Debug Information
Array
(
[meilisearch] => Array
(
[url] => https://msin.fadunews.in/indexes/zipri/search
[http_code] => 200
[response] => {"hits":[],"query":"Introduction-To-Security-Pdf","processingTimeMs":2,"limit":3,"offset":0,"estimatedTotalHits":0}
[curl_error] =>
[parsed] => Array
(
[hits] => Array
(
)
[query] => Introduction-To-Security-Pdf
[processingTimeMs] => 2
[limit] => 3
[offset] => 0
[estimatedTotalHits] => 0
)
)
[image_search] => Array
(
[url] => http://206.189.178.169:3001/?freshness=All&show=1&q=Introduction-To-Security-Pdf+INR+loc%3Ain
[http_code] => 200
[response] => {"name":"introduction-to-security-pdf inr loc:in","totalEstimatedMatches":305,"nextOffset":120,"currentOffset":0,"value":{"FEAB8B0927608CA6D1E6D68152D5963E4008CC97":{"name":"Buy PT INR Log Book Printable, Inr Tracker, INR Anticoagulant ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.Nl3LmTtT2zWIfO6zaPl46QAAAA?pid=Api","datePublished":"2022-03-10T14:45:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://i.etsystatic.com/31451663/r/il/f96a3b/3342764419/il_300x300.3342764419_9yil.jpg","hostPageUrl":"https://www.etsy.com/in-en/listing/1075090759/pt-inr-log-book-printable-inr-tracker","contentSize":"11955 B","width":300,"height":300,"cDNContentUrl":"https://th.bing.com/th/id/R.365dcb993b53db35887ceeb368f978e9?rik=77q4kHIGyGodbg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"79CC8004E3695D25186D6E1D6AC8067290B8BAEF","accentColor":"7E4D57"},"CE7688F40F17E6551782121C85853EB1F34871FC":{"name":"Introduction to Cyber Security : Guide to the World of Cyber Security ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.10xh9rxeuSZG3zdEp4FC7wHaLJ?pid=Api","datePublished":"2021-04-10T15:06:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/719IgY3pSdL._SL1200_.jpg","hostPageUrl":"https://www.amazon.in/Introduction-Cyber-Security-Guide-World-ebook/dp/B08XPRF87B","contentSize":"146530 B","width":797,"height":1200,"cDNContentUrl":"https://th.bing.com/th/id/R.d74c61f6bc5eb92646df3744a78142ef?rik=7GeIT%2fBxblVxKA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"CF17843F1BE35858C1212871556E71F04F8867EC","accentColor":"B01B20"},"72CE11320DEDAE9E35B134487DCDEC7BC24FEDFE":{"name":"CCS Unit I Notes - INTRODUCTION TO SECURITY Syllabus Computer Security ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.NG9PxvQ85KzVDlwjw8R0owHaJl?pid=Api","datePublished":"2024-08-30T14:25:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/f76b3c5846cda5a141bfd5f7c04f22ab/thumb_1200_1553.png","hostPageUrl":"https://www.studocu.com/in/document/ksr-college-of-arts-and-science-for-women/cyber-security/ccs-unit-i-notes/98645224","contentSize":"235962 B","width":1200,"height":1553,"cDNContentUrl":"https://th.bing.com/th/id/R.346f4fc6f43ce4acd50e5c23c3c474a3?rik=J%2bwRI9De6ulTGw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"EFDEF42CB7CEDCD784431B53E9EADED02311EC27","accentColor":"3D3D3D"},"8FC5E81C7992F49AD20C8B63F7EC0B2E36726A1D":{"name":"Introduction to Cyber Security - Introduction to Cyber Security ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.1SLeffOr54MrEo4pWmu17QHaEL?pid=Api","datePublished":"2024-07-08T00:39:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/952c46c003341f4ab960f4a9b99e5d5e/thumb_1200_676.png","hostPageUrl":"https://www.studocu.com/in/document/shetty-institute-of-technology/design-analysis-algorithm/introduction-to-cyber-security/98356481","contentSize":"995897 B","width":1200,"height":676,"cDNContentUrl":"https://th.bing.com/th/id/R.d522de7df3abe7832b128e295a6bb5ed?rik=%2bFyOwZcpT6ktwA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"D1A62763E2B0CE7F36B8C02DA94F2997C18E5CF8","accentColor":"A28829"},"0903E155495CC1866B01F1DE60DB957C4759C6CD":{"name":"Introduction to Information Security and Cyber Laws eBook : Surya ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.2ZwWhHOE3mjsP-A--4ieuAAAAA?pid=Api","datePublished":"2020-10-04T13:58:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/51WhL+-WSeL.jpg","hostPageUrl":"https://www.amazon.in/Introduction-Information-Security-Cyber-Laws-ebook/dp/B0789DLW1P","contentSize":"34274 B","width":385,"height":500,"cDNContentUrl":"https://th.bing.com/th/id/R.d99c16847384de68ec3fe03efb889eb8?rik=kDAeVZTFHGi2EA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"DC6C9574C759BD06ED1F10B6681CC594551E3090","accentColor":"B9121B"},"4C0E252DFB8AA47CEFA148530B668B56E2E69BAB":{"name":"12. Introduction to Security Assessments | Rootkid - Cyber Journal","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.kbnzLjDegjvRkZ1Hc_IpJwHaD4?pid=Api","datePublished":"2025-02-15T17:43:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://blog.rootkid.in/~gitbook/ogimage/iR7yu6VczDGEI6SBQGOE","hostPageUrl":"https://blog.rootkid.in/exam-prep-notes/klcp-exam-pen-103-notes/12.-introduction-to-security-assessments","contentSize":"190327 B","width":1200,"height":630,"cDNContentUrl":"https://th.bing.com/th/id/R.91b9f32e30de823bd1919d4773f22927?rik=xOBS0r%2boSsf%2bGg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"BAB96E2E65B866B035841AFEC74AA8BFD252E0C4","accentColor":"1E4FAD"},"0C37E72A0411D546336F9BEE0C2EC7CBDB8AF4DC":{"name":"Introduction to Security eBook : Fischer Ph.D., Robert, Halibozek MBA ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.eLHZn3shYiOmx4X6f6dFngAAAA?pid=Api","datePublished":"2018-10-17T12:00:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/5121E0bLLXL._SY445_SX342_.jpg","hostPageUrl":"https://www.amazon.in/Introduction-Security-Robert-Fischer-ebook/dp/B07JN3RNKD","contentSize":"37680 B","width":333,"height":445,"cDNContentUrl":"https://th.bing.com/th/id/R.78b1d99f7b216223a6c785fa7fa7459e?rik=wHN%2bokARXWQz9g&pid=ImgRaw&r=0","isTransparent":false,"imageId":"CD4FA8BDBC7CE2C0EEB9F633645D1140A27E73C0","accentColor":"A5262C"},"3BA60C3F9BB2D013B76C67144F21C1C58B60BD98":{"name":"Cyber Security Book | Fundamental Of Cyber Security eBook | Information ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.qc8xOa-nFCXjA5_fc-a5RAHaLO?pid=Api","datePublished":"2021-03-16T00:17:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://in.bpbonline.com/cdn/shop/products/Screen_Shot_2017-08-19_at_16.09.37_32b4fe1d-25c2-4d3b-9bd4-8180f28f4a9b_800x.png?v=1583313006","hostPageUrl":"https://in.bpbonline.com/products/fundamentals-of-cyber-security-book-ebook","contentSize":"561656 B","width":800,"height":1212,"cDNContentUrl":"https://th.bing.com/th/id/R.a9cf3139afa71425e3039fdf73e6b944?rik=s2rA87krDTF7xg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"89DB06B85C1C12F44176C67B310D2BB9F3C06AB3","accentColor":"009ACC"},"92335729B8B49A264905DCBF2FBA0A883B0A1A5A":{"name":"Introduction to Cyber Security eBook : Aslam, Amin: Amazon.in: Kindle Store","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.upkf8e5Lqx0puosw0N6EcgAAAA?pid=Api","datePublished":"2023-03-29T13:24:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/41ztsvy2YuL._SY445_SX342_.jpg","hostPageUrl":"https://www.amazon.in/Introduction-Cyber-Security-Amin-Aslam-ebook/dp/B0BSDJRFLF","contentSize":"15856 B","width":315,"height":445,"cDNContentUrl":"https://th.bing.com/th/id/R.ba991ff1ee4bab1d29ba8b30d0de8472?rik=KTN1kotLqWKUUA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"A5A1A0B388A0ABF2FBCD509462A94B8B92753329","accentColor":"0EA7BD"},"14FE164C6E0E23C8620FC10356F676F89E8093AB":{"name":"Buy An Introduction To Cyber Security: The Complete Guidance For ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.FwUvIu9gdhbfvxTL00o-RwHaLG?pid=Api","datePublished":"2023-04-27T04:24:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/71Qn7TW+NTS.jpg","hostPageUrl":"https://www.desertcart.in/products/366932499-an-introduction-to-cyber-security-the-complete-guidance-for-beginners-conclusion-of-cyber-security","contentSize":"142502 B","width":907,"height":1360,"cDNContentUrl":"https://th.bing.com/th/id/R.17052f22ef607616dfbf14cbd34a3e47?rik=Qe9hxObgMowm8A&pid=ImgRaw&r=0","isTransparent":false,"imageId":"BA3908E98F676F65301CF0268C32E0E6C461EF41","accentColor":"2A83A1"},"51F8C1978BC6E48D1666528E2978DFF3E537A33B":{"name":"Unit 5 college - unit 5 cyber security - UNIT 5 CYBER SECURITY ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.ozxH9c-KHQyU-yYD76iDKgHaJl?pid=Api","datePublished":"2024-08-29T09:38:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/0374e1f831a948dc30314590cc195741/thumb_1200_1553.png","hostPageUrl":"https://www.studocu.com/in/document/dr-apj-abdul-kalam-technical-university/btech/unit-5-college-unit-5-cyber-security/102011195","contentSize":"309868 B","width":1200,"height":1553,"cDNContentUrl":"https://th.bing.com/th/id/R.a33c47f5cf8a1d0c94fb2603efa8832a?rik=FY8cebhsTthhZg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"B33A735E3FFD8792E8256661D84E6CB8791C8F15","accentColor":"505357"},"108C6CB00A9030761264AF63C0993EB2BEAC9F4A":{"name":"Buy Introduction to Network Security with CD Book Online at Low Prices ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.fa4oYUC7VIwrTqse_n_nDgAAAA?pid=Api","datePublished":"2017-11-30T03:28:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/31JlcRHSEYL.jpg","hostPageUrl":"https://www.amazon.in/Introduction-Network-Security-Neal-Krawetz/dp/8131502481","contentSize":"12799 B","width":300,"height":300,"cDNContentUrl":"https://th.bing.com/th/id/R.7dae286140bb548c2b4eab1efe7fe70e?rik=AcjGC6AJA2chRg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"A4F9CAEB2BE3990C36FA4621670309A00BC6C801","accentColor":"B11A1D"},"7D4D443630B83F99A42A21A0F38D663A94A0D335":{"name":"Introduction to Security and Privacy in Cloud Computing : Edris Hamraz ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.CkyZ6i3uLkjP8K2ilQwozwAAAA?pid=Api","datePublished":"2024-05-25T22:29:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/41qrOm2qA2L._SX342_SY445_.jpg","hostPageUrl":"https://www.amazon.in/Introduction-Security-Privacy-Cloud-Computing/dp/6139475120","contentSize":"14466 B","width":342,"height":250,"cDNContentUrl":"https://th.bing.com/th/id/R.0a4c99ea2dee2e48cff0ada2950c28cf?rik=19REYwOL85lKog&pid=ImgRaw&r=0","isTransparent":false,"imageId":"533D0A49A366D83F0A12A24A99F38B036344D4D7","accentColor":"931A22"},"EED91319F5EA3043E64BC4D2F0FD7DC817CE519B":{"name":"Buy INTRODUCTION TO INFORMATION SECURITY-A STRATEGIC BASED APPROACH ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.aZYfFWZL7FL1Kv-SXtRCtQAAAA?pid=Api","datePublished":"2024-12-11T23:10:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/31XtsMSNd4L.jpg","hostPageUrl":"https://www.amazon.in/INTRODUCTION-INFORMATION-SECURITY-STRATEGIC-APPROACH/dp/9351071928","contentSize":"12157 B","width":295,"height":417,"cDNContentUrl":"https://th.bing.com/th/id/R.69961f15664bec52f52aff925ed442b5?rik=7p0xkV%2buAzRutA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"B915EC718CD7DF0F2D4CB46E3403AE5F91319DEE","accentColor":"011E46"},"5EA8EB65A7281122262C3BAD09F77F1187A1C318":{"name":"Introduction to Cyber Security pages 143: MALWARE AND ITS TYPE ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.xqFlVlpXKEPL1hoEIHSbnQHaEK?pid=Api","datePublished":"2025-07-24T22:00:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/71WoIoAqa+L._SL1500_.jpg","hostPageUrl":"https://www.amazon.in/Introduction-Cyber-Security-pages-143-ebook/dp/B0B6GW2MCD","contentSize":"138044 B","width":1500,"height":844,"cDNContentUrl":"https://th.bing.com/th/id/R.c6a165565a572843cbd61a0420749b9d?rik=5Yq%2bVnqCESJiwg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"813C1A7811F77F90DAB3C2622211827A56BE8AE5","accentColor":"011725"},"027F94EABAEDD785A16A8A7177150E50A9F9C7C9":{"name":"INTRODUCTION TO CYBER SECURITY: Buy INTRODUCTION TO CYBER SECURITY by ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.yS5Drwl684J_yahWleBl0QAAAA?pid=Api","datePublished":"2024-07-25T22:28:00.0000000Z","isFamilyFriendly":true,"contentUrl":"http://rukmini1.flixcart.com/image/300/300/xif0q/book/m/g/v/introduction-to-cyber-security-original-imagzecftwqfgute.jpeg","hostPageUrl":"https://www.flipkart.com/introduction-cyber-security/p/itmdbb3abdb2a6bd","contentSize":"13621 B","width":200,"height":300,"cDNContentUrl":"https://th.bing.com/th/id/R.c92e43af097af3827fc9a85695e065d1?rik=IPdJrqvefVgapg&riu=http%3a%2f%2frukmini1.flixcart.com%2fimage%2f300%2f300%2fxif0q%2fbook%2fm%2fg%2fv%2fintroduction-to-cyber-security-original-imagzecftwqfgute.jpeg&ehk=fptwQdCzDFN9GwklpTdbI%2fQZ75PWGLovXkJrztjmzVk%3d&risl=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"9C7C9F9A05E0517717A8A61A587DDEABAE49F720","accentColor":"A55B26"},"22CC5A8450956C1A1D51699C4341FE28BADB2F8D":{"name":"An Introduction to Security Standards for Buildings for Professional ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.Wt2MFZZ927KyTLa8Dv5lNwAAAA?pid=Api","datePublished":"2023-06-24T15:39:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/412F6n-uYjL.jpg","hostPageUrl":"https://www.amazon.in/Introduction-Standards-Buildings-Professional-Engineering-ebook/dp/B0C8C3PYDY","contentSize":"20251 B","width":386,"height":500,"cDNContentUrl":"https://th.bing.com/th/id/R.5add8c15967ddbb2b24cb6bc0efe6537?rik=IsylSAVZxqHRFQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"D8F2BDAB82EF1434C99615D1A1C6590548A5CC22","accentColor":"4B6080"},"7AB60D21819890670AE75827B8075D886458CE25":{"name":"CS UNIT 1 - Cyber security notes for mdsu - UNIT-I Information Security ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.nVdfBAUwP4q_qdf3TbZWMwHaJl?pid=Api","datePublished":"2022-05-31T11:14:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/76bfabddc2bbc8074a0168c96e5e8e7e/thumb_1200_1553.png","hostPageUrl":"https://www.studocu.com/in/document/maharshi-dayanand-saraswati-university/bachelor-of-computer-applications/cs-unit-1-cyber-security-notes-for-mdsu/24324316","contentSize":"222721 B","width":1200,"height":1553,"cDNContentUrl":"https://th.bing.com/th/id/R.9d575f0405303f8abfa9d7f74db65633?rik=p2vQEhiJCXagfg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"52EC854688D5708B72857EA07609891812D06BA7","accentColor":"181818"},"389A8AE1599F17CD0538AA47C1321A5A20F1C5E0":{"name":"Buy An Introduction to R Book Online at Low Prices in India | An ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.BevzGUaeMhEnIgIb1df0ugAAAA?pid=Api","datePublished":"2025-06-27T05:01:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/41gj3iFiqAL._SY445_SX342_.jpg","hostPageUrl":"https://www.amazon.in/Introduction-R-William-N-Venables/dp/0954612086","contentSize":"14069 B","width":296,"height":445,"cDNContentUrl":"https://th.bing.com/th/id/R.05ebf319469e32112722021bd5d7f4ba?rik=g6moHpX5cdxQgw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"0E5C1F02A5A1231C74AA8350DC71F9951EA8A983","accentColor":"011457"},"19ACD00A830B18DEEFED9B7754E568E419058EEF":{"name":"Module 1- Attacks on Computer security - NETWORK SECURITY MODULE 1 ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.oi7j3AGz9UncTpsasoRlEAHaKe?pid=Api","datePublished":"2023-06-18T19:47:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/63340a805e1935b0d599aa2435eea14c/thumb_1200_1698.png","hostPageUrl":"https://www.studocu.com/in/document/visvesvaraya-technological-university/electronic-and-communication/module-1-attacks-on-computer-security/53722744","contentSize":"407875 B","width":1200,"height":1698,"cDNContentUrl":"https://th.bing.com/th/id/R.a22ee3dc01b3f549dc4e9b1ab2846510?rik=kcoNoDiwge3%2b3g&pid=ImgRaw&r=0","isTransparent":false,"imageId":"FEE850914E865E4577B9DEFEED81B038A00DCA91","accentColor":"31629A"},"F7FF2724B96AB01A54E963BA88407DE8047439E1":{"name":"Fillable Online sis pitt Tel2821/is2150: introduction to security ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.ryRS_yVfat0sLqvDIVPz1wAAAA?pid=Api","datePublished":"2023-08-21T15:43:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.pdffiller.com/preview/34/579/34579062.png","hostPageUrl":"https://www.pdffiller.com/34579062--Lab2pdf-Tel2821is2150-introduction-to-security-School-of-Information-sis-pitt-","contentSize":"1670 B","width":298,"height":386,"cDNContentUrl":"https://th.bing.com/th/id/R.af2452ff255f6add2c2eabc32153f3d7?rik=f%2f9yQpumC6FFng&pid=ImgRaw&r=0","isTransparent":false,"imageId":"1E9347408ED70488AB369E45A10BA69B4272FF7F","accentColor":"3E3E3E"},"F97A73B7366BCF2232A84AE0F4D2194630DBE9DF":{"name":"Cyber Security Management | 24x7 Security Operation Center (SOC)","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.SeXhHZ2uHudkZMLYu7-mTwHaHa?pid=Api","datePublished":"2023-02-26T03:22:00.0000000Z","isFamilyFriendly":true,"contentUrl":"http://blog.progressive.in/assets/img/photos/comprehensive-cybersecurity.jpg?format=jpg","hostPageUrl":"http://blog.progressive.in/cyber-security-management","contentSize":"67902 B","width":800,"height":800,"cDNContentUrl":"https://th.bing.com/th/id/R.49e5e11d9dae1ee76464c2d8bbbfa64f?rik=n6c3e2O2%2fCIjig&riu=http%3a%2f%2fblog.progressive.in%2fassets%2fimg%2fphotos%2fcomprehensive-cybersecurity.jpg%3fformat%3djpg&ehk=CRjSFboy%2beSh3xxpB2yZ%2bxbT80cjtL9sooJNjIiWoOc%3d&risl=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"FD9EBD0364912D4F0EA48A2322FCB6637B37A79F","accentColor":"C24A09"},"6355C294AECB661B62F05150F880D1F44974EA45":{"name":"Buy Cybersecurity for Beginners: A Hands-On Guide for Total Beginners ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.F2LnR5FG9ZfOsImxtegdiQHaJy?pid=Api","datePublished":"2021-03-25T03:18:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/81Savb8lDDS._SL1500_.jpg","hostPageUrl":"https://www.amazon.in/How-Cybersecurity-Really-Works-Hands/dp/1718501285","contentSize":"194580 B","width":1135,"height":1500,"cDNContentUrl":"https://th.bing.com/th/id/R.1762e7479146f597ceb089b1b5e81d89?rik=NlUsSeq8ZrEmDw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"54AE47944F1D088F05150F26B166BCEA492C5536","accentColor":"C0B80B"},"28D4DD62F6E924B416F8C6703D3DBD97DD392B8C":{"name":"Introduction to Security eBook : Fischer, Robert J., Edward Halibozek ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.4LasShPUTv_-49roUVLLEgAAAA?pid=Api","datePublished":"2020-10-24T07:59:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/51vJglvqJgL._SY445_SX342_.jpg","hostPageUrl":"https://www.amazon.in/Introduction-Security-Robert-J-Fischer-ebook/dp/B001O5CZ7Q","contentSize":"20365 B","width":314,"height":445,"cDNContentUrl":"https://th.bing.com/th/id/R.e0b6ac4a13d44efffee3dae85152cb12?rik=gk3dJm%2beQkthjw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"C8B293DD79DBD3D3076C8F614B429E6F26DD4D82","accentColor":"025CB9"},"93B87A771558778BB3347F83C68CD1B4A0142F4C":{"name":"Leading Research Books for Security and Network Forensics | S-Logix","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.U0Wz4JV9pq73VKGyIDK2LwHaDN?pid=Api","datePublished":"2022-06-08T11:41:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://slogix.in/images/digital-forensics/introduction-to-security-and-network-forensics.jpg","hostPageUrl":"https://slogix.in/digital-forensics/introduction-to-security-and-network-forensics/","contentSize":"48758 B","width":830,"height":360,"cDNContentUrl":"https://th.bing.com/th/id/R.5345b3e0957da6aef754a1b22032b62f?rik=OYund1GFd7g7Qw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"C4F2410A4B1DC86C38F7433BB877855177A78B39","accentColor":"004B95"},"B2B184D1A27520BE5D15BD7FB83A9155944726B1":{"name":"Buy Mastering Your Introduction to Cyber Security Book Online at Low ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.L68ge9VtZNkF5KlHUuYgFwAAAA?pid=Api","datePublished":"2020-08-26T16:52:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/515uPXmPBpL._SY445_SX342_.jpg","hostPageUrl":"https://www.amazon.in/Mastering-Your-Introduction-Cyber-Security/dp/163491418X","contentSize":"28388 B","width":279,"height":445,"cDNContentUrl":"https://th.bing.com/th/id/R.2faf207bd56d64d905e4a94752e62017?rik=KxtIHSpXAuvVUQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"1B6274495519A38BF7DB51D5EB02572A1D481B2B","accentColor":"2188AA"},"4C647511A0E395E24EAC76E177B079C20362E587":{"name":"Cyber Security lecture notes pdf - CYBER SECURITY [R18A0521] LECTURE ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.9v4RaflU2fsIVNfbNlq59AHaJl?pid=Api","datePublished":"2022-09-18T23:37:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/f32c9f52f790303ed742f284c0a42e54/thumb_1200_1553.png","hostPageUrl":"https://www.studocu.com/in/document/shri-ramdeobaba-college-of-engineering-and-management/information-technology-workshop/cyber-security-lecture-notes-pdf/26444612","contentSize":"244204 B","width":1200,"height":1553,"cDNContentUrl":"https://th.bing.com/th/id/R.f6fe1169f954d9fb0854d7db365ab9f4?rik=xEZXEQo%2bWS7kyg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"785E26302C970B771E67CAE42E593E0A115746C4","accentColor":"BF9C0C"},"508FB97EAD3610A866D276AAE5A5E5A4099CDB8B":{"name":"Introduction to security : Amazon.in: Books","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.NqQCeie0NG85mbrT_xyWKgAAAA?pid=Api","datePublished":"2025-07-28T11:48:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/41TIenPS8tL._SY445_SX342_.jpg","hostPageUrl":"https://www.amazon.in/Introduction-to-security/dp/0913708208","contentSize":"9276 B","width":296,"height":445,"cDNContentUrl":"https://th.bing.com/th/id/R.36a4027a27b4346f3999bad3ff1c962a?rik=Bfib59pjAYpmLQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"B8BDC9904A5E5A5EAA672D668A0163DAE79BF805","accentColor":"785366"},"B991312EBDD5347934347A71348F7C973B51D521":{"name":"Introduction to Computer Security eBook : BISHOP: Amazon.in: Kindle Store","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.2DPET23GAZlred9jpVy05gAAAA?pid=Api","datePublished":"2025-07-06T02:17:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/41eFFLOVDdL._SY445_SX342_.jpg","hostPageUrl":"https://www.amazon.in/Introduction-Computer-Security-Bishop-ebook/dp/B07YG4BW81","contentSize":"19074 B","width":334,"height":445,"cDNContentUrl":"https://th.bing.com/th/id/R.d833c44f6dc601996b79df63a55cb4e6?rik=mxkT4ttdQ5dDQw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"125D15B379C7F84317A7434397435DDBE213199B","accentColor":"B7141A"},"633E8776A0E8D5EAE15C7569C2E57B96DBAA334D":{"name":"Buy Security Studies: An Introduction Book Online at Low Prices in ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.7DQ3dDiDIAHTUfu_J7vmywAAAA?pid=Api","datePublished":"2025-08-04T06:48:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/21JBjA3JT6L._SY445_SX342_.jpg","hostPageUrl":"https://www.amazon.in/Security-Studies-Introduction-Paul-Williams/dp/0415784891","contentSize":"7379 B","width":314,"height":445,"cDNContentUrl":"https://th.bing.com/th/id/R.ec34377438832001d351fbbf27bbe6cb?rik=NuN4ZwqOXa4exQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"D433AABD69B75E2C9657C51EAE5D8E0A6778E336","accentColor":"0C52A2"},"CFCBDF71080851C87C3FE448D8C91DD72F16FF35":{"name":"DF Complete - 1 | P a g e Digital Fundamentals(3130704) 2022 - 2023 ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.T4SYqGQ6d4pvKMKjrwbYJQHaKd?pid=Api","datePublished":"2024-11-18T03:06:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/fd36d881b2e446abd8a8ac565187f072/thumb_1200_1696.webp","hostPageUrl":"https://www.studocu.com/in/document/gujarat-technological-university/computer-engineering/df-complete/111122624","contentSize":"178558 B","width":1200,"height":1696,"cDNContentUrl":"https://th.bing.com/th/id/R.4f8498a8643a778a6f28c2a3af06d825?rik=%2fLz9F4CAFYzH8w&pid=ImgRaw&r=0","isTransparent":false,"imageId":"53FF61F27DD19C8D844EF3C78C15808017FDBCFC","accentColor":"8D4D21"},"3B991C9CF6A117D41C95EA43F559E3392D577AB5":{"name":"Cryptography and Cyber Security - CB3491 5th Semester CSE Dept | 2021 ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.LCPndLabZ3XkoTVdWJigdgHaNy?pid=Api","datePublished":"2023-03-31T21:20:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://i.imgur.com/oTpp3Mn.jpg","hostPageUrl":"https://www.poriyaan.in/paper/cryptography-and-cyber-security-84/","contentSize":"450737 B","width":786,"height":1464,"cDNContentUrl":"https://th.bing.com/th/id/R.2c23e774b69b6775e4a1355d5898a076?rik=s5nByW8acU3BWQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"5BA775D2933E955F34AE59C14D711A6FC9C199B3","accentColor":"6B6560"},"510CBFC5240D5436546F7BF2DFFB6B81190F3E27":{"name":"Cryptography and Network Security - Introduction 1-2 D (IT-Sem-7) PART ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.irraSULpcmnqdKqXtM0j6QHaF9?pid=Api","datePublished":"2024-02-07T14:06:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/1a2c7df006bd2af692cbc27f8b24932d/thumb_1200_967.png","hostPageUrl":"https://www.studocu.com/in/document/dr-apj-abdul-kalam-technical-university/master-of-computer-application/cryptography-and-network-security/83206449","contentSize":"580647 B","width":1200,"height":967,"cDNContentUrl":"https://th.bing.com/th/id/R.8abada4942e97269ea74aa97b4cd23e9?rik=FcD7XELQRWNF9g&pid=ImgRaw&r=0","isTransparent":false,"imageId":"72E3F09118B6BFFD2FB7F6456345D0425CFBC015","accentColor":"91593A"},"5CB1AD4BE74384A5C579A699D1FB6A980E2DE43E":{"name":"Module-4 - Introduction to Cyber Security module-4 notes - Chapter 4 ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.mM8i8Lfmr019G5nyT7GF2gHaKd?pid=Api","datePublished":"2023-10-23T04:32:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://website-assets.studocu.com/img/document_thumbnails/9d83ee0d842e87aa029b2d8c4722f7a1/thumb_1200_1696.webp","hostPageUrl":"https://www.studocu.com/in/document/visvesvaraya-technological-university/intoduction-to-cyber-security/module-4-introduction-to-cyber-security-module-4-notes/73536900","contentSize":"261120 B","width":1200,"height":1696,"cDNContentUrl":"https://th.bing.com/th/id/R.98cf22f0b7e6af4d7d1b99f24fb185da?rik=xRvatH40SFpclw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E34ED2E089A6BF1D996A975C5A48347EB4DA1BC5","accentColor":"656665"},"E09183027363DEAAF3B3ED2B0B081A02CAA8504F":{"name":"Introduction to Network Security E-book Testbank Solutions | PDF ...","thumbnailUrl":"https://tse3.mm.bing.net/th?id=OIF.xKzNbHjDbI%2bcgarHPzyoYA&pid=Api","datePublished":"2026-01-24T14:24:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://imgv2-1-f.scribdassets.com/img/document/986501010/original/282e8d707a/1?v=1","hostPageUrl":"https://www.scribd.com/document/986501010/Introduction-to-Network-Security-E-book-Testbank-Solutions","contentSize":"146740 B","width":768,"height":1024,"cDNContentUrl":"https://th.bing.com/th/id/R.4ff3f613eb021faa8dd68befde0c0e6b?rik=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"F4058AAC20A180B0B2DE3B3FAAED36372038190E","accentColor":"026DB2","isFresh":true},"06C6757EA1873265423FA2BA76CBBBBACFC87349":{"name":"Buy An Introduction to Security: Protecting an Organisation's Assets ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.or5mSfJF7ojv8Mc6SSVbogAAAA?pid=Api","datePublished":"2020-09-11T01:04:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/514DjZQZV7L._SY445_SX342_.jpg","hostPageUrl":"https://www.amazon.in/Introduction-Security-Protecting-Organisations-Assets/dp/178612694X","contentSize":"19014 B","width":288,"height":445,"cDNContentUrl":"https://th.bing.com/th/id/R.a2be6649f245ee88eff0c73a49255ba2?rik=YGxX5xp4I1Yk8w&pid=ImgRaw&r=0","isTransparent":false,"imageId":"94378CFCABBBBC67AB2AF3245623781AE7576C60","accentColor":"953641"},"02547B4D233B855CA45ABDBA8F184113F1A51776":{"name":"Introduction to Cloud Security","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.PlCwB0QLDFSX4q3J9-WlMgHaE7?pid=Api","datePublished":"2023-12-09T17:11:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://prod.ifacet.in/images/uploads/Introduction-to-Cloud-Security.jpg","hostPageUrl":"https://www.eicta.iitk.ac.in/knowledge-hub/cloud-computing/aws-cloud-computing-introduction-features-and-benefits","contentSize":"64451 B","width":640,"height":426,"cDNContentUrl":"https://th.bing.com/th/id/R.3e50b007440b0c5497e2adc9f7e5a532?rik=IEW31DKzWMVKpQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"67715A1F311481F8ABDBA54AC558B332D4B74520","accentColor":"0DBBBE"},"7D91B2B05AC893D494B0FE1553F488D49CD4D8DF":{"name":"CISSP - Introduction to Information Security","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.yvyld7iGomA1UfMkj1u9IwHaE7?pid=Api","datePublished":"2025-02-06T14:34:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://prod.ifacet.in/images/uploads/CISSP-%E2%80%93-Introduction-to-Information-Security.jpg","hostPageUrl":"https://www.eicta.iitk.ac.in/knowledge-hub/cyber-security/disinformation-security-strategies-to-combat-fake-news-in-the-digital-age-2025","contentSize":"62116 B","width":640,"height":426,"cDNContentUrl":"https://th.bing.com/th/id/R.cafca577b886a2603551f3248f5bbd23?rik=1xkrC6WMOU1JCw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"FD8D4DC94D884F3551EF0B494D398CA50B2B19D7","accentColor":"0FB9BC"},"A9F72A67291B1D2ECC3C0EC496E81C0A1395516F":{"name":"Introduction to Security 9th Edition Robert J. Fischer complete full ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIF.CjoHgLtBTTWRLYxWZBIuFg?pid=Api","datePublished":"2026-01-23T18:55:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://imgv2-1-f.scribdassets.com/img/document/985921383/original/fe860a16e6/1?v=1","hostPageUrl":"https://www.scribd.com/document/985921383/Introduction-to-Security-9th-Edition-Robert-J-Fischer-complete-full-ebook","contentSize":"72465 