,978 bytes]
  196. (hist) ‎AI2.7: ‎[5,964 bytes]
  197. (hist) ‎Privacy Laws in Honduras ‎[5,950 bytes]
  198. (hist) ‎3.2.1.3: VPN ‎[5,925 bytes]
  199. (hist) ‎Financial Management: ‎[5,888 bytes]
  200. (hist) ‎PO1.1: ‎[5,828 bytes]
  201. (hist) ‎DS5.10: ‎[5,775 bytes]
  202. (hist) ‎International Defamation Decisions ‎[5,758 bytes]
  203. (hist) ‎Padding (cryptography) ‎[5,737 bytes]
  204. (hist) ‎3.2.1.1: Routers ‎[5,684 bytes]
  205. (hist) ‎Strategy ‎[5,614 bytes]
  206. (hist) ‎Business-IT Alignment ‎[5,600 bytes]
  207. (hist) ‎Sample Anti-Virus Standard: ‎[5,591 bytes]
  208. (hist) ‎Sample Security Awareness Accessibility Standard: ‎[5,581 bytes]
  209. (hist) ‎Sample Configuration Management Standard: ‎[5,574 bytes]
  210. (hist) ‎Searching and Seizing Computers ‎[5,567 bytes]
  211. (hist) ‎Subjects of discovery; checklist ‎[5,541 bytes]
  212. (hist) ‎Documents ‎[5,508 bytes]
  213. (hist) ‎Privacy Laws in British Virgin Islands ‎[5,495 bytes]
  214. (hist) ‎Security Audit Procedures ‎[5,452 bytes]
  215. (hist) ‎Sample Incident Response Standard: ‎[5,449 bytes]
  216. (hist) ‎44 USC 3502 ‎[5,438 bytes]
  217. (hist) ‎Protected computer ‎[5,412 bytes]
  218. (hist) ‎Key Performance Indicator ‎[5,379 bytes]
  219. (hist) ‎DS11.2: ‎[5,288 bytes]
  220. (hist) ‎PO9.5: ‎[5,276 bytes]
  221. (hist) ‎Sample Management Security Awareness Standard: ‎[5,272 bytes]
  222. (hist) ‎AI7.7: ‎[5,221 bytes]
  223. (hist) ‎Presentations: ‎[5,202 bytes]
  224. (hist) ‎Trespass ‎[5,200 bytes]
  225. (hist) ‎Business Continuity Planning Booklet ‎[5,138 bytes]
  226. (hist) ‎Sample Asset Protection Policy: ‎[5,090 bytes]
  227. (hist) ‎PCI 1: ‎[5,082 bytes]
  228. (hist) ‎Asset Management: ‎[5,081 bytes]
  229. (hist) ‎Privacy Laws in Cayman Islands ‎[5,061 bytes]
  230. (hist) ‎Horsewiki/horsewiki/index.php ‎[4,980 bytes]
  231. (hist) ‎PO4.1: ‎[4,957 bytes]
  232. (hist) ‎Outline of issues involving search and seizure—The computer user's expectation of privacy ‎[4,955 bytes]
  233. (hist) ‎DS4.9: ‎[4,921 bytes]
  234. (hist) ‎Sample Availability Protection Standard: ‎[4,906 bytes]
  235. (hist) ‎Backup site ‎[4,891 bytes]
  236. (hist) ‎DS12.3: ‎[4,830 bytes]
  237. (hist) ‎DS11.6: ‎[4,742 bytes]
  238. (hist) ‎Children's Internet Protection Act (CIPA) ‎[4,739 bytes]
  239. (hist) ‎HIPAA Policy References: ‎[4,714 bytes]
  240. (hist) ‎Sample Asset Protection Standards: ‎[4,708 bytes]
