Kraft102's picture
Update backend source
34367da verified
[
{
"id": "25836012",
"title": "Project...Ankit\nUploaded by Ankit Chhabra\n0%\n78 pages | 78 pages to go",
"url": "https://www.scribd.com/document/25836012/Project-Ankit",
"doc_type": "document",
"source": "saved"
},
{
"id": "963715042",
"title": "Complex Surveys Analysis of Categorical Data 1st Edition Parimal Mukhopadhyay (Auth.) ebook guaranteed full access\nUploaded by divyadomnica1297\n0%\n47 pages | 47 pages to go",
"url": "https://www.scribd.com/document/963715042/Complex-Surveys-Analysis-of-Categorical-Data-1st-Edition-Parimal-Mukhopadhyay-Auth-ebook-guaranteed-full-access",
"doc_type": "document",
"source": "saved"
},
{
"id": "738405876",
"title": "CYBER_MCQ\nUploaded by manvirj01\n0%\n13 pages | 13 pages to go",
"url": "https://www.scribd.com/document/738405876/CYBER-MCQ",
"doc_type": "document",
"source": "saved"
},
{
"id": "756327653",
"title": "Cyber+Magazine+ +June+2024\nUploaded by matlnx\n0%\n196 pages | 196 pages to go",
"url": "https://www.scribd.com/document/756327653/Cyber-Magazine-June-2024",
"doc_type": "document",
"source": "saved"
},
{
"id": "357342968",
"title": "Cyber Red Team\nUploaded by Lalo Landa\n0%\n49 pages | 49 pages to go",
"url": "https://www.scribd.com/document/357342968/Cyber-Red-Team",
"doc_type": "document",
"source": "saved"
},
{
"id": "864346967",
"title": "The State of AI Cyber Security\nUploaded by Jaikrishn Singh\n0%\n59 pages | 59 pages to go",
"url": "https://www.scribd.com/document/864346967/The-State-of-AI-Cyber-Security",
"doc_type": "document",
"source": "saved"
},
{
"id": "275347815",
"title": "Pipeline Cyber Security\nUploaded by Amit Kumar\n0%\n13 pages | 13 pages to go",
"url": "https://www.scribd.com/document/275347815/Pipeline-Cyber-Security",
"doc_type": "document",
"source": "saved"
},
{
"id": "756327568",
"title": "Cyber Magazine January 2024\nUploaded by matlnx\n0%\n132 pages | 132 pages to go",
"url": "https://www.scribd.com/document/756327568/Cyber-Magazine-January-2024",
"doc_type": "document",
"source": "saved"
},
{
"id": "726931041",
"title": "REPORT_STATE_OF_AI_CYBER_SECURITY_2024_1714045778\nUploaded by dresses.wearier.0n\n0%\n32 pages | 32 pages to go",
"url": "https://www.scribd.com/document/726931041/REPORT-STATE-OF-AI-CYBER-SECURITY-2024-1714045778",
"doc_type": "document",
"source": "saved"
},
{
"id": "817018367",
"title": "Gen Ai Syllabus\nUploaded by Ramgopal Prajapati\n0%\n27 pages | 27 pages to go",
"url": "https://www.scribd.com/document/817018367/Gen-Ai-Syllabus",
"doc_type": "document",
"source": "saved"
},
{
"id": "709621918",
"title": "beyond-the-hype-capturing-the-potential-of-ai-and-gen-ai-in-tmt\nUploaded by khcheng\n0%\n126 pages | 126 pages to go",
"url": "https://www.scribd.com/document/709621918/beyond-the-hype-capturing-the-potential-of-ai-and-gen-ai-in-tmt",
"doc_type": "document",
"source": "saved"
},
{
"id": "245928819",
"title": "Bible Ethics\nUploaded by nazim2851\n0%\n385 pages | 385 pages to go",
"url": "https://www.scribd.com/document/245928819/Bible-Ethics",
"doc_type": "document",
"source": "saved"
},
{
"id": "714361813",
"title": "Gen AI\nUploaded by sj3010\n0%\n73 pages | 73 pages to go",