B","width":768,"height":1024,"cDNContentUrl":"https://th.bing.com/th/id/R.ebedac9987eeb1ece92223b4ad1a9c89?rik=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"F6155931A0C18E694CE0C3CCE2D1B19276A27F9A","accentColor":"0D61B5","isFresh":true},"ECEA57720D6209E83E836A47D6AD4998E2D676DA":{"name":"File | Transportation Security Administration","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.TyTnlYX-u8RLcqgCZ9IhgAHaJl?pid=Api","datePublished":"2022-05-26T14:13:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.tsa.gov/sites/default/files/ssi-cover-sheet-dhs-form-11054.jpg","hostPageUrl":"https://www.tsa.gov/image/ssi-cover-sheet-dhs-form-11054jpg","contentSize":"253165 B","width":1700,"height":2200,"cDNContentUrl":"https://th.bing.com/th/id/R.4f24e79585febbc44b72a80267d22180?rik=zq51J9AmkI7jOA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"AD676D2E8994DA6D74A638E38E9026D02775AECE","accentColor":"008002"},"DB844267D853417ECCAFF14A94AFC292ECD055D9":{"name":"Buy Introduction to insurance (Risk, insurance, and security) Book ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.CWbxuAiHKUI1GRiYgAfo9AAAAA?pid=Api","datePublished":"2020-08-27T04:14:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/41KHBIzHYoL._SY445_SX342_.jpg","hostPageUrl":"https://www.amazon.in/Title-Introduction-insurance-Risk-secur/dp/0134853598","contentSize":"10091 B","width":296,"height":445,"cDNContentUrl":"https://th.bing.com/th/id/R.0966f1b808872942351918988007e8f4?rik=vUgkdo01FOfM%2bg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"9D550DCE292CFA49A41FFACCE714358D762448BD","accentColor":"795266"},"6D97760F32F202DAF7045A473B25E8E211881D62":{"name":"Remote Workforce | ESET","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.OW79ZxgoLvP93XLrojS_ogAAAA?pid=Api","datePublished":"2020-05-23T18:12:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://web-assets.eset.com/fileadmin/ESET/INT/Landing/2020/CSR/remote-access-security-checklist-thumbnail.png","hostPageUrl":"https://www.eset.com/in/business/remote-workforce/","contentSize":"28512 B","width":350,"height":350,"cDNContentUrl":"https://th.bing.com/th/id/R.396efd6718282ef3fddd72eba234bfa2?rik=1nln8CMvIK1%2fQA&pid=ImgRaw&r=0","isTransparent":true,"imageId":"26D188112E8E52B374A5407FAD202F23F06779D6","accentColor":"06B3C4"},"7B831696A04A6E0F75BE30BC0C41B2FC8F2168BC":{"name":"Information Security Policy Examples Pdf | pdfFiller","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.3y9sp860WlhtYTfnYsgmVQAAAA?pid=Api","datePublished":"2022-01-11T19:49:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.pdffiller.com/preview/487/198/487198268.png","hostPageUrl":"https://www.pdffiller.com/en/micro-catalog/banking/18253-information-security-policy-examples-pdf.htm","contentSize":"12602 B","width":298,"height":386,"cDNContentUrl":"https://th.bing.com/th/id/R.df2f6ca7ceb45a586d6137e762c82655?rik=tzhhaQqk5vBX6w&pid=ImgRaw&r=0","isTransparent":false,"imageId":"CB8612F8CF2B14C0CB03EB57F0E6A40A696138B7","accentColor":"0E0EBD"},"99B073A1C02BACAA2108B9E2817AE0969A64CB56":{"name":"INTRODUCTION TO TRANSPORTATION SECURITY : Amazon.in: Books","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.3PFRmGEABKd775TI1raWpwAAAA?pid=Api","datePublished":"2021-12-11T10:48:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/31wOD8muxdL.jpg","hostPageUrl":"https://www.amazon.in/INTRODUCTION-TRANSPORTATION-SECURITY-NA/dp/0367269252","contentSize":"15775 B","width":180,"height":270,"cDNContentUrl":"https://th.bing.com/th/id/R.dcf15198610004a77bef94c8d6b696a7?rik=mQs3GgyyyqoSgA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"65BC46A9690EA7182E9B8012AACAB20C1A370B99","accentColor":"AB8B20"},"F7DF60414130AAB8A0672D8600437A6472F97FB0":{"name":"Software Testing Books | Best Software Testing Books | Software Testing ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP._EoZQ9xdIWMP6p2fu7Dc6gHaJq?pid=Api","datePublished":"2022-05-18T20:34:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.fita.in/includes/assets/img/books/software-testing-books/software-testing-books-12.jpg","hostPageUrl":"https://www.fita.in/software-testing-books/","contentSize":"23595 B","width":500,"height":652,"cDNContentUrl":"https://th.bing.com/th/id/R.fc4a1943dc5d21630fea9d9fbbb0dcea?rik=f%2f0GFBQDqosKdg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"0BF79F2746A7340068D2760A8BAA03141406FD7F","accentColor":"0D2F43"},"86F4A1E6E5ADCCE397239FF83267E8480E312B81":{"name":"Home | Classroom","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.motbaTTBBYBTVNa_aMhfsgHaEK?pid=Api","datePublished":"2021-02-26T06:36:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://classroom.anir0y.in/img/soc-1.png","hostPageUrl":"https://classroom.anir0y.in/","contentSize":"170037 B","width":1920,"height":1080,"cDNContentUrl":"https://th.bing.com/th/id/R.9a8b5b6934c105805354d6bf68c85fb2?rik=aE8abl7azD55Mg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"18B213E0848E76238FF932793ECCDA5E6E1A4F68","accentColor":"0984C2"},"534C168E82E9EA4C2FEA17B005A549654FCCE21D":{"name":"Buy Introduction to Criminology: Theories, Methods, and Criminal ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.59bdJXp-YHGZZAqruR57GwHaJn?pid=Api","datePublished":"2022-12-11T06:46:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/A14KxR-AG+L._SL1500_.jpg","hostPageUrl":"https://www.amazon.in/Introduction-Criminology-Theories-Criminal-Behavior/dp/1071835084","contentSize":"451840 B","width":1155,"height":1500,"cDNContentUrl":"https://th.bing.com/th/id/R.e7d6dd257a7e607199640aabb91e7b1b?rik=NcRh6CiersTyrg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"D12ECCF456945A500B71AEF2C4AE9E28E861C435","accentColor":"A88623"},"07899A67D78C97524D89F7E3A4A281C228A42116":{"name":"Technology 101: Intro to Security, New York Mills Public Library, 11 ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.3A7451IR-Zm1LZmo2ZttKQHaEL?pid=Api","datePublished":"2023-03-26T06:29:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://cdn-az.allevents.in/events8/banners/29a5c0074a3791d121498d6aa8d52c6f2027a027ccda3f0a66b37cbd190cbbdc-rimg-w960-h541-gmir?v=1712587819","hostPageUrl":"https://allevents.in/new%20york%20mills/technology-101-intro-to-security/200026032969224","contentSize":"44936 B","width":960,"height":541,"cDNContentUrl":"https://th.bing.com/th/id/R.dc0ef8e75211f999b52d99a8d99b6d29?rik=cJipdn3IeSXUmA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"61124A822C182A4A3E7F98D42579C87D76A99870","accentColor":"031A44"},"0146DFB5E5625083775F45AB4918E05E65CD7EA9":{"name":"Buy Introduction to the New Mainframe: Security Book Online at Low ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.boCKrtFPlTDI46K6m5K34gAAAA?pid=Api","datePublished":"2020-10-24T21:27:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/5113C8GHEOL._SX342_SY445_.jpg","hostPageUrl":"https://www.amazon.in/Introduction-New-Mainframe-IBM-Redbooks/dp/0738489654","contentSize":"19157 B","width":342,"height":430,"cDNContentUrl":"https://th.bing.com/th/id/R.6e808aaed14f9530c8e3a2ba9b92b7e2?rik=EGT9W14mBTh39Q&pid=ImgRaw&r=0","isTransparent":false,"imageId":"9AE7DC56E50E8194BA54F5773805265E5BFD6410","accentColor":"C22A09"},"FC4727BCEB764CC47CCEAEC6A43BCC2693837B5D":{"name":"Buy Cybersecurity All-in-one for Dummies Book Online at Low Prices in ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.D8KSgVHyteWQxCfnfPzwXgHaJS?pid=Api","datePublished":"2022-08-01T17:05:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/81oeLXBqdFL.jpg","hostPageUrl":"https://www.amazon.in/Cybersecurity-All-Dummies-Joseph-Steinberg/dp/139415285X","contentSize":"343588 B","width":2042,"height":2560,"cDNContentUrl":"https://th.bing.com/th/id/R.0fc2928151f2b5e590c427e77cfcf05e?rik=z3Ryy75nxEzH7A&pid=ImgRaw&r=0","isTransparent":false,"imageId":"D5B7383962CCB34A6CEAECC74CC467BECB7274CF","accentColor":"CBC300"},"63617718AAD31B41BCAC52F60495780E08552639":{"name":"Java Vs .net Security - Pdf : Pilipchuk, Denis, Piliptchouk, Denis ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.uWOpQnzk0w8VW-Oe3l-oMQAAAA?pid=Api","datePublished":"2004-05-01T12:00:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/51O9m+v08pL._SX342_SY445_.jpg","hostPageUrl":"https://www.amazon.in/Java-Vs-net-Security-Pdf/dp/059600821X","contentSize":"28014 B","width":342,"height":443,"cDNContentUrl":"https://th.bing.com/th/id/R.b963a9427ce4d30f155be39ede5fa831?rik=NhZ3gao9sRTLyg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"93625580E08759406F25CACB14B13DAA81771636","accentColor":"C89703"},"F1C77B1E7F3A030133CE7BF2DFFB6B81190F3E27":{"name":"Cryptography and Network Security - Introduction 1-2 D (IT-Sem-7) PART ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.37qFpw3YNq-f6rsmv5dNywAAAA?pid=Api","datePublished":"2024-02-07T14:06:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/84da6e2478387356c527b9f562d4e102/thumb_300_424.png","hostPageUrl":"https://www.studocu.com/in/document/dr-apj-abdul-kalam-technical-university/master-of-computer-application/cryptography-and-network-security/83206449","contentSize":"32801 B","width":300,"height":424,"cDNContentUrl":"https://th.bing.com/th/id/R.dfba85a70dd836af9feabb26bf974dcb?rik=H3y34fejMBAz7A&pid=ImgRaw&r=0","isTransparent":false,"imageId":"72E3F09118B6BFFD2FB7EC331030A3F7E1B77C1F","accentColor":"4E4E4E"},"D1E0A417B4846A536D728998902BB73596BA4DA4":{"name":"Introduction to Information Systems : Rainer, R. Kelly, Jr., Prince ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.MtMd7WSHQ67twZPasFzc_AHaJe?pid=Api","datePublished":"2021-12-22T01:58:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/91G0IrCp99L._SL1500_.jpg","hostPageUrl":"https://www.amazon.in/Introduction-Information-Systems-Brad-Prince/dp/1119761468","contentSize":"418614 B","width":1172,"height":1500,"cDNContentUrl":"https://th.bing.com/th/id/R.32d31ded648743aeedc193dab05cdcfc?rik=HQ5KcUtIpjXWJw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"4AD4AB69537BB209899827D635A6484B714A0E1D","accentColor":"B01B24"},"F92BC253F53ABCA9B392F3C087A8D8311A37486B":{"name":"Introduction to hardware security modules (HSM): “FIPS 140-2 tested and ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.qyit5IUfMfh6AoI3iefXOwHaEK?pid=Api","datePublished":"2023-01-28T20:25:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://utimaco.com/sites/default/files/2021-06/blog-introduction-into-hardware-security-modules-stage.jpg","hostPageUrl":"https://utimaco.com/news/blog-posts/introduction-hardware-security-modules-hsm-fips-140-2-tested-and-certified","contentSize":"356219 B","width":1920,"height":1080,"cDNContentUrl":"https://th.bing.com/th/id/R.ab28ade4851f31f87a02823789e7d73b?rik=n7IsNV%2bjy5o7KQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"B68473A1138D8A780C3F293B9ACBA35F352CB29F","accentColor":"1183BA"},"5123BB8E2C3EA344B6973134E0C44F265F675494":{"name":"Buy An Introduction to Statistical Learning: with Applications in R ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.KeTW9mlsIWg4849DtwKGjwHaLK?pid=Api","datePublished":"2017-01-07T10:06:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/61Lvnv9+CML.jpg","hostPageUrl":"https://www.amazon.in/Introduction-Statistical-Learning-Applications-Statistics/dp/1461471370","contentSize":"68500 B","width":827,"height":1246,"cDNContentUrl":"https://th.bing.com/th/id/R.29e4d6f6696c216838f38f43b702868f?rik=FTK76MLjOkRreQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"494576F562F44C0E4313796B443AE3C2E8BB3215","accentColor":"C99802"},"A0695D911EA05E9E26167A47BBA2848A68CE7268":{"name":"Theoretical Background Example - Fill Online, Printable, Fillable ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.jWcuqGgnJ6Gg6D4b-Dlb-gAAAA?pid=Api","datePublished":"2022-06-20T07:45:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.pdffiller.com/preview/414/539/414539059.png","hostPageUrl":"https://www.pdffiller.com/414539059--theoretical-background-example-","contentSize":"9627 B","width":298,"height":386,"cDNContentUrl":"https://th.bing.com/th/id/R.8d672ea8682727a1a0e83e1bf8395bfa?rik=CpbVGeEK5eliYQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"8627EC86A8482ABB74A76162E9E50AE119D5960A","accentColor":"4B4B4B"},"748F511641026A653C094906A4662D05CE5732A0":{"name":"What is Computer in Hindi - कंप्यूटर क्या है? [PDF] - Tutorial in Hindi","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.vivlnan3uTXm9xnRf1UMMAHaEK?pid=Api","datePublished":"2020-03-31T13:22:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.tutorialinhindi.com/wp-content/uploads/2022/12/Introduction-to-Computer-in-Hindi-1024x576.gif","hostPageUrl":"https://www.tutorialinhindi.com/computer-fundamentals/computer-hindi/","contentSize":"35508 B","width":1024,"height":576,"cDNContentUrl":"https://th.bing.com/th/id/R.be2be59da9f7b935e6f719d17f550c30?rik=R%2fgVYRQgplbDkA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"0A2375EC50D2664A609490C356A620146115F847","accentColor":"CB4300"},"FC93BA84170C1D0DD35CB591D52DFA8206D84B2C":{"name":"Buy E-Banking: Introduction, History and Security Issues Book Online at ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.PyCRHwU9UATFy9yCGeaiWgAAAA?pid=Api","datePublished":"2021-03-06T02:57:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/41yTYiK28AL._SX342_SY445_.jpg","hostPageUrl":"https://www.amazon.in/Banking-Dr-Fozia/dp/3659368792","contentSize":"13523 B","width":342,"height":250,"cDNContentUrl":"https://th.bing.com/th/id/R.3f20911f053d5004c5cbdc8219e6a25a?rik=zzmrSHHA0dA9xQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"C2B48D6028AFD25D195BC53DD0D1C07148AB39CF","accentColor":"AD1E22"},"6ED5CFD4B5AE896567405C045F849F50EC5B22D2":{"name":"Buy LMS Integrated for MindTap Introduction to Security, 1 term (6 ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.zfTa45ktS0zHPJtGks-ziAAAAA?pid=Api","datePublished":"2020-11-13T12:45:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/512PvNDOBDL._SX342_SY445_.jpg","hostPageUrl":"https://www.amazon.in/Integrated-MindTap-Introduction-Security-Awareness/dp/1305946715","contentSize":"16356 B","width":342,"height":272,"cDNContentUrl":"https://th.bing.com/th/id/R.cdf4dae3992d4b4cc73c9b4692cfb388?rik=5l38TVvqmFZ2BA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"2D22B5CE05F948F540C504765698EA5B4DFC5DE6","accentColor":"1D6AAE"},"357A8880E75947BCF69069F6360B027AFB8D7EB9":{"name":"Uttarakhand Open University, [FREE] course \"Introduction to Cyber Security\"","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.7yOU75HS5d4GQA3f_k4cAgHaEK?pid=Api","datePublished":"2021-04-04T16:58:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://edubard.in/media/media/Introduction_to_Cyber_Security.jpg","hostPageUrl":"https://edubard.in/full/uttarakhand-open-university-free-course-introduction-to-cyber-security","contentSize":"29106 B","width":1200,"height":675,"cDNContentUrl":"https://th.bing.com/th/id/R.ef2394ef91d2e5de06400ddffe4e1c02?rik=U6eICH6VdMtvCQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"9BE7D8BFA720B0636F96096FCB74957E0888A753","accentColor":"C9A402"},"45258E666E0187045D9B8E8AF86A981BBACC5E9C":{"name":"Buy Reinforcement Learning Book Online at Low Prices in India ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.O-QAMU8VOCIwJSzs1pY3WAHaKM?pid=Api","datePublished":"2023-04-04T09:31:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/71nk3rOK3jL._SL1500_.jpg","hostPageUrl":"https://www.amazon.in/Reinforcement-Learning-Introduction-Richard-Sutton/dp/0262039249","contentSize":"117984 B","width":1089,"height":1500,"cDNContentUrl":"https://th.bing.com/th/id/R.3be400314f15382230252cecd6963758?rik=VFLoZuYQeEDVuQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"C9E5CCABB189A68FA8E8B9D5407810E666E85254","accentColor":"894268"},"3FD745D02B5822A63EA65A380553877AD770EEA9":{"name":"Buy An Introduction to Statistical Learning: with Applications in ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.Hs28Jb7bOkH2xahF5qVRgQHaKk?pid=Api","datePublished":"2023-06-22T01:41:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/61i+eJ+8TnL._SL1181_.jpg","hostPageUrl":"https://www.amazon.in/Introduction-Statistical-Learning-Applications-Statistics/dp/3031387465","contentSize":"66310 B","width":827,"height":1181,"cDNContentUrl":"https://th.bing.com/th/id/R.1ecdbc25bedb3a41f6c5a845e6a55181?rik=831UDbKFImrjag&pid=ImgRaw&r=0","isTransparent":false,"imageId":"9AEE077DA778355083A56AE36A2285B20D547DF3","accentColor":"C1900A"},"C5BFEA1F6CA5062DA7472633CEE32E93431BAA51":{"name":"Buy Introduction to Time Series and Forecasting (Springer Texts in ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.rlG04DaIJFS5Cfx-LEjdEgHaJ0?pid=Api","datePublished":"2025-07-04T15:39:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/61mUqSuaTOL._SL1096_.jpg","hostPageUrl":"https://www.amazon.in/Introduction-Forecasting-Springer-Texts-Statistics/dp/3319298526","contentSize":"66529 B","width":827,"height":1096,"cDNContentUrl":"https://th.bing.com/th/id/R.ae51b4e036882454b909fc7e2c48dd12?rik=XPuu8cZaYNJ6dA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"15AAB13439E23EEC3362747AD2605AC6F1AEFB5C","accentColor":"C89803"},"69ECD06286A51DD4220BAF36A9D36948EB8ED840":{"name":"Security Engineering: A Guide to Building Dependable Distributed ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.3rVEqoar8QC4BYPQhI6TJwAAAA?pid=Api","datePublished":"2025-06-28T12:24:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/51YG0dHRqjL.jpg","hostPageUrl":"https://www.amazon.in/Security-Engineering-Building-Dependable-Distributed-ebook/dp/B08P69FT4Q","contentSize":"40528 B","width":375,"height":500,"cDNContentUrl":"https://th.bing.com/th/id/R.deb544aa86abf100b80583d0848e9327?rik=ls4NJmha0U0isA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"048DE8BE84963D9A63FAB0224DD15A68260DCE96","accentColor":"197A3C"},"71AA966717C5BF03D8E390D54A66082F9A026479":{"name":"Buy Introduction to Emergency Management and Disaster Science Book ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.Ta1u-nqhzl8ECvBVnmPawwHaKl?pid=Api","datePublished":"2021-08-13T04:17:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/81IzuA4zUBL._SL1500_.jpg","hostPageUrl":"https://www.amazon.in/Introduction-Emergency-Management-Disaster-Science/dp/0367898993","contentSize":"208299 B","width":1050,"height":1500,"cDNContentUrl":"https://th.bing.com/th/id/R.4dad6efa7aa1ce5f040af0559e63dac3?rik=F6ppdnFc%2bzCNPg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"974620A9F28066A45D093E8D30FB5C717669AA17","accentColor":"183A72"},"0284368D3669B770F91381041E374175147AAB9E":{"name":"Ignite Technologies – Ethical Hacking","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.ZlV1yFwvc4X1kstH3hvoIgHaEK?pid=Api","datePublished":"2020-03-14T15:32:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.ignitetechnologies.in/images/ethical-hacking.jpg","hostPageUrl":"https://www.ignitetechnologies.in/ethical-hacking.html","contentSize":"394010 B","width":1920,"height":1080,"cDNContentUrl":"https://th.bing.com/th/id/R.665575c85c2f7385f592cb47de1be822?rik=IEhj2GOWewefMQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E9BAA741571473E14018319F077B9663D8634820","accentColor":"836248"},"CCDF26DEA13E2169E1E6C2BBE0E8494EA7B11E6B":{"name":"Buy Introduction to Algorithms, fourth edition Book Online at Low ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP._nMSRyzARxjqDu6gR2ACYQHaIb?pid=Api","datePublished":"2022-08-02T02:29:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/61Mw06x2XcL._SL1500_.jpg","hostPageUrl":"https://www.amazon.in/Introduction-Algorithms-fourth-Thomas-Cormen/dp/026204630X","contentSize":"83942 B","width":1317,"height":1500,"cDNContentUrl":"https://th.bing.com/th/id/R.fe7312472cc04718ea0eeea047600261?rik=zP1i7RrjEpYebg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"B6E11B7AE4948E0EBB2C6E1E9612E31AED62FDCC","accentColor":"004D86"},"572DEC821085612533A0AE253DA9B94F8F1236F7":{"name":"Unlocking the Power of Secure Digital Payments | EY - India","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.-9zHiIuyouh9ZKAfi5NXfQHaE8?pid=Api","datePublished":"2022-12-22T06:17:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.ey.com/content/dam/ey-unified-site/ey-com/en-in/insights/cybersecurity/images/ey-digital-payment.jpg","hostPageUrl":"https://www.ey.com/en_in/insights/cybersecurity/how-to-unlock-the-power-of-digital-payments-through-security","contentSize":"578056 B","width":3840,"height":2560,"cDNContentUrl":"https://th.bing.com/th/id/R.fbdcc7888bb2a2e87d64a01f8b93577d?rik=ddLOKAFYFlIzCg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"7F6321F8F49B9AD352EA0A335216580128CED275","accentColor":"363A81"},"E9FEF346C5AFCE49B22EF28CE0812E72622755C6":{"name":"Buy Introduction to Real Analysis Book Online at Low Prices in India ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.YLb14P2cDNie0AyBVdagVgHaKz?pid=Api","datePublished":"2011-03-04T12:00:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/51zHpsmqtpL.jpg","hostPageUrl":"https://www.amazon.in/Introduction-Real-Analysis-Robert-Bartle/dp/0471433314","contentSize":"61783 B","width":797,"height":1162,"cDNContentUrl":"https://th.bing.com/th/id/R.60b6f5e0fd9c0cd89ed00c8155d6a056?rik=nu8%2fZFz67JQr4g&pid=ImgRaw&r=0","isTransparent":false,"imageId":"6C55722627E2180EC82FE22B94ECFA5C643FEF9E","accentColor":"C2C402"},"915D873ECFD165719E320EEA88429C136293EFE4":{"name":"Buy Introduction to Sociology Book Online at Low Prices in India ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.5xTsTRu-_GCHSM1cuojrkQHaJy?pid=Api","datePublished":"2024-06-15T04:40:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/61UxjN-S7lL._SL1200_.jpg","hostPageUrl":"https://www.amazon.in/Introduction-Sociology-Anthony-Giddens/dp/1324062223","contentSize":"75585 B","width":908,"height":1200,"cDNContentUrl":"https://th.bing.com/th/id/R.e714ec4d1bbefc608748cd5cba88eb91?rik=GdV44%2fwdVhfpIw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"4EFE392631C92488AEE023E917561DFCE378D519","accentColor":"C29809"},"4DA73373076EBED432D6AC9C778D6F6567763E18":{"name":"Introduction to the Thermodynamics of Materials, Fifth Edition: Buy ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.JwdffVOh-HZ4J87UgrnlXwAAAA?pid=Api","datePublished":"2023-09-04T10:31:00.0000000Z","isFamilyFriendly":true,"contentUrl":"http://rukmini1.flixcart.com/image/300/300/k05ljm80/book/4/3/6/introduction-to-the-thermodynamics-of-materials-fifth-edition-original-imafjzv5tmwrbsxq.jpeg","hostPageUrl":"https://www.flipkart.com/introduction-thermodynamics-materials/p/itmdyjyu6qgnmrze","contentSize":"18553 B","width":185,"height":300,"cDNContentUrl":"https://th.bing.com/th/id/R.27075f7d53a1f8767827ced482b9e55f?rik=1HozN3Dm600jbQ&riu=http%3a%2f%2frukmini1.flixcart.com%2fimage%2f300%2f300%2fk05ljm80%2fbook%2f4%2f3%2f6%2fintroduction-to-the-thermodynamics-of-materials-fifth-edition-original-imafjzv5tmwrbsxq.jpeg&ehk=iEyAzgbrQ%2fyDjzthqhZ3qkKuU5llGHZKas4xE09aCH8%3d&risl=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"81E3677656F6D877C9CA6D234DEBE67037337AD4","accentColor":"078367"},"D657B666130E545D79810E5283CDC8B8F625B4CC":{"name":"Connect AP Expo-2025 Date:27th - 29th June-2025 Venue : Gadiraju Palace ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.OP3VbeCMaHeRL4wQDamt3QAAAA?pid=Api","datePublished":"2023-06-24T14:59:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.connectap.co.in/assets/images/resource/informationtech.jpg","hostPageUrl":"https://www.connectap.co.in/","contentSize":"107511 B","width":360,"height":270,"cDNContentUrl":"https://th.bing.com/th/id/R.38fdd56de08c6877912f8c100da9addd?rik=bXVrZjHgRdWXGA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"CC4B526F8B8CDC3825E01897D545E031666B756D","accentColor":"23A2A8"},"A429539ADF8DF99DB9D1100104E98F364E11FE18":{"name":"Buy An Introduction To Mechanics Book Online at Low Prices in India ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.-J3qOyZOKrPhDN3AvPnSegHaH0?pid=Api","datePublished":"2021-06-25T17:50:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/810nPorcU9L._SL1417_.jpg","hostPageUrl":"https://www.amazon.in/Introduction-Mechanics-Daniel-Kleppner/dp/0070350485","contentSize":"265372 B","width":1342,"height":1417,"cDNContentUrl":"https://th.bing.com/th/id/R.f89dea3b264e2ab3e10cddc0bcf9d27a?rik=SpI1qf3Yn9mbHQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"81EF11E463F89E4010011D9BD99FD8FDA935924A","accentColor":"796C52"},"33AF08EC196ABDB485E0449A40DF8E43A748384D":{"name":"An Introduction of Indian Art Part - 1 and Part - 2 NCERT book Pdf download","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.tNKXPodnOoZHOXnNhJbd9gAAAA?pid=Api","datePublished":"2022-12-25T07:05:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrwFMRQE74h45ZnC4Ocwalo_kWk_Q5D3C8DusYZ3tZiUePCkoL4QQD_Wk20H1edi70qCVm1d_ej7aMOnP_lGKZWKKqt-5kcyP3rHOBn2M6hMH64SZsrHcYTDVhaZZYgZbg68DwxywVjoS-VMg2u2wy_5zO5vEo3eGHmBgyQIzkHhhIMV0H-VAFVdjhsA/s420/kefa1cc.jpg","hostPageUrl":"https://www.iasnotes.in/2022/11/an-introduction-to-indian-art-part-1-and-part-2-art-and-culture-ncert-book-pdf.html","contentSize":"58737 B","width":294,"height":420,"cDNContentUrl":"https://th.bing.com/th/id/R.b4d2973e87673a86473979cd8496ddf6?rik=M%2fqAzpGm20tYDg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"D483847A34E8FD04A9440E584BDBA691CE80FA33","accentColor":"BA9211"},"2F942F08D46705438D54B3C52889F8115D5AE0F8":{"name":"Security Exam Questions And Answers Pdf Download - Fill Online ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.