
Author by:
Muema Lombe


Government Auditing Standards and Single Audits 2019
Application containerization
Application architecture
Antivirus software
Adware
Advanced persistent threat (APT)
Advanced Encryption Standard (AES)
Access control list (ACL)