"url": "https://www.scribd.com/document/714361813/Gen-AI",
"doc_type": "document",
"source": "saved"
},
{
"id": "703234974",
"title": "LEAKED_COURSES_updated\nUploaded by realxpmyth\n0%\n3 pages | 3 pages to go",
"url": "https://www.scribd.com/document/703234974/LEAKED-COURSES-updated",
"doc_type": "document",
"source": "saved"
},
{
"id": "415161982",
"title": "New Report\nUploaded by Ashihs\n0%\n760 pages | 760 pages to go",
"url": "https://www.scribd.com/document/415161982/New-Report",
"doc_type": "document",
"source": "saved"
},
{
"id": "393492311",
"title": "Red Hat Enterprise Linux-8-Beta-Configuring Basic System Settings-En-US\nUploaded by js\n0%\n135 pages | 135 pages to go",
"url": "https://www.scribd.com/document/393492311/Red-Hat-Enterprise-Linux-8-Beta-Configuring-Basic-System-Settings-En-US",
"doc_type": "document",
"source": "saved"
},
{
"id": "201469029",
"title": "nexus-book-pdf.pdf\nUploaded by Andrea Martire\n0%\n446 pages | 446 pages to go",
"url": "https://www.scribd.com/document/201469029/nexus-book-pdf-pdf",
"doc_type": "document",
"source": "saved"
},
{
"id": "302469721",
"title": "Preferred Practices for Historical Repositories\nUploaded by Dan Octavian Paul\n0%\n188 pages | 188 pages to go",
"url": "https://www.scribd.com/document/302469721/Preferred-Practices-for-Historical-Repositories",
"doc_type": "document",
"source": "saved"
},
{
"id": "37540640",
"title": "Introduction and presentation of Learning resource repositories\nUploaded by riina_vuorikari\n0%\n147 pages | 147 pages to go",
"url": "https://www.scribd.com/document/37540640/Introduction-and-presentation-of-Learning-resource-repositories",
"doc_type": "document",
"source": "saved"
},
{
"id": "779187672",
"title": "Organizational Memory and Knowledge Repositories\nUploaded by Justin Joseph\n0%\n100 pages | 100 pages to go",
"url": "https://www.scribd.com/document/779187672/Organizational-Memory-and-Knowledge-Repositories",
"doc_type": "document",
"source": "saved"
},
{
"id": "854241996",
"title": "11th Computer New Book 2025 Punjab Text Book Board\nUploaded by Imran Hussain Khan\n0%\n160 pages | 160 pages to go",
"url": "https://www.scribd.com/document/854241996/11th-Computer-New-Book-2025-Punjab-Text-Book-Board",
"doc_type": "document",
"source": "saved"
},
{
"id": "769363747",
"title": "Awesome-ChatGPT-repositories CN\nUploaded by Marcos Luis\n0%\n88 pages | 88 pages to go",
"url": "https://www.scribd.com/document/769363747/Awesome-ChatGPT-repositories-CN",
"doc_type": "document",
"source": "saved"
},
{
"id": "875134779",
"title": "5K_Link_mega.nz\nUploaded by valfroypdemba\n0%\n157 pages | 157 pages to go",
"url": "https://www.scribd.com/document/875134779/5K-Link-mega-nz",
"doc_type": "document",
"source": "saved"
},
{
"id": "640946987",
"title": "ChatGPT\nUploaded by Paulo Rebelo\n0%\n29 pages | 29 pages to go",
"url": "https://www.scribd.com/document/640946987/ChatGPT",
"doc_type": "document",
"source": "saved"
},
{
"id": "878498772",
"title": "ChatGPT.pdf\nUploaded by Florian Croiset\n0%\n49 pages | 49 pages to go",
"url": "https://www.scribd.com/document/878498772/ChatGPT-pdf",
"doc_type": "document",
"source": "saved"
},
{
"id": "660685938",
"title": "ChatGPT\nUploaded by sophia787\n0%\n37 pages | 37 pages to go",