  241. (hist) ‎Management Booklet ‎[4,688 bytes]
  242. (hist) ‎Systems Development and Maintenance: ‎[4,680 bytes]
  243. (hist) ‎Sentencing hearing—illustrative argument and response ‎[4,661 bytes]
  244. (hist) ‎Sample Information Classification Standard: ‎[4,661 bytes]
  245. (hist) ‎PO4.10: ‎[4,642 bytes]
  246. (hist) ‎Sample Information Handling Standard: ‎[4,612 bytes]
  247. (hist) ‎Delivery and Support: ‎[4,570 bytes]
  248. (hist) ‎44 USC 3543 ‎[4,560 bytes]
  249. (hist) ‎Plaintext ‎[4,560 bytes]
  250. (hist) ‎Identity ‎[4,521 bytes]
  251. (hist) ‎PCI 6: ‎[4,512 bytes]
  252. (hist) ‎Adaptive Best Practices Policy Samples: ‎[4,483 bytes]
  253. (hist) ‎Motion to exclude computer-generated evidence—Laying business record exception foundation ‎[4,476 bytes]
  254. (hist) ‎Confidentiality ‎[4,465 bytes]
  255. (hist) ‎44 USC 3545 ‎[4,422 bytes]
  256. (hist) ‎Planning and Organization: ‎[4,419 bytes]
  257. (hist) ‎Security Freeze ‎[4,396 bytes]
  258. (hist) ‎PCI 3: ‎[4,395 bytes]
  259. (hist) ‎DS10.1: ‎[4,376 bytes]
  260. (hist) ‎Children's Online Protection Act (COPA) ‎[4,339 bytes]
  261. (hist) ‎PO6.1: ‎[4,297 bytes]
  262. (hist) ‎Miscellaneous federal laws ‎[4,296 bytes]
  263. (hist) ‎DB2 Database Asset Protection Standards: ‎[4,270 bytes]
  264. (hist) ‎PCI 9: ‎[4,268 bytes]
  265. (hist) ‎Libel ‎[4,262 bytes]
  266. (hist) ‎State Attempts At Regulation ‎[4,241 bytes]
  267. (hist) ‎Change Management: ‎[4,222 bytes]
  268. (hist) ‎Scenario analysis ‎[4,206 bytes]
  269. (hist) ‎12 CFR 229.21 ‎[4,184 bytes]
  270. (hist) ‎12 CFR 229.21 g ‎[4,184 bytes]
  271. (hist) ‎State Child pornography legislation ‎[4,181 bytes]
  272. (hist) ‎Outline of issues involving search and seizure—Not pursuant to warrant ‎[4,174 bytes]
  273. (hist) ‎PO4.11: ‎[4,167 bytes]
  274. (hist) ‎Determining factors ‎[4,163 bytes]
  275. (hist) ‎PO4.5: ‎[4,143 bytes]
  276. (hist) ‎SOX.5.1.13: ‎[4,131 bytes]
  277. (hist) ‎PO1.3: ‎[4,131 bytes]
  278. (hist) ‎PO10.3: ‎[4,102 bytes]
  279. (hist) ‎31 CFR 1010.340 ‎[4,088 bytes]
  280. (hist) ‎Malicious Code Prevention ‎[4,061 bytes]
  281. (hist) ‎44 USC 3535 ‎[4,053 bytes]
  282. (hist) ‎Sample Protection Standards: ‎[4,043 bytes]
  283. (hist) ‎Voir-dire questions checklist ‎[4,032 bytes]
  284. (hist) ‎Sample Encryption Standard: ‎[4,025 bytes]
  285. (hist) ‎Manage Document Metadata ‎[4,023 bytes]
  286. (hist) ‎GLBA Policy References: ‎[4,011 bytes]
  287. (hist) ‎PO2.4: ‎[4,004 bytes]
