%PDF-1.7
%
1 0 obj
<>stream
application/pdfHolistic Approach to Information Security Risk ManagementPratik Sawant
A-PDF Watermark 4.7.6 ; modified using iTextSharp 4.1.6 by 1T3XTijert
endstream
endobj
2 0 obj
<>/Lang(en-IN)/Pages 3 0 R/Metadata 1 0 R/Type/Catalog>>
endobj
3 0 obj
<>
endobj
4 0 obj
<>/ExtGState<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI]>>/Contents[29 0 R 30 0 R 31 0 R 32 0 R 33 0 R 34 0 R 35 0 R 36 0 R 37 0 R 38 0 R 39 0 R 40 0 R 41 0 R 42 0 R 43 0 R 44 0 R 45 0 R 46 0 R 47 0 R 48 0 R 49 0 R 50 0 R 51 0 R 52 0 R 53 0 R 54 0 R 55 0 R 56 0 R 57 0 R 58 0 R 59 0 R 60 0 R 61 0 R 62 0 R]/Group<>/Annots[63 0 R 64 0 R 65 0 R]/Type/Page/Tabs/S>>
endobj
40 0 obj
<>stream
x=]۸(՞lM6;&F3Xf_n @#[]DF_h4g/w?]^ַ=|9{ÛٯϟE frVU!hl~0}^|36DY-B67͟Nw;_~9fgn߭fnfgo5<v*bj}!ǻ˻|!ϖvv>gög?we!ĬfmѨ ˫vPhgo|3
e>c(GhBճE5xRhL Kd:y>Η:[8o1Lo
&09B"ڢU#>nYT/Pyu1_k~.|og}o~tئg|[}u"1*:5#h-'uūj
~SvJ0^6JTQҔꂅ8
yeKdwtQ] -DX#H2JXJEMzOOvV}b,XY;@RXqcWpI֮(8MVլZQ,_i*JAO×jx!dVf p7z.A [rzZou3Bf7"7Szq5)XݜH4~JF?{7}xr4Z[Ѓ-æyGi,EڑKtm\":nF
}svx&K8@[,
ۜ U&[s`:АenbVds)|M#_zQ=rv+yQːP._٥Ep(G+cL WnN=◡dv£t~,#^ixHWZL9h-l؎ (h3vl6Fll-t5=8~3p
~oLvn
xZh8&n?jE ǧ73xQONQ>
;;w3Ol 0\I'\ۙ$a'T(ųͨh4f5T;cïK|Em:tqgJ5O%u$$RLm)zɫC'JB,
(2Ya:5rJP&
>4Xh섓{eZX8R3+H>^MI<c_(Ӕ؏:u.f?G6z\cj{Kӝ1
I1|qUb*cUZ