"url": "https://www.scribd.com/document/660685938/ChatGPT",
"doc_type": "document",
"source": "saved"
},
{
"id": "836918955",
"title": "Dark-GPT _ Chat GPT 4 powered OSINT Tool\nUploaded by tanzeel6720\n0%\n2 pages | 2 pages to go",
"url": "https://www.scribd.com/document/836918955/Dark-GPT-Chat-GPT-4-powered-OSINT-Tool",
"doc_type": "document",
"source": "saved"
},
{
"id": "675665703",
"title": "POA_Leaking of Confidential Investigation Information\nUploaded by MissionLocal\n0%\n2 pages | 2 pages to go",
"url": "https://www.scribd.com/document/675665703/POA-Leaking-of-Confidential-Investigation-Information",
"doc_type": "document",
"source": "saved"
},
{
"id": "668299530",
"title": "Demand Gen Beta\nUploaded by Natty G\n0%\n63 pages | 63 pages to go",
"url": "https://www.scribd.com/document/668299530/Demand-Gen-Beta",
"doc_type": "document",
"source": "saved"
},
{
"id": "572492704",
"title": "Isg Next Gen Adm Quad Report Uk\nUploaded by Pradyumna Hathwar\n0%\n68 pages | 68 pages to go",
"url": "https://www.scribd.com/document/572492704/Isg-Next-Gen-Adm-Quad-Report-Uk",
"doc_type": "document",
"source": "saved"
},
{
"id": "845863631",
"title": "[25D2S01]_[Keynote Speech] AI First 시대의 시작\nUploaded by 이동환\n0%\n43 pages | 43 pages to go",
"url": "https://www.scribd.com/document/845863631/25D2S01-Keynote-Speech-AI-First-%E1%84%89%E1%85%B5%E1%84%83%E1%85%A2%E1%84%8B%E1%85%B4-%E1%84%89%E1%85%B5%E1%84%8C%E1%85%A1%E1%86%A8",
"doc_type": "document",
"source": "saved"
},
{
"id": "885286843",
"title": "Generative AI Leader (ILT)_Module2_Gen AI - Unlock Foundational Concepts\nUploaded by bluehkpuyi\n0%\n163 pages | 163 pages to go",
"url": "https://www.scribd.com/document/885286843/Generative-AI-Leader-ILT-Module2-Gen-AI-Unlock-Foundational-Concepts",
"doc_type": "document",
"source": "saved"
},
{
"id": "885286734",
"title": "Generative AI Leader (ILT)_Course Opening and Module1_Gen AI - Beyond the Chatbot\nUploaded by bluehkpuyi\n0%\n149 pages | 149 pages to go",
"url": "https://www.scribd.com/document/885286734/Generative-AI-Leader-ILT-Course-Opening-and-Module1-Gen-AI-Beyond-the-Chatbot",
"doc_type": "document",
"source": "saved"
},
{
"id": "317496717",
"title": "Human Rights Law Reviewer Commissioner Sarmiento\nUploaded by Megan Mateo\n0%\n5 pages | 5 pages to go",
"url": "https://www.scribd.com/document/317496717/Human-Rights-Law-Reviewer-Commissioner-Sarmiento",
"doc_type": "document",
"source": "saved"
},
{
"id": "901699254",
"title": "Verification for International AI Governance. July - 2025\nUploaded by GDIAZ\n0%\n172 pages | 172 pages to go",
"url": "https://www.scribd.com/document/901699254/Verification-for-International-AI-Governance-July-2025",
"doc_type": "document",
"source": "saved"
},
{
"id": "718012655",
"title": "100-Practical-Applications-and-Use-Cases-of-Generative-AI-in-Media-EN\nUploaded by rjnathan\n0%\n117 pages | 117 pages to go",
"url": "https://www.scribd.com/document/718012655/100-Practical-Applications-and-Use-Cases-of-Generative-AI-in-Media-EN",
"doc_type": "document",
"source": "saved"
},
{
"id": "917985338",
"title": "AI for Law - Book\nUploaded by chrkrs43\n0%\n101 pages | 101 pages to go",
"url": "https://www.scribd.com/document/917985338/AI-for-Law-Book",