-Jjen8GIIHSfr5XHgBNyRAAAAA?pid=Api","datePublished":"2023-08-03T22:39:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.pdffiller.com/preview/400/836/400836289.png","hostPageUrl":"https://www.pdffiller.com/400836289--PSISAPracticeTestpdf-security-guard-practice-test-download-pdf-","contentSize":"6460 B","width":298,"height":386,"cDNContentUrl":"https://th.bing.com/th/id/R.f898de9fc18820749faf95c780137244?rik=8knygE12UDTYRQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"8F0EA5D5118F98825C3B45D83450764D80F249F2","accentColor":"4F4F4F"},"B10AF913189ADCBDA62556102B40A781032B20F7":{"name":"Privacy Protection - Competendo - Digital Toolbox","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.Eqo3V4m8vIbKVz7oKUaOFwAAAA?pid=Api","datePublished":"2019-06-24T08:03:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://competendo.net/en/images/thumb/0/04/Holisticsecurity.png/128px-Holisticsecurity.png","hostPageUrl":"https://competendo.net/en/Privacy_Protection","contentSize":"46107 B","width":128,"height":180,"cDNContentUrl":"https://th.bing.com/th/id/R.12aa375789bcbc86ca573ee829468e17?rik=G6CfMYGpzdtqUg&pid=ImgRaw&r=0","isTransparent":true,"imageId":"7F02B230187A04B20165526ADBCDA981319FA01B","accentColor":"364295"},"2A287D434313421B61891668873D8D8382FC2916":{"name":"A Classical Introduction to Cryptography: Applications for ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.Z9S4zAYda1pwvEOpP5xsTwAAAA?pid=Api","datePublished":"2025-07-22T19:15:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/41PVM0YRTRL._SY445_SX342_.jpg","hostPageUrl":"https://www.amazon.in/Classical-Introduction-Cryptography-Applications-Communications-ebook/dp/B000WLSBSA","contentSize":"12496 B","width":279,"height":445,"cDNContentUrl":"https://th.bing.com/th/id/R.67d4b8cc061d6b5a70bc43a93f9c6c4f?rik=ooLXNDQxJLEWmA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"6192CF2838D8D37886619816B124313434D782A2","accentColor":"0179B2"},"0B99B431D14F5877B533E144F725CFAC602E71AC":{"name":"Buy Introduction To Psychology, 7th Edition Book Online at Low Prices ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.m3jFcAHUsURp-y2S65TVxQHaJp?pid=Api","datePublished":"2022-04-24T19:07:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/61gaU+NXoVL._SL1100_.jpg","hostPageUrl":"https://www.amazon.in/Introduction-Psychology-Clifford-Morgan/dp/0074622501","contentSize":"106141 B","width":844,"height":1100,"cDNContentUrl":"https://th.bing.com/th/id/R.9b78c57001d4b14469fb2d92eb94d5c5?rik=sJlLEx30hXdbMw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"CA17E206CAFC527F441E335B7785F41D134B99B0","accentColor":"C9C102"},"2BF92F1B8002A849B740AD1E770B9BC321B9D4AD":{"name":"Buy Computer and Information Security Handbook Book Online at Low ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.c0xRrTCQhk7XDidPWYOHWwAAAA?pid=Api","datePublished":"2023-11-03T14:40:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/4197jshzGwL.jpg","hostPageUrl":"https://www.amazon.in/Computer-Information-Security-Handbook-Vacca/dp/0443132232","contentSize":"29074 B","width":388,"height":500,"cDNContentUrl":"https://th.bing.com/th/id/R.734c51ad3090864ed70e274f5983875b?rik=sp%2fysQggipR7BA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"DA4D9B123CB9B077E1DA047B948A2008B1F29FB2","accentColor":"0B467D"},"E492DD51552BB1BDACF9ED3C89441C7F8F8B5EA6":{"name":"Buy AIX V6 Advanced Security Features Introduction and Configuration ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.s0oEoA_AMlbPATUDPmVLtAAAAA?pid=Api","datePublished":"2007-09-12T12:00:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/41-E+u3L94L._SY445_SX342_.jpg","hostPageUrl":"https://www.amazon.in/Advanced-Security-Features-Introduction-Configuration/dp/0738489247","contentSize":"16252 B","width":282,"height":445,"cDNContentUrl":"https://th.bing.com/th/id/R.b34a04a00fc03256cf0135033e654bb4?rik=TindFVWyG9vKnw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"6AE5B8F8F7C14498C3DE9FCADB1BB25515DD294E","accentColor":"BB2910"},"DF78A706167475F92D54722FE731BA55E8CC6450":{"name":"Buy Introduction to Statistics and Data Analysis, AP® Edition Book ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.SzDJOjQPzls9Fi9xG5i57AHaJt?pid=Api","datePublished":"2022-12-18T00:57:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/81NVyzpvnDL._SL1500_.jpg","hostPageUrl":"https://www.amazon.in/Introduction-Statistics-Data-Analysis-AP/dp/1337794422","contentSize":"184786 B","width":1144,"height":1500,"cDNContentUrl":"https://th.bing.com/th/id/R.4b30c93a340fce5b3d162f711b98b9ec?rik=%2fYd6YGFHV5%2fSRQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"0546CC8E55AB137EF22745D29F574761607A87FD","accentColor":"AC561F"},"1B23EFF4698564C8F91FB22D36BE86E52D47131A":{"name":"Buy Intro to Python for Computer Science and Data Science: Learning to ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.NkmyzavFJy89inpQYxxZXgHaJq?pid=Api","datePublished":"2024-12-13T10:38:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/71wP18MWVUL._SL1500_.jpg","hostPageUrl":"https://www.amazon.in/Introduction-Python-Computer-Data-Sciences/dp/0135404673","contentSize":"172267 B","width":1149,"height":1500,"cDNContentUrl":"https://th.bing.com/th/id/R.3649b2cdabc5272f3d8a7a50631c595e?rik=sTL%2bT5ZYRoyf8Q&pid=ImgRaw&r=0","isTransparent":false,"imageId":"A13174D25E68EB63D22BF19F8C4658964FFE32B1","accentColor":"BFA30C"},"B32C942A0BC93A664C4607ECA78A5F6B9943DEA2":{"name":"Buy Introduction to Psychology Book Online at Low Prices in India ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.DenSLFL5pC1PcMmq_MFhcQHaJ4?pid=Api","datePublished":"2025-07-27T02:05:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/91FrkI+NL7L._SL1500_.jpg","hostPageUrl":"https://www.amazon.in/Introduction-Psychology-Rita-L-Atkinson/dp/015508044X","contentSize":"124605 B","width":1125,"height":1500,"cDNContentUrl":"https://th.bing.com/th/id/R.0de9d22c52f9a42d4f70c9aafcc16171?rik=O8JJorCco2bEZA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"2AED3499B6F5A87ACE7064C466A39CB0A249C23B","accentColor":"904F3B"},"6E454DB2A3F9CDAA00F9C6CEE5A916A9336C6DDE":{"name":"Buy Introduction to Autonomous Mobile Robots Book Online at Low Prices ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.cw7nx9uGpSBLOD9E-LNWPAHaJ3?pid=Api","datePublished":"2017-11-30T09:28:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/81D9K1HiIWL._SL1500_.jpg","hostPageUrl":"https://www.amazon.in/Introduction-Autonomous-Mobile-Robots-Siegwart/dp/8120343220","contentSize":"114822 B","width":1126,"height":1500,"cDNContentUrl":"https://th.bing.com/th/id/R.730ee7c7db86a5204b383f44f8b3563c?rik=5lTUKzqf3KoAnw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"EDD6C6339A619A5EEC6C9F00AADC9F3A2BD454E6","accentColor":"993632"},"EDA1FFFCBCF9E5C42FD2CBE418D049DD0503B02B":{"name":"Buy Introduction to Medical Terminology Book Online at Low Prices in ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.FFc7mE4zZX3LSjRa0VpZyQHaJl?pid=Api","datePublished":"2022-01-19T15:36:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/61z33DX-o4L._SL1000_.jpg","hostPageUrl":"https://www.amazon.in/Introduction-Medical-Terminology-Linda-Stanhope/dp/1649253214","contentSize":"106894 B","width":773,"height":1000,"cDNContentUrl":"https://th.bing.com/th/id/R.14573b984e33657dcb4a345ad15a59c9?rik=3hr%2fz8ufXkzyLQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"B20B3050DD940D814EBC2DF24C5E9FCBCFFF1ADE","accentColor":"04469B"},"EE8FF62DF4F30D6FC3AF60A1C5306D695D7E7DDD":{"name":"Instructor Review Copy for An Introduction to Psychological Science ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.RSFGRvZv7HSwm0v978vceQHaJw?pid=Api","datePublished":"2024-03-14T04:15:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/71QOJ9I0f1L._SL1500_.jpg","hostPageUrl":"https://www.amazon.in/Instructor-Introduction-Psychological-Science-Canadian/dp/0137952945","contentSize":"121013 B","width":1138,"height":1500,"cDNContentUrl":"https://th.bing.com/th/id/R.45214646f66fec74b09b4bfdefcbdc79?rik=7vhv0k8%2f0PY8%2bg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"DDD7E7D596D6035C1A06FA3CF6D03F4FD26FF8EE","accentColor":"1C937C"},"873764B1909EA08CFA481925C2FA09D5C001B198":{"name":"Computer Security | Principles and Practice | Fourth Edition | By ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.Zl-7USHUx6IH0j1r4Aiu4AHaKR?pid=Api","datePublished":"2020-09-09T08:18:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://rukminim1.flixcart.com/image/832/832/k1i6ikw0/book/8/6/9/computer-security-principles-and-practice-fourth-edition-by-original-imafhfk67gzk9zmh.jpeg?q=70","hostPageUrl":"https://www.flipkart.com/computer-security-principles-practice-fourth-pearson/p/itm980f29a41475d","contentSize":"50172 B","width":600,"height":832,"cDNContentUrl":"https://th.bing.com/th/id/R.665fbb5121d4c7a207d23d6be008aee0?rik=eHNGGwnpCsivhA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"891B100C5D90AF2C529184AFC80AE9091B467378","accentColor":"B7141B"},"FA47F0E0347A5BFFD9DCEF6593668BB3FEA31019":{"name":"Introduction to Meta-Analysis eBook : Borenstein, Michael, Hedges ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.3jVC_-N4Ew0LPSXL_0KF6wAAAA?pid=Api","datePublished":"2025-06-22T20:07:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/41tanaZcvPS.jpg","hostPageUrl":"https://www.amazon.in/Introduction-Meta-Analysis-Michael-Borenstein-ebook/dp/B093B4TZB2","contentSize":"23664 B","width":334,"height":500,"cDNContentUrl":"https://th.bing.com/th/id/R.de3542ffe378130d0b3d25cbff4285eb?rik=r3QPDkOntf%2bdzQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"91013AEF3BB8663956FECD9DFFB5A7430E0F74AF","accentColor":"0B143F"},"B982DBB59DE412B0611C32DED46547D8E6F95C89":{"name":"Bot Verification","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.Bq5GaaOQm7jJZDoLc40Z-wHaEK?pid=Api","datePublished":"2025-06-08T06:03:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://targetcourse.in/wp-content/uploads/2025/06/20250608_094811-scaled.jpg","hostPageUrl":"https://targetcourse.in/magadh-university-ug-1st-merit-list-2025-29/","contentSize":"247758 B","width":2560,"height":1440,"cDNContentUrl":"https://th.bing.com/th/id/R.06ae4669a3909bb8c9643a0b738d19fb?rik=myi9W9lOIQsWwQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"98C59F6E8D74564DED23C1160B214ED95BBD289B","accentColor":"A90000"},"C6EED769E606E10061C8F6D4D738ABE655BD1918":{"name":"Introduction To Algorithms 3rd Edition: Buy Introduction To Algorithms ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.310mtUaLaihmzEKB-KdtfAHaJv?pid=Api","datePublished":"2022-07-06T10:55:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://rukminim2.flixcart.com/image/832/832/kzrbiq80/regionalbooks/c/l/0/introduction-to-algorithms-3rd-edition-original-imagbp83xm6qdrzp.jpeg?q=70","hostPageUrl":"https://www.flipkart.com/introduction-algorithms-3rd/p/itmfe21a60a4a2a1","contentSize":"49339 B","width":633,"height":832,"cDNContentUrl":"https://th.bing.com/th/id/R.df5d26b5468b6a2866cc4281f8a76d7c?rik=bO59lm5gHgAWjA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"8191DB556EBA837D4D6F8C16001E606E967DEE6C","accentColor":"2A77A1"},"25D7659B17FA589B760DA99DC17F8604BEBD19DE":{"name":"The Stock Loan Handbook of Terms and Guidelines: Introduction to ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.ldv6es40i55OVn4gtWv0lAAAAA?pid=Api","datePublished":"2020-12-14T03:32:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/41CPeEXx50L._SY445_SX342_.jpg","hostPageUrl":"https://www.amazon.in/Stock-Loan-Handbook-Terms-Guidelines/dp/0595416950","contentSize":"19032 B","width":312,"height":445,"cDNContentUrl":"https://th.bing.com/th/id/R.95dbfa7ace348b9e4e567e20b56bf494?rik=Un1WuXGvhbln0A&pid=ImgRaw&r=0","isTransparent":false,"imageId":"ED91DBEB4068F71CD99AD067B985AF71B9567D52","accentColor":"203A5F"},"FEAE41367C397D4F6C023BF913F9934BF3F8AE08":{"name":"UP NEET PG 2022 Merit List Released at upneet.gov.in for Round 1 ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.ITyyyDhY7e-cgMadtbv8bAHaEK?pid=Api","datePublished":"2022-09-29T05:48:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://img.jagranjosh.com/images/2022/September/2992022/up-neet-pg-2022-merit-list-released.jpg","hostPageUrl":"https://www.jagranjosh.com/news/up-neet-pg-2022-merit-list-released-at-upneet-gov-in-for-round-1-choice-filling-process-to-begin-soon-165029","contentSize":"209373 B","width":1200,"height":675,"cDNContentUrl":"https://th.bing.com/th/id/R.213cb2c83858edef9c80c69db5bbfc6c?rik=7%2boUY8eT1%2fTGIA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"80EA8F3FB4399F319FB320C6F4D793C76314EAEF","accentColor":"C2090A"},"13E3A0DC0FC24DEA99C93B060B056A33497704E2":{"name":"Buy Introduction to Anatomy & Physiology Book Online at Low Prices in ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.qDTabt8DfOIN8sUAx6nFmAHaJe?pid=Api","datePublished":"2022-12-20T22:00:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/61YZiYXrtyL._SL1000_.jpg","hostPageUrl":"https://www.amazon.in/Introduction-Anatomy-Physiology-Susan-Hall/dp/1637768125","contentSize":"74624 B","width":781,"height":1000,"cDNContentUrl":"https://th.bing.com/th/id/R.a834da6edf037ce20df2c500c7a9c598?rik=MT4KzfAs1K6ZnA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"2E40779433A650B060B39C99AED42CF0CD0A3E31","accentColor":"003B68"},"931E1AAE30B9774996F0AFB94C7D7C3FE2511857":{"name":"Introduction to FortiGate Part-1 Infrastructure: Fortinet Network ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.OgvKptpjtTBvuEGeB4zU7QAAAA?pid=Api","datePublished":"2020-10-20T07:49:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/51EqtseYsNL._SX342_SY445_.jpg","hostPageUrl":"https://www.amazon.in/Introduction-FortiGate-Part-1-Infrastructure-Fortinet/dp/B08BF2PNTH","contentSize":"27840 B","width":342,"height":443,"cDNContentUrl":"https://th.bing.com/th/id/R.3a0bcaa6da63b5306fb8419e078cd4ed?rik=OeGh6gObd5RpDw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"7581152EF3C7D7C49BFA0F6994779B03EAA1E139","accentColor":"A76324"},"98EE0EEF45DD698488A7DBF3FC3CAD0099C621A0":{"name":"Introduction to Topology: Buy Introduction to Topology by Gamelin T.W ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.nrx44rdLLdai05aFHkTz0gHaLG?pid=Api","datePublished":"2021-02-12T16:52:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://rukminim1.flixcart.com/image/832/832/kk1h5e80/book/f/w/a/introduction-to-topology-original-imafzhexzhh9gfhy.jpeg?q=70","hostPageUrl":"https://www.flipkart.com/introduction-to-topology/p/itmf81b4ed2a1a0e","contentSize":"42667 B","width":555,"height":832,"cDNContentUrl":"https://th.bing.com/th/id/R.9ebc78e2b74b2dd6a2d396851e44f3d2?rik=ie7g%2flTdlkiIeg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"0A126C9900DAC3CF3FBD7A884896DD54FEE0EE89","accentColor":"B38E18"},"82BB798B2595A8AF9B055AA539A3D90E31D30158":{"name":"Manufacturer Disclosure Statement For Medical Device Security Standards ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.yRCUhiXOs5ikQOHM1MSCAQAAAA?pid=Api","datePublished":"2019-03-22T21:22:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.pdffiller.com/preview/215/407/215407961.png","hostPageUrl":"https://www.pdffiller.com/215407961-MDS2pdf-Manufacturer-Disclosure-Statement-for-Medical-Device-Security-","contentSize":"76848 B","width":298,"height":386,"cDNContentUrl":"https://th.bing.com/th/id/R.c910948625ceb398a440e1ccd4c48201?rik=KLuXuFJZivq5UA&pid=ImgRaw&r=0","isTransparent":true,"imageId":"85103D13E09D3A935AA550B9FA8A5952B897BB28","accentColor":"0404C7"},"D8FBE285939DE43503A99F314B3EA7824C24D90A":{"name":"Principles of Management - GE3751 - Studocu","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.YFO0Dy-B3MdUH94aIDq__gAAAA?pid=Api","datePublished":"2024-11-05T09:32:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://website-assets.studocu.com/img/document_thumbnails/17e756026e19c0c5b33156a72889d19a/thumb_115_162.png","hostPageUrl":"https://www.studocu.com/in/course/anna-university/principles-of-management/7221201","contentSize":"20285 B","width":115,"height":162,"cDNContentUrl":"https://th.bing.com/th/id/R.6053b40f2f81dcc7541fde1a203abffe?rik=jb8uWDnZTlMwmg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"A09D42C4287AE3B413F99A30534ED939582EBF8D","accentColor":"5C5774"},"811D41111229736994D5081A7E47F4C8C9007739":{"name":"Buy INTRODUCTION TO COMBUSTION: CONCEPTS AND APPLICATIONS , 3RD EDN ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.7DditHWWw4nvecFQjd0qxAHaKC?pid=Api","datePublished":"2024-04-06T20:00:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/71JjNaFOieL._SL1100_.jpg","hostPageUrl":"https://www.amazon.in/INTRODUCTION-COMBUSTION-CONCEPTS-APPLICATIONS-3RD/dp/1259025942","contentSize":"132663 B","width":812,"height":1100,"cDNContentUrl":"https://th.bing.com/th/id/R.ec3762b47596c389ef79c1508ddd2ac4?rik=GNEUESGSN5ZJXQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"9377009C8C4F74E7A1805D49963792211114D118","accentColor":"C58406"},"CFAE5D8DB0AB26269462DBF650FADAA78A3168D8":{"name":"Intro to Debugging Java Web Servers Without Source Code For Security ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.NjD7dgViYjXogM1L5uK5_QHaDu?pid=Api","datePublished":"2024-09-07T21:29:00.0000000Z","isFamilyFriendly":true,"contentUrl":"http://blog.jayateerthag.in/post/img/2024-07-16_intro-to-debugging-java-web-servers-without-source-code-for-security-researchers_4.png","hostPageUrl":"https://blog.jayateerthag.in/post/intro-to-debugging-java-web-servers-without-source-code-for-security-researchers/","contentSize":"217255 B","width":800,"height":403,"cDNContentUrl":"https://th.bing.com/th/id/R.3630fb7605626235e880cd4be6e2b9fd?rik=%2fOrV2Au6YmJJJg&riu=http%3a%2f%2fblog.jayateerthag.in%2fpost%2fimg%2f2024-07-16_intro-to-debugging-java-web-servers-without-source-code-for-security-researchers_4.png&ehk=5iJoBffV5sRx5aF1qtn1xwewG%2bQHaJX7noV%2f%2b26uP64%3d&risl=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"8D8613A87AADAF056FBD26496262BA0BD8D5EAFC","accentColor":"0C74BF"},"932B770EA8CB5F6F41FCF128412043B9B0905036":{"name":"Grade R Objects in Nature Patterns","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.ANyCstAbcR6nBIhciCOghgAAAA?pid=Api","datePublished":"2024-02-21T15:30:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://images.twinkl.co.uk/tw1n/image/private/t_630_eco/image_repo/73/5f/za-hl-1702321109-grade-r-objects-in-nature-patterns_ver_1.jpg","hostPageUrl":"https://www.twinkl.co.in/resource/grade-r-objects-in-nature-patterns-za-hl-1702321109","contentSize":"32910 B","width":474,"height":237,"cDNContentUrl":"https://th.bing.com/th/id/R.00dc82b2d01b711ea704885c8823a086?rik=ObJ34Iq89fYUzw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"6305090B9B340214821FCF14F6F5BC8AE077B239","accentColor":"103A95"},"A3FB1B2A9BDB973F754A2743F55DE769746A0D7F":{"name":"Enhance Your Home Security with Tapo Cameras","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.uFj-BGkfcfbW3q49ETWMlQHaHa?pid=Api","datePublished":"2025-07-23T03:57:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://static.tp-link.com/upload/image-header/01_normal_20230714035517r.png","hostPageUrl":"https://www.tapo.com/in/smart-home/home-security/","contentSize":"154989 B","width":590,"height":590,"cDNContentUrl":"https://th.bing.com/th/id/R.b858fe04691f71f6d6deae3d11358c95?rik=Or%2bxorm9efNXpA&pid=ImgRaw&r=0","isTransparent":true,"imageId":"F7D0A647967ED55F3472A457F379BDB9A2B1BF3A","accentColor":"8DA625"},"7D3E77DE96E1A079BCFA28A5E43B17D7634DE122":{"name":"Introduction To Chemical Engineering By Badger Pdf - Fill Online ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.FQ17ZWctJZRcOBD8BLbSdgAAAA?pid=Api","datePublished":"2022-09-06T10:21:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.pdffiller.com/preview/461/931/461931286.png","hostPageUrl":"https://www.pdffiller.com/461931286--introduction-to-chemical-engineering-badger-pdf-download-","contentSize":"11878 B","width":298,"height":386,"cDNContentUrl":"https://th.bing.com/th/id/R.150d7b65672d25945c3810fc04b6d276?rik=1%2bN37WkeCpfLrw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"221ED4367D71B34E5A82AFCB970A1E69ED77E3D7","accentColor":"0909C2"},"135BCB7B9C9A08F6002F9467327E2401F10E244B":{"name":"Cybersicurezza: Le quattro aree individuate in ambito UE | Cyber ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.ZXTO2xgoIQnzVVLPrOfbOgHaEK?pid=Api","datePublished":"2023-04-22T15:37:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.fondazioneleonardo.com/sites/default/files/styles/meta_image/public/2024-03/IMG_0429.jpg?itok=n9VJinUi","hostPageUrl":"https://www.fondazioneleonardo.com/stories/cybersicurezza-le-quattro-aree-individuate-ambito-ue","contentSize":"127664 B","width":1280,"height":720,"cDNContentUrl":"https://th.bing.com/th/id/R.6574cedb18282109f35552cface7db3a?rik=MbW8t8mpgG8A8g&pid=ImgRaw&r=0","isTransparent":false,"imageId":"B442E01F1042E7237649F2006F80A9C9B7BCB531","accentColor":"13A2B8"},"C0FA7167B576934E10971154824CCCE1B0BFEDAD":{"name":"International Security: A Very Short Introduction (E-Book, PDF) | PERRY ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIF.2sGXO8eROm2lQ14Uw1j97Q?pid=Api","datePublished":"2026-01-26T11:52:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://medien.umbreitkatalog.de/bildzentrale/978/019/164/5617.jpg","hostPageUrl":"https://perry-rhodan.net/shop/item/9780191645617/international-security-a-very-short-introduction-von-christopher-s-browning-e-book-pdf","contentSize":"9421 B","width":127,"height":200,"cDNContentUrl":"https://th.bing.com/th/id/R.92093a2121dbbd32f26a27177676fe19?rik=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"DADEFB0B1ECCC42845117901E439675B7617AF0C","accentColor":"001B53","isFresh":true},"966EF45AC818F9E34A09F3E3BBA73B0731A3561A":{"name":"Buy Introduction to Quantum Mechanics Book Online at Low Prices in ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.k2CMyqileNHDilAc45hrtAHaJt?pid=Api","datePublished":"2018-05-06T12:34:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/61HBnuFYo-L.jpg","hostPageUrl":"https://www.amazon.in/Introduction-Quantum-Mechanics-David-Griffiths/dp/1107189632","contentSize":"89803 B","width":1037,"height":1360,"cDNContentUrl":"https://th.bing.com/th/id/R.93608ccaa8a578d1c38a501ce3986bb4?rik=aeZPpYyBnz6kkA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"A1653A1370B37ABB3E3F90A43E9F818CA54FE669","accentColor":"642324"},"1DFB9F81901F1F9B475B6C6C7FE0DA81190FE392":{"name":"Sample Introduction Of Guest Speaker - Fill Online, Printable, Fillable ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.5J186pktDKPF3VQRSDnIBwAAAA?pid=Api","datePublished":"2022-06-19T15:24:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.pdffiller.com/preview/101/720/101720735.png","hostPageUrl":"https://www.pdffiller.com/101720735-Academic-Introduction-for-Guest-Speakerpdf-introduction-of-guest-speaker-sample-","contentSize":"5024 B","width":298,"height":386,"cDNContentUrl":"https://th.bing.com/th/id/R.e49d7cea992d0ca3c5dd54114839c807?rik=0b%2f5GAnx8bl0tQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"293EF09118AD0EF7C6C6B574B9F1F10918F9BFD1","accentColor":"646667"},"FBC615D5099F4267E1891847A7B256462BCCA834":{"name":"Buy Introduction to Mathematical Statistics Book Online at Low Prices ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.zd-FDcB6sbufrA2FJX9CoAHaKW?pid=Api","datePublished":"2025-06-02T10:08:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/81nL3lVl1fL._SL1500_.jpg","hostPageUrl":"https://www.amazon.in/Introduction-Mathematical-Statistics-Robert-Hogg/dp/0321794710","contentSize":"133468 B","width":1073,"height":1500,"cDNContentUrl":"https://th.bing.com/th/id/R.cddf850dc07ab1bb9fac0d85257f42a0?rik=v2xRXZD5JHYemA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"438ACCB264652B7A7481981E7624F9905D516CBF","accentColor":"1E1E82"},"C27148B3824FCD09B14577D3CF6F81A459750005":{"name":"What 's New in Adobe RoboHelp","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.rkzXFGjqB21wCJtBu1Rv3wHaFI?pid=Api","datePublished":"2018-10-01T13:09:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://helpx-prod.scene7.com/is/image/HelpxProdLoc/pdf-security-settings?$png$&jpegSize=200&wid=904","hostPageUrl":"https://helpx.adobe.com/in/robohelp/using/overview.html","contentSize":"22492 B","width":904,"height":626,"cDNContentUrl":"https://th.bing.com/th/id/R.ae4cd71468ea076d70089b41bb546fdf?rik=LBeEOyj03JAbVA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"500057954A18F6FC3D77541B90DCF4283B84172C","accentColor":"1A5FB1"},"956736EC12D35D01105EDE0574F238B6E0FD2C72":{"name":"Buy An Introduction to R: Data Analysis and Visualization Book Online ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.z4k4Xw5PnoYJiWZ5RPidEQAAAA?pid=Api","datePublished":"2022-11-17T03:25:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/410FTZAsZqL._SY445_SX342_.jpg","hostPageUrl":"https://www.amazon.in/Introduction-Analysis-Visualization-Research-Skills/dp/1784273384","contentSize":"16701 B","width":311,"height":445,"cDNContentUrl":"https://th.bing.com/th/id/R.cf89385f0e4f9e860989667944f89d11?rik=WXZjziE91RAB5Q&pid=ImgRaw&r=0","isTransparent":false,"imageId":"27C2DF0E6B832F4750EDE50110D53D21CE637659","accentColor":"998B32"},"F5AAACA7307A292EFCC677B6DD27895767E21DD7":{"name":"Get CCTV Camera for Home and Office Security | Airtel Xsafe","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.c4HIkXCkrX438RpnO1FfGwHaTs?pid=Api","datePublished":"2023-09-27T04:24:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://assets.airtel.in/static-assets/b2c-surveillance/images/cms_pages/mobile_intro@2x.png","hostPageUrl":"https://www.airtel.in/xsafe/cctv-camera","contentSize":"702011 B","width":752,"height":2000,"cDNContentUrl":"https://th.bing.com/th/id/R.7381c89170a4ad7e37f11a673b515f1b?rik=X6rKegOnkuLPbA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"7DD12E76759872DD6B776CCFE292A7037ACAAA5F","accentColor":"5C6F61"},"5AEB3D88C87B83B5A18BDBF650FADAA78A3168D8":{"name":"Intro to Debugging Java Web Servers Without Source Code For Security ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.epIU4lp-JSb4tcGQHQS3_gHaE7?pid=Api","datePublished":"2024-09-07T21:29:00.0000000Z","isFamilyFriendly":true,"contentUrl":"http://blog.jayateerthag.in/post/img/2024-07-16_intro-to-debugging-java-web-servers-without-source-code-for-security-researchers_5.png","hostPageUrl":"https://blog.jayateerthag.in/post/intro-to-debugging-java-web-servers-without-source-code-for-security-researchers/","contentSize":"349504 B","width":800,"height":532,"cDNContentUrl":"https://th.bing.com/th/id/R.7a9214e25a7e2526f8b5c1901d04b7fe?rik=pb7TiIy3OFsauA&riu=http%3a%2f%2fblog.jayateerthag.in%2fpost%2fimg%2f2024-07-16_intro-to-debugging-java-web-servers-without-source-code-for-security-researchers_5.png&ehk=wN1ZQte%2bJPFnMMKy99%2bNObMeoK5rGnTxB6dtceeVzyQ%3d&risl=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"8D8613A87AADAF056FBDB81A5B38B78C88D3BEA5","accentColor":"AB2024"},"F2DE32B14AEBDBDF1CDDDBF650FADAA78A3168D8":{"name":"Intro to Debugging Java Web Servers Without Source Code For Security ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.8OZm_XEjvAX4kali5zQHwgHaD8?pid=Api","datePublished":"2024-09-07T21:29:00.0000000Z","isFamilyFriendly":true,"contentUrl":"http://blog.jayateerthag.in/post/img/2024-07-16_intro-to-debugging-java-web-servers-without-source-code-for-security-researchers_0.png","hostPageUrl":"https://blog.jayateerthag.in/post/intro-to-debugging-java-web-servers-without-source-code-for-security-researchers/","contentSize":"159027 B","width":800,"height":426,"cDNContentUrl":"https://th.bing.com/th/id/R.f0e666fd7123bc05f891a962e73407c2?rik=L%2b0jG6S%2bvf3B3Q&riu=http%3a%2f%2fblog.jayateerthag.in%2fpost%2fimg%2f2024-07-16_intro-to-debugging-java-web-servers-without-source-code-for-security-researchers_0.png&ehk=nLsDrx5ovPu%2b3R%2fNBTLBFIrqEdYQhBZYU7zGowxBFAk%3d&risl=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"8D8613A87AADAF056FBDDDC1FDBDBEA41B23ED2F","accentColor":"763439"},"21CB5FA3EF0C357B49E2EAFB6A4C7B4CBE49D20E":{"name":"Buy Introduction to Unconstrained Optimization with R Book Online at ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.FkSoxqGeJHhpecHCLC7OiAAAAA?pid=Api","datePublished":"2024-08-14T11:05:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/41O7KQJZM1L._SY445_SX342_.jpg","hostPageUrl":"https://www.amazon.in/Introduction-Unconstrained-Optimization-Shashi-Mishra/dp/9811508933","contentSize":"13444 B","width":295,"height":445,"cDNContentUrl":"https://th.bing.com/th/id/R.1644a8c6a19e24786979c1c22c2ece88?rik=Erz1Ov7AU7eULg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E02D94EBC4B7C4A6BFAE2E94B753C0FE3AF5BC12","accentColor":"B31C0E"},"05F73F825AECE47C0444693B7E491A3566FF7291":{"name":"Secrets and Codes: Intro to Encryption - Cyber Security and Ethical ...","thumbnailUrl":"https://tse3.mm.bing.net/th?id=OIF.GSSzcL3VcIiZOROyD%2bvR1Q&pid=Api","datePublished":"2026-01-24T07:02:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://cn.edurev.in/cdn_lib/v13/lib/img/content/cal.png","hostPageUrl":"https://d.edurev.in/t/481037/Secrets-and-Codes-Intro-to-Encryption","contentSize":"2428 B","width":132,"height":132,"cDNContentUrl":"https://th.bing.com/th/id/R.0c3b668c0816d97e89c75b65baddc452?rik=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"1927FF6653A194E7B3964440C74ECEA528F37F50","accentColor":"C90229","isFresh":true},"51F5CA83BE1C456C0FD8AA8499F6D5707BF1F536":{"name":"HP EliteBook 6 G1a 14 inch Notebook Next Gen AI PC specifications | HP ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.5LN5g2jqWysFvldz_r1M3QHaGE?pid=Api","datePublished":"2025-07-25T04:41:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://kaas.hpcloud.hp.com/PROD/v2/renderbinary/12312658/12311900/com-win-nb-p-elitebook-g1a-ngai-waffle14n-product-specifications/com-nb-elitebook-g1a-waffle-product-image","hostPageUrl":"https://support.hp.com/in-en/document/ish_12312658-12312636-16","contentSize":"47396 B","width":500,"height":410,"cDNContentUrl":"https://th.bing.com/th/id/R.e4b3798368ea5b2b05be5773febd4cdd?rik=FV%2bsOOvBVMbwjQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"635F1FB7075D6F9948AA8DF0C654C1EB38AC5F15","accentColor":"047EC7"},"E7E26719E3D8F759683830DFA361F03674A37989":{"name":"How to Unlock Password-protected PDF Online the Easy Way","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.W0_whFGNzV8VPZ4mXrxg5wHaEK?pid=Api","datePublished":"2025-04-15T15:18:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://images.wondershare.com/drfone/article/2025/05/how-to-open-a-password-protected-pdf-01.jpg","hostPageUrl":"https://drfone.wondershare.com/pdf-unlock/pdf-remove-password-online-free.html","contentSize":"20848 B","width":624,"height":351,"cDNContentUrl":"https://th.bing.com/th/id/R.5b4ff084518dcd5f153d9e265ebc60e7?rik=fi52kT6Nf5WGgw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"98973A47630F163AFD038386957F8D3E91762E7E","accentColor":"B41917"},"46942CE58D40DC6BFD86B24DAF75A8F9CAACC50B":{"name":"INTRODUCTION TO ELECTRIC CIRCUITS (6th Ed.) 6 Edition - Buy ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.bzMaGvsd5AGiHYIFJzuvqQHaJr?pid=Api","datePublished":"2018-04-09T08:23:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://rukminim1.flixcart.com/image/1408/1408/book/1/7/4/introduction-to-electric-circuits-6th-ed-original-imae5x5gsga75bwm.jpeg?q=90","hostPageUrl":"https://www.flipkart.com/introduction-electric-circuits-6th-ed-6/p/itmdwua2qzy7bpb8","contentSize":"316533 B","width":1077,"height":1408,"cDNContentUrl":"https://th.bing.com/th/id/R.6f331a1afb1de401a21d8205273bafa9?rik=ZEnCXtgEzbbfaA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"B05CCAAC9F8A57FAD42B68DFB6CD04D85EC24964","accentColor":"460405"},"8F44E8E6CEDF6927D81F5A872DEBAC6FE8EEE2B3":{"name":"DBMS : Characteristics","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.ODhA61SNYSgbY5NejXg0HQHaEn?pid=Api","datePublished":"2020-12-10T06:12:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://minigranth.in/images/tutorials/DBMS%20IMAGES/DBMS%20Characteristics.jpeg","hostPageUrl":"https://minigranth.in/dbms-tutorial/dbms-introduction","contentSize":"29259 B","width":666,"height":415,"cDNContentUrl":"https://th.bing.com/th/id/R.383840eb548d61281b63935e8d78341d?rik=%2bESObuz9lnKN8Q&pid=ImgRaw&r=0","isTransparent":false,"imageId":"3B2EEE8EF6CABED278A5F18D7296FDEC6E8E44F8","accentColor":"9D2E30"},"DD3252910CAF89CF919DD830419E91A49519E665":{"name":"Buy Introduction to Hospitality Management Book Online at Low Prices in ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.j14ZPUvKbzAEzlbG8lKquwHaJ4?pid=Api","datePublished":"2016-01-07T12:00:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/919hXPE98dL._SL1500_.jpg","hostPageUrl":"https://www.amazon.in/Introduction-Hospitality-Management-John-Walker/dp/0134151909","contentSize":"148639 B","width":1125,"height":1500,"cDNContentUrl":"https://th.bing.com/th/id/R.8f5e193d4bca6f3004ce56c6f252aabb?rik=3SMlGcD6mPwZ2Q&pid=ImgRaw&r=0","isTransparent":false,"imageId":"566E91594A19E914038DD919FC98FAC0192523DD","accentColor":"A57926"},"0C4E9362877047EEC61E59BED215BA7F84BA6350":{"name":"Security Survey Template - Fill and Sign Printable Template Online","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.3g1i3zfgNNT2wUnDWCGCmgAAAA?pid=Api","datePublished":"2021-07-29T00:28:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.pdffiller.com/preview/424/803/424803078.png","hostPageUrl":"https://www.uslegalforms.com/form-library/497629-security-survey-template","contentSize":"10626 B","width":298,"height":386,"cDNContentUrl":"https://th.bing.com/th/id/R.de0d62df37e034d4f6c149c35821829a?rik=wOQ5JngHdO5s4Q&pid=ImgRaw&r=0","isTransparent":false,"imageId":"0536AB48F7AB512DEB95E16CEE7407782639E4C0","accentColor":"4E4E4E"}},"relatedSearches":[{"text":"Introduction to Computer Security PDF","displayText":"Introduction to Computer Security PDF","webSearchUrl":"https://www.bing.com/images/search?q=Introduction+to+Computer+Security+PDF&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5834.