Display title | Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/What is a cybersecurity plan and why do you need it?/Cybersecurity planning and its value |
Default sort key | Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/What is a cybersecurity plan and why do you need it?/Cybersecurity planning and its value |
Page length (in bytes) | 1,033 |
Namespace | Book |
Page ID | 12073 |
Page content language | en - English |
Page content model | wikitext |
Indexing by robots | Allowed |
Number of redirects to this page | 0 |
Counted as a content page | Yes |
Edit | Allow all users (infinite) |
Move | Allow all users (infinite) |
Page creator | Shawndouglas (talk | contribs) |
Date of page creation | 19:35, 24 July 2020 |
Latest editor | Shawndouglas (talk | contribs) |
Date of latest edit | 19:11, 21 March 2023 |
Total number of edits | 5 |
Total number of distinct authors | 1 |
Recent number of edits (within past 90 days) | 0 |
Recent number of distinct authors | 0 |