"doc_type": "document",
"source": "saved"
},
{
"id": "701579921",
"title": "LLM_.Foundation.Models.from.the.Ground.Up\nUploaded by tanooskar\n0%\n195 pages | 195 pages to go",
"url": "https://www.scribd.com/document/701579921/LLM-Foundation-Models-from-the-Ground-Up",
"doc_type": "document",
"source": "saved"
},
{
"id": "737423783",
"title": "Tom Taulli - ChatGPT and Bard for Business Automation_ Achieving AI-Driven Growth (2023, Apress) - Libgen.li\nUploaded by Dino Nejašmić\n0%\n181 pages | 181 pages to go",
"url": "https://www.scribd.com/document/737423783/Tom-Taulli-ChatGPT-and-Bard-for-Business-Automation-Achieving-AI-Driven-Growth-2023-Apress-Libgen-li",
"doc_type": "document",
"source": "saved"
},
{
"id": "746741435",
"title": "Cryptography Notes\nUploaded by Susmit\n0%\n267 pages | 267 pages to go",
"url": "https://www.scribd.com/document/746741435/Cryptography-Notes",
"doc_type": "document",
"source": "saved"
},
{
"id": "755401746",
"title": "The ChatGPT-4 Alchemist the Secret to Mastering Prompts -- Novak, Jk -- 2023 -- Zen Robot Publishing -- e061d55645fdccf04820318abb6ac104 -- Anna’s Archive\nUploaded by Thomas Leon Highbaugh\n0%\n191 page",
"url": "https://www.scribd.com/document/755401746/The-ChatGPT-4-Alchemist-the-Secret-to-Mastering-Prompts-Novak-Jk-2023-Zen-Robot-Publishing-e061d55645fdccf04820318abb6ac104-Anna-s-Arc",
"doc_type": "document",
"source": "saved"
},
{
"id": "756541741",
"title": "Al New Scientist the Essential Guides – Issue 23, The AI Revolution\nUploaded by Balasubramanian Ponnuswami\n0%\n100 pages | 100 pages to go",
"url": "https://www.scribd.com/document/756541741/Al-New-Scientist-the-Essential-Guides-Issue-23-The-AI-Revolution",
"doc_type": "document",
"source": "saved"
},
{
"id": "887022170",
"title": "Gen AI for Developers Preread\nUploaded by Zenobia Sethna\n0%\n103 pages | 103 pages to go",
"url": "https://www.scribd.com/document/887022170/Gen-AI-for-Developers-Preread",
"doc_type": "document",
"source": "saved"
},
{
"id": "701302889",
"title": "Microsoft Building AI-Powered Apps\nUploaded by Jonas Melotte\n0%\n105 pages | 105 pages to go",
"url": "https://www.scribd.com/document/701302889/Microsoft-Building-AI-Powered-Apps",
"doc_type": "document",
"source": "saved"
},
{
"id": "686766356",
"title": "ChatGPT Bible Entrepreneur's Special Edition Unlocking Secret AI-Powered Strategies for Unprecedented Business Growth\nUploaded by lifeepic462\n0%\n150 pages | 150 pages to go",
"url": "https://www.scribd.com/document/686766356/ChatGPT-Bible-Entrepreneur-s-Special-Edition-Unlocking-Secret-AI-Powered-Strategies-for-Unprecedented-Business-Growth",
"doc_type": "document",
"source": "saved"
},
{
"id": "796906160",
"title": "Etika ChatGPT - Prof. Wisnu UI\nUploaded by Juniar Firdiansyah\n0%\n119 pages | 119 pages to go",
"url": "https://www.scribd.com/document/796906160/Etika-ChatGPT-Prof-Wisnu-UI",
"doc_type": "document",
"source": "saved"
},
{
"id": "661714383",
"title": "CGS eBook Transformative AI\nUploaded by Joao Rangel\n0%\n101 pages | 101 pages to go",
"url": "https://www.scribd.com/document/661714383/CGS-eBook-Transformative-AI",
"doc_type": "document",
"source": "saved"
},
{
"id": "902415823",
