Pages with the most revisions

Jump to navigation Jump to search

Showing below up to 500 results in range #21 to #520.

View ( | ) (20 | 50 | 100 | 250 | 500)

  1. Digital Millennium Copyright Act (DMCA)‏‎ (22 revisions)
  2. Computer Fraud and Abuse Act‏‎ (20 revisions)
  3. SOX.6.1.1:‏‎ (20 revisions)
  4. Privacy‏‎ (20 revisions)
  5. Sample Electronic Fraud Prevention Guidelines:‏‎ (20 revisions)
  6. Sample Information Classification Standard:‏‎ (19 revisions)
  7. Sample Asset Identification and Classification Policy:‏‎ (18 revisions)
  8. CAN-SPAM‏‎ (17 revisions)
  9. FISMA‏‎ (17 revisions)
  10. Horsewiki/index.php‏‎ (17 revisions)
  11. Incident Management:‏‎ (16 revisions)
  12. 18 USC 2518‏‎ (15 revisions)
  13. Bank Secrecy Act:‏‎ (15 revisions)
  14. Audit Booklet‏‎ (14 revisions)
  15. Searching and Seizing Computers and Obtaining Electronic Evidence Manual‏‎ (14 revisions)
  16. Database Application Best Practice Configuration Samples:‏‎ (14 revisions)
  17. Risk management‏‎ (13 revisions)
  18. AI6.1:‏‎ (13 revisions)
  19. Adaptive Best Practices Policy Samples:‏‎ (13 revisions)
  20. Intellectual property‏‎ (13 revisions)
  21. Oracle Database Asset Protection Standards:‏‎ (12 revisions)
  22. DS5.2:‏‎ (12 revisions)
  23. PO1.1:‏‎ (12 revisions)
  24. Sample Access Control Standard:‏‎ (11 revisions)
  25. AI3.2:‏‎ (11 revisions)
  26. Sample Asset Protection Policy:‏‎ (11 revisions)
  27. Planning and Organization:‏‎ (11 revisions)
  28. IT Security Risk Management Demystified‏‎ (11 revisions)
  29. ITIL‏‎ (11 revisions)
  30. 3.2.2.1: Unix‏‎ (10 revisions)
  31. Sample Encryption Standard:‏‎ (10 revisions)
  32. AI6.3:‏‎ (10 revisions)
  33. Business continuity planning‏‎ (10 revisions)
  34. Compliance:‏‎ (10 revisions)
  35. PCI:‏‎ (9 revisions)
  36. Corporate governance‏‎ (9 revisions)
  37. DS11.2:‏‎ (9 revisions)
  38. PCI 3:‏‎ (9 revisions)
  39. Encryption‏‎ (9 revisions)
  40. Enterprise Open-Source Policy Sample:‏‎ (9 revisions)
  41. SOX.2.3.4:‏‎ (9 revisions)
  42. Sample Availability Protection Standard:‏‎ (9 revisions)
  43. Sample Configuration Management Standard:‏‎ (9 revisions)
  44. PO4.3:‏‎ (8 revisions)
  45. PCI 1:‏‎ (8 revisions)
  46. PO4.1:‏‎ (8 revisions)
  47. Kentucky DOI:‏‎ (8 revisions)
  48. Presentations:‏‎ (8 revisions)
  49. Monitor and Evaluate:‏‎ (8 revisions)
  50. Asset Management:‏‎ (8 revisions)
  51. Basel 2‏‎ (8 revisions)
  52. PCI 4:‏‎ (8 revisions)
  53. PO10.3:‏‎ (8 revisions)
  54. SOX.6.1.4:‏‎ (8 revisions)
  55. DS2.3:‏‎ (8 revisions)
  56. Social Computing Guidelines‏‎ (8 revisions)
  57. Microsoft SQL Database Asset Protection Standards:‏‎ (8 revisions)
  58. Disaster Recovery Requirements Analysis‏‎ (8 revisions)
  59. SOX.2.0.16:‏‎ (8 revisions)