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Introduction+to+Computer+Security+PDF","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Introduction+to+Computer+Security+PDF&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Introduction to Cyber Security","displayText":"Introduction to Cyber Security","webSearchUrl":"https://www.bing.com/images/search?q=Introduction+to+Cyber+Security&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5836.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Introduction+to+Cyber+Security","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Introduction+to+Cyber+Security&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Network Security PDF","displayText":"Network Security PDF","webSearchUrl":"https://www.bing.com/images/search?q=Network+Security+PDF&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5838.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Network+Security+PDF","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Network+Security+PDF&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Information Security PDF","displayText":"Information Security PDF","webSearchUrl":"https://www.bing.com/images/search?q=Information+Security+PDF&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5840.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Information+Security+PDF","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Information+Security+PDF&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Introduction to Internet Security PDF","displayText":"Introduction to Internet Security PDF","webSearchUrl":"https://www.bing.com/images/search?q=Introduction+to+Internet+Security+PDF&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5842.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Introduction+to+Internet+Security+PDF","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Introduction+to+Internet+Security+PDF&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Introduction to It Security","displayText":"Introduction to It Security","webSearchUrl":"https://www.bing.com/images/search?q=Introduction+to+It+Security&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5844.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Introduction+to+It+Security","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Introduction+to+It+Security&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Introduction to Security Awareness","displayText":"Introduction to Security Awareness","webSearchUrl":"https://www.bing.com/images/search?q=Introduction+to+Security+Awareness&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5846.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Introduction+to+Security+Awareness","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Introduction+to+Security+Awareness&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Information Security and Cyber Law","displayText":"Information Security and Cyber Law","webSearchUrl":"https://www.bing.com/images/search?q=Information+Security+and+Cyber+Law&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5848.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Information+Security+and+Cyber+Law","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Information+Security+and+Cyber+Law&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Security in Computing PDF","displayText":"Security in Computing PDF","webSearchUrl":"https://www.bing.com/images/search?q=Security+in+Computing+PDF&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5850.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Security+in+Computing+PDF","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Security+in+Computing+PDF&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Introduction to Information Security Book","displayText":"Introduction to Information Security Book","webSearchUrl":"https://www.bing.com/images/search?q=Introduction+to+Information+Security+Book&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5852.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Introduction+to+Information+Security+Book","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Introduction+to+Information+Security+Book&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Introduction to Hardware Security","displayText":"Introduction to Hardware Security","webSearchUrl":"https://www.bing.com/images/search?q=Introduction+to+Hardware+Security&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5854.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Introduction+to+Hardware+Security","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Introduction+to+Hardware+Security&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Basic Computer Security","displayText":"Basic Computer Security","webSearchUrl":"https://www.bing.com/images/search?q=Basic+Computer+Security&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5856.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Basic+Computer+Security","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Basic+Computer+Security&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Introduction to Security Management","displayText":"Introduction to Security Management","webSearchUrl":"https://www.bing.com/images/search?q=Introduction+to+Security+Management&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5858.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Introduction+to+Security+Management","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Introduction+to+Security+Management&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Introduction to Security Controls","displayText":"Introduction to Security Controls","webSearchUrl":"https://www.bing.com/images/search?q=Introduction+to+Security+Controls&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5860.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Introduction+to+Security+Controls","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Introduction+to+Security+Controls&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Leter of Introduction Security","displayText":"Leter of Introduction Security","webSearchUrl":"https://www.bing.com/images/search?q=Leter+of+Introduction+Security&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5862.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Leter+of+Introduction+Security","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Leter+of+Introduction+Security&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Introduction to Security Procedures","displayText":"Introduction to Security Procedures","webSearchUrl":"https://www.bing.com/images/search?q=Introduction+to+Security+Procedures&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5864.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Introduction+to+Security+Procedures","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Introduction+to+Security+Procedures&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"PDF Security 101 Introduction to Private Security Carolina Press","displayText":"PDF Security 101 Introduction to Private Security Carolina Press","webSearchUrl":"https://www.bing.com/images/search?q=PDF+Security+101+Introduction+to+Private+Security+Carolina+Press&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5866.1","searchLink":"https://www.bing.com/api/v7/images/search?q=PDF+Security+101+Introduction+to+Private+Security+Carolina+Press","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=PDF+Security+101+Introduction+to+Private+Security+Carolina+Press&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Introduction OT Security","displayText":"Introduction OT Security","webSearchUrl":"https://www.bing.com/images/search?q=Introduction+OT+Security&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5868.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Introduction+OT+Security","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Introduction+OT+Security&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Introduction to Code Security","displayText":"Introduction to Code Security","webSearchUrl":"https://www.bing.com/images/search?q=Introduction+to+Code+Security&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5870.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Introduction+to+Code+Security","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Introduction+to+Code+Security&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Cyber Security Policy PDF","displayText":"Cyber Security Policy PDF","webSearchUrl":"https://www.bing.com/images/search?q=Cyber+Security+Policy+PDF&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5872.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Cyber+Security+Policy+PDF","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Cyber+Security+Policy+PDF&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Introduction of Digital Security","displayText":"Introduction of Digital Security","webSearchUrl":"https://www.bing.com/images/search?q=Introduction+of+Digital+Security&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5874.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Introduction+of+Digital+Security","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Introduction+of+Digital+Security&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Cyber Security Framework PDF","displayText":"Cyber Security Framework PDF","webSearchUrl":"https://www.bing.com/images/search?q=Cyber+Security+Framework+PDF&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5876.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Cyber+Security+Framework+PDF","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Cyber+Security+Framework+PDF&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Introduction to Device Security","displayText":"Introduction to Device Security","webSearchUrl":"https://www.bing.com/images/search?q=Introduction+to+Device+Security&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5878.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Introduction+to+Device+Security","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Introduction+to+Device+Security&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Introduction to Information Security 1 Chapter Explain in Gujarati Language PDF","displayText":"Introduction to Information Security 1 Chapter Explain in Gujarati Language PDF","webSearchUrl":"https://www.bing.com/images/search?q=Introduction+to+Information+Security+1+Chapter+Explain+in+Gujarati+Language+PDF&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5880.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Introduction+to+Information+Security+1+Chapter+Explain+in+Gujarati+Language+PDF","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Introduction+to+Information+Security+1+Chapter+Explain+in+Gujarati+Language+PDF&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Assignment Introduction for Security Photo","displayText":"Assignment Introduction for Security Photo","webSearchUrl":"https://www.bing.com/images/search?q=Assignment+Introduction+for+Security+Photo&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5882.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Assignment+Introduction+for+Security+Photo","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Assignment+Introduction+for+Security+Photo&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Great Introduction to Security","displayText":"Great Introduction to Security","webSearchUrl":"https://www.bing.com/images/search?q=Great+Introduction+to+Security&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5884.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Great+Introduction+to+Security","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Great+Introduction+to+Security&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Introduction to Network Security Basics","displayText":"Introduction to Network Security Basics","webSearchUrl":"https://www.bing.com/images/search?q=Introduction+to+Network+Security+Basics&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5886.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Introduction+to+Network+Security+Basics","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Introduction+to+Network+Security+Basics&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Introduction to Security Guarding","displayText":"Introduction to Security Guarding","webSearchUrl":"https://www.bing.com/images/search?q=Introduction+to+Security+Guarding&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5888.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Introduction+to+Security+Guarding","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Introduction+to+Security+Guarding&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Fundamentals of Network Security","displayText":"Fundamentals of Network Security","webSearchUrl":"https://www.bing.com/images/search?q=Fundamentals+of+Network+Security&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5890.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Fundamentals+of+Network+Security","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Fundamentals+of+Network+Security&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Security Team Introduction","displayText":"Security Team Introduction","webSearchUrl":"https://www.bing.com/images/search?q=Security+Team+Introduction&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5892.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Security+Team+Introduction","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Security+Team+Introduction&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Intro to Cyber Security","displayText":"Intro to Cyber Security","webSearchUrl":"https://www.bing.com/images/search?q=Intro+to+Cyber+Security&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5894.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Intro+to+Cyber+Security","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Intro+to+Cyber+Security&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Information Technology Security PDF","displayText":"Information Technology Security PDF","webSearchUrl":"https://www.bing.com/images/search?q=Information+Technology+Security+PDF&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5896.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Information+Technology+Security+PDF","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Information+Technology+Security+PDF&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Ontariotech IT Security Course PDF","displayText":"Ontariotech IT Security Course PDF","webSearchUrl":"https://www.bing.com/images/search?q=Ontariotech+IT+Security+Course+PDF&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5898.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Ontariotech+IT+Security+Course+PDF","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Ontariotech+IT+Security+Course+PDF&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Introduction to Information Assurance and Security","displayText":"Introduction to Information Assurance and Security","webSearchUrl":"https://www.bing.com/images/search?q=Introduction+to+Information+Assurance+and+Security&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5900.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Introduction+to+Information+Assurance+and+Security","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Introduction+to+Information+Assurance+and+Security&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Introduction to Security and Loss Prevention","displayText":"Introduction to Security and Loss Prevention","webSearchUrl":"https://www.bing.com/images/search?q=Introduction+to+Security+and+Loss+Prevention&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5902.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Introduction+to+Security+and+Loss+Prevention","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Introduction+to+Security+and+Loss+Prevention&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Principles of Computer Security","displayText":"Principles of Computer Security","webSearchUrl":"https://www.bing.com/images/search?q=Principles+of+Computer+Security&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5904.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Principles+of+Computer+Security","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Principles+of+Computer+Security&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Types of Computer Security PDF","displayText":"Types of Computer Security PDF","webSearchUrl":"https://www.bing.com/images/search?q=Types+of+Computer+Security+PDF&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5906.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Types+of+Computer+Security+PDF","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Types+of+Computer+Security+PDF&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Cyber Security Free PDF Download","displayText":"Cyber Security Free PDF Download","webSearchUrl":"https://www.bing.com/images/search?q=Cyber+Security+Free+PDF+Download&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5908.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Cyber+Security+Free+PDF+Download","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Cyber+Security+Free+PDF+Download&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Introduction to Security Clip Art","displayText":"Introduction to Security Clip Art","webSearchUrl":"https://www.bing.com/images/search?q=Introduction+to+Security+Clip+Art&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5910.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Introduction+to+Security+Clip+Art","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Introduction+to+Security+Clip+Art&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Introduction of Security Company","displayText":"Introduction of Security Company","webSearchUrl":"https://www.bing.com/images/search?q=Introduction+of+Security+Company&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5912.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Introduction+of+Security+Company","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Introduction+of+Security+Company&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Self Introduction for Interview with Cyber Security Note Book","displayText":"Self Introduction for Interview with Cyber Security Note Book","webSearchUrl":"https://www.bing.com/images/search?q=Self+Introduction+for+Interview+with+Cyber+Security+Note+Book&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5914.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Self+Introduction+for+Interview+with+Cyber+Security+Note+Book","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Self+Introduction+for+Interview+with+Cyber+Security+Note+Book&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Introduction an Over View On Cyber Security","displayText":"Introduction an Over View On Cyber Security","webSearchUrl":"https://www.bing.com/images/search?q=Introduction+an+Over+View+On+Cyber+Security&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5916.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Introduction+an+Over+View+On+Cyber+Security","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Introduction+an+Over+View+On+Cyber+Security&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Cyber Security Introduction Paragraph","displayText":"Cyber Security Introduction Paragraph","webSearchUrl":"https://www.bing.com/images/search?q=Cyber+Security+Introduction+Paragraph&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5918.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Cyber+Security+Introduction+Paragraph","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Cyber+Security+Introduction+Paragraph&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Introduuction to Cyber Security PDF","displayText":"Introduuction to Cyber Security PDF","webSearchUrl":"https://www.bing.com/images/search?q=Introduuction+to+Cyber+Security+PDF&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5920.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Introduuction+to+Cyber+Security+PDF","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Introduuction+to+Cyber+Security+PDF&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Introduction for Security Concepts","displayText":"Introduction for Security Concepts","webSearchUrl":"https://www.bing.com/images/search?q=Introduction+for+Security+Concepts&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5922.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Introduction+for+Security+Concepts","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Introduction+for+Security+Concepts&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Information Security Textbook PDF","displayText":"Information Security Textbook PDF","webSearchUrl":"https://www.bing.com/images/search?q=Information+Security+Textbook+PDF&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5924.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Information+Security+Textbook+PDF","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Information+Security+Textbook+PDF&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Introduction to Information Security Cert","displayText":"Introduction to Information Security Cert","webSearchUrl":"https://www.bing.com/images/search?q=Introduction+to+Information+Security+Cert&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5926.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Introduction+to+Information+Security+Cert","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Introduction+to+Information+Security+Cert&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Introduction to It Security Threats","displayText":"Introduction to It Security Threats","webSearchUrl":"https://www.bing.com/images/search?q=Introduction+to+It+Security+Threats&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5928.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Introduction+to+It+Security+Threats","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Introduction+to+It+Security+Threats&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Conclusion Introduction to Information Security","displayText":"Conclusion Introduction to Information Security","webSearchUrl":"https://www.bing.com/images/search?q=Conclusion+Introduction+to+Information+Security&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5930.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Conclusion+Introduction+to+Information+Security","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Conclusion+Introduction+to+Information+Security&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Introduction to Computer Security Text","displayText":"Introduction to Computer Security Text","webSearchUrl":"https://www.bing.com/images/search?q=Introduction+to+Computer+Security+Text&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5932.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Introduction+to+Computer+Security+Text","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Introduction+to+Computer+Security+Text&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}}],"createdate":1769611489800}
[curl_error] =>
[product_name_used] => Introduction-To-Security-Pdf
[parsed] => Array
(
[name] => introduction-to-security-pdf inr loc:in
[totalEstimatedMatches] => 305
[nextOffset] => 120
[currentOffset] => 0
[value] => Array
(
[FEAB8B0927608CA6D1E6D68152D5963E4008CC97] => Array
(
[name] => Buy PT INR Log Book Printable, Inr Tracker, INR Anticoagulant ...
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.Nl3LmTtT2zWIfO6zaPl46QAAAA?pid=Api
[datePublished] => 2022-03-10T14:45:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://i.etsystatic.com/31451663/r/il/f96a3b/3342764419/il_300x300.3342764419_9yil.jpg
[hostPageUrl] => https://www.etsy.com/in-en/listing/1075090759/pt-inr-log-book-printable-inr-tracker
[contentSize] => 11955 B
[width] => 300
[height] => 300
[cDNContentUrl] => https://th.bing.com/th/id/R.365dcb993b53db35887ceeb368f978e9?rik=77q4kHIGyGodbg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 79CC8004E3695D25186D6E1D6AC8067290B8BAEF
[accentColor] => 7E4D57
)
[CE7688F40F17E6551782121C85853EB1F34871FC] => Array
(
[name] => Introduction to Cyber Security : Guide to the World of Cyber Security ...
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.10xh9rxeuSZG3zdEp4FC7wHaLJ?pid=Api
[datePublished] => 2021-04-10T15:06:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/719IgY3pSdL._SL1200_.jpg
[hostPageUrl] => https://www.amazon.in/Introduction-Cyber-Security-Guide-World-ebook/dp/B08XPRF87B
[contentSize] => 146530 B
[width] => 797
[height] => 1200
[cDNContentUrl] => https://th.bing.com/th/id/R.d74c61f6bc5eb92646df3744a78142ef?rik=7GeIT%2fBxblVxKA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => CF17843F1BE35858C1212871556E71F04F8867EC
[accentColor] => B01B20
)
[72CE11320DEDAE9E35B134487DCDEC7BC24FEDFE] => Array
(
[name] => CCS Unit I Notes - INTRODUCTION TO SECURITY Syllabus Computer Security ...
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.NG9PxvQ85KzVDlwjw8R0owHaJl?pid=Api
[datePublished] => 2024-08-30T14:25:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/f76b3c5846cda5a141bfd5f7c04f22ab/thumb_1200_1553.png
[hostPageUrl] => https://www.studocu.com/in/document/ksr-college-of-arts-and-science-for-women/cyber-security/ccs-unit-i-notes/98645224
[contentSize] => 235962 B
[width] => 1200
[height] => 1553
[cDNContentUrl] => https://th.bing.com/th/id/R.346f4fc6f43ce4acd50e5c23c3c474a3?rik=J%2bwRI9De6ulTGw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => EFDEF42CB7CEDCD784431B53E9EADED02311EC27
[accentColor] => 3D3D3D
)
[8FC5E81C7992F49AD20C8B63F7EC0B2E36726A1D] => Array
(
[name] => Introduction to Cyber Security - Introduction to Cyber Security ...
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.1SLeffOr54MrEo4pWmu17QHaEL?pid=Api
[datePublished] => 2024-07-08T00:39:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/952c46c003341f4ab960f4a9b99e5d5e/thumb_1200_676.png
[hostPageUrl] => https://www.studocu.com/in/document/shetty-institute-of-technology/design-analysis-algorithm/introduction-to-cyber-security/98356481
[contentSize] => 995897 B
[width] => 1200
[height] => 676
[cDNContentUrl] => https://th.bing.com/th/id/R.d522de7df3abe7832b128e295a6bb5ed?rik=%2bFyOwZcpT6ktwA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => D1A62763E2B0CE7F36B8C02DA94F2997C18E5CF8
[accentColor] => A28829
)
[0903E155495CC1866B01F1DE60DB957C4759C6CD] => Array
(
[name] => Introduction to Information Security and Cyber Laws eBook : Surya ...
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.2ZwWhHOE3mjsP-A--4ieuAAAAA?pid=Api
[datePublished] => 2020-10-04T13:58:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/51WhL+-WSeL.jpg
[hostPageUrl] => https://www.amazon.in/Introduction-Information-Security-Cyber-Laws-ebook/dp/B0789DLW1P
[contentSize] => 34274 B
[width] => 385
[height] => 500
[cDNContentUrl] => https://th.bing.com/th/id/R.d99c16847384de68ec3fe03efb889eb8?rik=kDAeVZTFHGi2EA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => DC6C9574C759BD06ED1F10B6681CC594551E3090
[accentColor] => B9121B
)
[4C0E252DFB8AA47CEFA148530B668B56E2E69BAB] => Array
(
[name] => 12. Introduction to Security Assessments | Rootkid - Cyber Journal
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.kbnzLjDegjvRkZ1Hc_IpJwHaD4?pid=Api
[datePublished] => 2025-02-15T17:43:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://blog.rootkid.in/~gitbook/ogimage/iR7yu6VczDGEI6SBQGOE
[hostPageUrl] => https://blog.rootkid.in/exam-prep-notes/klcp-exam-pen-103-notes/12.-introduction-to-security-assessments
[contentSize] => 190327 B
[width] => 1200
[height] => 630
[cDNContentUrl] => https://th.bing.com/th/id/R.91b9f32e30de823bd1919d4773f22927?rik=xOBS0r%2boSsf%2bGg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => BAB96E2E65B866B035841AFEC74AA8BFD252E0C4
[accentColor] => 1E4FAD
)
[0C37E72A0411D546336F9BEE0C2EC7CBDB8AF4DC] => Array
(
[name] => Introduction to Security eBook : Fischer Ph.D., Robert, Halibozek MBA ...
