Oldest pages

Jump to navigation Jump to search

Showing below up to 500 results in range #501 to #1,000.

View ( | ) (20 | 50 | 100 | 250 | 500)

  1. Service Level Management:‏‎ (15:44, 20 March 2007)
  2. Capacity Management:‏‎ (15:46, 20 March 2007)
  3. Availability Management:‏‎ (15:48, 20 March 2007)
  4. Service Desk Management:‏‎ (16:15, 20 March 2007)
  5. Problem Management:‏‎ (16:20, 20 March 2007)
  6. Release Management:‏‎ (16:42, 20 March 2007)
  7. Change Management:‏‎ (16:23, 21 March 2007)
  8. Confidentiality‏‎ (15:05, 22 March 2007)
  9. Service Level Agreement‏‎ (16:06, 22 March 2007)
  10. Key Performance Indicator‏‎ (16:48, 22 March 2007)
  11. Information Security Management System‏‎ (17:09, 22 March 2007)
  12. DS5.1:‏‎ (17:12, 22 March 2007)
  13. Financial Management:‏‎ (10:12, 23 March 2007)
  14. Configuration Management:‏‎ (15:09, 23 March 2007)
  15. Configuration Mangement:‏‎ (16:12, 23 March 2007)
  16. Research‏‎ (00:00, 26 March 2007)
  17. ISO/IEC 17799‏‎ (16:57, 26 March 2007)
  18. Availability‏‎ (17:23, 26 March 2007)
  19. User’s Security Handbook -- RFC 2504 February 1999‏‎ (14:38, 3 April 2007)
  20. American Bar Association Digital Signature Guidelines‏‎ (15:18, 3 April 2007)
  21. 3‏‎ (15:23, 3 April 2007)
  22. 4‏‎ (15:24, 3 April 2007)
  23. 5‏‎ (15:25, 3 April 2007)
  24. 6‏‎ (15:26, 3 April 2007)
  25. 7‏‎ (15:26, 3 April 2007)
  26. 8‏‎ (15:27, 3 April 2007)
  27. 9‏‎ (15:28, 3 April 2007)
  28. 25‏‎ (15:47, 3 April 2007)
  29. 26‏‎ (15:47, 3 April 2007)
  30. 27‏‎ (15:48, 3 April 2007)
  31. 28‏‎ (15:49, 3 April 2007)
  32. 29‏‎ (15:50, 3 April 2007)
  33. 30‏‎ (15:50, 3 April 2007)
  34. 31‏‎ (15:51, 3 April 2007)
  35. 32‏‎ (15:52, 3 April 2007)
  36. 33‏‎ (15:52, 3 April 2007)
  37. 34‏‎ (15:53, 3 April 2007)
  38. 35‏‎ (15:53, 3 April 2007)
  39. Web Application Auditing:‏‎ (13:41, 4 April 2007)
  40. Information Technology Auditor's Glossary:‏‎ (13:08, 9 April 2007)
  41. PO2.3:‏‎ (16:53, 9 April 2007)
  42. DS5.5:‏‎ (16:57, 9 April 2007)
  43. PCI:‏‎ (17:00, 9 April 2007)
  44. SOX.2.0.25:‏‎ (17:03, 9 April 2007)
  45. SOX.2.7.11:‏‎ (17:05, 9 April 2007)
  46. Access Control:‏‎ (02:00, 10 April 2007)
  47. Personnel Security:‏‎ (12:54, 10 April 2007)
  48. Enterprise Open-Source Policy Sample:‏‎ (12:58, 10 April 2007)
  49. Insurance:‏‎ (13:30, 10 April 2007)
  50. Information Security booklet‏‎ (13:31, 10 April 2007)
  51. Physical and Environmental Protection‏‎ (14:22, 10 April 2007)
  52. Malicious Code Prevention‏‎ (17:25, 10 April 2007)
  53. Data Security‏‎ (18:20, 10 April 2007)
  54. Security Audit Procedures‏‎ (14:40, 11 April 2007)
  55. Audit Guidance Examination Procedures‏‎ (17:53, 11 April 2007)
  56. ME2.6:‏‎ (17:55, 13 April 2007)
  57. Risk Analysis‏‎ (18:32, 13 April 2007)
  58. Audit Booklet‏‎ (14:37, 16 April 2007)
  59. Quality assurance‏‎ (18:59, 17 April 2007)
  60. AI2.8:‏‎ (19:02, 17 April 2007)
  61. PO4.7:‏‎ (19:03, 17 April 2007)
  62. AI7.7:‏‎ (19:05, 17 April 2007)
  63. Software Configuration Management‏‎ (19:07, 17 April 2007)
  64. Service Provider Oversight‏‎ (19:14, 17 April 2007)
  65. Risk mitigation‏‎ (19:15, 17 April 2007)
  66. Bank Secrecy Act:‏‎ (14:57, 20 April 2007)
  67. Requests‏‎ (16:10, 20 April 2007)
  68. Best Practices Research Reports:‏‎ (16:22, 23 April 2007)
  69. Presentations:‏‎ (12:45, 25 April 2007)
  70. References:‏‎ (12:47, 25 April 2007)
  71. PO1.2:‏‎ (16:55, 25 April 2007)
  72. Business-IT Alignment‏‎ (17:07, 25 April 2007)
  73. PO1.1:‏‎ (17:21, 25 April 2007)