  60. SOX.2.0.12:‏‎ (8 revisions)
  61. SOX.2.0.17:‏‎ (8 revisions)
  62. Sample Asset Management Policy:‏‎ (8 revisions)
  63. Sample Asset Identification and Classification Standard:‏‎ (8 revisions)
  64. Sample Electronic Mail Acceptable Use Standard:‏‎ (8 revisions)
  65. Sample Information Systems and Technology Security Policy:‏‎ (8 revisions)
  66. ISO 20000‏‎ (8 revisions)
  67. 12 USC 3407‏‎ (7 revisions)
  68. Net Neutrality‏‎ (7 revisions)
  69. Internet Law Treatise‏‎ (7 revisions)
  70. AI2.7:‏‎ (7 revisions)
  71. Risk assessment‏‎ (7 revisions)
  72. Sample Security Awareness Policy:‏‎ (7 revisions)
  73. Awareness-training‏‎ (7 revisions)
  74. Best Practices Research Reports:‏‎ (7 revisions)
  75. Communications and Operations Management:‏‎ (7 revisions)
  76. Continuous auditing‏‎ (7 revisions)
  77. SOX.2.0.11:‏‎ (7 revisions)
  78. DS10.1:‏‎ (7 revisions)
  79. Information Security booklet‏‎ (7 revisions)
  80. Microsoft Operations Framework‏‎ (7 revisions)
  81. Research‏‎ (7 revisions)
  82. SOX.2.7.16:‏‎ (7 revisions)
  83. Sample Incident Response Standard:‏‎ (7 revisions)
  84. GLBA:‏‎ (7 revisions)
  85. Sample New Hire Security Awareness Standard:‏‎ (7 revisions)
  86. Sample Threat Assessment Standard:‏‎ (7 revisions)
  87. 12 CFR 205.13‏‎ (6 revisions)
  88. 12 CFR 226.25‏‎ (6 revisions)
  89. 12 CFR 230.9‏‎ (6 revisions)
  90. 15‏‎ (6 revisions)
  91. 16‏‎ (6 revisions)
  92. 17‏‎ (6 revisions)
  93. 19‏‎ (6 revisions)
  94. 2‏‎ (6 revisions)
  95. AI2.10:‏‎ (6 revisions)
  96. PO8.3:‏‎ (6 revisions)
  97. Sample Remote Access Standard:‏‎ (6 revisions)
  98. Trademark‏‎ (6 revisions)
  99. Security Audit Procedures‏‎ (6 revisions)
  100. Audit Guidance Examination Procedures‏‎ (6 revisions)
  101. PO8.2:‏‎ (6 revisions)
  102. Physical and Environmental Security:‏‎ (6 revisions)
  103. Corporate Governance‏‎ (6 revisions)
  104. Risk management plan‏‎ (6 revisions)
  105. Legal-Technology White Papers‏‎ (6 revisions)
  106. Department of Insurance:‏‎ (6 revisions)
  107. Padding (cryptography)‏‎ (6 revisions)
  108. SOX.2.0.13:‏‎ (6 revisions)
  109. Sample Anti-Virus Standard:‏‎ (6 revisions)
  110. Forensic Education Resources:‏‎ (6 revisions)
  111. '''Information Technology Risk Calculator'''‏‎ (5 revisions)
  112. 12‏‎ (5 revisions)
  113. 12 CFR 229.21 g‏‎ (5 revisions)
  114. 12 USC 3406‏‎ (5 revisions)
  115. 18 USC 2701‏‎ (5 revisions)
  116. 20‏‎ (5 revisions)
  117. 21‏‎ (5 revisions)
  118. Physical and Environmental Protection‏‎ (5 revisions)
  119. SSAE 16‏‎ (5 revisions)
  120. PO4.10:‏‎ (5 revisions)
  121. Uniform Electronic Transactions Act‏‎ (5 revisions)
  122. PCI-1.2.1:‏‎ (5 revisions)
  123. PCI-1.3.4:‏‎ (5 revisions)
  124. AI2.8:‏‎ (5 revisions)