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.eLHZn3shYiOmx4X6f6dFngAAAA?pid=Api
[datePublished] => 2018-10-17T12:00:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/5121E0bLLXL._SY445_SX342_.jpg
[hostPageUrl] => https://www.amazon.in/Introduction-Security-Robert-Fischer-ebook/dp/B07JN3RNKD
[contentSize] => 37680 B
[width] => 333
[height] => 445
[cDNContentUrl] => https://th.bing.com/th/id/R.78b1d99f7b216223a6c785fa7fa7459e?rik=wHN%2bokARXWQz9g&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => CD4FA8BDBC7CE2C0EEB9F633645D1140A27E73C0
[accentColor] => A5262C
)
[3BA60C3F9BB2D013B76C67144F21C1C58B60BD98] => Array
(
[name] => Cyber Security Book | Fundamental Of Cyber Security eBook | Information ...
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.qc8xOa-nFCXjA5_fc-a5RAHaLO?pid=Api
[datePublished] => 2021-03-16T00:17:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://in.bpbonline.com/cdn/shop/products/Screen_Shot_2017-08-19_at_16.09.37_32b4fe1d-25c2-4d3b-9bd4-8180f28f4a9b_800x.png?v=1583313006
[hostPageUrl] => https://in.bpbonline.com/products/fundamentals-of-cyber-security-book-ebook
[contentSize] => 561656 B
[width] => 800
[height] => 1212
[cDNContentUrl] => https://th.bing.com/th/id/R.a9cf3139afa71425e3039fdf73e6b944?rik=s2rA87krDTF7xg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 89DB06B85C1C12F44176C67B310D2BB9F3C06AB3
[accentColor] => 009ACC
)
[92335729B8B49A264905DCBF2FBA0A883B0A1A5A] => Array
(
[name] => Introduction to Cyber Security eBook : Aslam, Amin: Amazon.in: Kindle Store
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.upkf8e5Lqx0puosw0N6EcgAAAA?pid=Api
[datePublished] => 2023-03-29T13:24:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/41ztsvy2YuL._SY445_SX342_.jpg
[hostPageUrl] => https://www.amazon.in/Introduction-Cyber-Security-Amin-Aslam-ebook/dp/B0BSDJRFLF
[contentSize] => 15856 B
[width] => 315
[height] => 445
[cDNContentUrl] => https://th.bing.com/th/id/R.ba991ff1ee4bab1d29ba8b30d0de8472?rik=KTN1kotLqWKUUA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => A5A1A0B388A0ABF2FBCD509462A94B8B92753329
[accentColor] => 0EA7BD
)
[14FE164C6E0E23C8620FC10356F676F89E8093AB] => Array
(
[name] => Buy An Introduction To Cyber Security: The Complete Guidance For ...
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.FwUvIu9gdhbfvxTL00o-RwHaLG?pid=Api
[datePublished] => 2023-04-27T04:24:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/71Qn7TW+NTS.jpg
[hostPageUrl] => https://www.desertcart.in/products/366932499-an-introduction-to-cyber-security-the-complete-guidance-for-beginners-conclusion-of-cyber-security
[contentSize] => 142502 B
[width] => 907
[height] => 1360
[cDNContentUrl] => https://th.bing.com/th/id/R.17052f22ef607616dfbf14cbd34a3e47?rik=Qe9hxObgMowm8A&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => BA3908E98F676F65301CF0268C32E0E6C461EF41
[accentColor] => 2A83A1
)
[51F8C1978BC6E48D1666528E2978DFF3E537A33B] => Array
(
[name] => Unit 5 college - unit 5 cyber security - UNIT 5 CYBER SECURITY ...
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.ozxH9c-KHQyU-yYD76iDKgHaJl?pid=Api
[datePublished] => 2024-08-29T09:38:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/0374e1f831a948dc30314590cc195741/thumb_1200_1553.png
[hostPageUrl] => https://www.studocu.com/in/document/dr-apj-abdul-kalam-technical-university/btech/unit-5-college-unit-5-cyber-security/102011195
[contentSize] => 309868 B
[width] => 1200
[height] => 1553
[cDNContentUrl] => https://th.bing.com/th/id/R.a33c47f5cf8a1d0c94fb2603efa8832a?rik=FY8cebhsTthhZg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => B33A735E3FFD8792E8256661D84E6CB8791C8F15
[accentColor] => 505357
)
[108C6CB00A9030761264AF63C0993EB2BEAC9F4A] => Array
(
[name] => Buy Introduction to Network Security with CD Book Online at Low Prices ...
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.fa4oYUC7VIwrTqse_n_nDgAAAA?pid=Api
[datePublished] => 2017-11-30T03:28:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/31JlcRHSEYL.jpg
[hostPageUrl] => https://www.amazon.in/Introduction-Network-Security-Neal-Krawetz/dp/8131502481
[contentSize] => 12799 B
[width] => 300
[height] => 300
[cDNContentUrl] => https://th.bing.com/th/id/R.7dae286140bb548c2b4eab1efe7fe70e?rik=AcjGC6AJA2chRg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => A4F9CAEB2BE3990C36FA4621670309A00BC6C801
[accentColor] => B11A1D
)
[7D4D443630B83F99A42A21A0F38D663A94A0D335] => Array
(
[name] => Introduction to Security and Privacy in Cloud Computing : Edris Hamraz ...
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.CkyZ6i3uLkjP8K2ilQwozwAAAA?pid=Api
[datePublished] => 2024-05-25T22:29:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/41qrOm2qA2L._SX342_SY445_.jpg
[hostPageUrl] => https://www.amazon.in/Introduction-Security-Privacy-Cloud-Computing/dp/6139475120
[contentSize] => 14466 B
[width] => 342
[height] => 250
[cDNContentUrl] => https://th.bing.com/th/id/R.0a4c99ea2dee2e48cff0ada2950c28cf?rik=19REYwOL85lKog&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 533D0A49A366D83F0A12A24A99F38B036344D4D7
[accentColor] => 931A22
)
[EED91319F5EA3043E64BC4D2F0FD7DC817CE519B] => Array
(
[name] => Buy INTRODUCTION TO INFORMATION SECURITY-A STRATEGIC BASED APPROACH ...
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.aZYfFWZL7FL1Kv-SXtRCtQAAAA?pid=Api
[datePublished] => 2024-12-11T23:10:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/31XtsMSNd4L.jpg
[hostPageUrl] => https://www.amazon.in/INTRODUCTION-INFORMATION-SECURITY-STRATEGIC-APPROACH/dp/9351071928
[contentSize] => 12157 B
[width] => 295
[height] => 417
[cDNContentUrl] => https://th.bing.com/th/id/R.69961f15664bec52f52aff925ed442b5?rik=7p0xkV%2buAzRutA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => B915EC718CD7DF0F2D4CB46E3403AE5F91319DEE
[accentColor] => 011E46
)
[5EA8EB65A7281122262C3BAD09F77F1187A1C318] => Array
(
[name] => Introduction to Cyber Security pages 143: MALWARE AND ITS TYPE ...
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.xqFlVlpXKEPL1hoEIHSbnQHaEK?pid=Api
[datePublished] => 2025-07-24T22:00:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/71WoIoAqa+L._SL1500_.jpg
[hostPageUrl] => https://www.amazon.in/Introduction-Cyber-Security-pages-143-ebook/dp/B0B6GW2MCD
[contentSize] => 138044 B
[width] => 1500
[height] => 844
[cDNContentUrl] => https://th.bing.com/th/id/R.c6a165565a572843cbd61a0420749b9d?rik=5Yq%2bVnqCESJiwg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 813C1A7811F77F90DAB3C2622211827A56BE8AE5
[accentColor] => 011725
)
[027F94EABAEDD785A16A8A7177150E50A9F9C7C9] => Array
(
[name] => INTRODUCTION TO CYBER SECURITY: Buy INTRODUCTION TO CYBER SECURITY by ...
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.yS5Drwl684J_yahWleBl0QAAAA?pid=Api
[datePublished] => 2024-07-25T22:28:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => http://rukmini1.flixcart.com/image/300/300/xif0q/book/m/g/v/introduction-to-cyber-security-original-imagzecftwqfgute.jpeg
[hostPageUrl] => https://www.flipkart.com/introduction-cyber-security/p/itmdbb3abdb2a6bd
[contentSize] => 13621 B
[width] => 200
[height] => 300
[cDNContentUrl] => https://th.bing.com/th/id/R.c92e43af097af3827fc9a85695e065d1?rik=IPdJrqvefVgapg&riu=http%3a%2f%2frukmini1.flixcart.com%2fimage%2f300%2f300%2fxif0q%2fbook%2fm%2fg%2fv%2fintroduction-to-cyber-security-original-imagzecftwqfgute.jpeg&ehk=fptwQdCzDFN9GwklpTdbI%2fQZ75PWGLovXkJrztjmzVk%3d&risl=&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 9C7C9F9A05E0517717A8A61A587DDEABAE49F720
[accentColor] => A55B26
)
[22CC5A8450956C1A1D51699C4341FE28BADB2F8D] => Array
(
[name] => An Introduction to Security Standards for Buildings for Professional ...
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.Wt2MFZZ927KyTLa8Dv5lNwAAAA?pid=Api
[datePublished] => 2023-06-24T15:39:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/412F6n-uYjL.jpg
[hostPageUrl] => https://www.amazon.in/Introduction-Standards-Buildings-Professional-Engineering-ebook/dp/B0C8C3PYDY
[contentSize] => 20251 B
[width] => 386
[height] => 500
[cDNContentUrl] => https://th.bing.com/th/id/R.5add8c15967ddbb2b24cb6bc0efe6537?rik=IsylSAVZxqHRFQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => D8F2BDAB82EF1434C99615D1A1C6590548A5CC22
[accentColor] => 4B6080
)
[7AB60D21819890670AE75827B8075D886458CE25] => Array
(
[name] => CS UNIT 1 - Cyber security notes for mdsu - UNIT-I Information Security ...
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.nVdfBAUwP4q_qdf3TbZWMwHaJl?pid=Api
[datePublished] => 2022-05-31T11:14:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/76bfabddc2bbc8074a0168c96e5e8e7e/thumb_1200_1553.png
[hostPageUrl] => https://www.studocu.com/in/document/maharshi-dayanand-saraswati-university/bachelor-of-computer-applications/cs-unit-1-cyber-security-notes-for-mdsu/24324316
[contentSize] => 222721 B
[width] => 1200
[height] => 1553
[cDNContentUrl] => https://th.bing.com/th/id/R.9d575f0405303f8abfa9d7f74db65633?rik=p2vQEhiJCXagfg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 52EC854688D5708B72857EA07609891812D06BA7
[accentColor] => 181818
)
[389A8AE1599F17CD0538AA47C1321A5A20F1C5E0] => Array
(
[name] => Buy An Introduction to R Book Online at Low Prices in India | An ...
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.BevzGUaeMhEnIgIb1df0ugAAAA?pid=Api
[datePublished] => 2025-06-27T05:01:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/41gj3iFiqAL._SY445_SX342_.jpg
[hostPageUrl] => https://www.amazon.in/Introduction-R-William-N-Venables/dp/0954612086
[contentSize] => 14069 B
[width] => 296
[height] => 445
[cDNContentUrl] => https://th.bing.com/th/id/R.05ebf319469e32112722021bd5d7f4ba?rik=g6moHpX5cdxQgw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 0E5C1F02A5A1231C74AA8350DC71F9951EA8A983
[accentColor] => 011457
)
[19ACD00A830B18DEEFED9B7754E568E419058EEF] => Array
(
[name] => Module 1- Attacks on Computer security - NETWORK SECURITY MODULE 1 ...
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.oi7j3AGz9UncTpsasoRlEAHaKe?pid=Api
[datePublished] => 2023-06-18T19:47:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/63340a805e1935b0d599aa2435eea14c/thumb_1200_1698.png
[hostPageUrl] => https://www.studocu.com/in/document/visvesvaraya-technological-university/electronic-and-communication/module-1-attacks-on-computer-security/53722744
[contentSize] => 407875 B
[width] => 1200
[height] => 1698
[cDNContentUrl] => https://th.bing.com/th/id/R.a22ee3dc01b3f549dc4e9b1ab2846510?rik=kcoNoDiwge3%2b3g&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => FEE850914E865E4577B9DEFEED81B038A00DCA91
[accentColor] => 31629A
)
[F7FF2724B96AB01A54E963BA88407DE8047439E1] => Array
(
[name] => Fillable Online sis pitt Tel2821/is2150: introduction to security ...
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.ryRS_yVfat0sLqvDIVPz1wAAAA?pid=Api
[datePublished] => 2023-08-21T15:43:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.pdffiller.com/preview/34/579/34579062.png
[hostPageUrl] => https://www.pdffiller.com/34579062--Lab2pdf-Tel2821is2150-introduction-to-security-School-of-Information-sis-pitt-
[contentSize] => 1670 B
[width] => 298
[height] => 386
[cDNContentUrl] => https://th.bing.com/th/id/R.af2452ff255f6add2c2eabc32153f3d7?rik=f%2f9yQpumC6FFng&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 1E9347408ED70488AB369E45A10BA69B4272FF7F
[accentColor] => 3E3E3E
)
[F97A73B7366BCF2232A84AE0F4D2194630DBE9DF] => Array
(
[name] => Cyber Security Management | 24x7 Security Operation Center (SOC)
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.SeXhHZ2uHudkZMLYu7-mTwHaHa?pid=Api
[datePublished] => 2023-02-26T03:22:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => http://blog.progressive.in/assets/img/photos/comprehensive-cybersecurity.jpg?format=jpg
[hostPageUrl] => http://blog.progressive.in/cyber-security-management
[contentSize] => 67902 B
[width] => 800
[height] => 800
[cDNContentUrl] => https://th.bing.com/th/id/R.49e5e11d9dae1ee76464c2d8bbbfa64f?rik=n6c3e2O2%2fCIjig&riu=http%3a%2f%2fblog.progressive.in%2fassets%2fimg%2fphotos%2fcomprehensive-cybersecurity.jpg%3fformat%3djpg&ehk=CRjSFboy%2beSh3xxpB2yZ%2bxbT80cjtL9sooJNjIiWoOc%3d&risl=&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => FD9EBD0364912D4F0EA48A2322FCB6637B37A79F
[accentColor] => C24A09
)
[6355C294AECB661B62F05150F880D1F44974EA45] => Array
(
[name] => Buy Cybersecurity for Beginners: A Hands-On Guide for Total Beginners ...
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.F2LnR5FG9ZfOsImxtegdiQHaJy?pid=Api
[datePublished] => 2021-03-25T03:18:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/81Savb8lDDS._SL1500_.jpg
[hostPageUrl] => https://www.amazon.in/How-Cybersecurity-Really-Works-Hands/dp/1718501285
[contentSize] => 194580 B
[width] => 1135
[height] => 1500
[cDNContentUrl] => https://th.bing.com/th/id/R.1762e7479146f597ceb089b1b5e81d89?rik=NlUsSeq8ZrEmDw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 54AE47944F1D088F05150F26B166BCEA492C5536
[accentColor] => C0B80B
)
[28D4DD62F6E924B416F8C6703D3DBD97DD392B8C] => Array
(
[name] => Introduction to Security eBook : Fischer, Robert J., Edward Halibozek ...
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.4LasShPUTv_-49roUVLLEgAAAA?pid=Api
[datePublished] => 2020-10-24T07:59:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/51vJglvqJgL._SY445_SX342_.jpg
[hostPageUrl] => https://www.amazon.in/Introduction-Security-Robert-J-Fischer-ebook/dp/B001O5CZ7Q
[contentSize] => 20365 B
[width] => 314
[height] => 445
[cDNContentUrl] => https://th.bing.com/th/id/R.e0b6ac4a13d44efffee3dae85152cb12?rik=gk3dJm%2beQkthjw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => C8B293DD79DBD3D3076C8F614B429E6F26DD4D82
[accentColor] => 025CB9
)
[93B87A771558778BB3347F83C68CD1B4A0142F4C] => Array
(
[name] => Leading Research Books for Security and Network Forensics | S-Logix
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.U0Wz4JV9pq73VKGyIDK2LwHaDN?pid=Api
[datePublished] => 2022-06-08T11:41:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://slogix.in/images/digital-forensics/introduction-to-security-and-network-forensics.jpg
[hostPageUrl] => https://slogix.in/digital-forensics/introduction-to-security-and-network-forensics/
[contentSize] => 48758 B
[width] => 830
[height] => 360
[cDNContentUrl] => https://th.bing.com/th/id/R.5345b3e0957da6aef754a1b22032b62f?rik=OYund1GFd7g7Qw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => C4F2410A4B1DC86C38F7433BB877855177A78B39
[accentColor] => 004B95
)
[B2B184D1A27520BE5D15BD7FB83A9155944726B1] => Array
(
[name] => Buy Mastering Your Introduction to Cyber Security Book Online at Low ...
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.L68ge9VtZNkF5KlHUuYgFwAAAA?pid=Api
[datePublished] => 2020-08-26T16:52:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/515uPXmPBpL._SY445_SX342_.jpg
[hostPageUrl] => https://www.amazon.in/Mastering-Your-Introduction-Cyber-Security/dp/163491418X
[contentSize] => 28388 B
[width] => 279
[height] => 445
[cDNContentUrl] => https://th.bing.com/th/id/R.2faf207bd56d64d905e4a94752e62017?rik=KxtIHSpXAuvVUQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 1B6274495519A38BF7DB51D5EB02572A1D481B2B
[accentColor] => 2188AA
)
[4C647511A0E395E24EAC76E177B079C20362E587] => Array
(
[name] => Cyber Security lecture notes pdf - CYBER SECURITY [R18A0521] LECTURE ...
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.9v4RaflU2fsIVNfbNlq59AHaJl?pid=Api
[datePublished] => 2022-09-18T23:37:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/f32c9f52f790303ed742f284c0a42e54/thumb_1200_1553.png
[hostPageUrl] => https://www.studocu.com/in/document/shri-ramdeobaba-college-of-engineering-and-management/information-technology-workshop/cyber-security-lecture-notes-pdf/26444612
[contentSize] => 244204 B
[width] => 1200
[height] => 1553
[cDNContentUrl] => https://th.bing.com/th/id/R.f6fe1169f954d9fb0854d7db365ab9f4?rik=xEZXEQo%2bWS7kyg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 785E26302C970B771E67CAE42E593E0A115746C4
[accentColor] => BF9C0C
)
[508FB97EAD3610A866D276AAE5A5E5A4099CDB8B] => Array
(
[name] => Introduction to security : Amazon.in: Books
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.NqQCeie0NG85mbrT_xyWKgAAAA?pid=Api
[datePublished] => 2025-07-28T11:48:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/41TIenPS8tL._SY445_SX342_.jpg
[hostPageUrl] => https://www.amazon.in/Introduction-to-security/dp/0913708208
[contentSize] => 9276 B
[width] => 296
[height] => 445
[cDNContentUrl] => https://th.bing.com/th/id/R.36a4027a27b4346f3999bad3ff1c962a?rik=Bfib59pjAYpmLQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => B8BDC9904A5E5A5EAA672D668A0163DAE79BF805
[accentColor] => 785366
)
[B991312EBDD5347934347A71348F7C973B51D521] => Array
(
[name] => Introduction to Computer Security eBook : BISHOP: Amazon.in: Kindle Store
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.2DPET23GAZlred9jpVy05gAAAA?pid=Api
[datePublished] => 2025-07-06T02:17:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/41eFFLOVDdL._SY445_SX342_.jpg
[hostPageUrl] => https://www.amazon.in/Introduction-Computer-Security-Bishop-ebook/dp/B07YG4BW81
[contentSize] => 19074 B
[width] => 334
[height] => 445
[cDNContentUrl] => https://th.bing.com/th/id/R.d833c44f6dc601996b79df63a55cb4e6?rik=mxkT4ttdQ5dDQw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 125D15B379C7F84317A7434397435DDBE213199B
[accentColor] => B7141A
)
[633E8776A0E8D5EAE15C7569C2E57B96DBAA334D] => Array
(
[name] => Buy Security Studies: An Introduction Book Online at Low Prices in ...
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.7DQ3dDiDIAHTUfu_J7vmywAAAA?pid=Api
[datePublished] => 2025-08-04T06:48:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/21JBjA3JT6L._SY445_SX342_.jpg
[hostPageUrl] => https://www.amazon.in/Security-Studies-Introduction-Paul-Williams/dp/0415784891
[contentSize] => 7379 B
[width] => 314
[height] => 445
[cDNContentUrl] => https://th.bing.com/th/id/R.ec34377438832001d351fbbf27bbe6cb?rik=NuN4ZwqOXa4exQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => D433AABD69B75E2C9657C51EAE5D8E0A6778E336
[accentColor] => 0C52A2
)
[CFCBDF71080851C87C3FE448D8C91DD72F16FF35] => Array
(
[name] => DF Complete - 1 | P a g e Digital Fundamentals(3130704) 2022 - 2023 ...
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.T4SYqGQ6d4pvKMKjrwbYJQHaKd?pid=Api
[datePublished] => 2024-11-18T03:06:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/fd36d881b2e446abd8a8ac565187f072/thumb_1200_1696.webp
[hostPageUrl] => https://www.studocu.com/in/document/gujarat-technological-university/computer-engineering/df-complete/111122624
[contentSize] => 178558 B
[width] => 1200
[height] => 1696
[cDNContentUrl] => https://th.bing.com/th/id/R.4f8498a8643a778a6f28c2a3af06d825?rik=%2fLz9F4CAFYzH8w&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 53FF61F27DD19C8D844EF3C78C15808017FDBCFC
[accentColor] => 8D4D21
)
[3B991C9CF6A117D41C95EA43F559E3392D577AB5] => Array
(
[name] => Cryptography and Cyber Security - CB3491 5th Semester CSE Dept | 2021 ...
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.LCPndLabZ3XkoTVdWJigdgHaNy?pid=Api
[datePublished] => 2023-03-31T21:20:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://i.imgur.com/oTpp3Mn.jpg
[hostPageUrl] => https://www.poriyaan.in/paper/cryptography-and-cyber-security-84/
[contentSize] => 450737 B
[width] => 786
[height] => 1464
[cDNContentUrl] => https://th.bing.com/th/id/R.2c23e774b69b6775e4a1355d5898a076?rik=s5nByW8acU3BWQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 5BA775D2933E955F34AE59C14D711A6FC9C199B3
[accentColor] => 6B6560
)
[510CBFC5240D5436546F7BF2DFFB6B81190F3E27] => Array
(
[name] => Cryptography and Network Security - Introduction 1-2 D (IT-Sem-7) PART ...
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.irraSULpcmnqdKqXtM0j6QHaF9?pid=Api
[datePublished] => 2024-02-07T14:06:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/1a2c7df006bd2af692cbc27f8b24932d/thumb_1200_967.png
[hostPageUrl] => https://www.studocu.com/in/document/dr-apj-abdul-kalam-technical-university/master-of-computer-application/cryptography-and-network-security/83206449
[contentSize] => 580647 B
[width] => 1200
[height] => 967
[cDNContentUrl] => https://th.bing.com/th/id/R.8abada4942e97269ea74aa97b4cd23e9?rik=FcD7XELQRWNF9g&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 72E3F09118B6BFFD2FB7F6456345D0425CFBC015
[accentColor] => 91593A
)
[5CB1AD4BE74384A5C579A699D1FB6A980E2DE43E] => Array
(
[name] => Module-4 - Introduction to Cyber Security module-4 notes - Chapter 4 ...
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.mM8i8Lfmr019G5nyT7GF2gHaKd?pid=Api
[datePublished] => 2023-10-23T04:32:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://website-assets.studocu.com/img/document_thumbnails/9d83ee0d842e87aa029b2d8c4722f7a1/thumb_1200_1696.webp
[hostPageUrl] => https://www.studocu.com/in/document/visvesvaraya-technological-university/intoduction-to-cyber-security/module-4-introduction-to-cyber-security-module-4-notes/73536900
[contentSize] => 261120 B
[width] => 1200
[height] => 1696
[cDNContentUrl] => https://th.bing.com/th/id/R.98cf22f0b7e6af4d7d1b99f24fb185da?rik=xRvatH40SFpclw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => E34ED2E089A6BF1D996A975C5A48347EB4DA1BC5
[accentColor] => 656665
)
[E09183027363DEAAF3B3ED2B0B081A02CAA8504F] => Array
(
[name] => Introduction to Network Security E-book Testbank Solutions | PDF ...
[thumbnailUrl] => https://tse3.mm.bing.net/th?id=OIF.xKzNbHjDbI%2bcgarHPzyoYA&pid=Api
[datePublished] => 2026-01-24T14:24:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://imgv2-1-f.scribdassets.com/img/document/986501010/original/282e8d707a/1?v=1
[hostPageUrl] => https://www.scribd.com/document/986501010/Introduction-to-Network-Security-E-book-Testbank-Solutions
[contentSize] => 146740 B
[width] => 768
[height] => 1024
[cDNContentUrl] => https://th.bing.com/th/id/R.4ff3f613eb021faa8dd68befde0c0e6b?rik=&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => F4058AAC20A180B0B2DE3B3FAAED36372038190E
[accentColor] => 026DB2
[isFresh] => 1
)
[06C6757EA1873265423FA2BA76CBBBBACFC87349] => Array
(
[name] => Buy An Introduction to Security: Protecting an Organisation's Assets ...
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.or5mSfJF7ojv8Mc6SSVbogAAAA?pid=Api
[datePublished] => 2020-09-11T01:04:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/514DjZQZV7L._SY445_SX342_.jpg
[hostPageUrl] => https://www.amazon.in/Introduction-Security-Protecting-Organisations-Assets/dp/178612694X
[contentSize] => 19014 B
[width] => 288
[height] => 445
[cDNContentUrl] => https://th.bing.com/th/id/R.a2be6649f245ee88eff0c73a49255ba2?rik=YGxX5xp4I1Yk8w&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 94378CFCABBBBC67AB2AF3245623781AE7576C60
[accentColor] => 953641
)
[02547B4D233B855CA45ABDBA8F184113F1A51776] => Array
(
[name] => Introduction to Cloud Security
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.PlCwB0QLDFSX4q3J9-WlMgHaE7?pid=Api
[datePublished] => 2023-12-09T17:11:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://prod.ifacet.in/images/uploads/Introduction-to-Cloud-Security.jpg
[hostPageUrl] => https://www.eicta.iitk.ac.in/knowledge-hub/cloud-computing/aws-cloud-computing-introduction-features-and-benefits
[contentSize] => 64451 B
[width] => 640
[height] => 426
[cDNContentUrl] => https://th.bing.com/th/id/R.3e50b007440b0c5497e2adc9f7e5a532?rik=IEW31DKzWMVKpQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 67715A1F311481F8ABDBA54AC558B332D4B74520
[accentColor] => 0DBBBE
)
[7D91B2B05AC893D494B0FE1553F488D49CD4D8DF] => Array
(
[name] => CISSP - Introduction to Information Security
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.yvyld7iGomA1UfMkj1u9IwHaE7?pid=Api
[datePublished] => 2025-02-06T14:34:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://prod.ifacet.in/images/uploads/CISSP-%E2%80%93-Introduction-to-Information-Security.jpg
[hostPageUrl] => https://www.eicta.iitk.ac.in/knowledge-hub/cyber-security/disinformation-security-strategies-to-combat-fake-news-in-the-digital-age-2025
[contentSize] => 62116 B
[width] => 640
[height] => 426
[cDNContentUrl] => https://th.bing.com/th/id/R.cafca577b886a2603551f3248f5bbd23?rik=1xkrC6WMOU1JCw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => FD8D4DC94D884F3551EF0B494D398CA50B2B19D7
[accentColor] => 0FB9BC
)
[A9F72A67291B1D2ECC3C0EC496E81C0A1395516F] => Array
(
[name] => Introduction to Security 9th Edition Robert J. Fischer complete full ...
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIF.CjoHgLtBTTWRLYxWZBIuFg?pid=Api
[datePublished] => 2026-01-23T18:55:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://imgv2-1-f.scribdassets.com/img/document/985921383/original/fe860a16e6/1?v=1
[hostPageUrl] => https://www.scribd.com/document/985921383/Introduction-to-Security-9th-Edition-Robert-J-Fischer-complete-full-ebook
[contentSize] => 72465 B
[width] => 768
[height] => 1024
[cDNContentUrl] => https://th.bing.com/th/id/R.ebedac9987eeb1ece92223b4ad1a9c89?rik=&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => F6155931A0C18E694CE0C3CCE2D1B19276A27F9A
[accentColor] => 0D61B5
[isFresh] => 1
)
[ECEA57720D6209E83E836A47D6AD4998E2D676DA] => Array
(
[name] => File | Transportation Security Administration
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.TyTnlYX-u8RLcqgCZ9IhgAHaJl?pid=Api
[datePublished] => 2022-05-26T14:13:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.tsa.gov/sites/default/files/ssi-cover-sheet-dhs-form-11054.jpg
[hostPageUrl] => https://www.tsa.gov/image/ssi-cover-sheet-dhs-form-11054jpg
[contentSize] => 253165 B
[width] => 1700
[height] => 2200
[cDNContentUrl] => https://th.bing.com/th/id/R.4f24e79585febbc44b72a80267d22180?rik=zq51J9AmkI7jOA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => AD676D2E8994DA6D74A638E38E9026D02775AECE
[accentColor] => 008002
)
[DB844267D853417ECCAFF14A94AFC292ECD055D9] => Array
(
[name] => Buy Introduction to insurance (Risk, insurance, and security) Book ...
