Pages with the most revisions
Jump to navigation
Jump to search
Showing below up to 500 results in range #251 to #750.
- Burden of proof (3 revisions)
- Business-IT Alignment (3 revisions)
- Business Continuity Planning Booklet (3 revisions)
- Change Management: (3 revisions)
- Change control (3 revisions)
- Cleartext (3 revisions)
- PCI-9.3.1: (3 revisions)
- Configuration Mangement: (3 revisions)
- Continuity Management: (3 revisions)
- DS11.4: (3 revisions)
- DS11.5: (3 revisions)
- PCI-9.1.2: (3 revisions)
- DS12.2: (3 revisions)
- PCI-6.3.1: (3 revisions)
- Personally identifiable information (3 revisions)
- Recovery Point Objective (3 revisions)
- DS4.6: (3 revisions)
- DS5.10: (3 revisions)
- SOX.1.1: (3 revisions)
- RED/BLACK concept (3 revisions)
- DS5.5: (3 revisions)
- SOX.4.4.8: (3 revisions)
- DS6.4: (3 revisions)
- SOX.2.0.26: (3 revisions)
- DS8.1: (3 revisions)
- DS9.3: (3 revisions)
- Sample Change Control Standard: (3 revisions)
- Sample Software Acceptable Use Standard: (3 revisions)
- Security through obscurity (3 revisions)
- Discovery in general (3 revisions)
- FN2 (3 revisions)
- FOIA (3 revisions)
- Financial Management: (3 revisions)
- GLBA Policy References: (3 revisions)
- Gramm-Leach-Bliley: (3 revisions)
- Health Insurance Portability and Accountability: (3 revisions)
- IT Change Management (3 revisions)
- PO1.4: (3 revisions)
- PO6.1: (3 revisions)
- Information Systems Acquisition, Development and Maintenance: (3 revisions)
- PO7.8: (3 revisions)
- PO6.4: (3 revisions)
- PO9.3: (3 revisions)
- PO2.3: (3 revisions)
- Recovery Consistency Objective (3 revisions)
- Privacy Laws in Honduras (3 revisions)
- SOX.1.25: (3 revisions)
- SOX.1.22: (3 revisions)
- Privacy Laws in Canada (3 revisions)
- SOX.2.0.23: (3 revisions)
- SOX.2.0.21: (3 revisions)
- SOX.2.7.11: (3 revisions)
- SOX.2.7.9: (3 revisions)
- ME4.3: (3 revisions)
- Malicious Code Prevention (3 revisions)
- Sample Internet Acceptable Use Policy: (3 revisions)
- Sample Telecommunication Acceptable Use Standard: (3 revisions)
- Sample Vulnerability Assessment Standard: (3 revisions)
- Service Provider Oversight (3 revisions)
- Security by design (3 revisions)
- Sample Asset Protection Standards: (3 revisions)
- PCI-1.1.1: (3 revisions)
- PCI-1.1.4: (3 revisions)
- PCI-1.1.6: (3 revisions)
- PCI-1.2.2: (3 revisions)
- PCI-1.2.3: (3 revisions)
- PCI-1.3.3: (3 revisions)
- PCI-1.3.5: (3 revisions)
- PCI-1.3.6: (3 revisions)
- PCI-1.3.7: (3 revisions)
- PCI-1.3.8: (3 revisions)
- PCI-10.2.1: (3 revisions)
- PCI-10.4: (3 revisions)
- PCI-12.8.3: (3 revisions)
- 3.2.2.4: OS/400 (2 revisions)
- PCI-9.10.2: (2 revisions)
- 44 USC 3501 (2 revisions)
- 44 USC 3501-3549 (2 revisions)
- PO3.3: (2 revisions)
- PCI-8.5.5: (2 revisions)
- SOX.1.23: (2 revisions)
- Privilege (computer science) (2 revisions)
- SOX.2.0.25: (2 revisions)
- SOX.4.2.1.8: (2 revisions)
- SOX.2.0.22: (2 revisions)
- Recovery Time Objective (2 revisions)
- The Copyright Act (2 revisions)
- Sample Integrity Protection Standard: (2 revisions)
- AI1.2: (2 revisions)
- PO10.9: (2 revisions)
- AI2.1: (2 revisions)
- AI2.3: (2 revisions)
- AI2.4: (2 revisions)