"title": "ChatGPT Manual (English)\nUploaded by Menos Lobos\n0%\n109 pages | 109 pages to go",
"url": "https://www.scribd.com/document/902415823/ChatGPT-Manual-English",
"doc_type": "document",
"source": "saved"
},
{
"id": "819701398",
"title": "ChatGPT Generative AI in Corporate Law Departments 2023\nUploaded by Manyata Dave\n0%\n19 pages | 19 pages to go",
"url": "https://www.scribd.com/document/819701398/ChatGPT-Generative-AI-in-Corporate-Law-Departments-2023",
"doc_type": "document",
"source": "saved"
},
{
"id": "737720575",
"title": ".\nUploaded by OLARTE TRISHA\n0%\n20 pages | 20 pages to go",
"url": "https://www.scribd.com/document/737720575/",
"doc_type": "document",
"source": "saved"
},
{
"id": "787508896",
"title": "A Survey on Recent Advances in LLM-Based Multi-turn Dialogue Systems\nUploaded by mengyingzhu\n0%\n35 pages | 35 pages to go",
"url": "https://www.scribd.com/document/787508896/A-Survey-on-Recent-Advances-in-LLM-Based-Multi-turn-Dialogue-Systems",
"doc_type": "document",
"source": "saved"
},
{
"id": "951254594",
"title": "CyberSecurity Unit 3\nUploaded by disha mondal\n0%\n76 pages | 76 pages to go",
"url": "https://www.scribd.com/document/951254594/CyberSecurity-Unit-3",
"doc_type": "document",
"source": "saved"
},
{
"id": "856592461",
"title": "GIDS - Building Robust, Secure LLM and Agentic AI Workflows\nUploaded by Nick\n0%\n36 pages | 36 pages to go",
"url": "https://www.scribd.com/document/856592461/GIDS-Building-Robust-Secure-LLM-and-Agentic-AI-Workflows",
"doc_type": "document",
"source": "saved"
},
{
"id": "859868297",
"title": "100daysofcybersecurity\nUploaded by vosepob416\n0%\n62 pages | 62 pages to go",
"url": "https://www.scribd.com/document/859868297/100daysofcybersecurity",
"doc_type": "document",
"source": "saved"
},
{
"id": "652937615",
"title": "Generative AI and ChatGPT Enterprise Risks\nUploaded by Taranga Sen\n0%\n34 pages | 34 pages to go",
"url": "https://www.scribd.com/document/652937615/Generative-AI-and-ChatGPT-Enterprise-Risks",
"doc_type": "document",
"source": "saved"
},
{
"id": "750395204",
"title": "Chat GPT Bible - Lawyers and Legal Professionals Special Edition (Lucas Foster)\nUploaded by Practica\n0%\n114 pages | 114 pages to go",
"url": "https://www.scribd.com/document/750395204/Chat-GPT-Bible-Lawyers-and-Legal-Professionals-Special-Edition-Lucas-Foster",
"doc_type": "document",
"source": "saved"
},
{
"id": "765663960",
"title": "NVIDIA Blackwell Architecture Technical Overview\nUploaded by Hien\n0%\n22 pages | 22 pages to go",
"url": "https://www.scribd.com/document/765663960/NVIDIA-Blackwell-Architecture-Technical-Overview",
"doc_type": "document",
"source": "saved"
},
{
"id": "838410229",
"title": "Survey_of_research_on_confidential_computing\nUploaded by Raghu Nayak\n0%\n22 pages | 22 pages to go",
"url": "https://www.scribd.com/document/838410229/Survey-of-research-on-confidential-computing",
"doc_type": "document",
"source": "saved"
},
{
"id": "647922860",
"title": "Chatgpt an Ai Nlp Model Pov\nUploaded by LEGEND OFFICIAL\n0%\n11 pages | 11 pages to go",
"url": "https://www.scribd.com/document/647922860/Chatgpt-an-Ai-Nlp-Model-Pov",
"doc_type": "document",
"source": "saved"
},
{
"id": "918248806",