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.CWbxuAiHKUI1GRiYgAfo9AAAAA?pid=Api
[datePublished] => 2020-08-27T04:14:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/41KHBIzHYoL._SY445_SX342_.jpg
[hostPageUrl] => https://www.amazon.in/Title-Introduction-insurance-Risk-secur/dp/0134853598
[contentSize] => 10091 B
[width] => 296
[height] => 445
[cDNContentUrl] => https://th.bing.com/th/id/R.0966f1b808872942351918988007e8f4?rik=vUgkdo01FOfM%2bg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 9D550DCE292CFA49A41FFACCE714358D762448BD
[accentColor] => 795266
)
[6D97760F32F202DAF7045A473B25E8E211881D62] => Array
(
[name] => Remote Workforce | ESET
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.OW79ZxgoLvP93XLrojS_ogAAAA?pid=Api
[datePublished] => 2020-05-23T18:12:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://web-assets.eset.com/fileadmin/ESET/INT/Landing/2020/CSR/remote-access-security-checklist-thumbnail.png
[hostPageUrl] => https://www.eset.com/in/business/remote-workforce/
[contentSize] => 28512 B
[width] => 350
[height] => 350
[cDNContentUrl] => https://th.bing.com/th/id/R.396efd6718282ef3fddd72eba234bfa2?rik=1nln8CMvIK1%2fQA&pid=ImgRaw&r=0
[isTransparent] => 1
[imageId] => 26D188112E8E52B374A5407FAD202F23F06779D6
[accentColor] => 06B3C4
)
[7B831696A04A6E0F75BE30BC0C41B2FC8F2168BC] => Array
(
[name] => Information Security Policy Examples Pdf | pdfFiller
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.3y9sp860WlhtYTfnYsgmVQAAAA?pid=Api
[datePublished] => 2022-01-11T19:49:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.pdffiller.com/preview/487/198/487198268.png
[hostPageUrl] => https://www.pdffiller.com/en/micro-catalog/banking/18253-information-security-policy-examples-pdf.htm
[contentSize] => 12602 B
[width] => 298
[height] => 386
[cDNContentUrl] => https://th.bing.com/th/id/R.df2f6ca7ceb45a586d6137e762c82655?rik=tzhhaQqk5vBX6w&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => CB8612F8CF2B14C0CB03EB57F0E6A40A696138B7
[accentColor] => 0E0EBD
)
[99B073A1C02BACAA2108B9E2817AE0969A64CB56] => Array
(
[name] => INTRODUCTION TO TRANSPORTATION SECURITY : Amazon.in: Books
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.3PFRmGEABKd775TI1raWpwAAAA?pid=Api
[datePublished] => 2021-12-11T10:48:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/31wOD8muxdL.jpg
[hostPageUrl] => https://www.amazon.in/INTRODUCTION-TRANSPORTATION-SECURITY-NA/dp/0367269252
[contentSize] => 15775 B
[width] => 180
[height] => 270
[cDNContentUrl] => https://th.bing.com/th/id/R.dcf15198610004a77bef94c8d6b696a7?rik=mQs3GgyyyqoSgA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 65BC46A9690EA7182E9B8012AACAB20C1A370B99
[accentColor] => AB8B20
)
[F7DF60414130AAB8A0672D8600437A6472F97FB0] => Array
(
[name] => Software Testing Books | Best Software Testing Books | Software Testing ...
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP._EoZQ9xdIWMP6p2fu7Dc6gHaJq?pid=Api
[datePublished] => 2022-05-18T20:34:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.fita.in/includes/assets/img/books/software-testing-books/software-testing-books-12.jpg
[hostPageUrl] => https://www.fita.in/software-testing-books/
[contentSize] => 23595 B
[width] => 500
[height] => 652
[cDNContentUrl] => https://th.bing.com/th/id/R.fc4a1943dc5d21630fea9d9fbbb0dcea?rik=f%2f0GFBQDqosKdg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 0BF79F2746A7340068D2760A8BAA03141406FD7F
[accentColor] => 0D2F43
)
[86F4A1E6E5ADCCE397239FF83267E8480E312B81] => Array
(
[name] => Home | Classroom
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.motbaTTBBYBTVNa_aMhfsgHaEK?pid=Api
[datePublished] => 2021-02-26T06:36:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://classroom.anir0y.in/img/soc-1.png
[hostPageUrl] => https://classroom.anir0y.in/
[contentSize] => 170037 B
[width] => 1920
[height] => 1080
[cDNContentUrl] => https://th.bing.com/th/id/R.9a8b5b6934c105805354d6bf68c85fb2?rik=aE8abl7azD55Mg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 18B213E0848E76238FF932793ECCDA5E6E1A4F68
[accentColor] => 0984C2
)
[534C168E82E9EA4C2FEA17B005A549654FCCE21D] => Array
(
[name] => Buy Introduction to Criminology: Theories, Methods, and Criminal ...
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.59bdJXp-YHGZZAqruR57GwHaJn?pid=Api
[datePublished] => 2022-12-11T06:46:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/A14KxR-AG+L._SL1500_.jpg
[hostPageUrl] => https://www.amazon.in/Introduction-Criminology-Theories-Criminal-Behavior/dp/1071835084
[contentSize] => 451840 B
[width] => 1155
[height] => 1500
[cDNContentUrl] => https://th.bing.com/th/id/R.e7d6dd257a7e607199640aabb91e7b1b?rik=NcRh6CiersTyrg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => D12ECCF456945A500B71AEF2C4AE9E28E861C435
[accentColor] => A88623
)
[07899A67D78C97524D89F7E3A4A281C228A42116] => Array
(
[name] => Technology 101: Intro to Security, New York Mills Public Library, 11 ...
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.3A7451IR-Zm1LZmo2ZttKQHaEL?pid=Api
[datePublished] => 2023-03-26T06:29:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://cdn-az.allevents.in/events8/banners/29a5c0074a3791d121498d6aa8d52c6f2027a027ccda3f0a66b37cbd190cbbdc-rimg-w960-h541-gmir?v=1712587819
[hostPageUrl] => https://allevents.in/new%20york%20mills/technology-101-intro-to-security/200026032969224
[contentSize] => 44936 B
[width] => 960
[height] => 541
[cDNContentUrl] => https://th.bing.com/th/id/R.dc0ef8e75211f999b52d99a8d99b6d29?rik=cJipdn3IeSXUmA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 61124A822C182A4A3E7F98D42579C87D76A99870
[accentColor] => 031A44
)
[0146DFB5E5625083775F45AB4918E05E65CD7EA9] => Array
(
[name] => Buy Introduction to the New Mainframe: Security Book Online at Low ...
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.boCKrtFPlTDI46K6m5K34gAAAA?pid=Api
[datePublished] => 2020-10-24T21:27:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/5113C8GHEOL._SX342_SY445_.jpg
[hostPageUrl] => https://www.amazon.in/Introduction-New-Mainframe-IBM-Redbooks/dp/0738489654
[contentSize] => 19157 B
[width] => 342
[height] => 430
[cDNContentUrl] => https://th.bing.com/th/id/R.6e808aaed14f9530c8e3a2ba9b92b7e2?rik=EGT9W14mBTh39Q&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 9AE7DC56E50E8194BA54F5773805265E5BFD6410
[accentColor] => C22A09
)
[FC4727BCEB764CC47CCEAEC6A43BCC2693837B5D] => Array
(
[name] => Buy Cybersecurity All-in-one for Dummies Book Online at Low Prices in ...
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.D8KSgVHyteWQxCfnfPzwXgHaJS?pid=Api
[datePublished] => 2022-08-01T17:05:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/81oeLXBqdFL.jpg
[hostPageUrl] => https://www.amazon.in/Cybersecurity-All-Dummies-Joseph-Steinberg/dp/139415285X
[contentSize] => 343588 B
[width] => 2042
[height] => 2560
[cDNContentUrl] => https://th.bing.com/th/id/R.0fc2928151f2b5e590c427e77cfcf05e?rik=z3Ryy75nxEzH7A&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => D5B7383962CCB34A6CEAECC74CC467BECB7274CF
[accentColor] => CBC300
)
[63617718AAD31B41BCAC52F60495780E08552639] => Array
(
[name] => Java Vs .net Security - Pdf : Pilipchuk, Denis, Piliptchouk, Denis ...
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.uWOpQnzk0w8VW-Oe3l-oMQAAAA?pid=Api
[datePublished] => 2004-05-01T12:00:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/51O9m+v08pL._SX342_SY445_.jpg
[hostPageUrl] => https://www.amazon.in/Java-Vs-net-Security-Pdf/dp/059600821X
[contentSize] => 28014 B
[width] => 342
[height] => 443
[cDNContentUrl] => https://th.bing.com/th/id/R.b963a9427ce4d30f155be39ede5fa831?rik=NhZ3gao9sRTLyg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 93625580E08759406F25CACB14B13DAA81771636
[accentColor] => C89703
)
[F1C77B1E7F3A030133CE7BF2DFFB6B81190F3E27] => Array
(
[name] => Cryptography and Network Security - Introduction 1-2 D (IT-Sem-7) PART ...
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.37qFpw3YNq-f6rsmv5dNywAAAA?pid=Api
[datePublished] => 2024-02-07T14:06:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/84da6e2478387356c527b9f562d4e102/thumb_300_424.png
[hostPageUrl] => https://www.studocu.com/in/document/dr-apj-abdul-kalam-technical-university/master-of-computer-application/cryptography-and-network-security/83206449
[contentSize] => 32801 B
[width] => 300
[height] => 424
[cDNContentUrl] => https://th.bing.com/th/id/R.dfba85a70dd836af9feabb26bf974dcb?rik=H3y34fejMBAz7A&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 72E3F09118B6BFFD2FB7EC331030A3F7E1B77C1F
[accentColor] => 4E4E4E
)
[D1E0A417B4846A536D728998902BB73596BA4DA4] => Array
(
[name] => Introduction to Information Systems : Rainer, R. Kelly, Jr., Prince ...
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.MtMd7WSHQ67twZPasFzc_AHaJe?pid=Api
[datePublished] => 2021-12-22T01:58:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/91G0IrCp99L._SL1500_.jpg
[hostPageUrl] => https://www.amazon.in/Introduction-Information-Systems-Brad-Prince/dp/1119761468
[contentSize] => 418614 B
[width] => 1172
[height] => 1500
[cDNContentUrl] => https://th.bing.com/th/id/R.32d31ded648743aeedc193dab05cdcfc?rik=HQ5KcUtIpjXWJw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 4AD4AB69537BB209899827D635A6484B714A0E1D
[accentColor] => B01B24
)
[F92BC253F53ABCA9B392F3C087A8D8311A37486B] => Array
(
[name] => Introduction to hardware security modules (HSM): “FIPS 140-2 tested and ...
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.qyit5IUfMfh6AoI3iefXOwHaEK?pid=Api
[datePublished] => 2023-01-28T20:25:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://utimaco.com/sites/default/files/2021-06/blog-introduction-into-hardware-security-modules-stage.jpg
[hostPageUrl] => https://utimaco.com/news/blog-posts/introduction-hardware-security-modules-hsm-fips-140-2-tested-and-certified
[contentSize] => 356219 B
[width] => 1920
[height] => 1080
[cDNContentUrl] => https://th.bing.com/th/id/R.ab28ade4851f31f87a02823789e7d73b?rik=n7IsNV%2bjy5o7KQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => B68473A1138D8A780C3F293B9ACBA35F352CB29F
[accentColor] => 1183BA
)
[5123BB8E2C3EA344B6973134E0C44F265F675494] => Array
(
[name] => Buy An Introduction to Statistical Learning: with Applications in R ...
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.KeTW9mlsIWg4849DtwKGjwHaLK?pid=Api
[datePublished] => 2017-01-07T10:06:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/61Lvnv9+CML.jpg
[hostPageUrl] => https://www.amazon.in/Introduction-Statistical-Learning-Applications-Statistics/dp/1461471370
[contentSize] => 68500 B
[width] => 827
[height] => 1246
[cDNContentUrl] => https://th.bing.com/th/id/R.29e4d6f6696c216838f38f43b702868f?rik=FTK76MLjOkRreQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 494576F562F44C0E4313796B443AE3C2E8BB3215
[accentColor] => C99802
)
[A0695D911EA05E9E26167A47BBA2848A68CE7268] => Array
(
[name] => Theoretical Background Example - Fill Online, Printable, Fillable ...
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.jWcuqGgnJ6Gg6D4b-Dlb-gAAAA?pid=Api
[datePublished] => 2022-06-20T07:45:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.pdffiller.com/preview/414/539/414539059.png
[hostPageUrl] => https://www.pdffiller.com/414539059--theoretical-background-example-
[contentSize] => 9627 B
[width] => 298
[height] => 386
[cDNContentUrl] => https://th.bing.com/th/id/R.8d672ea8682727a1a0e83e1bf8395bfa?rik=CpbVGeEK5eliYQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 8627EC86A8482ABB74A76162E9E50AE119D5960A
[accentColor] => 4B4B4B
)
[748F511641026A653C094906A4662D05CE5732A0] => Array
(
[name] => What is Computer in Hindi - कंप्यूटर क्या है? [PDF] - Tutorial in Hindi
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.vivlnan3uTXm9xnRf1UMMAHaEK?pid=Api
[datePublished] => 2020-03-31T13:22:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.tutorialinhindi.com/wp-content/uploads/2022/12/Introduction-to-Computer-in-Hindi-1024x576.gif
[hostPageUrl] => https://www.tutorialinhindi.com/computer-fundamentals/computer-hindi/
[contentSize] => 35508 B
[width] => 1024
[height] => 576
[cDNContentUrl] => https://th.bing.com/th/id/R.be2be59da9f7b935e6f719d17f550c30?rik=R%2fgVYRQgplbDkA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 0A2375EC50D2664A609490C356A620146115F847
[accentColor] => CB4300
)
[FC93BA84170C1D0DD35CB591D52DFA8206D84B2C] => Array
(
[name] => Buy E-Banking: Introduction, History and Security Issues Book Online at ...
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.PyCRHwU9UATFy9yCGeaiWgAAAA?pid=Api
[datePublished] => 2021-03-06T02:57:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/41yTYiK28AL._SX342_SY445_.jpg
[hostPageUrl] => https://www.amazon.in/Banking-Dr-Fozia/dp/3659368792
[contentSize] => 13523 B
[width] => 342
[height] => 250
[cDNContentUrl] => https://th.bing.com/th/id/R.3f20911f053d5004c5cbdc8219e6a25a?rik=zzmrSHHA0dA9xQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => C2B48D6028AFD25D195BC53DD0D1C07148AB39CF
[accentColor] => AD1E22
)
[6ED5CFD4B5AE896567405C045F849F50EC5B22D2] => Array
(
[name] => Buy LMS Integrated for MindTap Introduction to Security, 1 term (6 ...
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.zfTa45ktS0zHPJtGks-ziAAAAA?pid=Api
[datePublished] => 2020-11-13T12:45:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/512PvNDOBDL._SX342_SY445_.jpg
[hostPageUrl] => https://www.amazon.in/Integrated-MindTap-Introduction-Security-Awareness/dp/1305946715
[contentSize] => 16356 B
[width] => 342
[height] => 272
[cDNContentUrl] => https://th.bing.com/th/id/R.cdf4dae3992d4b4cc73c9b4692cfb388?rik=5l38TVvqmFZ2BA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 2D22B5CE05F948F540C504765698EA5B4DFC5DE6
[accentColor] => 1D6AAE
)
[357A8880E75947BCF69069F6360B027AFB8D7EB9] => Array
(
[name] => Uttarakhand Open University, [FREE] course "Introduction to Cyber Security"
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.7yOU75HS5d4GQA3f_k4cAgHaEK?pid=Api
[datePublished] => 2021-04-04T16:58:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://edubard.in/media/media/Introduction_to_Cyber_Security.jpg
[hostPageUrl] => https://edubard.in/full/uttarakhand-open-university-free-course-introduction-to-cyber-security
[contentSize] => 29106 B
[width] => 1200
[height] => 675
[cDNContentUrl] => https://th.bing.com/th/id/R.ef2394ef91d2e5de06400ddffe4e1c02?rik=U6eICH6VdMtvCQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 9BE7D8BFA720B0636F96096FCB74957E0888A753
[accentColor] => C9A402
)
[45258E666E0187045D9B8E8AF86A981BBACC5E9C] => Array
(
[name] => Buy Reinforcement Learning Book Online at Low Prices in India ...
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.O-QAMU8VOCIwJSzs1pY3WAHaKM?pid=Api
[datePublished] => 2023-04-04T09:31:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/71nk3rOK3jL._SL1500_.jpg
[hostPageUrl] => https://www.amazon.in/Reinforcement-Learning-Introduction-Richard-Sutton/dp/0262039249
[contentSize] => 117984 B
[width] => 1089
[height] => 1500
[cDNContentUrl] => https://th.bing.com/th/id/R.3be400314f15382230252cecd6963758?rik=VFLoZuYQeEDVuQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => C9E5CCABB189A68FA8E8B9D5407810E666E85254
[accentColor] => 894268
)
[3FD745D02B5822A63EA65A380553877AD770EEA9] => Array
(
[name] => Buy An Introduction to Statistical Learning: with Applications in ...
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.Hs28Jb7bOkH2xahF5qVRgQHaKk?pid=Api
[datePublished] => 2023-06-22T01:41:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/61i+eJ+8TnL._SL1181_.jpg
[hostPageUrl] => https://www.amazon.in/Introduction-Statistical-Learning-Applications-Statistics/dp/3031387465
[contentSize] => 66310 B
[width] => 827
[height] => 1181
[cDNContentUrl] => https://th.bing.com/th/id/R.1ecdbc25bedb3a41f6c5a845e6a55181?rik=831UDbKFImrjag&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 9AEE077DA778355083A56AE36A2285B20D547DF3
[accentColor] => C1900A
)
[C5BFEA1F6CA5062DA7472633CEE32E93431BAA51] => Array
(
[name] => Buy Introduction to Time Series and Forecasting (Springer Texts in ...
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.rlG04DaIJFS5Cfx-LEjdEgHaJ0?pid=Api
[datePublished] => 2025-07-04T15:39:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/61mUqSuaTOL._SL1096_.jpg
[hostPageUrl] => https://www.amazon.in/Introduction-Forecasting-Springer-Texts-Statistics/dp/3319298526
[contentSize] => 66529 B
[width] => 827
[height] => 1096
[cDNContentUrl] => https://th.bing.com/th/id/R.ae51b4e036882454b909fc7e2c48dd12?rik=XPuu8cZaYNJ6dA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 15AAB13439E23EEC3362747AD2605AC6F1AEFB5C
[accentColor] => C89803
)
[69ECD06286A51DD4220BAF36A9D36948EB8ED840] => Array
(
[name] => Security Engineering: A Guide to Building Dependable Distributed ...
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.3rVEqoar8QC4BYPQhI6TJwAAAA?pid=Api
[datePublished] => 2025-06-28T12:24:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/51YG0dHRqjL.jpg
[hostPageUrl] => https://www.amazon.in/Security-Engineering-Building-Dependable-Distributed-ebook/dp/B08P69FT4Q
[contentSize] => 40528 B
[width] => 375
[height] => 500
[cDNContentUrl] => https://th.bing.com/th/id/R.deb544aa86abf100b80583d0848e9327?rik=ls4NJmha0U0isA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 048DE8BE84963D9A63FAB0224DD15A68260DCE96
[accentColor] => 197A3C
)
[71AA966717C5BF03D8E390D54A66082F9A026479] => Array
(
[name] => Buy Introduction to Emergency Management and Disaster Science Book ...
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.Ta1u-nqhzl8ECvBVnmPawwHaKl?pid=Api
[datePublished] => 2021-08-13T04:17:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/81IzuA4zUBL._SL1500_.jpg
[hostPageUrl] => https://www.amazon.in/Introduction-Emergency-Management-Disaster-Science/dp/0367898993
[contentSize] => 208299 B
[width] => 1050
[height] => 1500
[cDNContentUrl] => https://th.bing.com/th/id/R.4dad6efa7aa1ce5f040af0559e63dac3?rik=F6ppdnFc%2bzCNPg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 974620A9F28066A45D093E8D30FB5C717669AA17
[accentColor] => 183A72
)
[0284368D3669B770F91381041E374175147AAB9E] => Array
(
[name] => Ignite Technologies – Ethical Hacking
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.ZlV1yFwvc4X1kstH3hvoIgHaEK?pid=Api
[datePublished] => 2020-03-14T15:32:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.ignitetechnologies.in/images/ethical-hacking.jpg
[hostPageUrl] => https://www.ignitetechnologies.in/ethical-hacking.html
[contentSize] => 394010 B
[width] => 1920
[height] => 1080
[cDNContentUrl] => https://th.bing.com/th/id/R.665575c85c2f7385f592cb47de1be822?rik=IEhj2GOWewefMQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => E9BAA741571473E14018319F077B9663D8634820
[accentColor] => 836248
)
[CCDF26DEA13E2169E1E6C2BBE0E8494EA7B11E6B] => Array
(
[name] => Buy Introduction to Algorithms, fourth edition Book Online at Low ...
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP._nMSRyzARxjqDu6gR2ACYQHaIb?pid=Api
[datePublished] => 2022-08-02T02:29:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/61Mw06x2XcL._SL1500_.jpg
[hostPageUrl] => https://www.amazon.in/Introduction-Algorithms-fourth-Thomas-Cormen/dp/026204630X
[contentSize] => 83942 B
[width] => 1317
[height] => 1500
[cDNContentUrl] => https://th.bing.com/th/id/R.fe7312472cc04718ea0eeea047600261?rik=zP1i7RrjEpYebg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => B6E11B7AE4948E0EBB2C6E1E9612E31AED62FDCC
[accentColor] => 004D86
)
[572DEC821085612533A0AE253DA9B94F8F1236F7] => Array
(
[name] => Unlocking the Power of Secure Digital Payments | EY - India
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.-9zHiIuyouh9ZKAfi5NXfQHaE8?pid=Api
[datePublished] => 2022-12-22T06:17:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.ey.com/content/dam/ey-unified-site/ey-com/en-in/insights/cybersecurity/images/ey-digital-payment.jpg
[hostPageUrl] => https://www.ey.com/en_in/insights/cybersecurity/how-to-unlock-the-power-of-digital-payments-through-security
[contentSize] => 578056 B
[width] => 3840
[height] => 2560
[cDNContentUrl] => https://th.bing.com/th/id/R.fbdcc7888bb2a2e87d64a01f8b93577d?rik=ddLOKAFYFlIzCg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 7F6321F8F49B9AD352EA0A335216580128CED275
[accentColor] => 363A81
)
[E9FEF346C5AFCE49B22EF28CE0812E72622755C6] => Array
(
[name] => Buy Introduction to Real Analysis Book Online at Low Prices in India ...
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.YLb14P2cDNie0AyBVdagVgHaKz?pid=Api
[datePublished] => 2011-03-04T12:00:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/51zHpsmqtpL.jpg
[hostPageUrl] => https://www.amazon.in/Introduction-Real-Analysis-Robert-Bartle/dp/0471433314
[contentSize] => 61783 B
[width] => 797
[height] => 1162
[cDNContentUrl] => https://th.bing.com/th/id/R.60b6f5e0fd9c0cd89ed00c8155d6a056?rik=nu8%2fZFz67JQr4g&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 6C55722627E2180EC82FE22B94ECFA5C643FEF9E
[accentColor] => C2C402
)
[915D873ECFD165719E320EEA88429C136293EFE4] => Array
(
[name] => Buy Introduction to Sociology Book Online at Low Prices in India ...
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.5xTsTRu-_GCHSM1cuojrkQHaJy?pid=Api
[datePublished] => 2024-06-15T04:40:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/61UxjN-S7lL._SL1200_.jpg
[hostPageUrl] => https://www.amazon.in/Introduction-Sociology-Anthony-Giddens/dp/1324062223
[contentSize] => 75585 B
[width] => 908
[height] => 1200
[cDNContentUrl] => https://th.bing.com/th/id/R.e714ec4d1bbefc608748cd5cba88eb91?rik=GdV44%2fwdVhfpIw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 4EFE392631C92488AEE023E917561DFCE378D519
[accentColor] => C29809
)
[4DA73373076EBED432D6AC9C778D6F6567763E18] => Array
(
[name] => Introduction to the Thermodynamics of Materials, Fifth Edition: Buy ...
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.JwdffVOh-HZ4J87UgrnlXwAAAA?pid=Api
[datePublished] => 2023-09-04T10:31:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => http://rukmini1.flixcart.com/image/300/300/k05ljm80/book/4/3/6/introduction-to-the-thermodynamics-of-materials-fifth-edition-original-imafjzv5tmwrbsxq.jpeg
[hostPageUrl] => https://www.flipkart.com/introduction-thermodynamics-materials/p/itmdyjyu6qgnmrze
[contentSize] => 18553 B
[width] => 185
[height] => 300
[cDNContentUrl] => https://th.bing.com/th/id/R.27075f7d53a1f8767827ced482b9e55f?rik=1HozN3Dm600jbQ&riu=http%3a%2f%2frukmini1.flixcart.com%2fimage%2f300%2f300%2fk05ljm80%2fbook%2f4%2f3%2f6%2fintroduction-to-the-thermodynamics-of-materials-fifth-edition-original-imafjzv5tmwrbsxq.jpeg&ehk=iEyAzgbrQ%2fyDjzthqhZ3qkKuU5llGHZKas4xE09aCH8%3d&risl=&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 81E3677656F6D877C9CA6D234DEBE67037337AD4
[accentColor] => 078367
)
[D657B666130E545D79810E5283CDC8B8F625B4CC] => Array
(
[name] => Connect AP Expo-2025 Date:27th - 29th June-2025 Venue : Gadiraju Palace ...
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.OP3VbeCMaHeRL4wQDamt3QAAAA?pid=Api
[datePublished] => 2023-06-24T14:59:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.connectap.co.in/assets/images/resource/informationtech.jpg
[hostPageUrl] => https://www.connectap.co.in/
[contentSize] => 107511 B
[width] => 360
[height] => 270
[cDNContentUrl] => https://th.bing.com/th/id/R.38fdd56de08c6877912f8c100da9addd?rik=bXVrZjHgRdWXGA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => CC4B526F8B8CDC3825E01897D545E031666B756D
[accentColor] => 23A2A8
)
[A429539ADF8DF99DB9D1100104E98F364E11FE18] => Array
(
[name] => Buy An Introduction To Mechanics Book Online at Low Prices in India ...
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.-J3qOyZOKrPhDN3AvPnSegHaH0?pid=Api
[datePublished] => 2021-06-25T17:50:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/810nPorcU9L._SL1417_.jpg
[hostPageUrl] => https://www.amazon.in/Introduction-Mechanics-Daniel-Kleppner/dp/0070350485
[contentSize] => 265372 B
[width] => 1342
[height] => 1417
[cDNContentUrl] => https://th.bing.com/th/id/R.f89dea3b264e2ab3e10cddc0bcf9d27a?rik=SpI1qf3Yn9mbHQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 81EF11E463F89E4010011D9BD99FD8FDA935924A
[accentColor] => 796C52
)
[33AF08EC196ABDB485E0449A40DF8E43A748384D] => Array
(
[name] => An Introduction of Indian Art Part - 1 and Part - 2 NCERT book Pdf download
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.tNKXPodnOoZHOXnNhJbd9gAAAA?pid=Api
[datePublished] => 2022-12-25T07:05:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrwFMRQE74h45ZnC4Ocwalo_kWk_Q5D3C8DusYZ3tZiUePCkoL4QQD_Wk20H1edi70qCVm1d_ej7aMOnP_lGKZWKKqt-5kcyP3rHOBn2M6hMH64SZsrHcYTDVhaZZYgZbg68DwxywVjoS-VMg2u2wy_5zO5vEo3eGHmBgyQIzkHhhIMV0H-VAFVdjhsA/s420/kefa1cc.jpg
[hostPageUrl] => https://www.iasnotes.in/2022/11/an-introduction-to-indian-art-part-1-and-part-2-art-and-culture-ncert-book-pdf.html
[contentSize] => 58737 B
[width] => 294
[height] => 420
[cDNContentUrl] => https://th.bing.com/th/id/R.b4d2973e87673a86473979cd8496ddf6?rik=M%2fqAzpGm20tYDg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => D483847A34E8FD04A9440E584BDBA691CE80FA33
[accentColor] => BA9211
)
[2F942F08D46705438D54B3C52889F8115D5AE0F8] => Array
(
[name] => Security Exam Questions And Answers Pdf Download - Fill Online ...
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.-Jjen8GIIHSfr5XHgBNyRAAAAA?pid=Api
[datePublished] => 2023-08-03T22:39:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.pdffiller.com/preview/400/836/400836289.png
[hostPageUrl] => https://www.pdffiller.com/400836289--PSISAPracticeTestpdf-security-guard-practice-test-download-pdf-
[contentSize] => 6460 B
[width] => 298
[height] => 386
[cDNContentUrl] => https://th.bing.com/th/id/R.f898de9fc18820749faf95c780137244?rik=8knygE12UDTYRQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 8F0EA5D5118F98825C3B45D83450764D80F249F2
[accentColor] => 4F4F4F
)
[B10AF913189ADCBDA62556102B40A781032B20F7] => Array
(
[name] => Privacy Protection - Competendo - Digital Toolbox
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.Eqo3V4m8vIbKVz7oKUaOFwAAAA?pid=Api
[datePublished] => 2019-06-24T08:03:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://competendo.net/en/images/thumb/0/04/Holisticsecurity.png/128px-Holisticsecurity.png
[hostPageUrl] => https://competendo.net/en/Privacy_Protection
[contentSize] => 46107 B
[width] => 128
[height] => 180
[cDNContentUrl] => https://th.bing.com/th/id/R.12aa375789bcbc86ca573ee829468e17?rik=G6CfMYGpzdtqUg&pid=ImgRaw&r=0
[isTransparent] => 1
[imageId] => 7F02B230187A04B20165526ADBCDA981319FA01B
[accentColor] => 364295
)
[2A287D434313421B61891668873D8D8382FC2916] => Array
(
[name] => A Classical Introduction to Cryptography: Applications for ...