  74. PO3.3:‏‎ (17:49, 25 April 2007)
  75. DS2.1:‏‎ (18:00, 25 April 2007)
  76. PO7.4:‏‎ (18:05, 25 April 2007)
  77. DS4.2:‏‎ (18:10, 25 April 2007)
  78. DS4.3:‏‎ (18:16, 25 April 2007)
  79. DS4.5:‏‎ (18:21, 25 April 2007)
  80. DS4.6:‏‎ (18:35, 25 April 2007)
  81. Business Impact Analysis‏‎ (18:45, 25 April 2007)
  82. Development and Acquisition Booklet‏‎ (22:41, 25 April 2007)
  83. Management Booklet‏‎ (18:03, 27 April 2007)
  84. E-Banking Booklet‏‎ (10:04, 28 April 2007)
  85. Continuity Management:‏‎ (13:24, 30 April 2007)
  86. Microsoft SQL Database Asset Protection Standards:‏‎ (13:53, 14 May 2007)
  87. DB2 Database Asset Protection Standards:‏‎ (14:43, 15 May 2007)
  88. MySQL Database Asset Protection Standards:‏‎ (17:59, 18 May 2007)
  89. Organizing Information Security:‏‎ (12:49, 22 May 2007)
  90. Human Resources Security:‏‎ (14:04, 22 May 2007)
  91. Information Systems Acquisition, Development and Maintenance:‏‎ (14:05, 22 May 2007)
  92. Security Policy:‏‎ (13:25, 23 May 2007)
  93. Asset Management:‏‎ (13:29, 23 May 2007)
  94. Communications and Operations Management:‏‎ (13:51, 23 May 2007)
  95. Incident Management:‏‎ (16:40, 23 May 2007)
  96. Compliance:‏‎ (12:41, 25 May 2007)
  97. Business Continuity Planning Booklet‏‎ (13:42, 30 May 2007)
  98. Business Continuity Management:‏‎ (00:17, 1 June 2007)
  99. Security through obscurity‏‎ (14:44, 14 June 2007)
  100. Russian copulation‏‎ (15:35, 14 June 2007)
  101. Plaintext‏‎ (15:52, 14 June 2007)
  102. RED/BLACK concept‏‎ (16:06, 14 June 2007)
  103. Cleartext‏‎ (16:40, 14 June 2007)
  104. Padding (cryptography)‏‎ (16:42, 14 June 2007)
  105. Hardening‏‎ (18:26, 14 June 2007)
  106. Privilege (computer science)‏‎ (18:37, 14 June 2007)
  107. Security by design‏‎ (18:39, 14 June 2007)
  108. Zero-day exploit‏‎ (19:02, 14 June 2007)
  109. Monitor and Evaluate:‏‎ (19:06, 14 June 2007)
  110. Planning and Organization:‏‎ (19:07, 14 June 2007)
  111. Acquisition and Implementation:‏‎ (19:07, 14 June 2007)
  112. Delivery and Support:‏‎ (19:08, 14 June 2007)
  113. Physical and Environmental Security:‏‎ (19:28, 14 June 2007)
  114. PO4.11:‏‎ (19:45, 14 June 2007)
  115. AI1.2:‏‎ (23:52, 14 June 2007)
  116. AI4.2:‏‎ (23:55, 14 June 2007)
  117. Organizational Security:‏‎ (12:40, 15 June 2007)
  118. HIPAA Standard References:‏‎ (13:15, 15 June 2007)
  119. Health Insurance Portability and Accountability:‏‎ (13:17, 15 June 2007)
  120. Information Security Audit‏‎ (16:52, 15 June 2007)
  121. GLBA:‏‎ (17:02, 15 June 2007)
  122. FFIEC:‏‎ (17:47, 15 June 2007)
  123. Sample Misuse Reporting Standard:‏‎ (12:22, 19 July 2007)
  124. Oracle Database Asset Protection Standards:‏‎ (16:20, 15 November 2007)
  125. Risk assessment‏‎ (16:03, 22 December 2007)
  126. The HIPAA Security and the Risk Dilemma:‏‎ (20:24, 27 February 2008)
  127. Implementation‏‎ (14:51, 29 February 2008)
  128. AES‏‎ (11:41, 28 March 2008)
  129. Cryptography‏‎ (11:44, 28 March 2008)
  130. Database Application Best Practice Configuration Samples:‏‎ (11:45, 28 March 2008)
  131. Encryption‏‎ (11:46, 28 March 2008)
  132. PCI-4.1.1:‏‎ (11:48, 28 March 2008)
  133. DS11.2:‏‎ (11:49, 28 March 2008)
  134. DS11.3:‏‎ (11:50, 28 March 2008)
  135. PCI 3:‏‎ (11:52, 28 March 2008)
  136. PCI-3.4‏‎ (11:53, 28 March 2008)
  137. Forensic Education Resources:‏‎ (16:12, 20 October 2008)
  138. Horsewiki/horsewiki/index.php‏‎ (11:55, 17 November 2008)
  139. Horsewiki/index.php‏‎ (10:30, 21 November 2008)
  140. Current events‏‎ (11:17, 30 November 2008)
