EVOLUTION-NINJA
Edit File: 1741254643ppt-2 Introduction-cybersecurity-Governance and legislation.pdf
%PDF-1.5 %���� 27 0 obj << /Type /ExtGState /BM /Normal /ca 1 >> endobj 28 0 obj << /Type /ExtGState /BM /Normal /ca 0.70196 >> endobj 29 0 obj << /Type /ExtGState /BM /Normal /CA 0.70196 >> endobj 30 0 obj << /Type /ExtGState /BM /Normal /ca 0.36078 >> endobj 31 0 obj << /Type /ExtGState /BM /Normal /ca 0.2 >> endobj 32 0 obj << /Type /ExtGState /BM /Normal /ca 0.65882 >> endobj 33 0 obj << /Type /ExtGState /BM /Normal /ca 0.50196 >> endobj 34 0 obj << /Type /ExtGState /BM /Normal /ca 0.8 >> endobj 37 0 obj << /Filter /FlateDecode /Length 33048 /Length1 94560 >> stream x��] `Tչ��]�ޙ;˝- �,4@� �f���� a$!D� ����Imp��}.X�[��V'n\Њ@�+�c]�J�m�U$s�Νl��g�BR�g�w�{��=��s�I $ P[8������d���)),*�t��? E��%�g�M<�Ο�4��q%s+�/�`7�s� ��fΛ[�ЦG<