  288. (hist) ‎Privacy Laws in Costa Rica ‎[3,972 bytes]
  289. (hist) ‎AI1.1: ‎[3,970 bytes]
  290. (hist) ‎DS7.2: ‎[3,965 bytes]
  291. (hist) ‎DS5.6: ‎[3,961 bytes]
  292. (hist) ‎Taking of information ‎[3,960 bytes]
  293. (hist) ‎Risk management plan ‎[3,958 bytes]
  294. (hist) ‎Physical and Environmental Security: ‎[3,955 bytes]
  295. (hist) ‎AI6.3: ‎[3,954 bytes]
  296. (hist) ‎Configuration Mangement: ‎[3,941 bytes]
  297. (hist) ‎DS13.1: ‎[3,908 bytes]
  298. (hist) ‎Service Desk Management: ‎[3,907 bytes]
  299. (hist) ‎Laws and Regulations: ‎[3,904 bytes]
  300. (hist) ‎Witnesses testifying as to documents ‎[3,858 bytes]
  301. (hist) ‎PCI 10: ‎[3,838 bytes]
  302. (hist) ‎DS12.2: ‎[3,787 bytes]
  303. (hist) ‎Availability ‎[3,780 bytes]
  304. (hist) ‎AI7.3: ‎[3,774 bytes]
  305. (hist) ‎DS1.1: ‎[3,766 bytes]
  306. (hist) ‎IT Change Management ‎[3,762 bytes]
  307. (hist) ‎PCI-4.1.1: ‎[3,758 bytes]
  308. (hist) ‎DS9.1: ‎[3,726 bytes]
  309. (hist) ‎Zero-day exploit ‎[3,715 bytes]
  310. (hist) ‎AI2.5: ‎[3,663 bytes]
  311. (hist) ‎Sample New Hire Security Awareness Standard: ‎[3,622 bytes]
  312. (hist) ‎AI3.1: ‎[3,611 bytes]
  313. (hist) ‎PCI-3.4 ‎[3,604 bytes]
  314. (hist) ‎PO4.3: ‎[3,600 bytes]
  315. (hist) ‎Sample Information Systems and Technology Security Policy: ‎[3,594 bytes]
  316. (hist) ‎PO1.5: ‎[3,592 bytes]
  317. (hist) ‎Discrediting expert witnesses—Illustrative cross-examination of systems analyst ‎[3,580 bytes]
  318. (hist) ‎Service Level Agreement ‎[3,553 bytes]
  319. (hist) ‎Insurance: ‎[3,551 bytes]
  320. (hist) ‎SB-1386 ‎[3,531 bytes]
  321. (hist) ‎Outline of issues involving search and seizure—Pursuant to warrant ‎[3,481 bytes]
  322. (hist) ‎Microsoft Operations Framework ‎[3,480 bytes]
  323. (hist) ‎AI7.6: ‎[3,480 bytes]
  324. (hist) ‎DS3.3: ‎[3,476 bytes]
  325. (hist) ‎PO1.6: ‎[3,474 bytes]
  326. (hist) ‎Persuading defendant to accept plea bargain ‎[3,468 bytes]
  327. (hist) ‎Change control ‎[3,461 bytes]
  328. (hist) ‎SOX.6.1.1: ‎[3,458 bytes]
  329. (hist) ‎Compliance ‎[3,455 bytes]
  330. (hist) ‎PO5.5: ‎[3,434 bytes]
  331. (hist) ‎Sample Acceptable Use Policy: ‎[3,383 bytes]
  332. (hist) ‎North Carolina Identity Theft Protection Act of 2005 ‎[3,379 bytes]
  333. (hist) ‎PCI 8: ‎[3,373 bytes]
  334. (hist) ‎DS11.5: ‎[3,360 bytes]
  335. (hist) ‎Motion to exclude computer-generated evidence ‎[3,349 bytes]
  336. (hist) ‎DS13.2: ‎[3,331 bytes]
