Search results

Jump to navigation Jump to search
View ( | ) (20 | 50 | 100 | 250 | 500)
  • ...ade Law (UNCITRAL), 29th Sess., art. 7(1), at 3, U.N. Doc. A/CN.9/XXIX/CRP.1/Add.13 (1996) ("Where a law requires a signature of a person, that requirem ...
    1 KB (161 words) - 12:29, 16 October 2014
  • {| id="table1" width="100%" border="1" | 1.0 ...
    12 KB (1,720 words) - 14:10, 1 May 2010
  • ...nuary). Authentication: A pillar of information assurance. SC Magazine, 21(1), 55. Retrieved October 30, 2011, from ProQuest Computing. (Document ID: 1 .../www.e-publishing.af.mil/shared/media/epubs/AFI33-203V1.pdf AFI 33-203 Vol 1], Emission Security (Soon to be AFSSI 7700) ...
    7 KB (983 words) - 10:41, 15 April 2012
  • ...5(a)(3)(A), (4)(A), 7(g)(1), 5 U.S.C.A. §§ 7704(a)(3)(A), (4)(A), 7706(g)(1). Omega World Travel, Inc. v. Mummagraphics, Inc., 469 F.3d 348 (4th Cir. 2 ...e sender's domain name. CAN-SPAM Act, §§ 5(a)(1, 6), 15 U.S.C.A. § 7704(a)(1, 6). Omega World Travel, Inc. v. Mummagraphics, Inc., 469 F.3d 348 (4th Cir ...
    8 KB (1,176 words) - 10:17, 5 May 2011
  • Image:Vulnerability Assessment and Management Standard(1).png|Vulnerability Assessment and Management Standard page two of five. ...
    2 KB (230 words) - 19:16, 14 January 2014
  • ### SHA-1 with 128-bit or 160 bit key Image:Encryption Standard(1).png|Encryption Standard page two of eight ...
    4 KB (558 words) - 15:12, 21 January 2014
  • ...D.N.Y. 1943) (opinion of the court by Judge Learned Hand), aff'd, 326 U.S. 1 (1945). ...
    1 KB (184 words) - 18:49, 10 April 2011
  • Computer Crime Prevention Law — Ill. Rev. Stat., ch. 38, §§ 16D-1 to -7<br> Ind. Code § 35-43-1-4<br> ...
    9 KB (1,358 words) - 22:11, 5 September 2011
  • {| id="table1" width="100%" border="1" | 1.0 ...
    11 KB (1,433 words) - 14:11, 1 May 2010
  • {| id="table1" width="100%" border="1" | 1.0 ...
    8 KB (1,068 words) - 17:23, 16 October 2009
  • ...e under these three statutes. This manual reflects that division: Chapters 1 and 2 address the Fourth Amendment law of search and seizure, and Chapters Chapter 1 explains the restrictions that the Fourth Amendment places on the warrantle ...
    11 KB (1,632 words) - 12:36, 5 August 2011
  • Image:Asset Information Labeling Standard(1).png|Asset Information Labeling Standard page two of six. ...
    2 KB (258 words) - 16:26, 24 September 2014
  • ...54 FR 13864, April 6, 1989; 56 FR 13754, April 4, 1991; 58 FR 17084, April 1, 1993; 59 FR 40204, Aug. 5, 1994; 73 FR 44599, July 30, 2008; 74 FR 36094, ...
    1 KB (152 words) - 12:28, 16 October 2014
  • ...vice organization's controls over a minimum six month period (e.g. January 1, 2012 to June 30, 2012). The contents of each type of report is described i {| id="table1" width="100%" border="1" ...
    10 KB (1,457 words) - 21:20, 21 August 2012
  • ...B), with respect to information technology in the Federal Government, to: (1) exercise capital planning control; (2) promote the improvement of the acqu * '''(Sec. 5113)''' Requires the OMB Director to: (1) encourage performance- and results-based management in fulfilling his resp ...
    10 KB (1,502 words) - 19:27, 4 April 2010
  • ...ed online for a minimum of thirty (30) days and retained for at least one (1) year and in accordance with legal and regulatory requirements. Image:Availability Protection Standard(1).png|Availability Protection Standard page two of eight. ...
    5 KB (646 words) - 21:03, 15 January 2014
  • Image:Employee Ongoing Security Awareness Standard(1).png|Employee Ongoing Security Awareness Standard page two of five. ...
    2 KB (275 words) - 17:10, 23 January 2014
  • (1) Any person subject to the act and this part shall retain evidence of compl ...
    1 KB (194 words) - 12:27, 16 October 2014
  • {| id="table1" width="100%" border="1" | 1.0 ...
    12 KB (1,711 words) - 14:16, 1 May 2010
  • {| id="table1" width="100%" border="1" | 1.0 ...
    14 KB (1,956 words) - 14:16, 1 May 2010
View ( | ) (20 | 50 | 100 | 250 | 500)