"title": "Integrating AI Into ADHD Therapy Insights From ChatGPT‑4o\nUploaded by al200658\n0%\n16 pages | 16 pages to go",
"url": "https://www.scribd.com/document/918248806/Integrating-AI-Into-ADHD-Therapy-Insights-From-ChatGPT-4o",
"doc_type": "document",
"source": "saved"
},
{
"id": "883727299",
"title": "ChatGPT for Digital Forensic Investigation\nUploaded by asmat.ncscholar\n0%\n10 pages | 10 pages to go",
"url": "https://www.scribd.com/document/883727299/ChatGPT-for-Digital-Forensic-Investigation",
"doc_type": "document",
"source": "saved"
},
{
"id": "934145939",
"title": "Qwen3 Technical Report\nUploaded by marskaili\n0%\n70 pages | 70 pages to go",
"url": "https://www.scribd.com/document/934145939/Qwen3-Technical-Report",
"doc_type": "document",
"source": "saved"
},
{
"id": "701201452",
"title": "sw assignment\nUploaded by sisayderiba936\n0%\n64 pages | 64 pages to go",
"url": "https://www.scribd.com/document/701201452/sw-assignment",
"doc_type": "document",
"source": "saved"
},
{
"id": "810958330",
"title": "2025_Ransomware_Survival_Guide\nUploaded by Gats\n0%\n17 pages | 17 pages to go",
"url": "https://www.scribd.com/document/810958330/2025-Ransomware-Survival-Guide",
"doc_type": "document",
"source": "saved"
},
{
"id": "854348597",
"title": "Liska a. Ransomware. Understand. Prevent. Recover 2ed 2023\nUploaded by R Rocco\n0%\n320 pages | 320 pages to go",
"url": "https://www.scribd.com/document/854348597/Liska-a-Ransomware-Understand-Prevent-Recover-2ed-2023",
"doc_type": "document",
"source": "saved"
},
{
"id": "697213566",
"title": "2022-12 TJ Media December 2022 Full Songlist-P\nUploaded by HErSON LU\n0%\n127 pages | 127 pages to go",
"url": "https://www.scribd.com/document/697213566/2022-12-TJ-Media-December-2022-Full-Songlist-P",
"doc_type": "document",
"source": "saved"
},
{
"id": "678582702",
"title": "VAMsecurity Part 1\nUploaded by Mansi Singh\n0%\n141 pages | 141 pages to go",
"url": "https://www.scribd.com/document/678582702/VAMsecurity-Part-1",
"doc_type": "document",
"source": "saved"
},
{
"id": "815246795",
"title": "La sécurité de réseau\nUploaded by Hanane taterkine\n0%\n132 pages | 132 pages to go",
"url": "https://www.scribd.com/document/815246795/La-sA-curitA-de-rA-seau",
"doc_type": "document",
"source": "saved"
},
{
"id": "743592684",
"title": "KODLAB - Kendi Siteni Kendin Koru\nUploaded by 53nolife34\n0%\n297 pages | 297 pages to go",
"url": "https://www.scribd.com/document/743592684/KODLAB-Kendi-Siteni-Kendin-Koru",
"doc_type": "document",
"source": "saved"
},
{
"id": "543141153",
"title": "Ransomware-Understand-Prevent-Recover\nUploaded by marcus_fabio\n0%\n317 pages | 317 pages to go",
"url": "https://www.scribd.com/document/543141153/Ransomware-Understand-Prevent-Recover",
"doc_type": "document",
"source": "saved"
},
{
"id": "778118955",
"title": "Malware Analysis WannaCry.exe Malicious Activity _ ANY.run - Malware Sandbox Online\nUploaded by lautaroddb\n0%\n128 pages | 128 pages to go",
"url": "https://www.scribd.com/document/778118955/Malware-Analysis-WannaCry-exe-Malicious-Activity-ANY-run-Malware-Sandbox-Online",
"doc_type": "document",
"source": "saved"
},
{
"id": "757963859",
"title": "A Relevance Model for Threat-Centric Ranking of Cybersecurity Vul\nUploaded by saumya.jsps\n0%\n232 pages | 232 pages to go",
