- DocumentThe_Gamble_of_Comp_128_2uploaded byHiba Afaneh
- DocumentRisk Analysis Case Study1035uploaded byHiba Afaneh
- DocumentCobit Itil and Bs7799uploaded byHiba Afaneh
- Document(ISC)2-IDC 2004 Global Information Security Workforce Studyuploaded byHiba Afaneh
- DocumentNational security strategyuploaded byHiba Afaneh
- DocumentCritical Systems cyber security controlsuploaded byHiba Afaneh
- DocumentCloud Cybersecurity Controlsuploaded byHiba Afaneh
- DocumentBC in telecomuploaded byHiba Afaneh
- Document20191209_ADHICS Implementation Guidelines- Healthcareuploaded byHiba Afaneh
- Documentjordancloudpolicy2020uploaded byHiba Afaneh
- DocumentNational+Cyber+Security+Strategy+of+Jordan 2018uploaded byHiba Afaneh
- DocumentSecurityScorecard_2016_Financial_Reportuploaded byHiba Afaneh
- DocumentA Measurement Companion to the CIS V6uploaded byHiba Afaneh
- Document10 Steps to Cyber Securityuploaded byHiba Afaneh
- Document2015 UW-Madison Cybersecurity Strategic Plan Final Jul-01-2015uploaded byHiba Afaneh
- DocumentCybersecurity Domainsv 2dot0uploaded byHiba Afaneh
- DocumentCOVID19 - Cybersecurity Guidelinesuploaded byHiba Afaneh
- DocumentTripwire Navigating Industrial Cybersecurity a Field Guideuploaded byHiba Afaneh
- DocumentNIST-CSF-Excel-User-Guide-v4.5uploaded byHiba Afaneh
- DocumentDubai Cyber Security Strategy (1)uploaded byHiba Afaneh