From Wikipedia, the free encyclopedia
The following discussion is an archived debate of the proposed deletion of the article below. Please do not modify it. Subsequent comments should be made on the appropriate discussion page (such as the article's talk page or in a deletion review). No further edits should be made to this page.

The result was delete. KTC ( talk) 17:15, 5 November 2015 (UTC) reply

Cybersecurity strategy 5 Layout Capability Maturity Model

Cybersecurity strategy 5 Layout Capability Maturity Model (  | talk | history | protect | delete | links | watch | logs | views) – ( View log · Stats)
(Find sources:  Google ( books · news · scholar · free images · WP refs· FENS · JSTOR · TWL)

Original research by the editor. The article has been turned down at Draft:Cybersecurity strategy 5 Layout Capability Maturity Model. StarryGrandma ( talk) 20:06, 28 October 2015 (UTC) reply

Note: This debate has been included in the list of Computing-related deletion discussions. StarryGrandma ( talk) 20:55, 28 October 2015 (UTC) reply
The above discussion is preserved as an archive of the debate. Please do not modify it. Subsequent comments should be made on the appropriate discussion page (such as the article's talk page or in a deletion review). No further edits should be made to this page.
From Wikipedia, the free encyclopedia
The following discussion is an archived debate of the proposed deletion of the article below. Please do not modify it. Subsequent comments should be made on the appropriate discussion page (such as the article's talk page or in a deletion review). No further edits should be made to this page.

The result was delete. KTC ( talk) 17:15, 5 November 2015 (UTC) reply

Cybersecurity strategy 5 Layout Capability Maturity Model

Cybersecurity strategy 5 Layout Capability Maturity Model (  | talk | history | protect | delete | links | watch | logs | views) – ( View log · Stats)
(Find sources:  Google ( books · news · scholar · free images · WP refs· FENS · JSTOR · TWL)

Original research by the editor. The article has been turned down at Draft:Cybersecurity strategy 5 Layout Capability Maturity Model. StarryGrandma ( talk) 20:06, 28 October 2015 (UTC) reply

Note: This debate has been included in the list of Computing-related deletion discussions. StarryGrandma ( talk) 20:55, 28 October 2015 (UTC) reply
The above discussion is preserved as an archive of the debate. Please do not modify it. Subsequent comments should be made on the appropriate discussion page (such as the article's talk page or in a deletion review). No further edits should be made to this page.

Videos

Youtube | Vimeo | Bing

Websites

Google | Yahoo | Bing

Encyclopedia

Google | Yahoo | Bing

Facebook