- AI2.9: (2 revisions)
- AI4.2: (2 revisions)
- AI6.4: (2 revisions)
- AI7.6: (2 revisions)
- AI7.7: (2 revisions)
- PCI-4.1.1: (2 revisions)
- Plaintext (2 revisions)
- PO7.4: (2 revisions)
- PO3.4: (2 revisions)
- PCI-9.1.3: (2 revisions)
- Proving computer theft (2 revisions)
- SAS 70 (2 revisions)
- Anti-cybersquatting Consumer Protection Act (2 revisions)
- SOX.2.0.31: (2 revisions)
- Right of Publicity (2 revisions)
- PCI-9.3.2: (2 revisions)
- Character witnesses (2 revisions)
- Communications Decency Act (2 revisions)
- Computer network (2 revisions)
- DB2 Database Asset Protection Standards: (2 revisions)
- DS1.3: (2 revisions)
- DS1.4: (2 revisions)
- DS1.5: (2 revisions)
- DS1.6: (2 revisions)
- DS10.2: (2 revisions)
- DS11.3: (2 revisions)
- DS12.5: (2 revisions)
- PO10.11: (2 revisions)
- PCI-3.4 (2 revisions)
- PO3.2: (2 revisions)
- DS1: (2 revisions)
- PO7.1: (2 revisions)
- PCI-7.1: (2 revisions)
- DS3: (2 revisions)
- DS4.10: (2 revisions)
- DS4.2: (2 revisions)
- DS4.3: (2 revisions)
- DS4.5: (2 revisions)
- Privacy Laws in United States (2 revisions)
- DS4: (2 revisions)
- DS5.1: (2 revisions)
- DS5.9: (2 revisions)
- DS5: (2 revisions)
- DS6.1: (2 revisions)
- DS6.2: (2 revisions)
- DS6.3: (2 revisions)
- DS7.1: (2 revisions)
- DS7.2: (2 revisions)
- DS7.3: (2 revisions)
- Quality assurance (2 revisions)
- DS8.2: (2 revisions)
- DS8.3: (2 revisions)
- DS8.4: (2 revisions)
- DS8.5: (2 revisions)
- PCI-6.5.1: (2 revisions)
- Sample Misuse Reporting Standard: (2 revisions)
- DS:2 (2 revisions)
- Sample Threat Monitoring Standard: (2 revisions)
- Sarbanes-Oxley Policy Samples: (2 revisions)
- Sample Third Party Security Awareness Standard: (2 revisions)
- Uniform Computer Information Transactions Act (2 revisions)
- The Stored Communications Act (2 revisions)
- Department of Defense Information Assurance Certification and Accreditation Process (2 revisions)
- The HIPAA Security and the Risk Dilemma: (2 revisions)
- Electronic Signatures in Global and National Commerce Act (2 revisions)
- PCI-3.1 (2 revisions)
- FN1 (2 revisions)
- FN10 (2 revisions)
- FN11 (2 revisions)
- FN12 (2 revisions)
- FN13 (2 revisions)
- FN14 (2 revisions)
- FN15 (2 revisions)
- FN16 (2 revisions)
- FN17 (2 revisions)
- FN18 (2 revisions)
- FN19 (2 revisions)
- FN20 (2 revisions)
- FN21 (2 revisions)
- FN22 (2 revisions)
- FN23 (2 revisions)
- FN24 (2 revisions)
- FN25 (2 revisions)
- FN26 (2 revisions)
- FN27 (2 revisions)
- FN28 (2 revisions)
- FN29 (2 revisions)
- FN3 (2 revisions)
- FN30 (2 revisions)
- FN31 (2 revisions)
- FN32 (2 revisions)
- FN33 (2 revisions)
- FN34 (2 revisions)
- FN35 (2 revisions)
- FN36 (2 revisions)
- FN37 (2 revisions)
- FN38 (2 revisions)
- FN39 (2 revisions)
- FN4 (2 revisions)
- FN40 (2 revisions)
- FN41 (2 revisions)
- FN42 (2 revisions)
- FN43 (2 revisions)
- FN44 (2 revisions)
- FN45 (2 revisions)
- FN46 (2 revisions)
- FN47 (2 revisions)
- FN48 (2 revisions)
- FN49 (2 revisions)
- FN5 (2 revisions)
- FN50 (2 revisions)
- FN51 (2 revisions)
- FN52 (2 revisions)
- FN53 (2 revisions)
- FN54 (2 revisions)
- FN55 (2 revisions)
- FN56 (2 revisions)
- FN6 (2 revisions)