  141. In general‏‎ (03:10, 17 February 2009)
  142. Purpose of computer crime laws‏‎ (14:48, 17 February 2009)
  143. Applicability of common-law sanctions‏‎ (14:51, 17 February 2009)
  144. Procedure; generally‏‎ (14:51, 17 February 2009)
  145. Venue‏‎ (14:54, 17 February 2009)
  146. In general; intangible nature of assets‏‎ (03:33, 18 February 2009)
  147. Alteration‏‎ (03:34, 18 February 2009)
  148. Computer‏‎ (03:35, 18 February 2009)
  149. Computer network‏‎ (03:37, 18 February 2009)
  150. Computer hardware‏‎ (03:38, 18 February 2009)
  151. Computer software‏‎ (03:38, 18 February 2009)
  152. Computer program‏‎ (03:40, 18 February 2009)
  153. Computer services‏‎ (03:40, 18 February 2009)
  154. Data; intellectual property‏‎ (03:42, 18 February 2009)
  155. Financial instrument‏‎ (03:43, 18 February 2009)
  156. Intent—knowledge‏‎ (03:45, 18 February 2009)
  157. Intent—Purpose‏‎ (03:46, 18 February 2009)
  158. Intent—Malice‏‎ (03:47, 18 February 2009)
  159. Intent—Authorization‏‎ (03:48, 18 February 2009)
  160. Recklessness‏‎ (03:48, 18 February 2009)
  161. Intent—Knowledge‏‎ (03:50, 18 February 2009)
  162. Federal Laws in general‏‎ (10:53, 18 February 2009)
  163. Activities involving access devices and equipment‏‎ (10:54, 18 February 2009)
  164. Communications Decency Act‏‎ (10:56, 18 February 2009)
  165. Child pornography legislation‏‎ (11:00, 18 February 2009)
  166. The Copyright Act‏‎ (11:04, 18 February 2009)
  167. National Stolen Property Act‏‎ (11:06, 18 February 2009)
  168. Electronic Communications Privacy Act‏‎ (11:09, 18 February 2009)
  169. Economic Espionage Act of 1996‏‎ (11:10, 18 February 2009)
  170. Miscellaneous federal laws‏‎ (11:15, 18 February 2009)
  171. State Laws in general‏‎ (11:45, 18 February 2009)
  172. Illegal gains‏‎ (11:51, 18 February 2009)
  173. Physical taking offenses‏‎ (12:04, 18 February 2009)
  174. Use of computer services; larceny‏‎ (12:07, 18 February 2009)
  175. Taking of information‏‎ (12:09, 18 February 2009)
  176. State consumer protection laws‏‎ (12:10, 18 February 2009)
  177. Possession of hardware designed for illegal purpose‏‎ (12:11, 18 February 2009)
  178. Damage to computer or component‏‎ (12:14, 18 February 2009)
  179. Personal harm‏‎ (12:15, 18 February 2009)
  180. Violation of privacy‏‎ (12:17, 18 February 2009)
  181. Trespass‏‎ (12:30, 18 February 2009)
  182. Facilitating crime‏‎ (12:31, 18 February 2009)
  183. Computer pornography‏‎ (12:33, 18 February 2009)
  184. Federal Child pornography legislation‏‎ (12:35, 18 February 2009)
  185. State Child pornography legislation‏‎ (12:38, 18 February 2009)
  186. State Child protection legislation; solicitation and importuning‏‎ (12:42, 18 February 2009)
  187. Trade secret statutes‏‎ (12:44, 18 February 2009)
  188. Miscellaneous laws‏‎ (12:48, 18 February 2009)
  189. Punishments and Penalties in general‏‎ (12:50, 18 February 2009)
  190. Determining factors‏‎ (12:52, 18 February 2009)
  191. Civil remedies‏‎ (12:53, 18 February 2009)
  192. Admission of evidence‏‎ (12:54, 18 February 2009)
  193. Loss valuation‏‎ (12:55, 18 February 2009)
  194. Meeting and gaining rapport with the defendant‏‎ (16:12, 18 February 2009)
  195. Restricting interrogation of defendant‏‎ (16:13, 18 February 2009)
  196. Dealing with pretrial publicity‏‎ (16:14, 18 February 2009)
  197. Initial pre-arrest client interview‏‎ (16:15, 18 February 2009)
  198. Conferring with arrested client‏‎ (16:16, 18 February 2009)
  199. Initial conference with defendant; information checklist‏‎ (16:17, 18 February 2009)