  125. SOX.5.1.13:‏‎ (5 revisions)
  126. AI6.5:‏‎ (5 revisions)
  127. Sample Management Awareness Standard:‏‎ (5 revisions)
  128. Sample Asset Information Handling Standard‏‎ (5 revisions)
  129. SOX.1.3:‏‎ (5 revisions)
  130. PCI-1.3.2:‏‎ (5 revisions)
  131. Security Policy:‏‎ (5 revisions)
  132. Capability Maturity Model‏‎ (5 revisions)
  133. Sample Ongoing Security Awareness Standard:‏‎ (5 revisions)
  134. Computer Fraud and Abuse Act (CFAA)‏‎ (5 revisions)
  135. SOX.2.0.14:‏‎ (5 revisions)
  136. Cryptography‏‎ (5 revisions)
  137. DS1.1:‏‎ (5 revisions)
  138. DS12.3:‏‎ (5 revisions)
  139. DS2.4:‏‎ (5 revisions)
  140. Testing Templates:‏‎ (5 revisions)
  141. E-Banking Booklet‏‎ (5 revisions)
  142. SOX.2.0.15:‏‎ (5 revisions)
  143. SOX.2.0.6:‏‎ (5 revisions)
  144. Sample Acceptable Use Policy:‏‎ (5 revisions)
  145. Sample Auditing Standard:‏‎ (5 revisions)
  146. Sample Life Cycle Management Standard:‏‎ (5 revisions)
  147. References:‏‎ (5 revisions)
  148. Implementation‏‎ (5 revisions)
  149. Identity theft‏‎ (5 revisions)
  150. 1‏‎ (4 revisions)
  151. 10‏‎ (4 revisions)
  152. 11‏‎ (4 revisions)
  153. 13‏‎ (4 revisions)
  154. 14‏‎ (4 revisions)
  155. 18‏‎ (4 revisions)
  156. 22‏‎ (4 revisions)
  157. 23‏‎ (4 revisions)
  158. Sample Vulnerability Assessment and Management Policy:‏‎ (4 revisions)
  159. PCI-1.1.2:‏‎ (4 revisions)
  160. AI2.5:‏‎ (4 revisions)
  161. AI3.1:‏‎ (4 revisions)
  162. AI5.1:‏‎ (4 revisions)
  163. AI6.2:‏‎ (4 revisions)
  164. Sample Threat Assessment and Monitoring Policy:‏‎ (4 revisions)
  165. PCI-1.1.5:‏‎ (4 revisions)
  166. North Carolina Identity Theft Protection Act of 2005‏‎ (4 revisions)
  167. PO4.11:‏‎ (4 revisions)
  168. PO9.1:‏‎ (4 revisions)
  169. Configuration Management:‏‎ (4 revisions)
  170. DS11.6:‏‎ (4 revisions)
  171. Information assurance‏‎ (4 revisions)
  172. Sample Physical Access Standard:‏‎ (4 revisions)
  173. DS13.1:‏‎ (4 revisions)
  174. DS2.1:‏‎ (4 revisions)
  175. DS2.2:‏‎ (4 revisions)
  176. DS3.4:‏‎ (4 revisions)
  177. Software Configuration Management‏‎ (4 revisions)
  178. DS4.1:‏‎ (4 revisions)
  179. DS4.4:‏‎ (4 revisions)
  180. PCI-1.1.3:‏‎ (4 revisions)
  181. DS4.9:‏‎ (4 revisions)
  182. Organizational Security:‏‎ (4 revisions)
  183. DS5.3:‏‎ (4 revisions)
  184. PCI-1.3.1:‏‎ (4 revisions)
  185. Information Security Management System‏‎ (4 revisions)
  186. DS9.1:‏‎ (4 revisions)
  187. DS9.2:‏‎ (4 revisions)
  188. Data Security‏‎ (4 revisions)
  189. PCI-10.3.1:‏‎ (4 revisions)
  190. Delivery and Support:‏‎ (4 revisions)
  191. Development and Acquisition Booklet‏‎ (4 revisions)
  192. PCI 5:‏‎ (4 revisions)
  193. PO1.2:‏‎ (4 revisions)
  194. FERPA‏‎ (4 revisions)
  195. Privacy Laws in Mexico‏‎ (4 revisions)