  337. (hist) ‎PO8.2: ‎[3,304 bytes]
  338. (hist) ‎Electronic Communications Privacy Act ‎[3,302 bytes]
  339. (hist) ‎Sample Auditing Standard: ‎[3,291 bytes]
  340. (hist) ‎Sample Security Awareness Policy: ‎[3,291 bytes]
  341. (hist) ‎DS4.1: ‎[3,286 bytes]
  342. (hist) ‎Preface ‎[3,285 bytes]
  343. (hist) ‎SOX Policy References: ‎[3,272 bytes]
  344. (hist) ‎PO9.3: ‎[3,268 bytes]
  345. (hist) ‎DS10.2: ‎[3,243 bytes]
  346. (hist) ‎PCI-10.4: ‎[3,241 bytes]
  347. (hist) ‎Intent ‎[3,232 bytes]
  348. (hist) ‎PO6.5: ‎[3,211 bytes]
  349. (hist) ‎PO3.5: ‎[3,211 bytes]
  350. (hist) ‎AI5.1: ‎[3,198 bytes]
  351. (hist) ‎SOX.4.2.1.9: ‎[3,189 bytes]
  352. (hist) ‎PCI-3.1 ‎[3,186 bytes]
  353. (hist) ‎SOX.4.2.1.10: ‎[3,182 bytes]
  354. (hist) ‎DS4.4: ‎[3,182 bytes]
  355. (hist) ‎Client interview checklist ‎[3,181 bytes]
  356. (hist) ‎Business Impact Analysis ‎[3,180 bytes]
  357. (hist) ‎DS9.2: ‎[3,151 bytes]
  358. (hist) ‎AI3.4: ‎[3,129 bytes]
  359. (hist) ‎PO6.3: ‎[3,106 bytes]
  360. (hist) ‎AI6.5: ‎[3,099 bytes]
  361. (hist) ‎PCI-11.2: ‎[3,098 bytes]
  362. (hist) ‎PO6.4: ‎[3,096 bytes]
  363. (hist) ‎Factors affecting amount of fee ‎[3,090 bytes]
  364. (hist) ‎PO4.6: ‎[3,084 bytes]
  365. (hist) ‎Electronic Signatures in Global and National Commerce Act ‎[3,080 bytes]
  366. (hist) ‎AI5.4: ‎[3,075 bytes]
  367. (hist) ‎AI7.5: ‎[3,074 bytes]
  368. (hist) ‎'''Information Technology Risk Calculator''' ‎[3,071 bytes]
  369. (hist) ‎FERPA ‎[3,054 bytes]
  370. (hist) ‎Drafting instructions to jury—key terms ‎[3,053 bytes]
  371. (hist) ‎AI2.6: ‎[3,040 bytes]
  372. (hist) ‎Release on own recognizance ‎[3,024 bytes]
  373. (hist) ‎SOX.4.2.1.8: ‎[3,016 bytes]
  374. (hist) ‎Problem Management: ‎[3,011 bytes]
  375. (hist) ‎Acquisition and Implementation: ‎[2,992 bytes]
  376. (hist) ‎PO1.4: ‎[2,976 bytes]
  377. (hist) ‎Search and Seizure Preface and Acknowledgments ‎[2,949 bytes]
  378. (hist) ‎Cross-examination of prosecution witnesses for the Prosecution ‎[2,923 bytes]
  379. (hist) ‎SOX.1.25: ‎[2,920 bytes]
  380. (hist) ‎Sample Asset Management Policy: ‎[2,915 bytes]
  381. (hist) ‎PCI-12.8.3: ‎[2,912 bytes]
  382. (hist) ‎SOX.2.0.18: ‎[2,912 bytes]
  383. (hist) ‎DS5.8: ‎[2,906 bytes]
  384. (hist) ‎SOX.1.1.1: ‎[2,902 bytes]
  385. (hist) ‎DS2.2: ‎[2,901 bytes]
  386. (hist) ‎SOX.2.0.22: ‎[2,900 bytes]
  387. (hist) ‎DS5.1: ‎[2,899 bytes]
  388. (hist) ‎Interviewing witnesses ‎[2,897 bytes]