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.Z9S4zAYda1pwvEOpP5xsTwAAAA?pid=Api
[datePublished] => 2025-07-22T19:15:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/41PVM0YRTRL._SY445_SX342_.jpg
[hostPageUrl] => https://www.amazon.in/Classical-Introduction-Cryptography-Applications-Communications-ebook/dp/B000WLSBSA
[contentSize] => 12496 B
[width] => 279
[height] => 445
[cDNContentUrl] => https://th.bing.com/th/id/R.67d4b8cc061d6b5a70bc43a93f9c6c4f?rik=ooLXNDQxJLEWmA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 6192CF2838D8D37886619816B124313434D782A2
[accentColor] => 0179B2
)
[0B99B431D14F5877B533E144F725CFAC602E71AC] => Array
(
[name] => Buy Introduction To Psychology, 7th Edition Book Online at Low Prices ...
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.m3jFcAHUsURp-y2S65TVxQHaJp?pid=Api
[datePublished] => 2022-04-24T19:07:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/61gaU+NXoVL._SL1100_.jpg
[hostPageUrl] => https://www.amazon.in/Introduction-Psychology-Clifford-Morgan/dp/0074622501
[contentSize] => 106141 B
[width] => 844
[height] => 1100
[cDNContentUrl] => https://th.bing.com/th/id/R.9b78c57001d4b14469fb2d92eb94d5c5?rik=sJlLEx30hXdbMw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => CA17E206CAFC527F441E335B7785F41D134B99B0
[accentColor] => C9C102
)
[2BF92F1B8002A849B740AD1E770B9BC321B9D4AD] => Array
(
[name] => Buy Computer and Information Security Handbook Book Online at Low ...
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.c0xRrTCQhk7XDidPWYOHWwAAAA?pid=Api
[datePublished] => 2023-11-03T14:40:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/4197jshzGwL.jpg
[hostPageUrl] => https://www.amazon.in/Computer-Information-Security-Handbook-Vacca/dp/0443132232
[contentSize] => 29074 B
[width] => 388
[height] => 500
[cDNContentUrl] => https://th.bing.com/th/id/R.734c51ad3090864ed70e274f5983875b?rik=sp%2fysQggipR7BA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => DA4D9B123CB9B077E1DA047B948A2008B1F29FB2
[accentColor] => 0B467D
)
[E492DD51552BB1BDACF9ED3C89441C7F8F8B5EA6] => Array
(
[name] => Buy AIX V6 Advanced Security Features Introduction and Configuration ...
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.s0oEoA_AMlbPATUDPmVLtAAAAA?pid=Api
[datePublished] => 2007-09-12T12:00:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/41-E+u3L94L._SY445_SX342_.jpg
[hostPageUrl] => https://www.amazon.in/Advanced-Security-Features-Introduction-Configuration/dp/0738489247
[contentSize] => 16252 B
[width] => 282
[height] => 445
[cDNContentUrl] => https://th.bing.com/th/id/R.b34a04a00fc03256cf0135033e654bb4?rik=TindFVWyG9vKnw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 6AE5B8F8F7C14498C3DE9FCADB1BB25515DD294E
[accentColor] => BB2910
)
[DF78A706167475F92D54722FE731BA55E8CC6450] => Array
(
[name] => Buy Introduction to Statistics and Data Analysis, AP® Edition Book ...
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.SzDJOjQPzls9Fi9xG5i57AHaJt?pid=Api
[datePublished] => 2022-12-18T00:57:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/81NVyzpvnDL._SL1500_.jpg
[hostPageUrl] => https://www.amazon.in/Introduction-Statistics-Data-Analysis-AP/dp/1337794422
[contentSize] => 184786 B
[width] => 1144
[height] => 1500
[cDNContentUrl] => https://th.bing.com/th/id/R.4b30c93a340fce5b3d162f711b98b9ec?rik=%2fYd6YGFHV5%2fSRQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 0546CC8E55AB137EF22745D29F574761607A87FD
[accentColor] => AC561F
)
[1B23EFF4698564C8F91FB22D36BE86E52D47131A] => Array
(
[name] => Buy Intro to Python for Computer Science and Data Science: Learning to ...
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.NkmyzavFJy89inpQYxxZXgHaJq?pid=Api
[datePublished] => 2024-12-13T10:38:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/71wP18MWVUL._SL1500_.jpg
[hostPageUrl] => https://www.amazon.in/Introduction-Python-Computer-Data-Sciences/dp/0135404673
[contentSize] => 172267 B
[width] => 1149
[height] => 1500
[cDNContentUrl] => https://th.bing.com/th/id/R.3649b2cdabc5272f3d8a7a50631c595e?rik=sTL%2bT5ZYRoyf8Q&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => A13174D25E68EB63D22BF19F8C4658964FFE32B1
[accentColor] => BFA30C
)
[B32C942A0BC93A664C4607ECA78A5F6B9943DEA2] => Array
(
[name] => Buy Introduction to Psychology Book Online at Low Prices in India ...
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.DenSLFL5pC1PcMmq_MFhcQHaJ4?pid=Api
[datePublished] => 2025-07-27T02:05:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/91FrkI+NL7L._SL1500_.jpg
[hostPageUrl] => https://www.amazon.in/Introduction-Psychology-Rita-L-Atkinson/dp/015508044X
[contentSize] => 124605 B
[width] => 1125
[height] => 1500
[cDNContentUrl] => https://th.bing.com/th/id/R.0de9d22c52f9a42d4f70c9aafcc16171?rik=O8JJorCco2bEZA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 2AED3499B6F5A87ACE7064C466A39CB0A249C23B
[accentColor] => 904F3B
)
[6E454DB2A3F9CDAA00F9C6CEE5A916A9336C6DDE] => Array
(
[name] => Buy Introduction to Autonomous Mobile Robots Book Online at Low Prices ...
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.cw7nx9uGpSBLOD9E-LNWPAHaJ3?pid=Api
[datePublished] => 2017-11-30T09:28:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/81D9K1HiIWL._SL1500_.jpg
[hostPageUrl] => https://www.amazon.in/Introduction-Autonomous-Mobile-Robots-Siegwart/dp/8120343220
[contentSize] => 114822 B
[width] => 1126
[height] => 1500
[cDNContentUrl] => https://th.bing.com/th/id/R.730ee7c7db86a5204b383f44f8b3563c?rik=5lTUKzqf3KoAnw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => EDD6C6339A619A5EEC6C9F00AADC9F3A2BD454E6
[accentColor] => 993632
)
[EDA1FFFCBCF9E5C42FD2CBE418D049DD0503B02B] => Array
(
[name] => Buy Introduction to Medical Terminology Book Online at Low Prices in ...
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.FFc7mE4zZX3LSjRa0VpZyQHaJl?pid=Api
[datePublished] => 2022-01-19T15:36:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/61z33DX-o4L._SL1000_.jpg
[hostPageUrl] => https://www.amazon.in/Introduction-Medical-Terminology-Linda-Stanhope/dp/1649253214
[contentSize] => 106894 B
[width] => 773
[height] => 1000
[cDNContentUrl] => https://th.bing.com/th/id/R.14573b984e33657dcb4a345ad15a59c9?rik=3hr%2fz8ufXkzyLQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => B20B3050DD940D814EBC2DF24C5E9FCBCFFF1ADE
[accentColor] => 04469B
)
[EE8FF62DF4F30D6FC3AF60A1C5306D695D7E7DDD] => Array
(
[name] => Instructor Review Copy for An Introduction to Psychological Science ...
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.RSFGRvZv7HSwm0v978vceQHaJw?pid=Api
[datePublished] => 2024-03-14T04:15:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/71QOJ9I0f1L._SL1500_.jpg
[hostPageUrl] => https://www.amazon.in/Instructor-Introduction-Psychological-Science-Canadian/dp/0137952945
[contentSize] => 121013 B
[width] => 1138
[height] => 1500
[cDNContentUrl] => https://th.bing.com/th/id/R.45214646f66fec74b09b4bfdefcbdc79?rik=7vhv0k8%2f0PY8%2bg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => DDD7E7D596D6035C1A06FA3CF6D03F4FD26FF8EE
[accentColor] => 1C937C
)
[873764B1909EA08CFA481925C2FA09D5C001B198] => Array
(
[name] => Computer Security | Principles and Practice | Fourth Edition | By ...
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.Zl-7USHUx6IH0j1r4Aiu4AHaKR?pid=Api
[datePublished] => 2020-09-09T08:18:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://rukminim1.flixcart.com/image/832/832/k1i6ikw0/book/8/6/9/computer-security-principles-and-practice-fourth-edition-by-original-imafhfk67gzk9zmh.jpeg?q=70
[hostPageUrl] => https://www.flipkart.com/computer-security-principles-practice-fourth-pearson/p/itm980f29a41475d
[contentSize] => 50172 B
[width] => 600
[height] => 832
[cDNContentUrl] => https://th.bing.com/th/id/R.665fbb5121d4c7a207d23d6be008aee0?rik=eHNGGwnpCsivhA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 891B100C5D90AF2C529184AFC80AE9091B467378
[accentColor] => B7141B
)
[FA47F0E0347A5BFFD9DCEF6593668BB3FEA31019] => Array
(
[name] => Introduction to Meta-Analysis eBook : Borenstein, Michael, Hedges ...
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.3jVC_-N4Ew0LPSXL_0KF6wAAAA?pid=Api
[datePublished] => 2025-06-22T20:07:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/41tanaZcvPS.jpg
[hostPageUrl] => https://www.amazon.in/Introduction-Meta-Analysis-Michael-Borenstein-ebook/dp/B093B4TZB2
[contentSize] => 23664 B
[width] => 334
[height] => 500
[cDNContentUrl] => https://th.bing.com/th/id/R.de3542ffe378130d0b3d25cbff4285eb?rik=r3QPDkOntf%2bdzQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 91013AEF3BB8663956FECD9DFFB5A7430E0F74AF
[accentColor] => 0B143F
)
[B982DBB59DE412B0611C32DED46547D8E6F95C89] => Array
(
[name] => Bot Verification
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.Bq5GaaOQm7jJZDoLc40Z-wHaEK?pid=Api
[datePublished] => 2025-06-08T06:03:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://targetcourse.in/wp-content/uploads/2025/06/20250608_094811-scaled.jpg
[hostPageUrl] => https://targetcourse.in/magadh-university-ug-1st-merit-list-2025-29/
[contentSize] => 247758 B
[width] => 2560
[height] => 1440
[cDNContentUrl] => https://th.bing.com/th/id/R.06ae4669a3909bb8c9643a0b738d19fb?rik=myi9W9lOIQsWwQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 98C59F6E8D74564DED23C1160B214ED95BBD289B
[accentColor] => A90000
)
[C6EED769E606E10061C8F6D4D738ABE655BD1918] => Array
(
[name] => Introduction To Algorithms 3rd Edition: Buy Introduction To Algorithms ...
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.310mtUaLaihmzEKB-KdtfAHaJv?pid=Api
[datePublished] => 2022-07-06T10:55:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://rukminim2.flixcart.com/image/832/832/kzrbiq80/regionalbooks/c/l/0/introduction-to-algorithms-3rd-edition-original-imagbp83xm6qdrzp.jpeg?q=70
[hostPageUrl] => https://www.flipkart.com/introduction-algorithms-3rd/p/itmfe21a60a4a2a1
[contentSize] => 49339 B
[width] => 633
[height] => 832
[cDNContentUrl] => https://th.bing.com/th/id/R.df5d26b5468b6a2866cc4281f8a76d7c?rik=bO59lm5gHgAWjA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 8191DB556EBA837D4D6F8C16001E606E967DEE6C
[accentColor] => 2A77A1
)
[25D7659B17FA589B760DA99DC17F8604BEBD19DE] => Array
(
[name] => The Stock Loan Handbook of Terms and Guidelines: Introduction to ...
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.ldv6es40i55OVn4gtWv0lAAAAA?pid=Api
[datePublished] => 2020-12-14T03:32:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/41CPeEXx50L._SY445_SX342_.jpg
[hostPageUrl] => https://www.amazon.in/Stock-Loan-Handbook-Terms-Guidelines/dp/0595416950
[contentSize] => 19032 B
[width] => 312
[height] => 445
[cDNContentUrl] => https://th.bing.com/th/id/R.95dbfa7ace348b9e4e567e20b56bf494?rik=Un1WuXGvhbln0A&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => ED91DBEB4068F71CD99AD067B985AF71B9567D52
[accentColor] => 203A5F
)
[FEAE41367C397D4F6C023BF913F9934BF3F8AE08] => Array
(
[name] => UP NEET PG 2022 Merit List Released at upneet.gov.in for Round 1 ...
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.ITyyyDhY7e-cgMadtbv8bAHaEK?pid=Api
[datePublished] => 2022-09-29T05:48:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://img.jagranjosh.com/images/2022/September/2992022/up-neet-pg-2022-merit-list-released.jpg
[hostPageUrl] => https://www.jagranjosh.com/news/up-neet-pg-2022-merit-list-released-at-upneet-gov-in-for-round-1-choice-filling-process-to-begin-soon-165029
[contentSize] => 209373 B
[width] => 1200
[height] => 675
[cDNContentUrl] => https://th.bing.com/th/id/R.213cb2c83858edef9c80c69db5bbfc6c?rik=7%2boUY8eT1%2fTGIA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 80EA8F3FB4399F319FB320C6F4D793C76314EAEF
[accentColor] => C2090A
)
[13E3A0DC0FC24DEA99C93B060B056A33497704E2] => Array
(
[name] => Buy Introduction to Anatomy & Physiology Book Online at Low Prices in ...
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.qDTabt8DfOIN8sUAx6nFmAHaJe?pid=Api
[datePublished] => 2022-12-20T22:00:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/61YZiYXrtyL._SL1000_.jpg
[hostPageUrl] => https://www.amazon.in/Introduction-Anatomy-Physiology-Susan-Hall/dp/1637768125
[contentSize] => 74624 B
[width] => 781
[height] => 1000
[cDNContentUrl] => https://th.bing.com/th/id/R.a834da6edf037ce20df2c500c7a9c598?rik=MT4KzfAs1K6ZnA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 2E40779433A650B060B39C99AED42CF0CD0A3E31
[accentColor] => 003B68
)
[931E1AAE30B9774996F0AFB94C7D7C3FE2511857] => Array
(
[name] => Introduction to FortiGate Part-1 Infrastructure: Fortinet Network ...
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.OgvKptpjtTBvuEGeB4zU7QAAAA?pid=Api
[datePublished] => 2020-10-20T07:49:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/51EqtseYsNL._SX342_SY445_.jpg
[hostPageUrl] => https://www.amazon.in/Introduction-FortiGate-Part-1-Infrastructure-Fortinet/dp/B08BF2PNTH
[contentSize] => 27840 B
[width] => 342
[height] => 443
[cDNContentUrl] => https://th.bing.com/th/id/R.3a0bcaa6da63b5306fb8419e078cd4ed?rik=OeGh6gObd5RpDw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 7581152EF3C7D7C49BFA0F6994779B03EAA1E139
[accentColor] => A76324
)
[98EE0EEF45DD698488A7DBF3FC3CAD0099C621A0] => Array
(
[name] => Introduction to Topology: Buy Introduction to Topology by Gamelin T.W ...
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.nrx44rdLLdai05aFHkTz0gHaLG?pid=Api
[datePublished] => 2021-02-12T16:52:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://rukminim1.flixcart.com/image/832/832/kk1h5e80/book/f/w/a/introduction-to-topology-original-imafzhexzhh9gfhy.jpeg?q=70
[hostPageUrl] => https://www.flipkart.com/introduction-to-topology/p/itmf81b4ed2a1a0e
[contentSize] => 42667 B
[width] => 555
[height] => 832
[cDNContentUrl] => https://th.bing.com/th/id/R.9ebc78e2b74b2dd6a2d396851e44f3d2?rik=ie7g%2flTdlkiIeg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 0A126C9900DAC3CF3FBD7A884896DD54FEE0EE89
[accentColor] => B38E18
)
[82BB798B2595A8AF9B055AA539A3D90E31D30158] => Array
(
[name] => Manufacturer Disclosure Statement For Medical Device Security Standards ...
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.yRCUhiXOs5ikQOHM1MSCAQAAAA?pid=Api
[datePublished] => 2019-03-22T21:22:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.pdffiller.com/preview/215/407/215407961.png
[hostPageUrl] => https://www.pdffiller.com/215407961-MDS2pdf-Manufacturer-Disclosure-Statement-for-Medical-Device-Security-
[contentSize] => 76848 B
[width] => 298
[height] => 386
[cDNContentUrl] => https://th.bing.com/th/id/R.c910948625ceb398a440e1ccd4c48201?rik=KLuXuFJZivq5UA&pid=ImgRaw&r=0
[isTransparent] => 1
[imageId] => 85103D13E09D3A935AA550B9FA8A5952B897BB28
[accentColor] => 0404C7
)
[D8FBE285939DE43503A99F314B3EA7824C24D90A] => Array
(
[name] => Principles of Management - GE3751 - Studocu
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.YFO0Dy-B3MdUH94aIDq__gAAAA?pid=Api
[datePublished] => 2024-11-05T09:32:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://website-assets.studocu.com/img/document_thumbnails/17e756026e19c0c5b33156a72889d19a/thumb_115_162.png
[hostPageUrl] => https://www.studocu.com/in/course/anna-university/principles-of-management/7221201
[contentSize] => 20285 B
[width] => 115
[height] => 162
[cDNContentUrl] => https://th.bing.com/th/id/R.6053b40f2f81dcc7541fde1a203abffe?rik=jb8uWDnZTlMwmg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => A09D42C4287AE3B413F99A30534ED939582EBF8D
[accentColor] => 5C5774
)
[811D41111229736994D5081A7E47F4C8C9007739] => Array
(
[name] => Buy INTRODUCTION TO COMBUSTION: CONCEPTS AND APPLICATIONS , 3RD EDN ...
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.7DditHWWw4nvecFQjd0qxAHaKC?pid=Api
[datePublished] => 2024-04-06T20:00:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/71JjNaFOieL._SL1100_.jpg
[hostPageUrl] => https://www.amazon.in/INTRODUCTION-COMBUSTION-CONCEPTS-APPLICATIONS-3RD/dp/1259025942
[contentSize] => 132663 B
[width] => 812
[height] => 1100
[cDNContentUrl] => https://th.bing.com/th/id/R.ec3762b47596c389ef79c1508ddd2ac4?rik=GNEUESGSN5ZJXQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 9377009C8C4F74E7A1805D49963792211114D118
[accentColor] => C58406
)
[CFAE5D8DB0AB26269462DBF650FADAA78A3168D8] => Array
(
[name] => Intro to Debugging Java Web Servers Without Source Code For Security ...
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.NjD7dgViYjXogM1L5uK5_QHaDu?pid=Api
[datePublished] => 2024-09-07T21:29:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => http://blog.jayateerthag.in/post/img/2024-07-16_intro-to-debugging-java-web-servers-without-source-code-for-security-researchers_4.png
[hostPageUrl] => https://blog.jayateerthag.in/post/intro-to-debugging-java-web-servers-without-source-code-for-security-researchers/
[contentSize] => 217255 B
[width] => 800
[height] => 403
[cDNContentUrl] => https://th.bing.com/th/id/R.3630fb7605626235e880cd4be6e2b9fd?rik=%2fOrV2Au6YmJJJg&riu=http%3a%2f%2fblog.jayateerthag.in%2fpost%2fimg%2f2024-07-16_intro-to-debugging-java-web-servers-without-source-code-for-security-researchers_4.png&ehk=5iJoBffV5sRx5aF1qtn1xwewG%2bQHaJX7noV%2f%2b26uP64%3d&risl=&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 8D8613A87AADAF056FBD26496262BA0BD8D5EAFC
[accentColor] => 0C74BF
)
[932B770EA8CB5F6F41FCF128412043B9B0905036] => Array
(
[name] => Grade R Objects in Nature Patterns
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.ANyCstAbcR6nBIhciCOghgAAAA?pid=Api
[datePublished] => 2024-02-21T15:30:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://images.twinkl.co.uk/tw1n/image/private/t_630_eco/image_repo/73/5f/za-hl-1702321109-grade-r-objects-in-nature-patterns_ver_1.jpg
[hostPageUrl] => https://www.twinkl.co.in/resource/grade-r-objects-in-nature-patterns-za-hl-1702321109
[contentSize] => 32910 B
[width] => 474
[height] => 237
[cDNContentUrl] => https://th.bing.com/th/id/R.00dc82b2d01b711ea704885c8823a086?rik=ObJ34Iq89fYUzw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 6305090B9B340214821FCF14F6F5BC8AE077B239
[accentColor] => 103A95
)
[A3FB1B2A9BDB973F754A2743F55DE769746A0D7F] => Array
(
[name] => Enhance Your Home Security with Tapo Cameras
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.uFj-BGkfcfbW3q49ETWMlQHaHa?pid=Api
[datePublished] => 2025-07-23T03:57:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://static.tp-link.com/upload/image-header/01_normal_20230714035517r.png
[hostPageUrl] => https://www.tapo.com/in/smart-home/home-security/
[contentSize] => 154989 B
[width] => 590
[height] => 590
[cDNContentUrl] => https://th.bing.com/th/id/R.b858fe04691f71f6d6deae3d11358c95?rik=Or%2bxorm9efNXpA&pid=ImgRaw&r=0
[isTransparent] => 1
[imageId] => F7D0A647967ED55F3472A457F379BDB9A2B1BF3A
[accentColor] => 8DA625
)
[7D3E77DE96E1A079BCFA28A5E43B17D7634DE122] => Array
(
[name] => Introduction To Chemical Engineering By Badger Pdf - Fill Online ...
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.FQ17ZWctJZRcOBD8BLbSdgAAAA?pid=Api
[datePublished] => 2022-09-06T10:21:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.pdffiller.com/preview/461/931/461931286.png
[hostPageUrl] => https://www.pdffiller.com/461931286--introduction-to-chemical-engineering-badger-pdf-download-
[contentSize] => 11878 B
[width] => 298
[height] => 386
[cDNContentUrl] => https://th.bing.com/th/id/R.150d7b65672d25945c3810fc04b6d276?rik=1%2bN37WkeCpfLrw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 221ED4367D71B34E5A82AFCB970A1E69ED77E3D7
[accentColor] => 0909C2
)
[135BCB7B9C9A08F6002F9467327E2401F10E244B] => Array
(
[name] => Cybersicurezza: Le quattro aree individuate in ambito UE | Cyber ...
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.ZXTO2xgoIQnzVVLPrOfbOgHaEK?pid=Api
[datePublished] => 2023-04-22T15:37:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.fondazioneleonardo.com/sites/default/files/styles/meta_image/public/2024-03/IMG_0429.jpg?itok=n9VJinUi
[hostPageUrl] => https://www.fondazioneleonardo.com/stories/cybersicurezza-le-quattro-aree-individuate-ambito-ue
[contentSize] => 127664 B
[width] => 1280
[height] => 720
[cDNContentUrl] => https://th.bing.com/th/id/R.6574cedb18282109f35552cface7db3a?rik=MbW8t8mpgG8A8g&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => B442E01F1042E7237649F2006F80A9C9B7BCB531
[accentColor] => 13A2B8
)
[C0FA7167B576934E10971154824CCCE1B0BFEDAD] => Array
(
[name] => International Security: A Very Short Introduction (E-Book, PDF) | PERRY ...
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIF.2sGXO8eROm2lQ14Uw1j97Q?pid=Api
[datePublished] => 2026-01-26T11:52:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://medien.umbreitkatalog.de/bildzentrale/978/019/164/5617.jpg
[hostPageUrl] => https://perry-rhodan.net/shop/item/9780191645617/international-security-a-very-short-introduction-von-christopher-s-browning-e-book-pdf
[contentSize] => 9421 B
[width] => 127
[height] => 200
[cDNContentUrl] => https://th.bing.com/th/id/R.92093a2121dbbd32f26a27177676fe19?rik=&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => DADEFB0B1ECCC42845117901E439675B7617AF0C
[accentColor] => 001B53
[isFresh] => 1
)
[966EF45AC818F9E34A09F3E3BBA73B0731A3561A] => Array
(
[name] => Buy Introduction to Quantum Mechanics Book Online at Low Prices in ...
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.k2CMyqileNHDilAc45hrtAHaJt?pid=Api
[datePublished] => 2018-05-06T12:34:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/61HBnuFYo-L.jpg
[hostPageUrl] => https://www.amazon.in/Introduction-Quantum-Mechanics-David-Griffiths/dp/1107189632
[contentSize] => 89803 B
[width] => 1037
[height] => 1360
[cDNContentUrl] => https://th.bing.com/th/id/R.93608ccaa8a578d1c38a501ce3986bb4?rik=aeZPpYyBnz6kkA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => A1653A1370B37ABB3E3F90A43E9F818CA54FE669
[accentColor] => 642324
)
[1DFB9F81901F1F9B475B6C6C7FE0DA81190FE392] => Array
(
[name] => Sample Introduction Of Guest Speaker - Fill Online, Printable, Fillable ...
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.5J186pktDKPF3VQRSDnIBwAAAA?pid=Api
[datePublished] => 2022-06-19T15:24:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.pdffiller.com/preview/101/720/101720735.png
[hostPageUrl] => https://www.pdffiller.com/101720735-Academic-Introduction-for-Guest-Speakerpdf-introduction-of-guest-speaker-sample-
[contentSize] => 5024 B
[width] => 298
[height] => 386
[cDNContentUrl] => https://th.bing.com/th/id/R.e49d7cea992d0ca3c5dd54114839c807?rik=0b%2f5GAnx8bl0tQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 293EF09118AD0EF7C6C6B574B9F1F10918F9BFD1
[accentColor] => 646667
)
[FBC615D5099F4267E1891847A7B256462BCCA834] => Array
(
[name] => Buy Introduction to Mathematical Statistics Book Online at Low Prices ...
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.zd-FDcB6sbufrA2FJX9CoAHaKW?pid=Api
[datePublished] => 2025-06-02T10:08:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/81nL3lVl1fL._SL1500_.jpg
[hostPageUrl] => https://www.amazon.in/Introduction-Mathematical-Statistics-Robert-Hogg/dp/0321794710
[contentSize] => 133468 B
[width] => 1073
[height] => 1500
[cDNContentUrl] => https://th.bing.com/th/id/R.cddf850dc07ab1bb9fac0d85257f42a0?rik=v2xRXZD5JHYemA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 438ACCB264652B7A7481981E7624F9905D516CBF
[accentColor] => 1E1E82
)
[C27148B3824FCD09B14577D3CF6F81A459750005] => Array
(
[name] => What 's New in Adobe RoboHelp
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.rkzXFGjqB21wCJtBu1Rv3wHaFI?pid=Api
[datePublished] => 2018-10-01T13:09:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://helpx-prod.scene7.com/is/image/HelpxProdLoc/pdf-security-settings?$png$&jpegSize=200&wid=904
[hostPageUrl] => https://helpx.adobe.com/in/robohelp/using/overview.html
[contentSize] => 22492 B
[width] => 904
[height] => 626
[cDNContentUrl] => https://th.bing.com/th/id/R.ae4cd71468ea076d70089b41bb546fdf?rik=LBeEOyj03JAbVA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 500057954A18F6FC3D77541B90DCF4283B84172C
[accentColor] => 1A5FB1
)
[956736EC12D35D01105EDE0574F238B6E0FD2C72] => Array
(
[name] => Buy An Introduction to R: Data Analysis and Visualization Book Online ...
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.z4k4Xw5PnoYJiWZ5RPidEQAAAA?pid=Api
[datePublished] => 2022-11-17T03:25:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/410FTZAsZqL._SY445_SX342_.jpg
[hostPageUrl] => https://www.amazon.in/Introduction-Analysis-Visualization-Research-Skills/dp/1784273384
[contentSize] => 16701 B
[width] => 311
[height] => 445
[cDNContentUrl] => https://th.bing.com/th/id/R.cf89385f0e4f9e860989667944f89d11?rik=WXZjziE91RAB5Q&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 27C2DF0E6B832F4750EDE50110D53D21CE637659
[accentColor] => 998B32
)
[F5AAACA7307A292EFCC677B6DD27895767E21DD7] => Array
(
[name] => Get CCTV Camera for Home and Office Security | Airtel Xsafe
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.c4HIkXCkrX438RpnO1FfGwHaTs?pid=Api
[datePublished] => 2023-09-27T04:24:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://assets.airtel.in/static-assets/b2c-surveillance/images/cms_pages/mobile_intro@2x.png
[hostPageUrl] => https://www.airtel.in/xsafe/cctv-camera
[contentSize] => 702011 B
[width] => 752
[height] => 2000
[cDNContentUrl] => https://th.bing.com/th/id/R.7381c89170a4ad7e37f11a673b515f1b?rik=X6rKegOnkuLPbA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 7DD12E76759872DD6B776CCFE292A7037ACAAA5F
[accentColor] => 5C6F61
)
[5AEB3D88C87B83B5A18BDBF650FADAA78A3168D8] => Array
(
[name] => Intro to Debugging Java Web Servers Without Source Code For Security ...
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.epIU4lp-JSb4tcGQHQS3_gHaE7?pid=Api
[datePublished] => 2024-09-07T21:29:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => http://blog.jayateerthag.in/post/img/2024-07-16_intro-to-debugging-java-web-servers-without-source-code-for-security-researchers_5.png
[hostPageUrl] => https://blog.jayateerthag.in/post/intro-to-debugging-java-web-servers-without-source-code-for-security-researchers/
[contentSize] => 349504 B
[width] => 800
[height] => 532
[cDNContentUrl] => https://th.bing.com/th/id/R.7a9214e25a7e2526f8b5c1901d04b7fe?rik=pb7TiIy3OFsauA&riu=http%3a%2f%2fblog.jayateerthag.in%2fpost%2fimg%2f2024-07-16_intro-to-debugging-java-web-servers-without-source-code-for-security-researchers_5.png&ehk=wN1ZQte%2bJPFnMMKy99%2bNObMeoK5rGnTxB6dtceeVzyQ%3d&risl=&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 8D8613A87AADAF056FBDB81A5B38B78C88D3BEA5
[accentColor] => AB2024
)
[F2DE32B14AEBDBDF1CDDDBF650FADAA78A3168D8] => Array
(
[name] => Intro to Debugging Java Web Servers Without Source Code For Security ...
[thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.8OZm_XEjvAX4kali5zQHwgHaD8?pid=Api
[datePublished] => 2024-09-07T21:29:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => http://blog.jayateerthag.in/post/img/2024-07-16_intro-to-debugging-java-web-servers-without-source-code-for-security-researchers_0.png
[hostPageUrl] => https://blog.jayateerthag.in/post/intro-to-debugging-java-web-servers-without-source-code-for-security-researchers/
[contentSize] => 159027 B
[width] => 800
[height] => 426
[cDNContentUrl] => https://th.bing.com/th/id/R.f0e666fd7123bc05f891a962e73407c2?rik=L%2b0jG6S%2bvf3B3Q&riu=http%3a%2f%2fblog.jayateerthag.in%2fpost%2fimg%2f2024-07-16_intro-to-debugging-java-web-servers-without-source-code-for-security-researchers_0.png&ehk=nLsDrx5ovPu%2b3R%2fNBTLBFIrqEdYQhBZYU7zGowxBFAk%3d&risl=&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 8D8613A87AADAF056FBDDDC1FDBDBEA41B23ED2F
[accentColor] => 763439
)
[21CB5FA3EF0C357B49E2EAFB6A4C7B4CBE49D20E] => Array
(
[name] => Buy Introduction to Unconstrained Optimization with R Book Online at ...
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.FkSoxqGeJHhpecHCLC7OiAAAAA?pid=Api
[datePublished] => 2024-08-14T11:05:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/41O7KQJZM1L._SY445_SX342_.jpg
[hostPageUrl] => https://www.amazon.in/Introduction-Unconstrained-Optimization-Shashi-Mishra/dp/9811508933
[contentSize] => 13444 B
[width] => 295
[height] => 445
[cDNContentUrl] => https://th.bing.com/th/id/R.1644a8c6a19e24786979c1c22c2ece88?rik=Erz1Ov7AU7eULg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => E02D94EBC4B7C4A6BFAE2E94B753C0FE3AF5BC12
[accentColor] => B31C0E
)
[05F73F825AECE47C0444693B7E491A3566FF7291] => Array
(
[name] => Secrets and Codes: Intro to Encryption - Cyber Security and Ethical ...
[thumbnailUrl] => https://tse3.mm.bing.net/th?id=OIF.GSSzcL3VcIiZOROyD%2bvR1Q&pid=Api
[datePublished] => 2026-01-24T07:02:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://cn.edurev.in/cdn_lib/v13/lib/img/content/cal.png
[hostPageUrl] => https://d.edurev.in/t/481037/Secrets-and-Codes-Intro-to-Encryption
[contentSize] => 2428 B
[width] => 132
[height] => 132
[cDNContentUrl] => https://th.bing.com/th/id/R.0c3b668c0816d97e89c75b65baddc452?rik=&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 1927FF6653A194E7B3964440C74ECEA528F37F50
[accentColor] => C90229
[isFresh] => 1
)
[51F5CA83BE1C456C0FD8AA8499F6D5707BF1F536] => Array
(
[name] => HP EliteBook 6 G1a 14 inch Notebook Next Gen AI PC specifications | HP ...
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.5LN5g2jqWysFvldz_r1M3QHaGE?pid=Api
[datePublished] => 2025-07-25T04:41:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://kaas.hpcloud.hp.com/PROD/v2/renderbinary/12312658/12311900/com-win-nb-p-elitebook-g1a-ngai-waffle14n-product-specifications/com-nb-elitebook-g1a-waffle-product-image
[hostPageUrl] => https://support.hp.com/in-en/document/ish_12312658-12312636-16
[contentSize] => 47396 B
[width] => 500
[height] => 410
[cDNContentUrl] => https://th.bing.com/th/id/R.e4b3798368ea5b2b05be5773febd4cdd?rik=FV%2bsOOvBVMbwjQ&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 635F1FB7075D6F9948AA8DF0C654C1EB38AC5F15
[accentColor] => 047EC7
)
[E7E26719E3D8F759683830DFA361F03674A37989] => Array
(
[name] => How to Unlock Password-protected PDF Online the Easy Way
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.W0_whFGNzV8VPZ4mXrxg5wHaEK?pid=Api
[datePublished] => 2025-04-15T15:18:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://images.wondershare.com/drfone/article/2025/05/how-to-open-a-password-protected-pdf-01.jpg
[hostPageUrl] => https://drfone.wondershare.com/pdf-unlock/pdf-remove-password-online-free.html
[contentSize] => 20848 B
[width] => 624
[height] => 351
[cDNContentUrl] => https://th.bing.com/th/id/R.5b4ff084518dcd5f153d9e265ebc60e7?rik=fi52kT6Nf5WGgw&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 98973A47630F163AFD038386957F8D3E91762E7E
[accentColor] => B41917
)
[46942CE58D40DC6BFD86B24DAF75A8F9CAACC50B] => Array
(
[name] => INTRODUCTION TO ELECTRIC CIRCUITS (6th Ed.) 6 Edition - Buy ...
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.bzMaGvsd5AGiHYIFJzuvqQHaJr?pid=Api
[datePublished] => 2018-04-09T08:23:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://rukminim1.flixcart.com/image/1408/1408/book/1/7/4/introduction-to-electric-circuits-6th-ed-original-imae5x5gsga75bwm.jpeg?q=90
[hostPageUrl] => https://www.flipkart.com/introduction-electric-circuits-6th-ed-6/p/itmdwua2qzy7bpb8
[contentSize] => 316533 B
[width] => 1077
[height] => 1408
[cDNContentUrl] => https://th.bing.com/th/id/R.6f331a1afb1de401a21d8205273bafa9?rik=ZEnCXtgEzbbfaA&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => B05CCAAC9F8A57FAD42B68DFB6CD04D85EC24964
[accentColor] => 460405
)
[8F44E8E6CEDF6927D81F5A872DEBAC6FE8EEE2B3] => Array
(
[name] => DBMS : Characteristics
[thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.ODhA61SNYSgbY5NejXg0HQHaEn?pid=Api
[datePublished] => 2020-12-10T06:12:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://minigranth.in/images/tutorials/DBMS%20IMAGES/DBMS%20Characteristics.jpeg
[hostPageUrl] => https://minigranth.in/dbms-tutorial/dbms-introduction
[contentSize] => 29259 B
[width] => 666
[height] => 415
[cDNContentUrl] => https://th.bing.com/th/id/R.383840eb548d61281b63935e8d78341d?rik=%2bESObuz9lnKN8Q&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 3B2EEE8EF6CABED278A5F18D7296FDEC6E8E44F8
[accentColor] => 9D2E30
)
[DD3252910CAF89CF919DD830419E91A49519E665] => Array
(
[name] => Buy Introduction to Hospitality Management Book Online at Low Prices in ...
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.j14ZPUvKbzAEzlbG8lKquwHaJ4?pid=Api
[datePublished] => 2016-01-07T12:00:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://m.media-amazon.com/images/I/919hXPE98dL._SL1500_.jpg
[hostPageUrl] => https://www.amazon.in/Introduction-Hospitality-Management-John-Walker/dp/0134151909
[contentSize] => 148639 B
[width] => 1125
[height] => 1500
[cDNContentUrl] => https://th.bing.com/th/id/R.8f5e193d4bca6f3004ce56c6f252aabb?rik=3SMlGcD6mPwZ2Q&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 566E91594A19E914038DD919FC98FAC0192523DD
[accentColor] => A57926
)
[0C4E9362877047EEC61E59BED215BA7F84BA6350] => Array
(
[name] => Security Survey Template - Fill and Sign Printable Template Online
[thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.3g1i3zfgNNT2wUnDWCGCmgAAAA?pid=Api
[datePublished] => 2021-07-29T00:28:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://www.pdffiller.com/preview/424/803/424803078.png
[hostPageUrl] => https://www.uslegalforms.com/form-library/497629-security-survey-template
[contentSize] => 10626 B
[width] => 298
[height] => 386
[cDNContentUrl] => https://th.bing.com/th/id/R.de0d62df37e034d4f6c149c35821829a?rik=wOQ5JngHdO5s4Q&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 0536AB48F7AB512DEB95E16CEE7407782639E4C0
[accentColor] => 4E4E4E
)
)
[relatedSearches] => Array
(
[0] => Array
(
[text] => Introduction to Computer Security PDF
[displayText] => Introduction to Computer Security PDF
[webSearchUrl] => https://www.bing.com/images/search?q=Introduction+to+Computer+Security+PDF&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5834.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Introduction+to+Computer+Security+PDF
[thumbnail] => Array
(
[thumbnailUrl] => https://tse1.mm.bing.net/th?q=Introduction+to+Computer+Security+PDF&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[1] => Array
(
[text] => Introduction to Cyber Security
[displayText] => Introduction to Cyber Security
[webSearchUrl] => https://www.bing.com/images/search?q=Introduction+to+Cyber+Security&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5836.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Introduction+to+Cyber+Security
[thumbnail] => Array
(
[thumbnailUrl] => https://tse1.mm.bing.net/th?q=Introduction+to+Cyber+Security&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[2] => Array
(
[text] => Network Security PDF
[displayText] => Network Security PDF
[webSearchUrl] => https://www.bing.com/images/search?q=Network+Security+PDF&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5838.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Network+Security+PDF
[thumbnail] => Array
(
[thumbnailUrl] => https://tse1.mm.bing.net/th?q=Network+Security+PDF&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[3] => Array
(
[text] => Information Security PDF
[displayText] => Information Security PDF
[webSearchUrl] => https://www.bing.com/images/search?q=Information+Security+PDF&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5840.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Information+Security+PDF
[thumbnail] => Array
(
[thumbnailUrl] => https://tse1.mm.bing.net/th?q=Information+Security+PDF&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[4] => Array
(
[text] => Introduction to Internet Security PDF
[displayText] => Introduction to Internet Security PDF
[webSearchUrl] => https://www.bing.com/images/search?q=Introduction+to+Internet+Security+PDF&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5842.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Introduction+to+Internet+Security+PDF
[thumbnail] => Array
(
[thumbnailUrl] => https://tse1.mm.bing.net/th?q=Introduction+to+Internet+Security+PDF&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[5] => Array
(
[text] => Introduction to It Security
[displayText] => Introduction to It Security
[webSearchUrl] => https://www.bing.com/images/search?q=Introduction+to+It+Security&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5844.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Introduction+to+It+Security
[thumbnail] => Array
(
[thumbnailUrl] => https://tse3.mm.bing.net/th?q=Introduction+to+It+Security&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[6] => Array
(
[text] => Introduction to Security Awareness
[displayText] => Introduction to Security Awareness
[webSearchUrl] => https://www.bing.com/images/search?q=Introduction+to+Security+Awareness&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5846.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Introduction+to+Security+Awareness
[thumbnail] => Array
(
[thumbnailUrl] => https://tse3.mm.bing.net/th?q=Introduction+to+Security+Awareness&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[7] => Array
(
[text] => Information Security and Cyber Law
[displayText] => Information Security and Cyber Law
[webSearchUrl] => https://www.bing.com/images/search?q=Information+Security+and+Cyber+Law&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5848.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Information+Security+and+Cyber+Law
[thumbnail] => Array
(
[thumbnailUrl] => https://tse3.mm.bing.net/th?q=Information+Security+and+Cyber+Law&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[8] => Array
(
[text] => Security in Computing PDF
[displayText] => Security in Computing PDF
[webSearchUrl] => https://www.bing.com/images/search?q=Security+in+Computing+PDF&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5850.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Security+in+Computing+PDF
[thumbnail] => Array
(
[thumbnailUrl] => https://tse4.mm.bing.net/th?q=Security+in+Computing+PDF&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[9] => Array
(
[text] => Introduction to Information Security Book
[displayText] => Introduction to Information Security Book
[webSearchUrl] => https://www.bing.com/images/search?q=Introduction+to+Information+Security+Book&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5852.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Introduction+to+Information+Security+Book
[thumbnail] => Array
(
[thumbnailUrl] => https://tse3.mm.bing.net/th?q=Introduction+to+Information+Security+Book&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[10] => Array
(
[text] => Introduction to Hardware Security
[displayText] => Introduction to Hardware Security
[webSearchUrl] => https://www.bing.com/images/search?q=Introduction+to+Hardware+Security&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5854.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Introduction+to+Hardware+Security
[thumbnail] => Array
(
[thumbnailUrl] => https://tse4.mm.bing.net/th?q=Introduction+to+Hardware+Security&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[11] => Array
(
[text] => Basic Computer Security
[displayText] => Basic Computer Security
[webSearchUrl] => https://www.bing.com/images/search?q=Basic+Computer+Security&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5856.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Basic+Computer+Security
[thumbnail] => Array
(
[thumbnailUrl] => https://tse2.mm.bing.net/th?q=Basic+Computer+Security&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[12] => Array
(
[text] => Introduction to Security Management
[displayText] => Introduction to Security Management
[webSearchUrl] => https://www.bing.com/images/search?q=Introduction+to+Security+Management&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5858.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Introduction+to+Security+Management
[thumbnail] => Array
(
[thumbnailUrl] => https://tse3.mm.bing.net/th?q=Introduction+to+Security+Management&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[13] => Array
(
[text] => Introduction to Security Controls
[displayText] => Introduction to Security Controls
[webSearchUrl] => https://www.bing.com/images/search?q=Introduction+to+Security+Controls&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5860.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Introduction+to+Security+Controls
[thumbnail] => Array
(
[thumbnailUrl] => https://tse4.mm.bing.net/th?q=Introduction+to+Security+Controls&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[14] => Array
(
[text] => Leter of Introduction Security
[displayText] => Leter of Introduction Security
[webSearchUrl] => https://www.bing.com/images/search?q=Leter+of+Introduction+Security&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5862.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Leter+of+Introduction+Security
[thumbnail] => Array
(
[thumbnailUrl] => https://tse2.mm.bing.net/th?q=Leter+of+Introduction+Security&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[15] => Array
(
[text] => Introduction to Security Procedures
[displayText] => Introduction to Security Procedures
[webSearchUrl] => https://www.bing.com/images/search?q=Introduction+to+Security+Procedures&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5864.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Introduction+to+Security+Procedures
[thumbnail] => Array
(
[thumbnailUrl] => https://tse2.mm.bing.net/th?q=Introduction+to+Security+Procedures&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[16] => Array
(
[text] => PDF Security 101 Introduction to Private Security Carolina Press
[displayText] => PDF Security 101 Introduction to Private Security Carolina Press
[webSearchUrl] => https://www.bing.com/images/search?q=PDF+Security+101+Introduction+to+Private+Security+Carolina+Press&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5866.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=PDF+Security+101+Introduction+to+Private+Security+Carolina+Press
[thumbnail] => Array
(
[thumbnailUrl] => https://tse1.mm.bing.net/th?q=PDF+Security+101+Introduction+to+Private+Security+Carolina+Press&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[17] => Array
(
[text] => Introduction OT Security
[displayText] => Introduction OT Security
[webSearchUrl] => https://www.bing.com/images/search?q=Introduction+OT+Security&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5868.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Introduction+OT+Security
[thumbnail] => Array
(
[thumbnailUrl] => https://tse2.mm.bing.net/th?q=Introduction+OT+Security&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[18] => Array
(
[text] => Introduction to Code Security
[displayText] => Introduction to Code Security
[webSearchUrl] => https://www.bing.com/images/search?q=Introduction+to+Code+Security&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5870.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Introduction+to+Code+Security
[thumbnail] => Array
(
[thumbnailUrl] => https://tse3.mm.bing.net/th?q=Introduction+to+Code+Security&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[19] => Array
(
[text] => Cyber Security Policy PDF
[displayText] => Cyber Security Policy PDF
[webSearchUrl] => https://www.bing.com/images/search?q=Cyber+Security+Policy+PDF&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5872.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Cyber+Security+Policy+PDF
[thumbnail] => Array
(
[thumbnailUrl] => https://tse2.mm.bing.net/th?q=Cyber+Security+Policy+PDF&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[20] => Array
(
[text] => Introduction of Digital Security
[displayText] => Introduction of Digital Security
[webSearchUrl] => https://www.bing.com/images/search?q=Introduction+of+Digital+Security&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5874.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Introduction+of+Digital+Security
[thumbnail] => Array
(
[thumbnailUrl] => https://tse4.mm.bing.net/th?q=Introduction+of+Digital+Security&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[21] => Array
(
[text] => Cyber Security Framework PDF
[displayText] => Cyber Security Framework PDF
[webSearchUrl] => https://www.bing.com/images/search?q=Cyber+Security+Framework+PDF&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5876.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Cyber+Security+Framework+PDF
[thumbnail] => Array
(
[thumbnailUrl] => https://tse4.mm.bing.net/th?q=Cyber+Security+Framework+PDF&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[22] => Array
(
[text] => Introduction to Device Security
[displayText] => Introduction to Device Security
[webSearchUrl] => https://www.bing.com/images/search?q=Introduction+to+Device+Security&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5878.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Introduction+to+Device+Security
[thumbnail] => Array
(
[thumbnailUrl] => https://tse2.mm.bing.net/th?q=Introduction+to+Device+Security&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[23] => Array
(
[text] => Introduction to Information Security 1 Chapter Explain in Gujarati Language PDF
[displayText] => Introduction to Information Security 1 Chapter Explain in Gujarati Language PDF
[webSearchUrl] => https://www.bing.com/images/search?q=Introduction+to+Information+Security+1+Chapter+Explain+in+Gujarati+Language+PDF&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5880.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Introduction+to+Information+Security+1+Chapter+Explain+in+Gujarati+Language+PDF
[thumbnail] => Array
(
[thumbnailUrl] => https://tse3.mm.bing.net/th?q=Introduction+to+Information+Security+1+Chapter+Explain+in+Gujarati+Language+PDF&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[24] => Array
(
[text] => Assignment Introduction for Security Photo
[displayText] => Assignment Introduction for Security Photo
[webSearchUrl] => https://www.bing.com/images/search?q=Assignment+Introduction+for+Security+Photo&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5882.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Assignment+Introduction+for+Security+Photo
[thumbnail] => Array
(
[thumbnailUrl] => https://tse1.mm.bing.net/th?q=Assignment+Introduction+for+Security+Photo&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[25] => Array
(
[text] => Great Introduction to Security
[displayText] => Great Introduction to Security
[webSearchUrl] => https://www.bing.com/images/search?q=Great+Introduction+to+Security&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5884.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Great+Introduction+to+Security
[thumbnail] => Array
(
[thumbnailUrl] => https://tse1.mm.bing.net/th?q=Great+Introduction+to+Security&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[26] => Array
(
[text] => Introduction to Network Security Basics
[displayText] => Introduction to Network Security Basics
[webSearchUrl] => https://www.bing.com/images/search?q=Introduction+to+Network+Security+Basics&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5886.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Introduction+to+Network+Security+Basics
[thumbnail] => Array
(
[thumbnailUrl] => https://tse1.mm.bing.net/th?q=Introduction+to+Network+Security+Basics&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[27] => Array
(
[text] => Introduction to Security Guarding
[displayText] => Introduction to Security Guarding
[webSearchUrl] => https://www.bing.com/images/search?q=Introduction+to+Security+Guarding&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5888.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Introduction+to+Security+Guarding
[thumbnail] => Array
(
[thumbnailUrl] => https://tse3.mm.bing.net/th?q=Introduction+to+Security+Guarding&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[28] => Array
(
[text] => Fundamentals of Network Security
[displayText] => Fundamentals of Network Security
[webSearchUrl] => https://www.bing.com/images/search?q=Fundamentals+of+Network+Security&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5890.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Fundamentals+of+Network+Security
[thumbnail] => Array
(
[thumbnailUrl] => https://tse2.mm.bing.net/th?q=Fundamentals+of+Network+Security&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[29] => Array
(
[text] => Security Team Introduction
[displayText] => Security Team Introduction
[webSearchUrl] => https://www.bing.com/images/search?q=Security+Team+Introduction&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5892.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Security+Team+Introduction
[thumbnail] => Array
(
[thumbnailUrl] => https://tse2.mm.bing.net/th?q=Security+Team+Introduction&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[30] => Array
(
[text] => Intro to Cyber Security
[displayText] => Intro to Cyber Security
[webSearchUrl] => https://www.bing.com/images/search?q=Intro+to+Cyber+Security&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5894.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Intro+to+Cyber+Security
[thumbnail] => Array
(
[thumbnailUrl] => https://tse3.mm.bing.net/th?q=Intro+to+Cyber+Security&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[31] => Array
(
[text] => Information Technology Security PDF
[displayText] => Information Technology Security PDF
[webSearchUrl] => https://www.bing.com/images/search?q=Information+Technology+Security+PDF&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5896.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Information+Technology+Security+PDF
[thumbnail] => Array
(
[thumbnailUrl] => https://tse3.mm.bing.net/th?q=Information+Technology+Security+PDF&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[32] => Array
(
[text] => Ontariotech IT Security Course PDF
[displayText] => Ontariotech IT Security Course PDF
[webSearchUrl] => https://www.bing.com/images/search?q=Ontariotech+IT+Security+Course+PDF&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5898.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Ontariotech+IT+Security+Course+PDF
[thumbnail] => Array
(
[thumbnailUrl] => https://tse3.mm.bing.net/th?q=Ontariotech+IT+Security+Course+PDF&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[33] => Array
(
[text] => Introduction to Information Assurance and Security
[displayText] => Introduction to Information Assurance and Security
[webSearchUrl] => https://www.bing.com/images/search?q=Introduction+to+Information+Assurance+and+Security&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5900.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Introduction+to+Information+Assurance+and+Security
[thumbnail] => Array
(
[thumbnailUrl] => https://tse4.mm.bing.net/th?q=Introduction+to+Information+Assurance+and+Security&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[34] => Array
(
[text] => Introduction to Security and Loss Prevention
[displayText] => Introduction to Security and Loss Prevention
[webSearchUrl] => https://www.bing.com/images/search?q=Introduction+to+Security+and+Loss+Prevention&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5902.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Introduction+to+Security+and+Loss+Prevention
[thumbnail] => Array
(
[thumbnailUrl] => https://tse2.mm.bing.net/th?q=Introduction+to+Security+and+Loss+Prevention&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[35] => Array
(
[text] => Principles of Computer Security
[displayText] => Principles of Computer Security
[webSearchUrl] => https://www.bing.com/images/search?q=Principles+of+Computer+Security&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5904.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Principles+of+Computer+Security
[thumbnail] => Array
(
[thumbnailUrl] => https://tse2.mm.bing.net/th?q=Principles+of+Computer+Security&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[36] => Array
(
[text] => Types of Computer Security PDF
[displayText] => Types of Computer Security PDF
[webSearchUrl] => https://www.bing.com/images/search?q=Types+of+Computer+Security+PDF&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5906.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Types+of+Computer+Security+PDF
[thumbnail] => Array
(
[thumbnailUrl] => https://tse2.mm.bing.net/th?q=Types+of+Computer+Security+PDF&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[37] => Array
(
[text] => Cyber Security Free PDF Download
[displayText] => Cyber Security Free PDF Download
[webSearchUrl] => https://www.bing.com/images/search?q=Cyber+Security+Free+PDF+Download&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5908.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Cyber+Security+Free+PDF+Download
[thumbnail] => Array
(
[thumbnailUrl] => https://tse4.mm.bing.net/th?q=Cyber+Security+Free+PDF+Download&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[38] => Array
(
[text] => Introduction to Security Clip Art
[displayText] => Introduction to Security Clip Art
[webSearchUrl] => https://www.bing.com/images/search?q=Introduction+to+Security+Clip+Art&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5910.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Introduction+to+Security+Clip+Art
[thumbnail] => Array
(
[thumbnailUrl] => https://tse3.mm.bing.net/th?q=Introduction+to+Security+Clip+Art&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[39] => Array
(
[text] => Introduction of Security Company
[displayText] => Introduction of Security Company
[webSearchUrl] => https://www.bing.com/images/search?q=Introduction+of+Security+Company&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5912.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Introduction+of+Security+Company
[thumbnail] => Array
(
[thumbnailUrl] => https://tse1.mm.bing.net/th?q=Introduction+of+Security+Company&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[40] => Array
(
[text] => Self Introduction for Interview with Cyber Security Note Book
[displayText] => Self Introduction for Interview with Cyber Security Note Book
[webSearchUrl] => https://www.bing.com/images/search?q=Self+Introduction+for+Interview+with+Cyber+Security+Note+Book&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5914.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Self+Introduction+for+Interview+with+Cyber+Security+Note+Book
[thumbnail] => Array
(
[thumbnailUrl] => https://tse1.mm.bing.net/th?q=Self+Introduction+for+Interview+with+Cyber+Security+Note+Book&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[41] => Array
(
[text] => Introduction an Over View On Cyber Security
[displayText] => Introduction an Over View On Cyber Security
[webSearchUrl] => https://www.bing.com/images/search?q=Introduction+an+Over+View+On+Cyber+Security&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5916.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Introduction+an+Over+View+On+Cyber+Security
[thumbnail] => Array
(
[thumbnailUrl] => https://tse1.mm.bing.net/th?q=Introduction+an+Over+View+On+Cyber+Security&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[42] => Array
(
[text] => Cyber Security Introduction Paragraph
[displayText] => Cyber Security Introduction Paragraph
[webSearchUrl] => https://www.bing.com/images/search?q=Cyber+Security+Introduction+Paragraph&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5918.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Cyber+Security+Introduction+Paragraph
[thumbnail] => Array
(
[thumbnailUrl] => https://tse4.mm.bing.net/th?q=Cyber+Security+Introduction+Paragraph&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[43] => Array
(
[text] => Introduuction to Cyber Security PDF
[displayText] => Introduuction to Cyber Security PDF
[webSearchUrl] => https://www.bing.com/images/search?q=Introduuction+to+Cyber+Security+PDF&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5920.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Introduuction+to+Cyber+Security+PDF
[thumbnail] => Array
(
[thumbnailUrl] => https://tse2.mm.bing.net/th?q=Introduuction+to+Cyber+Security+PDF&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[44] => Array
(
[text] => Introduction for Security Concepts
[displayText] => Introduction for Security Concepts
[webSearchUrl] => https://www.bing.com/images/search?q=Introduction+for+Security+Concepts&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5922.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Introduction+for+Security+Concepts
[thumbnail] => Array
(
[thumbnailUrl] => https://tse3.mm.bing.net/th?q=Introduction+for+Security+Concepts&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[45] => Array
(
[text] => Information Security Textbook PDF
[displayText] => Information Security Textbook PDF
[webSearchUrl] => https://www.bing.com/images/search?q=Information+Security+Textbook+PDF&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5924.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Information+Security+Textbook+PDF
[thumbnail] => Array
(
[thumbnailUrl] => https://tse3.mm.bing.net/th?q=Information+Security+Textbook+PDF&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[46] => Array
(
[text] => Introduction to Information Security Cert
[displayText] => Introduction to Information Security Cert
[webSearchUrl] => https://www.bing.com/images/search?q=Introduction+to+Information+Security+Cert&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5926.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Introduction+to+Information+Security+Cert
[thumbnail] => Array
(
[thumbnailUrl] => https://tse4.mm.bing.net/th?q=Introduction+to+Information+Security+Cert&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[47] => Array
(
[text] => Introduction to It Security Threats
[displayText] => Introduction to It Security Threats
[webSearchUrl] => https://www.bing.com/images/search?q=Introduction+to+It+Security+Threats&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5928.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Introduction+to+It+Security+Threats
[thumbnail] => Array
(
[thumbnailUrl] => https://tse4.mm.bing.net/th?q=Introduction+to+It+Security+Threats&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[48] => Array
(
[text] => Conclusion Introduction to Information Security
[displayText] => Conclusion Introduction to Information Security
[webSearchUrl] => https://www.bing.com/images/search?q=Conclusion+Introduction+to+Information+Security&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5930.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Conclusion+Introduction+to+Information+Security
[thumbnail] => Array
(
[thumbnailUrl] => https://tse1.mm.bing.net/th?q=Conclusion+Introduction+to+Information+Security&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
[49] => Array
(
[text] => Introduction to Computer Security Text
[displayText] => Introduction to Computer Security Text
[webSearchUrl] => https://www.bing.com/images/search?q=Introduction+to+Computer+Security+Text&FORM=IRPATC
[webSearchUrlPingSuffix] => images.LB.1,5932.1
[searchLink] => https://www.bing.com/api/v7/images/search?q=Introduction+to+Computer+Security+Text
[thumbnail] => Array
(
[thumbnailUrl] => https://tse4.mm.bing.net/th?q=Introduction+to+Computer+Security+Text&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
)
)
)
[createdate] => 1769611489800
)
[json_error] => No error
[products_count] => 120
[related_searches_count] => 50
[first_product_sample] => Array
(
[name] => Buy PT INR Log Book Printable, Inr Tracker, INR Anticoagulant ...
[thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.Nl3LmTtT2zWIfO6zaPl46QAAAA?pid=Api
[datePublished] => 2022-03-10T14:45:00.0000000Z
[isFamilyFriendly] => 1
[contentUrl] => https://i.etsystatic.com/31451663/r/il/f96a3b/3342764419/il_300x300.3342764419_9yil.jpg
[hostPageUrl] => https://www.etsy.com/in-en/listing/1075090759/pt-inr-log-book-printable-inr-tracker
[contentSize] => 11955 B
[width] => 300
[height] => 300
[cDNContentUrl] => https://th.bing.com/th/id/R.365dcb993b53db35887ceeb368f978e9?rik=77q4kHIGyGodbg&pid=ImgRaw&r=0
[isTransparent] =>
[imageId] => 79CC8004E3695D25186D6E1D6AC8067290B8BAEF
[accentColor] => 7E4D57
)
)
[skipped_products] => Array
(
)
)