  200. Considerations as to arranging for surrender of defendant‏‎ (16:18, 18 February 2009)
  201. Obtaining defendant's release on bail‏‎ (16:19, 18 February 2009)
  202. Illustrative form; order fixing bail‏‎ (16:24, 18 February 2009)
  203. Release on own recognizance‏‎ (16:26, 18 February 2009)
  204. Release on own recognizance—Questions checklist‏‎ (16:27, 18 February 2009)
  205. Illustrative form—defendant's agreement to appear‏‎ (17:43, 18 February 2009)
  206. Illustrative form—Order for release on own recognizance‏‎ (17:46, 18 February 2009)
  207. Client Interview and Planning; Evaluating the Case in general‏‎ (17:47, 18 February 2009)
  208. Generalized Intentional Torts‏‎ (16:31, 21 February 2009)
  209. Generalized Negligence Torts‏‎ (16:32, 21 February 2009)
  210. Generalized Strict Liability Torts‏‎ (16:33, 21 February 2009)
  211. Generalized Defamation Torts‏‎ (16:34, 21 February 2009)
  212. Generalized Tort Remedies‏‎ (16:35, 21 February 2009)
  213. Dealing with difficult technical information‏‎ (13:18, 22 February 2009)
  214. Tape recording initial client interview‏‎ (13:19, 22 February 2009)
  215. Advising client of attorney-client privilege‏‎ (13:20, 22 February 2009)
  216. Putting client at ease‏‎ (13:21, 22 February 2009)
  217. Evaluating defendant's version of facts‏‎ (13:23, 22 February 2009)
  218. Evaluating defendant's attitude toward computer victim‏‎ (13:25, 22 February 2009)
  219. Evaluating defendant as a witness‏‎ (13:26, 22 February 2009)
  220. Client interview checklist‏‎ (13:29, 22 February 2009)
  221. Obtaining information about alleged codefendants; checklist‏‎ (13:30, 22 February 2009)
  222. Fees and Costs in general‏‎ (13:31, 22 February 2009)
  223. Determining client's ability to pay fee‏‎ (13:33, 22 February 2009)
  224. Factors affecting amount of fee‏‎ (13:34, 22 February 2009)
  225. Informing client of special costs‏‎ (13:39, 22 February 2009)
  226. Collecting or securing payment of fee‏‎ (13:40, 22 February 2009)
  227. Proceedings Before Grand Jury in general‏‎ (13:41, 22 February 2009)
  228. Appearance of defendant before the grand jury‏‎ (13:42, 22 February 2009)
  229. Evidence presented to the grand jury‏‎ (13:43, 22 February 2009)
  230. Separate trial‏‎ (13:44, 22 February 2009)
  231. Proceedings by Way of Preliminary Hearing in general‏‎ (13:45, 22 February 2009)
  232. Exclusion of witnesses and the press during testimony‏‎ (13:46, 22 February 2009)
  233. Prosecution's need to prove elements of crime‏‎ (13:47, 22 February 2009)
  234. Cross-examination of prosecution witnesses‏‎ (13:48, 22 February 2009)
  235. Factors determining extent of cross-examination‏‎ (13:49, 22 February 2009)
  236. Objecting to computer-generated evidence‏‎ (13:50, 22 February 2009)
  237. Presentation of the defense case‏‎ (13:51, 22 February 2009)
  238. Defense motion to dismiss charges‏‎ (13:51, 22 February 2009)
  239. Motion to reduce charge‏‎ (13:52, 22 February 2009)
  240. Arraignment; Pleas; Continuance of Case in general‏‎ (13:53, 22 February 2009)
  241. Demurrer to complaint; pleas‏‎ (13:54, 22 February 2009)
  242. Waiver or assertion of right to speedy trial‏‎ (13:56, 22 February 2009)
  243. Preliminary Matters in general‏‎ (15:05, 22 February 2009)
  244. Use of discovery‏‎ (15:06, 22 February 2009)
  245. Use of private investigators‏‎ (15:16, 22 February 2009)
  246. Use of computer security consultants, EDP auditors, and computer professionals‏‎ (15:17, 22 February 2009)
  247. Use of independent laboratory tests‏‎ (15:20, 22 February 2009)