  196. Recommended Links:‏‎ (4 revisions)
  197. PO5.5:‏‎ (4 revisions)
  198. SOX.1.1.1:‏‎ (4 revisions)
  199. SOX.2.0.18:‏‎ (4 revisions)
  200. Sample Information Labeling Standard:‏‎ (4 revisions)
  201. Sample Information Handling Standard:‏‎ (4 revisions)
  202. HIPAA Policy References:‏‎ (4 revisions)
  203. Horsewiki/horsewiki/index.php‏‎ (4 revisions)
  204. 12 CFR 229.21‏‎ (3 revisions)
  205. 24‏‎ (3 revisions)
  206. 3.2.1.1: Routers‏‎ (3 revisions)
  207. 3.2.1.2: Firewalls‏‎ (3 revisions)
  208. 3.2.1.3: VPN‏‎ (3 revisions)
  209. 3.2.1.4: Managed Switches‏‎ (3 revisions)
  210. 3.2.1.5: Intrusion Detection or Prevention System‏‎ (3 revisions)
  211. 3.2.2.2: Windows‏‎ (3 revisions)
  212. PO1.4:‏‎ (3 revisions)
  213. PCI-10.4:‏‎ (3 revisions)
  214. SOX.2.7.11:‏‎ (3 revisions)
  215. Sample Internet Acceptable Use Policy:‏‎ (3 revisions)
  216. Security by design‏‎ (3 revisions)
  217. 44 USC 3542‏‎ (3 revisions)
  218. Information Systems Acquisition, Development and Maintenance:‏‎ (3 revisions)
  219. PCI-1.1.4:‏‎ (3 revisions)
  220. AI1.1:‏‎ (3 revisions)
  221. PO2.3:‏‎ (3 revisions)
  222. AI2.2:‏‎ (3 revisions)
  223. AI2.6:‏‎ (3 revisions)
  224. AI3.3:‏‎ (3 revisions)
  225. AI3.4:‏‎ (3 revisions)
  226. PO6.4:‏‎ (3 revisions)
  227. PO7.8:‏‎ (3 revisions)
  228. SOX.2.0.21:‏‎ (3 revisions)
  229. AI5.3:‏‎ (3 revisions)
  230. AI5.4:‏‎ (3 revisions)
  231. AI7.12:‏‎ (3 revisions)
  232. AI7.3:‏‎ (3 revisions)
  233. Sample Vulnerability Assessment Standard:‏‎ (3 revisions)
  234. AI7.5:‏‎ (3 revisions)
  235. Malicious Code Prevention‏‎ (3 revisions)
  236. ME4.3:‏‎ (3 revisions)
  237. Acquisition and Implementation:‏‎ (3 revisions)
  238. PCI-1.1.1:‏‎ (3 revisions)
  239. PCI-1.1.6:‏‎ (3 revisions)
  240. PCI-1.2.3:‏‎ (3 revisions)
  241. Availability‏‎ (3 revisions)
  242. Backup site‏‎ (3 revisions)
  243. Burden of proof‏‎ (3 revisions)
  244. Business-IT Alignment‏‎ (3 revisions)
  245. Business Continuity Planning Booklet‏‎ (3 revisions)
  246. PCI 9:‏‎ (3 revisions)
  247. Change Management:‏‎ (3 revisions)
  248. Change control‏‎ (3 revisions)
  249. Cleartext‏‎ (3 revisions)
  250. PCI-10.2.1:‏‎ (3 revisions)
  251. PO6.1:‏‎ (3 revisions)
  252. Personnel Security:‏‎ (3 revisions)
  253. Configuration Mangement:‏‎ (3 revisions)
  254. Recovery Consistency Objective‏‎ (3 revisions)
  255. Continuity Management:‏‎ (3 revisions)
  256. Personally identifiable information‏‎ (3 revisions)
  257. SOX.2.0.23:‏‎ (3 revisions)
  258. Sample Change Control Standard:‏‎ (3 revisions)
  259. Sample Asset Protection Standards:‏‎ (3 revisions)
  260. DS11.4:‏‎ (3 revisions)
  261. DS11.5:‏‎ (3 revisions)
  262. Privacy Laws in Canada‏‎ (3 revisions)
  263. DS12.2:‏‎ (3 revisions)
