- DocumentoThe_Gamble_of_Comp_128_2caricato daHiba Afaneh
- DocumentoRisk Analysis Case Study1035caricato daHiba Afaneh
- DocumentoCobit Itil and Bs7799caricato daHiba Afaneh
- Documento(ISC)2-IDC 2004 Global Information Security Workforce Studycaricato daHiba Afaneh
- DocumentoNational security strategycaricato daHiba Afaneh
- DocumentoCritical Systems cyber security controlscaricato daHiba Afaneh
- DocumentoCloud Cybersecurity Controlscaricato daHiba Afaneh
- DocumentoBC in telecomcaricato daHiba Afaneh
- Documento20191209_ADHICS Implementation Guidelines- Healthcarecaricato daHiba Afaneh
- Documentojordancloudpolicy2020caricato daHiba Afaneh
- DocumentoNational+Cyber+Security+Strategy+of+Jordan 2018caricato daHiba Afaneh
- DocumentoSecurityScorecard_2016_Financial_Reportcaricato daHiba Afaneh
- DocumentoA Measurement Companion to the CIS V6caricato daHiba Afaneh
- Documento10 Steps to Cyber Securitycaricato daHiba Afaneh
- Documento2015 UW-Madison Cybersecurity Strategic Plan Final Jul-01-2015caricato daHiba Afaneh
- DocumentoCybersecurity Domainsv 2dot0caricato daHiba Afaneh
- DocumentoCOVID19 - Cybersecurity Guidelinescaricato daHiba Afaneh
- DocumentoTripwire Navigating Industrial Cybersecurity a Field Guidecaricato daHiba Afaneh
- DocumentoNIST-CSF-Excel-User-Guide-v4.5caricato daHiba Afaneh
- DocumentoDubai Cyber Security Strategy (1)caricato daHiba Afaneh