Uncategorized pages

Jump to navigation Jump to search

Showing below up to 406 results in range #751 to #1,156.

View ( | next 500) (20 | 50 | 100 | 250 | 500)

  1. PCI-4.2:
  2. PCI-5.1:
  3. PCI-5.2:
  4. PCI-6.1.1:
  5. PCI-6.2:
  6. PCI-6.3.1:
  7. PCI-6.3.2:
  8. PCI-6.3.3:
  9. PCI-6.3.4:
  10. PCI-6.3.5:
  11. PCI-6.3.6:
  12. PCI-6.3.7:
  13. PCI-6.4.1:
  14. PCI-6.4.2:
  15. PCI-6.4.3:
  16. PCI-6.4.4:
  17. PCI-6.5.10:
  18. PCI-6.5.1:
  19. PCI-6.5.2:
  20. PCI-6.5.3:
  21. PCI-6.5.4:
  22. PCI-6.5.5:
  23. PCI-6.5.6:
  24. PCI-6.5.7:
  25. PCI-6.5.8:
  26. PCI-6.5.9:
  27. PCI-7.1:
  28. PCI-7.2:
  29. PCI-8.1:
  30. PCI-8.2:
  31. PCI-8.3:
  32. PCI-8.4:
  33. PCI-8.5.10:
  34. PCI-8.5.11:
  35. PCI-8.5.12:
  36. PCI-8.5.13:
  37. PCI-8.5.14:
  38. PCI-8.5.15:
  39. PCI-8.5.16:
  40. PCI-8.5.1:
  41. PCI-8.5.2:
  42. PCI-8.5.3:
  43. PCI-8.5.4:
  44. PCI-8.5.5:
  45. PCI-8.5.6:
  46. PCI-8.5.7:
  47. PCI-8.5.8:
  48. PCI-8.5.9:
  49. PCI-9.1.1:
  50. PCI-9.1.2:
  51. PCI-9.1.3:
  52. PCI-9.10.1:
  53. PCI-9.10.2:
  54. PCI-9.2:
  55. PCI-9.3.1:
  56. PCI-9.3.2:
  57. PCI-9.3.3:
  58. PCI-9.4:
  59. PCI-9.5:
  60. PCI-9.6:
  61. PCI-9.7.1:
  62. PCI-9.7.2:
  63. PCI-9.8:
  64. PCI-9.9.1:
  65. PCI:
  66. PCI 10:
  67. PCI 11:
  68. PCI 12:
  69. PCI 1:
  70. PCI 2:
  71. PCI 3:
  72. PCI 4:
  73. PCI 5:
  74. PCI 6:
  75. PCI 7:
  76. PCI 8:
  77. PCI 9:
  78. PO1.1:
  79. PO1.2:
  80. PO1.3:
  81. PO1.4:
  82. PO1.5:
  83. PO1.6:
  84. PO10.10:
  85. PO10.11:
  86. PO10.12:
  87. PO10.13:
  88. PO10.14:
  89. PO10.1:
  90. PO10.2:
  91. PO10.3:
  92. PO10.4:
  93. PO10.5:
  94. PO10.6:
  95. PO10.7:
  96. PO10.8:
  97. PO10.9:
  98. PO10:
  99. PO1:
  100. PO2.1:
  101. PO2.2:
  102. PO2.3:
  103. PO2.4:
  104. PO2:
  105. PO3.1:
  106. PO3.2:
  107. PO3.3:
  108. PO3.4:
  109. PO3.5:
  110. PO3:
  111. PO4.10:
  112. PO4.11:
  113. PO4.12:
  114. PO4.13:
  115. PO4.14:
  116. PO4.15:
  117. PO4.1:
  118. PO4.2:
  119. PO4.3:
  120. PO4.4:
  121. PO4.5:
  122. PO4.6:
  123. PO4.7:
  124. PO4.8:
  125. PO4.9:
  126. PO4:
  127. PO5.1:
  128. PO5.2:
  129. PO5.3:
  130. PO5.4:
  131. PO5.5:
  132. PO5:
  133. PO6.1:
  134. PO6.2:
  135. PO6.3:
  136. PO6.4:
  137. PO6.5:
  138. PO6:
  139. PO7.1:
  140. PO7.2:
  141. PO7.3:
  142. PO7.4:
  143. PO7.5:
  144. PO7.6:
  145. PO7.7:
  146. PO7.8:
  147. PO7:
  148. PO8.1:
  149. PO8.2:
  150. PO8.3:
  151. PO8.4:
  152. PO8.5:
  153. PO8.6:
  154. PO8:
  155. PO9.1:
  156. PO9.2:
  157. PO9.3:
  158. PO9.4:
  159. PO9.5:
  160. PO9.6:
  161. PO9:
  162. Personal harm
  163. Personnel Security:
  164. Persuading defendant to accept plea bargain
  165. Physical and Environmental Protection
  166. Physical and Environmental Security:
  167. Physical taking offenses
  168. Planning and Organization:
  169. Plea bargain checklist
  170. Plea bargain issues
  171. Police reports of the computer crime
  172. Possession of hardware designed for illegal purpose
  173. Preemption
  174. Preface
  175. Preliminary Matters in general
  176. Preliminary Tactics in general
  177. Presence and effect of pretrial publicity
  178. Presentation of the defense case
  179. Presentations:
  180. Privacy And Data Collection
  181. Privacy Laws in British Virgin Islands
  182. Privacy Laws in Canada
  183. Privacy Laws in Cayman Islands
  184. Privacy Laws in Costa Rica
  185. Privacy Laws in Honduras
  186. Privacy Laws in Mexico
  187. Privacy Laws in Panama
  188. Privacy Laws in United States
  189. Problem Management:
  190. Procedure; generally
  191. Proceedings After Trial in general
  192. Proceedings Before Grand Jury in general
  193. Proceedings by Way of Preliminary Hearing in general