  264. Security through obscurity‏‎ (3 revisions)
  265. Service Provider Oversight‏‎ (3 revisions)
  266. Sample Telecommunication Acceptable Use Standard:‏‎ (3 revisions)
  267. DS4.6:‏‎ (3 revisions)
  268. DS5.10:‏‎ (3 revisions)
  269. DS5.5:‏‎ (3 revisions)
  270. PCI-1.3.3:‏‎ (3 revisions)
  271. PCI-1.2.2:‏‎ (3 revisions)
  272. DS6.4:‏‎ (3 revisions)
  273. DS8.1:‏‎ (3 revisions)
  274. DS9.3:‏‎ (3 revisions)
  275. PCI-1.3.8:‏‎ (3 revisions)
  276. PCI-1.3.7:‏‎ (3 revisions)
  277. PCI-1.3.6:‏‎ (3 revisions)
  278. PCI-6.3.1:‏‎ (3 revisions)
  279. Discovery in general‏‎ (3 revisions)
  280. PCI-9.1.2:‏‎ (3 revisions)
  281. PCI-12.8.3:‏‎ (3 revisions)
  282. PCI 6:‏‎ (3 revisions)
  283. PCI-9.3.1:‏‎ (3 revisions)
  284. PCI-1.3.5:‏‎ (3 revisions)
  285. FN2‏‎ (3 revisions)
  286. RED/BLACK concept‏‎ (3 revisions)
  287. Recovery Point Objective‏‎ (3 revisions)
  288. Privacy Laws in Honduras‏‎ (3 revisions)
  289. PO9.3:‏‎ (3 revisions)
  290. SOX.1.1:‏‎ (3 revisions)
  291. SOX.1.22:‏‎ (3 revisions)
  292. SOX.1.25:‏‎ (3 revisions)
  293. SOX.2.0.26:‏‎ (3 revisions)
  294. SOX.2.7.9:‏‎ (3 revisions)
  295. SOX.4.4.8:‏‎ (3 revisions)
  296. FOIA‏‎ (3 revisions)
  297. Financial Management:‏‎ (3 revisions)
  298. GLBA Policy References:‏‎ (3 revisions)
  299. SOX.4.2.1.7:‏‎ (3 revisions)
  300. Gramm-Leach-Bliley:‏‎ (3 revisions)
  301. IT Change Management‏‎ (3 revisions)
  302. Health Insurance Portability and Accountability:‏‎ (3 revisions)
  303. Sample System Development Life Cycle Standard:‏‎ (3 revisions)
  304. Sample Software Acceptable Use Standard:‏‎ (3 revisions)
  305. Sample BYOD Acceptable Use Standard:‏‎ (2 revisions)
  306. SOX.2.7.17:‏‎ (2 revisions)
  307. PCI-10.1:‏‎ (2 revisions)
  308. PCI-4.1.1:‏‎ (2 revisions)
  309. 3.2.2.4: OS/400‏‎ (2 revisions)
  310. PCI-2.3:‏‎ (2 revisions)
  311. PO3.4:‏‎ (2 revisions)
  312. PO2.2:‏‎ (2 revisions)
  313. PO7.6:‏‎ (2 revisions)
  314. PO7.1:‏‎ (2 revisions)
  315. Russian copulation‏‎ (2 revisions)
  316. 44 USC 3501‏‎ (2 revisions)
  317. 44 USC 3501-3549‏‎ (2 revisions)
  318. ME1.4:‏‎ (2 revisions)
  319. Motion in limine‏‎ (2 revisions)
  320. PCI-1.3.10:‏‎ (2 revisions)
  321. PCI-1.1.9:‏‎ (2 revisions)
  322. PCI-10.3.6:‏‎ (2 revisions)
  323. PCI-1.4:‏‎ (2 revisions)
  324. AI1.2:‏‎ (2 revisions)
  325. PCI-1.3:‏‎ (2 revisions)
  326. AI2.1:‏‎ (2 revisions)
  327. AI2.3:‏‎ (2 revisions)
  328. AI2.4:‏‎ (2 revisions)
  329. AI2.9:‏‎ (2 revisions)
  330. Quality assurance‏‎ (2 revisions)
  331. AI4.2:‏‎ (2 revisions)
  332. PO10.9:‏‎ (2 revisions)
  333. AI6.4:‏‎ (2 revisions)
  334. Sample Legal Hold Standards:‏‎ (2 revisions)
  335. PO3.1:‏‎ (2 revisions)
  336. ME1.2:‏‎ (2 revisions)
  337. ME2.3:‏‎ (2 revisions)