  389. (hist) ‎SOX.1.1: ‎[2,893 bytes]
  390. (hist) ‎SOX.2.0.25: ‎[2,891 bytes]
  391. (hist) ‎SOX.2.0.15: ‎[2,885 bytes]
  392. (hist) ‎PO10.9: ‎[2,876 bytes]
  393. (hist) ‎44 USC 3501 ‎[2,872 bytes]
  394. (hist) ‎PCI-2.1.1: ‎[2,859 bytes]
  395. (hist) ‎PO4.4: ‎[2,854 bytes]
  396. (hist) ‎SOX.6.1.4: ‎[2,840 bytes]
  397. (hist) ‎Law enforcement witnesses for the Prosecution ‎[2,835 bytes]
  398. (hist) ‎44 USC 3533 ‎[2,824 bytes]
  399. (hist) ‎PCI-9.2: ‎[2,824 bytes]
  400. (hist) ‎Experts ‎[2,820 bytes]
  401. (hist) ‎Legal Electronic Data Exchange Standard ‎[2,812 bytes]
  402. (hist) ‎SOX.2.7.11: ‎[2,811 bytes]
  403. (hist) ‎PO9.1: ‎[2,806 bytes]
  404. (hist) ‎ME4.1: ‎[2,804 bytes]
  405. (hist) ‎SOX.4.4.8: ‎[2,803 bytes]
  406. (hist) ‎AI5.3: ‎[2,802 bytes]
  407. (hist) ‎PCI-2.2.3: ‎[2,798 bytes]
  408. (hist) ‎PCI-12.9.1: ‎[2,793 bytes]
  409. (hist) ‎PCI-11.5: ‎[2,784 bytes]
  410. (hist) ‎AI7.12: ‎[2,780 bytes]
  411. (hist) ‎PO3.1: ‎[2,771 bytes]
  412. (hist) ‎ME4.2: ‎[2,763 bytes]
  413. (hist) ‎DS11.3: ‎[2,758 bytes]
  414. (hist) ‎Sample Threat Assessment and Monitoring Policy: ‎[2,756 bytes]
  415. (hist) ‎DS2.1: ‎[2,755 bytes]
  416. (hist) ‎ME4.3: ‎[2,751 bytes]
  417. (hist) ‎Preliminary Tactics in general ‎[2,748 bytes]
  418. (hist) ‎PCI-1.1.5: ‎[2,743 bytes]
  419. (hist) ‎SOX.2.0.17: ‎[2,724 bytes]
  420. (hist) ‎Communications Decency Act - Obscene Materials ‎[2,712 bytes]
  421. (hist) ‎AI7.10: ‎[2,711 bytes]
  422. (hist) ‎PO10.6: ‎[2,709 bytes]
  423. (hist) ‎PCI-6.5.5: ‎[2,708 bytes]
  424. (hist) ‎PCI-6.5.3: ‎[2,706 bytes]
  425. (hist) ‎PCI-6.5.2: ‎[2,705 bytes]
  426. (hist) ‎Online Auctions ‎[2,704 bytes]
  427. (hist) ‎SOX.1.2: ‎[2,704 bytes]
  428. (hist) ‎PCI-12.8.4: ‎[2,703 bytes]
  429. (hist) ‎PCI-12.8.1: ‎[2,703 bytes]
  430. (hist) ‎IBM OS/400 Asset Protection Standards: ‎[2,702 bytes]
  431. (hist) ‎PCI 11: ‎[2,702 bytes]
  432. (hist) ‎PCI-6.5.6: ‎[2,697 bytes]
  433. (hist) ‎PCI-2.3: ‎[2,695 bytes]
  434. (hist) ‎PCI-12.8.5: ‎[2,692 bytes]
  435. (hist) ‎AI2.4: ‎[2,687 bytes]
  436. (hist) ‎PCI-6.5.10: ‎[2,684 bytes]
  437. (hist) ‎PO2.3: ‎[2,684 bytes]
  438. (hist) ‎PCI-11.1: ‎[2,678 bytes]
  439. (hist) ‎In general; locating witnesses ‎[2,675 bytes]
  440. (hist) ‎PCI-6.5.1: ‎[2,671 bytes]
  441. (hist) ‎PCI-6.5.7: ‎[2,670 bytes]
  442. (hist) ‎PCI-6.5.4: ‎[2,670 bytes]
  443. (hist) ‎12 USC 3407 ‎[2,669 bytes]
  444. (hist) ‎PCI-9.1.1: ‎[2,669 bytes]