  248. Application of forensics to computers‏‎ (15:25, 22 February 2009)
  249. In general; locating witnesses‏‎ (15:26, 22 February 2009)
  250. Interviewing witnesses‏‎ (15:27, 22 February 2009)
  251. Dealing with reluctant witnesses‏‎ (15:28, 22 February 2009)
  252. Law enforcement witnesses‏‎ (15:29, 22 February 2009)
  253. Examining Police Reports, Records, and Photographs in general‏‎ (15:29, 22 February 2009)
  254. Police reports of the computer crime‏‎ (15:30, 22 February 2009)
  255. Fingerprints and handwriting‏‎ (15:31, 22 February 2009)
  256. Investigating the Scene of Crime in general‏‎ (15:32, 22 February 2009)
  257. Reconstructing the crime‏‎ (15:33, 22 February 2009)
  258. Use of photographs and motion pictures‏‎ (15:34, 22 February 2009)
  259. Discovery in general‏‎ (15:37, 22 February 2009)
  260. Subjects of discovery; checklist‏‎ (15:41, 22 February 2009)
  261. Defense discovery options‏‎ (15:43, 22 February 2009)
  262. In general; obtaining lesser charge‏‎ (17:48, 22 February 2009)
  263. Plea bargain checklist‏‎ (17:50, 22 February 2009)
  264. Uncertainty as to applicability of the law‏‎ (17:50, 22 February 2009)
  265. Difficulties in the admissibility of evidence‏‎ (17:52, 22 February 2009)
  266. Uncertainty as to effect of case on a jury‏‎ (17:52, 22 February 2009)
  267. Likelihood of light sentencing; equities favoring defendant‏‎ (17:53, 22 February 2009)
  268. Lack of consensus about sentencing white-collar criminals‏‎ (17:53, 22 February 2009)
  269. The possibility of restitution‏‎ (17:54, 22 February 2009)
  270. Timing of plea bargain request‏‎ (17:55, 22 February 2009)
  271. Plea bargain issues‏‎ (17:55, 22 February 2009)
  272. Determining the plea‏‎ (17:57, 22 February 2009)
  273. Persuading defendant to accept plea bargain‏‎ (17:57, 22 February 2009)
  274. Deciding on the plea‏‎ (17:58, 22 February 2009)
  275. Determining Defenses in general‏‎ (17:59, 22 February 2009)
  276. Notice of defenses‏‎ (18:00, 22 February 2009)
  277. Identity‏‎ (18:04, 22 February 2009)
  278. Alibi‏‎ (18:20, 22 February 2009)
  279. Intent‏‎ (18:22, 22 February 2009)
  280. Authority‏‎ (18:23, 22 February 2009)
  281. Entrapment‏‎ (18:25, 22 February 2009)
  282. Statute of limitations‏‎ (18:26, 22 February 2009)
  283. Preemption‏‎ (18:33, 22 February 2009)
  284. Former jeopardy‏‎ (18:35, 22 February 2009)
  285. Impossibility‏‎ (18:36, 22 February 2009)
  286. Insanity‏‎ (18:37, 22 February 2009)
  287. Motion to dismiss charge‏‎ (18:38, 22 February 2009)
  288. Motion to suppress illegally obtained evidence; checklist‏‎ (18:43, 22 February 2009)
  289. Outline of issues involving search and seizure—Pursuant to warrant‏‎ (18:50, 22 February 2009)
  290. Outline of issues involving search and seizure—Not pursuant to warrant‏‎ (18:54, 22 February 2009)
  291. Outline of issues involving search and seizure—First Amendment issues‏‎ (18:55, 22 February 2009)
  292. Outline of issues involving search and seizure—The computer user's expectation of privacy‏‎ (18:58, 22 February 2009)
  293. Motion challenging the admissibility of computer-generated evidence‏‎ (19:06, 22 February 2009)
  294. Motion for change of venue‏‎ (19:07, 22 February 2009)
  295. Motion for change of venue—Based on publicity‏‎ (19:13, 22 February 2009)
  296. Motion for a continuance‏‎ (19:14, 22 February 2009)
  297. Motion to limit trial publicity‏‎ (19:15, 22 February 2009)
  298. Trial brief‏‎ (19:16, 22 February 2009)
  299. Witness preparation—in general‏‎ (19:17, 22 February 2009)