- FN69 (2 revisions)
- FN7 (2 revisions)
- FN8 (2 revisions)
- FN9 (2 revisions)
- Federal Laws in general (2 revisions)
- Generalized Contract Law Outline (2 revisions)
- PCI-9.1.1: (2 revisions)
- PCI-2.3: (2 revisions)
- PCI 8: (2 revisions)
- IBM OS/400 Asset Protection Standards: (2 revisions)
- ISO/IEC 17799 (2 revisions)
- ISO/IEC 27002 (2 revisions)
- PCI 7: (2 revisions)
- PO1.6: (2 revisions)
- PO10.2: (2 revisions)
- PO2.2: (2 revisions)
- PO10.6: (2 revisions)
- PO10.1: (2 revisions)
- PO1.3: (2 revisions)
- PCI-2.2.3: (2 revisions)
- PO4.7: (2 revisions)
- PO4.5: (2 revisions)
- Industry Self-Regulation (2 revisions)
- Information Risk Guide (2 revisions)
- PO3.1: (2 revisions)
- Infrastructure Best Practice Configuration Samples: (2 revisions)
- PO7.6: (2 revisions)
- Integrity (2 revisions)
- PO6.3: (2 revisions)
- Intent—knowledge (2 revisions)
- PCI-12.9.2: (2 revisions)
- International Issues (2 revisions)
- International Organization for Standardization Security Standard: (2 revisions)
- Jurisdiction (2 revisions)
- KY DOI A.1: (2 revisions)
- Requests (2 revisions)
- Russian copulation (2 revisions)
- SOX.1.2: (2 revisions)
- SOX.1.5: (2 revisions)
- Libel (2 revisions)
- Logical Security (2 revisions)
- ME1.2: (2 revisions)
- ME1.4: (2 revisions)
- SOX.2.7.10: (2 revisions)
- ME2.1: (2 revisions)
- ME2.3: (2 revisions)
- ME2.4: (2 revisions)
- ME2.5: (2 revisions)
- SOX.2.7.13: (2 revisions)
- SOX.2.7.14: (2 revisions)
- SOX.2.7.12: (2 revisions)
- SOX.2.0.20: (2 revisions)
- SOX.4.2.1.9: (2 revisions)
- SOX.2.7.17: (2 revisions)
- SOX Policy References: (2 revisions)
- PCI-12.9.1: (2 revisions)
- Sample BYOD Acceptable Use Standard: (2 revisions)
- Miscellaneous federal laws (2 revisions)
- Sample Legal Hold Standards: (2 revisions)
- Motion in limine (2 revisions)
- Sample Security Awareness Accessibility Standard: (2 revisions)
- Sarbanes-Oxley (2 revisions)
- Sample Vulnerability Management Standard: (2 revisions)
- USAM 9-7.200 (2 revisions)
- Spam (2 revisions)
- USC 2701 (2 revisions)
- USC 18 1030 (2 revisions)
- Outline of issues involving search and seizure—Pursuant to warrant (2 revisions)
- PCI-1.1.7: (2 revisions)
- PCI-1.1.8: (2 revisions)
- PCI-1.1.9: (2 revisions)
- PCI-1.3.10: (2 revisions)
- PCI-1.3.9: (2 revisions)
- PCI-1.3: (2 revisions)
- PCI-1.4.1: (2 revisions)
- PCI-1.4.2: (2 revisions)
- PCI-1.4: (2 revisions)
- PCI-1.5: (2 revisions)
- PCI-10.1: (2 revisions)
- PCI-10.2.2: (2 revisions)
- PCI-10.2.3: (2 revisions)
- PCI-10.2.4: (2 revisions)
- PCI-10.2.5: (2 revisions)
- PCI-10.2.6: (2 revisions)
- PCI-10.2.7: (2 revisions)
- PCI-10.3.2: (2 revisions)
- PCI-10.3.3: (2 revisions)
- PCI-10.3.4: (2 revisions)
- PCI-10.3.5: (2 revisions)
- PCI-10.3.6: (2 revisions)
- PCI-10.5.1: (2 revisions)
- PCI-10.5.2: (2 revisions)
- PCI-10.5.3: (2 revisions)
- PCI-10.5.4: (2 revisions)
- PCI-10.5.5: (2 revisions)
- PCI-10.6: (2 revisions)
- PCI-11.5: (2 revisions)
- PCI-12.1.1: (2 revisions)
- PCI-12.1.2: (2 revisions)
- PCI-12.7: (2 revisions)
- 25 (1 revision)
- 26 (1 revision)
- 27 (1 revision)
- 3 (1 revision)
- 3.2.2.3: Mainframe (1 revision)
- 30 (1 revision)