  445. (hist) ‎PCI-6.5.9: ‎[2,667 bytes]
  446. (hist) ‎PCI-6.5.8: ‎[2,666 bytes]
  447. (hist) ‎PCI-12.8.2: ‎[2,664 bytes]
  448. (hist) ‎PCI-1.3.10: ‎[2,656 bytes]
  449. (hist) ‎AI4.2: ‎[2,653 bytes]
  450. (hist) ‎SOX.1.7: ‎[2,652 bytes]
  451. (hist) ‎SOX.1.22: ‎[2,650 bytes]
  452. (hist) ‎PO4.8: ‎[2,647 bytes]
  453. (hist) ‎PCI-8.5.1: ‎[2,641 bytes]
  454. (hist) ‎SOX.4.2.1.7: ‎[2,637 bytes]
  455. (hist) ‎PO7.8: ‎[2,627 bytes]
  456. (hist) ‎PCI-1.3.9: ‎[2,617 bytes]
  457. (hist) ‎SOX.2.3.4: ‎[2,610 bytes]
  458. (hist) ‎DS5.7: ‎[2,606 bytes]
  459. (hist) ‎KY DOI A.1: ‎[2,601 bytes]
  460. (hist) ‎PO10.13: ‎[2,590 bytes]
  461. (hist) ‎ME1.2: ‎[2,585 bytes]
  462. (hist) ‎AI2.8: ‎[2,585 bytes]
  463. (hist) ‎PCI-8.5.8: ‎[2,583 bytes]
  464. (hist) ‎PCI-2.2.2: ‎[2,576 bytes]
  465. (hist) ‎PO10.2: ‎[2,572 bytes]
  466. (hist) ‎PO4.2: ‎[2,568 bytes]
  467. (hist) ‎44 USC 3532 ‎[2,565 bytes]
  468. (hist) ‎PCI-5.2: ‎[2,559 bytes]
  469. (hist) ‎DS3.5: ‎[2,559 bytes]
  470. (hist) ‎PCI-3.6.6: ‎[2,554 bytes]
  471. (hist) ‎PCI-6.3.7: ‎[2,553 bytes]
  472. (hist) ‎Proving computer theft ‎[2,549 bytes]
  473. (hist) ‎SOX.2.0.28: ‎[2,544 bytes]
  474. (hist) ‎SOX.2.0.26: ‎[2,541 bytes]
  475. (hist) ‎PCI-8.2: ‎[2,539 bytes]
  476. (hist) ‎PO3.2: ‎[2,535 bytes]
  477. (hist) ‎SOX.2.0.31: ‎[2,531 bytes]
  478. (hist) ‎PCI-7.2: ‎[2,527 bytes]
  479. (hist) ‎PCI-3.6.10: ‎[2,517 bytes]
  480. (hist) ‎SOX.2.0.24: ‎[2,516 bytes]
  481. (hist) ‎SOX.2.7.15: ‎[2,507 bytes]
  482. (hist) ‎AI1.3: ‎[2,503 bytes]
  483. (hist) ‎PCI-9.10.1: ‎[2,501 bytes]
  484. (hist) ‎PCI-8.5.13: ‎[2,501 bytes]
  485. (hist) ‎Department of Defense Information Assurance Certification and Accreditation Process ‎[2,499 bytes]
  486. (hist) ‎PO5.1: ‎[2,498 bytes]
  487. (hist) ‎PO4.15: ‎[2,497 bytes]
  488. (hist) ‎PCI-8.5.16: ‎[2,491 bytes]
  489. (hist) ‎PCI-8.5.12: ‎[2,488 bytes]
  490. (hist) ‎PCI-8.5.9: ‎[2,487 bytes]
  491. (hist) ‎SOX.2.0.30: ‎[2,486 bytes]
  492. (hist) ‎PO5.2: ‎[2,486 bytes]
  493. (hist) ‎Proceedings by Way of Preliminary Hearing in general ‎[2,483 bytes]
  494. (hist) ‎SOX.2.7.6: ‎[2,483 bytes]
  495. (hist) ‎SOX.2.0.21: ‎[2,483 bytes]
  496. (hist) ‎PCI-11.4: ‎[2,477 bytes]
  497. (hist) ‎PCI-1.1.7: ‎[2,473 bytes]
  498. (hist) ‎PCI-2.2.4: ‎[2,471 bytes]
  499. (hist) ‎SOX.2.0.19: ‎[2,467 bytes]
  500. (hist) ‎AI6.2: ‎[2,467 bytes]

View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)