  300. Witness preparation—Expert witnesses‏‎ (19:18, 22 February 2009)
  301. Preliminary Tactics in general‏‎ (19:20, 22 February 2009)
  302. Seating arrangement in courtroom‏‎ (19:21, 22 February 2009)
  303. Introductory remarks to veniremen‏‎ (19:21, 22 February 2009)
  304. Selecting the Jury in general‏‎ (19:22, 22 February 2009)
  305. Observing jury reaction to questioning by prosecutor‏‎ (19:23, 22 February 2009)
  306. Avoiding generalization based on appearance‏‎ (19:24, 22 February 2009)
  307. Eliciting promise to require independent conviction by each juror‏‎ (19:24, 22 February 2009)
  308. Jurors' views toward computers‏‎ (19:28, 22 February 2009)
  309. Presence and effect of pretrial publicity‏‎ (19:29, 22 February 2009)
  310. Voir-dire questions checklist‏‎ (19:36, 22 February 2009)
  311. Motion to furnish daily transcript‏‎ (19:36, 22 February 2009)
  312. Motion to exclude nontestifying witnesses from courtroom‏‎ (19:37, 22 February 2009)
  313. Motion for mistrial‏‎ (19:38, 22 February 2009)
  314. Motion in limine‏‎ (19:43, 22 February 2009)
  315. Motion to suppress illegally obtained evidence‏‎ (19:47, 22 February 2009)
  316. Motion to suppress confession‏‎ (20:01, 22 February 2009)
  317. Motion challenging method of choosing jury‏‎ (20:02, 22 February 2009)
  318. Motion to exclude computer-generated evidence‏‎ (20:06, 22 February 2009)
  319. Motion to exclude computer-generated evidence—Best evidence rule‏‎ (20:07, 22 February 2009)
  320. Motion to exclude computer-generated evidence—Hearsay rule‏‎ (20:08, 22 February 2009)
  321. Motion to exclude computer-generated evidence—Laying business record exception foundation‏‎ (20:10, 22 February 2009)
  322. Other motions‏‎ (20:12, 22 February 2009)
  323. Opening Statements in general‏‎ (20:13, 22 February 2009)
  324. Opening statement for prosecution‏‎ (20:14, 22 February 2009)
  325. Opening statement for defense‏‎ (20:15, 22 February 2009)
  326. In general; burden of proof‏‎ (20:17, 22 February 2009)
  327. Proving computer theft‏‎ (20:20, 22 February 2009)
  328. Proving computer damage‏‎ (20:22, 22 February 2009)
  329. Proving computer trespass‏‎ (20:24, 22 February 2009)
  330. Proving invasion of privacy‏‎ (20:26, 22 February 2009)
  331. Using electronically obtained evidence‏‎ (20:27, 22 February 2009)
  332. The Defense of a Computer Crime Case‏‎ (20:29, 22 February 2009)
  333. Cross-examination of prosecution witnesses for the Prosecution‏‎ (20:30, 22 February 2009)
  334. Witnesses testifying as to documents‏‎ (20:31, 22 February 2009)
  335. Law enforcement witnesses for the Prosecution‏‎ (20:38, 22 February 2009)
  336. Accountant witnesses‏‎ (20:39, 22 February 2009)
  337. Impeaching witnesses granted immunity; minors‏‎ (20:39, 22 February 2009)
  338. Discrediting expert witnesses‏‎ (20:40, 22 February 2009)
  339. Discrediting expert witnesses—Illustrative cross-examination of systems analyst‏‎ (20:53, 22 February 2009)
  340. In general; timing the appearance of defense witnesses‏‎ (20:54, 22 February 2009)
  341. Defendant as a witness‏‎ (20:58, 22 February 2009)
  342. Other defense witnesses; alleged codefendants‏‎ (20:58, 22 February 2009)
  343. Alibi witnesses‏‎ (20:59, 22 February 2009)
  344. Character witnesses‏‎ (21:00, 22 February 2009)
  345. Minors as defense witnesses‏‎ (21:00, 22 February 2009)
  346. Experts‏‎ (21:02, 22 February 2009)
  347. Defense Summation in general‏‎ (21:03, 22 February 2009)
  348. Illustrative summation‏‎ (21:04, 22 February 2009)