  338. Outline of issues involving search and seizure—Pursuant to warrant‏‎ (2 revisions)
  339. Anti-cybersquatting Consumer Protection Act‏‎ (2 revisions)
  340. PCI-1.1.8:‏‎ (2 revisions)
  341. PCI-10.2.4:‏‎ (2 revisions)
  342. PCI-1.4.1:‏‎ (2 revisions)
  343. PCI-11.5:‏‎ (2 revisions)
  344. PCI-10.5.2:‏‎ (2 revisions)
  345. PCI-1.3.9:‏‎ (2 revisions)
  346. PCI-8.5.5:‏‎ (2 revisions)
  347. PCI-2.2.3:‏‎ (2 revisions)
  348. PCI 7:‏‎ (2 revisions)
  349. Character witnesses‏‎ (2 revisions)
  350. PO10.11:‏‎ (2 revisions)
  351. PO1.3:‏‎ (2 revisions)
  352. PCI-12.9.2:‏‎ (2 revisions)
  353. PO10.6:‏‎ (2 revisions)
  354. PO3.3:‏‎ (2 revisions)
  355. PO4.7:‏‎ (2 revisions)
  356. Communications Decency Act‏‎ (2 revisions)
  357. PO4.5:‏‎ (2 revisions)
  358. PO3.2:‏‎ (2 revisions)
  359. PO7.4:‏‎ (2 revisions)
  360. Computer network‏‎ (2 revisions)
  361. PO6.3:‏‎ (2 revisions)
  362. Privilege (computer science)‏‎ (2 revisions)
  363. Recovery Time Objective‏‎ (2 revisions)
  364. Privacy Laws in United States‏‎ (2 revisions)
  365. SAS 70‏‎ (2 revisions)
  366. SOX.2.7.10:‏‎ (2 revisions)
  367. DB2 Database Asset Protection Standards:‏‎ (2 revisions)
  368. DS1.3:‏‎ (2 revisions)
  369. DS1.4:‏‎ (2 revisions)
  370. DS1.5:‏‎ (2 revisions)
  371. DS1.6:‏‎ (2 revisions)
  372. DS10.2:‏‎ (2 revisions)
  373. Sample Integrity Protection Standard:‏‎ (2 revisions)
  374. DS11.3:‏‎ (2 revisions)
  375. ME2.1:‏‎ (2 revisions)
  376. Miscellaneous federal laws‏‎ (2 revisions)
  377. DS4:‏‎ (2 revisions)
  378. DS5.1:‏‎ (2 revisions)
  379. DS5.9:‏‎ (2 revisions)
  380. DS5:‏‎ (2 revisions)
  381. DS6.1:‏‎ (2 revisions)
  382. DS6.2:‏‎ (2 revisions)
  383. DS6.3:‏‎ (2 revisions)
  384. PCI-1.1.7:‏‎ (2 revisions)
  385. DS7.1:‏‎ (2 revisions)
  386. DS7.2:‏‎ (2 revisions)
  387. DS7.3:‏‎ (2 revisions)
  388. DS8.2:‏‎ (2 revisions)
  389. DS8.3:‏‎ (2 revisions)
  390. DS8.4:‏‎ (2 revisions)
  391. DS8.5:‏‎ (2 revisions)
  392. PCI-1.5:‏‎ (2 revisions)
  393. DS:2‏‎ (2 revisions)
  394. PCI-1.4.2:‏‎ (2 revisions)
  395. PCI-10.2.6:‏‎ (2 revisions)
  396. PCI-10.2.5:‏‎ (2 revisions)
  397. PCI-10.2.3:‏‎ (2 revisions)
  398. PCI-10.3.3:‏‎ (2 revisions)
  399. PCI-10.3.2:‏‎ (2 revisions)
  400. PCI-10.2.7:‏‎ (2 revisions)
  401. PCI-10.2.2:‏‎ (2 revisions)
  402. PCI-10.5.4:‏‎ (2 revisions)
  403. PCI-10.5.3:‏‎ (2 revisions)
  404. PCI-10.5.1:‏‎ (2 revisions)
  405. PCI-10.3.5:‏‎ (2 revisions)
  406. PCI-10.6:‏‎ (2 revisions)
  407. Department of Defense Information Assurance Certification and Accreditation Process‏‎ (2 revisions)
  408. PCI-12.1.2:‏‎ (2 revisions)
  409. PCI-12.1.1:‏‎ (2 revisions)
  410. PCI-10.5.5:‏‎ (2 revisions)
  411. PCI-10.3.4:‏‎ (2 revisions)
  412. PCI-3.4‏‎ (2 revisions)
  413. PCI-3.1‏‎ (2 revisions)
  414. PCI-12.9.1:‏‎ (2 revisions)