- 31 (1 revision)
- 31 CFR 501.601 (1 revision)
- 31 USC 5321 (1 revision)
- 32 (1 revision)
- 33 (1 revision)
- 34 (1 revision)
- 35 (1 revision)
- 4 (1 revision)
- 42 USC 4212 f 10 (1 revision)
- 44 USC 3502 (1 revision)
- 44 USC 3531 (1 revision)
- 44 USC 3532 (1 revision)
- 44 USC 3533 (1 revision)
- 44 USC 3534 (1 revision)
- 44 USC 3535 (1 revision)
- AI1: (1 revision)
- AI2: (1 revision)
- AI3: (1 revision)
- AI4.1: (1 revision)
- AI4.3: (1 revision)
- AI4.4: (1 revision)
- AI4: (1 revision)
- AI5.2: (1 revision)
- AI5.5: (1 revision)
- AI5.6: (1 revision)
- AI5: (1 revision)
- AI6: (1 revision)
- AI7.10: (1 revision)
- AI7.11: (1 revision)
- AI7.1: (1 revision)
- AI7.2: (1 revision)
- Avoiding generalization based on appearance (1 revision)
- BS 7799 (1 revision)
- Best Practices Security Incident Response Program: (1 revision)
- Business Impact Analysis (1 revision)
- COBIT and COSO Framework Process Overview: (1 revision)
- Capacity Management: (1 revision)
- Child pornography legislation (1 revision)
- Children's Internet Protection Act (CIPA) (1 revision)
- Children's Online Protection Act (COPA) (1 revision)
- Civil consequences of plea or finding of guilt (1 revision)
- Civil remedies (1 revision)
- Client interview checklist (1 revision)
- Clinger-Cohen-Act (1 revision)
- Collecting or securing payment of fee (1 revision)
- Communications Decency Act - Obscene Materials (1 revision)
- Computer (1 revision)
- Computer Crime Statues by State (1 revision)
- Computer Security Act 1987 (1 revision)
- Computer hardware (1 revision)
- Computer pornography (1 revision)
- Computer program (1 revision)
- Computer services (1 revision)
- Computer software (1 revision)
- Conferring with arrested client (1 revision)
- Conferring with probation officer (1 revision)
- Confidentiality (1 revision)
- Considerations as to arranging for surrender of defendant (1 revision)
- Content And Speech Regulation (1 revision)
- Copyright (1 revision)
- Copyright Fair Use (1 revision)
- Copyright Infringement Issues (1 revision)
- Copyright Non-Preemptable Common Law Claims (1 revision)
- Copyright Rights Acquisition (1 revision)
- Copyright Trespass to Chattels (1 revision)
- Copyright in General (1 revision)
- Credit card fraud (1 revision)
- Cross-examination of prosecution witnesses (1 revision)
- Cross-examination of prosecution witnesses for the Prosecution (1 revision)
- DITSCAP (1 revision)
- DS1.2: (1 revision)
- DS10.3: (1 revision)
- DS10.4: (1 revision)
- DS10: (1 revision)
- DS11.1: (1 revision)
- DS11: (1 revision)
- Defendant as a witness (1 revision)
- Defense Summation in general (1 revision)
- Demurrer to complaint; pleas (1 revision)
- Determining Defenses in general (1 revision)
- Determining client's ability to pay fee (1 revision)
- Determining factors (1 revision)
- Direct Mail Sales On The Web (1 revision)
- Directive 95/46/EC (1 revision)
- Discrediting expert witnesses (1 revision)
- Discrediting expert witnesses—Illustrative cross-examination of systems analyst (1 revision)
- Drafting instructions to jury—Alteration with intent to injure or defraud (1 revision)