  194. Prosecution's need to prove elements of crime
  195. Proving computer damage
  196. Proving computer theft
  197. Proving computer trespass
  198. Proving invasion of privacy
  199. Punishments and Penalties in general
  200. Purpose of computer crime laws
  201. Putting client at ease
  202. Quality assurance
  203. Recklessness
  204. Recommended Links:
  205. Reconstructing the crime
  206. References:
  207. Release Management:
  208. Release on own recognizance
  209. Release on own recognizance—Questions checklist
  210. Requests
  211. Research
  212. Restricting interrogation of defendant
  213. Return of exhibits
  214. Right of Publicity
  215. Risk Analysis
  216. Risk management plan
  217. Risk mitigation
  218. SAS 70
  219. SOX.1.1.1:
  220. SOX.1.1:
  221. SOX.1.22:
  222. SOX.1.23:
  223. SOX.1.24:
  224. SOX.1.25:
  225. SOX.1.2:
  226. SOX.1.3:
  227. SOX.1.5:
  228. SOX.1.7:
  229. SOX.2.0.11:
  230. SOX.2.0.12:
  231. SOX.2.0.13:
  232. SOX.2.0.14:
  233. SOX.2.0.15:
  234. SOX.2.0.16:
  235. SOX.2.0.17:
  236. SOX.2.0.18:
  237. SOX.2.0.19:
  238. SOX.2.0.20:
  239. SOX.2.0.21:
  240. SOX.2.0.22:
  241. SOX.2.0.23:
  242. SOX.2.0.24:
  243. SOX.2.0.25:
  244. SOX.2.0.26:
  245. SOX.2.0.27:
  246. SOX.2.0.28:
  247. SOX.2.0.29:
  248. SOX.2.0.30:
  249. SOX.2.0.31:
  250. SOX.2.0.32:
  251. SOX.2.0.5:
  252. SOX.2.0.6:
  253. SOX.2.0.7:
  254. SOX.2.0.8:
  255. SOX.2.3.4:
  256. SOX.2.7.10:
  257. SOX.2.7.11:
  258. SOX.2.7.12:
  259. SOX.2.7.13:
  260. SOX.2.7.14:
  261. SOX.2.7.15:
  262. SOX.2.7.16:
  263. SOX.2.7.17:
  264. SOX.2.7.6:
  265. SOX.2.7.7:
  266. SOX.2.7.8:
  267. SOX.2.7.9:
  268. SOX.4.2.1.10:
  269. SOX.4.2.1.7:
  270. SOX.4.2.1.8:
  271. SOX.4.2.1.9:
  272. SOX.4.2.4.15:
  273. SOX.4.4.8:
  274. SOX.5.1.13:
  275. SOX.6.1.1:
  276. SOX.6.1.4:
  277. SOX.6.1.5:
  278. SOX Policy References:
  279. SSAE 16
  280. Sample Acceptable Use Policy:
  281. Sample Access Control Standard:
  282. Sample Anti-Virus Standard:
  283. Sample Asset Identification and Classification Policy:
  284. Sample Asset Identification and Classification Standard:
  285. Sample Asset Information Handling Standard
  286. Sample Asset Management Policy:
  287. Sample Asset Protection Policy:
  288. Sample Asset Protection Standard:
  289. Sample Asset Protection Standards:
  290. Sample Auditing Standard:
  291. Sample Availability Protection Standard:
  292. Sample BYOD Acceptable Use Standard:
  293. Sample Change Control Standard:
  294. Sample Configuration Management Standard:
  295. Sample Electronic Fraud Prevention Guidelines:
  296. Sample Electronic Mail Acceptable Use Standard:
  297. Sample Encryption Standard:
  298. Sample Incident Response Standard:
  299. Sample Information Classification Standard:
  300. Sample Information Handling Standard:
  301. Sample Information Security Program Charter:
  302. Sample Information Systems and Technology Security Policy:
  303. Sample Integrity Protection Standard:
  304. Sample Internet Acceptable Use Policy:
  305. Sample Legal Hold Standards:
  306. Sample Life Cycle Management Standard:
  307. Sample Management Awareness Standard:
  308. Sample Management Security Awareness Standard:
  309. Sample Misuse Reporting Standard:
  310. Sample New Hire Security Awareness Standard:
  311. Sample On Premise Wireless Access Technology Guideline
  312. Sample Ongoing Security Awareness Standard:
  313. Sample Physical Access Standard:
  314. Sample Protection Standards:
  315. Sample Remote Access Standard:
  316. Sample Security Awareness Accessibility Standard:
  317. Sample Security Awareness Policy:
  318. Sample Software Acceptable Use Standard:
  319. Sample System Development Life Cycle Standard:
  320. Sample Telecommunication Acceptable Use Standard:
  321. Sample Third Party Security Awareness Standard:
  322. Sample Threat Assessment Standard:
  323. Sample Threat Assessment and Monitoring Policy:
  324. Sample Threat Monitoring Standard:
  325. Sample Vulnerability Assessment Standard:
  326. Sample Vulnerability Assessment and Management Policy:
  327. Sample Vulnerability Management Standard:
  328. Sarbanes-Oxley Policy Samples:
  329. Search and Seizure Appendices
  330. Search and Seizure Introduction
  331. Search and Seizure Preface and Acknowledgments
  332. Searching and Seizing Computers
  333. Searching and Seizing Computers With a Warrant
  334. Searching and Seizing Computers Without a Warrant
  335. Searching and Seizing Computers and Obtaining Electronic Evidence Manual
  336. Seating arrangement in courtroom
  337. Security Audit Procedures
  338. Security Best Practices and Addressing Regulatory Mandates Testing Template:
  339. Security Best Practices and Addressing Regulatory Mandates Testing Template (Answer Key):
  340. Security Policy:
  341. Security by design
  342. Selected Defamation Defenses
  343. Selecting the Jury in general
  344. Sentencing hearing—illustrative argument and response
  345. Separate trial
  346. Service Level Management:
  347. Service Provider Oversight
  348. Sitesupport-url
  349. Social Computing Guidelines
  350. Sovereignty
  351. Spam
  352. State Attempts At Regulation
  353. State Child pornography legislation
  354. State Child protection legislation; solicitation and importuning
  355. State Laws in general
  356. State consumer protection laws
  357. Statute of limitations
  358. Statutory Protections
  359. Subjects of discovery; checklist
  360. Sustainable Risk Reduction Through Information Security Process Test Template (Answer Key):
  361. Sustainable Risk Reduction Through Information Security Process Testing Template:
  362. Systems Development and Maintenance:
  363. Table formatting help
  364. Taking of information
  365. Tape recording initial client interview
  366. Testing Templates:
  367. Texas DOI:
  368. Text formatting help
  369. The Copyright Act
  370. The Defense of a Computer Crime Case
  371. The HIPAA Security and the Risk Dilemma:
  372. The Stored Communications Act
  373. The Wiretap Act (Title III)
  374. The possibility of restitution
  375. Timing of plea bargain request
  376. Tools:
  377. Trade secret statutes
  378. Trademark Links, Frames, Search Engines And Meta-Tags
  379. Trademark in General
  380. Trademark of Domain Names
  381. Trespass
  382. Trial brief
  383. USAM 9-7.111
  384. USAM 9-7.200
  385. USC 18 1030
  386. USC 2701
  387. Uncertainty as to applicability of the law
  388. Uncertainty as to effect of case on a jury
  389. Use of computer security consultants, EDP auditors, and computer professionals
  390. Use of computer services; larceny
  391. Use of discovery
  392. Use of independent laboratory tests
  393. Use of photographs and motion pictures
  394. Use of private investigators
  395. User’s Security Handbook -- RFC 2504 February 1999
  396. Using electronically obtained evidence
  397. Venue
  398. Violation of privacy
  399. Voir-dire questions checklist
  400. Waiver or assertion of right to speedy trial
  401. Web Application Auditing:
  402. Why you need an intelligent file transfer solution.
  403. Wisconsin DOI:
  404. Witness preparation—Expert witnesses
  405. Witness preparation—in general
  406. Witnesses testifying as to documents

View ( | next 500) (20 | 50 | 100 | 250 | 500)