  349. Drafting instructions to jury—key terms‏‎ (21:08, 22 February 2009)
  350. Drafting instructions to jury—Computer damage‏‎ (21:17, 22 February 2009)
  351. Drafting instructions to jury—Alteration with intent to injure or defraud‏‎ (21:29, 22 February 2009)
  352. Drafting instructions to jury—Computer theft—access‏‎ (21:35, 22 February 2009)
  353. Drafting instructions to jury—Taking, transferring, concealing, or retaining‏‎ (21:36, 22 February 2009)
  354. Proceedings After Trial in general‏‎ (21:37, 22 February 2009)
  355. Conferring with probation officer‏‎ (21:39, 22 February 2009)
  356. Sentencing hearing—illustrative argument and response‏‎ (21:45, 22 February 2009)
  357. Return of exhibits‏‎ (21:46, 22 February 2009)
  358. Civil consequences of plea or finding of guilt‏‎ (21:48, 22 February 2009)
  359. FN57‏‎ (10:29, 25 February 2009)
  360. FN58‏‎ (10:31, 25 February 2009)
  361. FN59‏‎ (10:33, 25 February 2009)
  362. FN60‏‎ (10:35, 25 February 2009)
  363. FN61‏‎ (10:37, 25 February 2009)
  364. FN62‏‎ (10:39, 25 February 2009)
  365. FN63‏‎ (10:41, 25 February 2009)
  366. FN64‏‎ (10:43, 25 February 2009)
  367. FN65‏‎ (10:45, 25 February 2009)
  368. FN66‏‎ (10:47, 25 February 2009)
  369. FN67‏‎ (10:48, 25 February 2009)
  370. FN68‏‎ (10:50, 25 February 2009)
  371. FN70‏‎ (10:53, 25 February 2009)
  372. FN71‏‎ (10:56, 25 February 2009)
  373. FN72‏‎ (10:57, 25 February 2009)
  374. FN73‏‎ (10:46, 26 February 2009)
  375. FN74‏‎ (10:49, 26 February 2009)
  376. FN75‏‎ (11:02, 26 February 2009)
  377. FN76‏‎ (11:05, 26 February 2009)
  378. FN77‏‎ (11:06, 26 February 2009)
  379. FN78‏‎ (11:09, 26 February 2009)
  380. FN79‏‎ (11:11, 26 February 2009)
  381. FN80‏‎ (11:12, 26 February 2009)
  382. Security Management:‏‎ (14:10, 27 February 2009)
  383. FN81‏‎ (12:09, 28 February 2009)
  384. FN82‏‎ (12:11, 28 February 2009)
  385. FN34‏‎ (12:13, 28 February 2009)
  386. FN84‏‎ (12:15, 28 February 2009)
  387. FN36‏‎ (12:17, 28 February 2009)
  388. FN37‏‎ (12:19, 28 February 2009)
  389. FN87‏‎ (12:21, 28 February 2009)
  390. FN88‏‎ (12:22, 28 February 2009)
  391. FN89‏‎ (12:24, 28 February 2009)
  392. FN90‏‎ (12:25, 28 February 2009)
  393. FN91‏‎ (12:27, 28 February 2009)
  394. FN92‏‎ (12:29, 28 February 2009)
  395. FN93‏‎ (12:31, 28 February 2009)
  396. FN94‏‎ (12:32, 28 February 2009)
  397. FN95‏‎ (12:33, 28 February 2009)
  398. FN96‏‎ (12:35, 28 February 2009)
  399. FN97‏‎ (12:36, 28 February 2009)
  400. FN98‏‎ (12:38, 28 February 2009)
  401. FN99‏‎ (12:43, 28 February 2009)
  402. FN1‏‎ (16:47, 1 March 2009)
  403. FN2‏‎ (16:49, 1 March 2009)
  404. FN3‏‎ (16:51, 1 March 2009)
  405. FN4‏‎ (16:52, 1 March 2009)
  406. FN5‏‎ (16:53, 1 March 2009)
  407. FN6‏‎ (16:55, 1 March 2009)
  408. FN7‏‎ (16:59, 1 March 2009)
  409. FN8‏‎ (17:00, 1 March 2009)
  410. FN9‏‎ (17:02, 1 March 2009)
  411. FN10‏‎ (17:03, 1 March 2009)
  412. FN11‏‎ (17:04, 1 March 2009)
  413. FN12‏‎ (17:06, 1 March 2009)
  414. FN13‏‎ (17:08, 1 March 2009)
  415. FN14‏‎ (17:09, 1 March 2009)
  416. FN15‏‎ (17:10, 1 March 2009)
  417. FN16‏‎ (17:12, 1 March 2009)
  418. FN17‏‎ (17:13, 1 March 2009)
  419. FN18‏‎ (17:15, 1 March 2009)
  420. FN19‏‎ (17:16, 1 March 2009)
  421. FN20‏‎ (17:18, 1 March 2009)
  422. FN21‏‎ (12:38, 2 March 2009)
  423. FN22‏‎ (12:40, 2 March 2009)
  424. FN23‏‎ (12:42, 2 March 2009)
  425. FN24‏‎ (12:43, 2 March 2009)
  426. FN25‏‎ (12:44, 2 March 2009)
  427. FN26‏‎ (12:45, 2 March 2009)
  428. FN27‏‎ (12:47, 2 March 2009)
  429. FN28‏‎ (12:48, 2 March 2009)