- Drafting instructions to jury—Computer damage (1 revision)
- Drafting instructions to jury—Computer theft—access (1 revision)
- Drafting instructions to jury—Taking, transferring, concealing, or retaining (1 revision)
- Drafting instructions to jury—key terms (1 revision)
- Economic Espionage Act of 1996 (1 revision)
- Electronic Communications Privacy Act (1 revision)
- Electronic Surveillance in Communications Networks (1 revision)
- Electronic data interchange (1 revision)
- Eliciting promise to require independent conviction by each juror (1 revision)
- Entrapment (1 revision)
- Evaluating defendant's attitude toward computer victim (1 revision)
- Evaluating defendant's version of facts (1 revision)
- Evaluating defendant as a witness (1 revision)
- Evidence (1 revision)
- Evidence presented to the grand jury (1 revision)
- Experts (1 revision)
- FN57 (1 revision)
- FN58 (1 revision)
- FN59 (1 revision)
- FN60 (1 revision)
- FN61 (1 revision)
- FN62 (1 revision)
- FN63 (1 revision)
- FN64 (1 revision)
- FN65 (1 revision)
- FN66 (1 revision)
- FN67 (1 revision)
- FN68 (1 revision)
- FN70 (1 revision)
- FN71 (1 revision)
- FN72 (1 revision)
- FN73 (1 revision)
- FN74 (1 revision)
- FN75 (1 revision)
- FN76 (1 revision)
- FN77 (1 revision)
- FN78 (1 revision)
- FN79 (1 revision)
- FN80 (1 revision)
- FN81 (1 revision)
- FN82 (1 revision)
- FN83 (1 revision)
- FN84 (1 revision)
- FN85 (1 revision)
- FN86 (1 revision)
- FN87 (1 revision)
- FN88 (1 revision)
- FN89 (1 revision)
- FN90 (1 revision)
- FN91 (1 revision)
- FN92 (1 revision)
- FN93 (1 revision)
- FN94 (1 revision)
- FN95 (1 revision)
- FN96 (1 revision)
- FN97 (1 revision)
- FN98 (1 revision)
- FN99 (1 revision)
- Facilitating crime (1 revision)
- Factors affecting amount of fee (1 revision)
- Factors determining extent of cross-examination (1 revision)
- Fair Credit Reporting Act (1 revision)
- Federal Child pornography legislation (1 revision)
- Fees and Costs in general (1 revision)
- Fifth Amendment (1 revision)
- Financial instrument (1 revision)
- Fingerprints and handwriting (1 revision)
- First Amendment (1 revision)
- Florida DOI: (1 revision)
- Foreign Privacy Laws vs. U.S. Discovery Obligations (1 revision)
- Former jeopardy (1 revision)
- Fraud (1 revision)
- Generalized Defamation Torts (1 revision)
- Generalized Intentional Torts (1 revision)
- Generalized Negligence Torts (1 revision)
- Generalized Strict Liability Torts (1 revision)
- Generalized Tort Remedies (1 revision)
- Generalized Torts Outline (1 revision)
- Georgia DOI: (1 revision)
- Getting it Right in Records Management (1 revision)
- Zero-day exploit (1 revision)
- Opening statement for defense (1 revision)
- Other defense witnesses; alleged codefendants (1 revision)
- Other motions (1 revision)
- Outline of issues involving search and seizure—The computer user's expectation of privacy (1 revision)
- PCI-1.1: (1 revision)
- PCI-1.2 (1 revision)
- PCI-1.4.a: (1 revision)
- PCI-1.4.b: (1 revision)
- PCI-10.5.6: (1 revision)
- PCI-10.5.7: (1 revision)
- PCI-10.7: (1 revision)
- PCI-11.1: (1 revision)
- PCI-11.2: (1 revision)
- PCI-11.3: (1 revision)
- PCI-11.4: (1 revision)