  415. PCI-9.1.1:‏‎ (2 revisions)
  416. PCI-7.1:‏‎ (2 revisions)
  417. PCI-9.1.3:‏‎ (2 revisions)
  418. PCI-6.5.1:‏‎ (2 revisions)
  419. Electronic Signatures in Global and National Commerce Act‏‎ (2 revisions)
  420. PCI-9.3.2:‏‎ (2 revisions)
  421. PCI 8:‏‎ (2 revisions)
  422. PCI-9.10.2:‏‎ (2 revisions)
  423. PCI-12.7:‏‎ (2 revisions)
  424. FN1‏‎ (2 revisions)
  425. FN10‏‎ (2 revisions)
  426. FN11‏‎ (2 revisions)
  427. FN12‏‎ (2 revisions)
  428. FN13‏‎ (2 revisions)
  429. FN14‏‎ (2 revisions)
  430. FN15‏‎ (2 revisions)
  431. FN16‏‎ (2 revisions)
  432. FN17‏‎ (2 revisions)
  433. FN18‏‎ (2 revisions)
  434. FN19‏‎ (2 revisions)
  435. FN20‏‎ (2 revisions)
  436. FN21‏‎ (2 revisions)
  437. FN22‏‎ (2 revisions)
  438. FN23‏‎ (2 revisions)
  439. FN24‏‎ (2 revisions)
  440. FN25‏‎ (2 revisions)
  441. FN26‏‎ (2 revisions)
  442. FN27‏‎ (2 revisions)
  443. FN28‏‎ (2 revisions)
  444. FN29‏‎ (2 revisions)
  445. FN3‏‎ (2 revisions)
  446. FN30‏‎ (2 revisions)
  447. FN31‏‎ (2 revisions)
  448. FN32‏‎ (2 revisions)
  449. FN33‏‎ (2 revisions)
  450. FN34‏‎ (2 revisions)
  451. FN35‏‎ (2 revisions)
  452. FN36‏‎ (2 revisions)
  453. FN37‏‎ (2 revisions)
  454. FN38‏‎ (2 revisions)
  455. FN39‏‎ (2 revisions)
  456. FN4‏‎ (2 revisions)
  457. FN40‏‎ (2 revisions)
  458. FN41‏‎ (2 revisions)
  459. FN42‏‎ (2 revisions)
  460. FN43‏‎ (2 revisions)
  461. FN44‏‎ (2 revisions)
  462. FN45‏‎ (2 revisions)
  463. FN46‏‎ (2 revisions)
  464. FN47‏‎ (2 revisions)
  465. FN48‏‎ (2 revisions)
  466. FN49‏‎ (2 revisions)
  467. FN5‏‎ (2 revisions)
  468. FN50‏‎ (2 revisions)
  469. FN51‏‎ (2 revisions)
  470. FN52‏‎ (2 revisions)
  471. FN53‏‎ (2 revisions)
  472. FN54‏‎ (2 revisions)
  473. FN55‏‎ (2 revisions)
  474. FN56‏‎ (2 revisions)
  475. Plaintext‏‎ (2 revisions)
  476. FN6‏‎ (2 revisions)
  477. Proving computer theft‏‎ (2 revisions)
  478. PO10.2:‏‎ (2 revisions)
  479. FN69‏‎ (2 revisions)
  480. FN7‏‎ (2 revisions)
  481. SOX.1.23:‏‎ (2 revisions)
  482. Right of Publicity‏‎ (2 revisions)
  483. SOX.1.5:‏‎ (2 revisions)
  484. SOX.1.2:‏‎ (2 revisions)
  485. FN8‏‎ (2 revisions)
  486. SOX.2.0.22:‏‎ (2 revisions)
  487. SOX.2.0.20:‏‎ (2 revisions)
  488. SOX.2.0.31:‏‎ (2 revisions)
  489. SOX.2.0.25:‏‎ (2 revisions)
  490. SOX.2.7.13:‏‎ (2 revisions)
  491. SOX.2.7.12:‏‎ (2 revisions)
  492. FN9‏‎ (2 revisions)
  493. SOX.2.7.14:‏‎ (2 revisions)
  494. Requests‏‎ (2 revisions)
  495. SOX Policy References:‏‎ (2 revisions)
  496. SOX.4.2.1.9:‏‎ (2 revisions)
  497. Federal Laws in general‏‎ (2 revisions)
  498. SOX.4.2.1.8:‏‎ (2 revisions)
  499. Sample Misuse Reporting Standard:‏‎ (2 revisions)
  500. Generalized Contract Law Outline‏‎ (2 revisions)

View ( | ) (20 | 50 | 100 | 250 | 500)