  430. FN29‏‎ (12:50, 2 March 2009)
  431. FN30‏‎ (12:51, 2 March 2009)
  432. FN31‏‎ (11:03, 3 March 2009)
  433. FN32‏‎ (11:05, 3 March 2009)
  434. FN33‏‎ (11:06, 3 March 2009)
  435. FN35‏‎ (11:08, 3 March 2009)
  436. FN38‏‎ (11:18, 3 March 2009)
  437. FN39‏‎ (11:40, 3 March 2009)
  438. FN40‏‎ (11:42, 3 March 2009)
  439. FN41‏‎ (02:56, 5 March 2009)
  440. FN42‏‎ (02:57, 5 March 2009)
  441. FN43‏‎ (02:59, 5 March 2009)
  442. FN44‏‎ (03:00, 5 March 2009)
  443. FN45‏‎ (03:02, 5 March 2009)
  444. FN46‏‎ (03:03, 5 March 2009)
  445. FN47‏‎ (10:39, 5 March 2009)
  446. FN48‏‎ (10:44, 5 March 2009)
  447. FN49‏‎ (10:46, 5 March 2009)
  448. FN50‏‎ (10:47, 5 March 2009)
  449. FN51‏‎ (10:49, 5 March 2009)
  450. FN52‏‎ (10:51, 5 March 2009)
  451. FN53‏‎ (10:52, 5 March 2009)
  452. FN54‏‎ (10:53, 5 March 2009)
  453. FN55‏‎ (10:55, 5 March 2009)
  454. FN56‏‎ (10:57, 5 March 2009)
  455. FN69‏‎ (10:58, 5 March 2009)
  456. FN83‏‎ (10:58, 5 March 2009)
  457. FN85‏‎ (10:59, 5 March 2009)
  458. FN86‏‎ (11:00, 5 March 2009)
  459. Sovereignty‏‎ (11:27, 5 March 2009)
  460. Libel‏‎ (11:40, 5 March 2009)
  461. Sample Legal Hold Standards:‏‎ (13:20, 9 March 2009)
  462. Sample Asset Protection Standard:‏‎ (18:06, 15 March 2009)
  463. Generalized Contract Law Outline‏‎ (09:26, 7 April 2009)
  464. Generalized Torts Outline‏‎ (10:42, 7 April 2009)
  465. Awareness-training‏‎ (20:07, 13 June 2009)
  466. Awareness Articles and Information:‏‎ (20:12, 13 June 2009)
  467. Loose Lips, Sink Ships:‏‎ (20:13, 13 June 2009)
  468. Integrity‏‎ (20:33, 28 July 2009)
  469. Sample On Premise Wireless Access Technology Guideline‏‎ (16:01, 2 August 2009)
  470. Infrastructure Best Practice Configuration Samples:‏‎ (16:15, 2 August 2009)
  471. Burden of proof‏‎ (10:18, 11 August 2009)
  472. Fifth Amendment‏‎ (10:20, 11 August 2009)
  473. Social Computing Guidelines‏‎ (14:56, 28 August 2009)
  474. Sample Electronic Fraud Prevention Guidelines:‏‎ (16:53, 22 September 2009)
  475. Sample Asset Identification and Classification Policy:‏‎ (17:23, 16 October 2009)
  476. Risk management‏‎ (23:45, 10 March 2010)
  477. Getting it Right in Records Management‏‎ (22:00, 15 March 2010)
  478. Why you need an intelligent file transfer solution.‏‎ (22:16, 15 March 2010)
  479. Manage Document Metadata‏‎ (22:52, 15 March 2010)
  480. A Project Management Approach to eDiscovery‏‎ (10:44, 16 March 2010)
  481. Foreign Privacy Laws vs. U.S. Discovery Obligations‏‎ (10:48, 16 March 2010)
  482. How Many Pages in a Gigabyte?‏‎ (10:49, 16 March 2010)
  483. Information Risk Guide‏‎ (10:57, 16 March 2010)
  484. Legal-Technology White Papers‏‎ (11:06, 16 March 2010)
  485. Risk management plan‏‎ (16:58, 28 March 2010)
  486. Clinger-Cohen-Act‏‎ (19:27, 4 April 2010)
  487. Sarbanes-Oxley‏‎ (14:31, 15 April 2010)
  488. Corporate Governance‏‎ (15:20, 15 April 2010)
  489. FERPA‏‎ (19:08, 19 April 2010)
  490. FISMA‏‎ (19:19, 19 April 2010)
  491. AS8015‏‎ (16:22, 20 April 2010)
  492. Corporate governance‏‎ (17:19, 20 April 2010)
  493. IT Change Management‏‎ (10:24, 23 April 2010)
  494. Change control‏‎ (14:15, 23 April 2010)
  495. Microsoft Operations Framework‏‎ (14:19, 23 April 2010)
  496. ISO 20000‏‎ (14:25, 23 April 2010)
  497. USC 18 1030‏‎ (11:31, 1 May 2010)
  498. Sample Management Awareness Standard:‏‎ (14:02, 1 May 2010)
  499. Sample Third Party Security Awareness Standard:‏‎ (14:05, 1 May 2010)
  500. Sample Security Awareness Accessibility Standard:‏‎ (14:07, 1 May 2010)

View ( | ) (20 | 50 | 100 | 250 | 500)