"url": "https://www.scribd.com/document/757963859/A-Relevance-Model-for-Threat-Centric-Ranking-of-Cybersecurity-Vul",
"doc_type": "document",
"source": "saved"
},
{
"id": "378833792",
"title": "Common Password List\nUploaded by Jim Joseph\n0%\n170 pages | 170 pages to go",
"url": "https://www.scribd.com/document/378833792/common-password-list",
"doc_type": "document",
"source": "saved"
},
{
"id": "365716391",
"title": "Mapping Area.xlsx\nUploaded by Deby Putra Bahrodin\n0%\n160 pages | 160 pages to go",
"url": "https://www.scribd.com/document/365716391/Mapping-Area-xlsx",
"doc_type": "document",
"source": "saved"
},
{
"id": "523726483",
"title": "subdomains-10000\nUploaded by Andrey\n0%\n170 pages | 170 pages to go",
"url": "https://www.scribd.com/document/523726483/subdomains-10000",
"doc_type": "document",
"source": "saved"
},
{
"id": "682262343",
"title": "Document\nUploaded by Francis Kim\n0%\n158 pages | 158 pages to go",
"url": "https://www.scribd.com/document/682262343/Document",
"doc_type": "document",
"source": "saved"
},
{
"id": "746101118",
"title": "global leads batches\nUploaded by mohan\n0%\n324 pages | 324 pages to go",
"url": "https://www.scribd.com/document/746101118/global-leads-batches",
"doc_type": "document",
"source": "saved"
},
{
"id": "86715736",
"title": "Microsoft complaint against Zeus botnet operators\nUploaded by stshank\n0%\n162 pages | 162 pages to go",
"url": "https://www.scribd.com/document/86715736/Microsoft-complaint-against-Zeus-botnet-operators",
"doc_type": "document",
"source": "saved"
},
{
"id": "928832200",
"title": "База арбитражников\nUploaded by Ooo Sss\n0%\n1,229 pages | 1,229 pages to go",
"url": "https://www.scribd.com/document/928832200/%D0%91%D0%B0%D0%B7%D0%B0-%D0%B0%D1%80%D0%B1%D0%B8%D1%82%D1%80%D0%B0%D0%B6%D0%BD%D0%B8%D0%BA%D0%BE%D0%B2",
"doc_type": "document",
"source": "saved"
},
{
"id": "776335814",
"title": "Chrome Hammer Ascension\nUploaded by Blackdogzx\n0%\n102 pages | 102 pages to go",
"url": "https://www.scribd.com/document/776335814/Chrome-Hammer-Ascension",
"doc_type": "document",
"source": "saved"
},
{
"id": "869868516",
"title": "Web Hacking Incident Database (WHID)\nUploaded by jeronimosanboni\n0%\n306 pages | 306 pages to go",
"url": "https://www.scribd.com/document/869868516/Web-Hacking-Incident-Database-WHID",
"doc_type": "document",
"source": "saved"
},
{
"id": "807286566",
"title": "angel investors list\nUploaded by Goldy Kakkar\n0%\n122 pages | 122 pages to go",
"url": "https://www.scribd.com/document/807286566/angel-investors-list",
"doc_type": "document",
"source": "saved"
},
{
"id": "382016560",
"title": "Anonymous Cyber Team By Mr.tl25\nUploaded by k m\n0%\n108 pages | 108 pages to go",
"url": "https://www.scribd.com/document/382016560/Anonymous-Cyber-Team-By-Mr-tl25",
"doc_type": "document",
"source": "saved"
},
{
"id": "757502151",
"title": "2022 Linux Foundation Annual Report\nUploaded by donothingaccount\n0%\n141 pages | 141 pages to go",
"url": "https://www.scribd.com/document/757502151/2022-Linux-Foundation-Annual-Report",
"doc_type": "document",
"source": "saved"
},
{
"id": "804291293",
"title": "Lightspeed Ventures\nUploaded by aryanchawathe2016\n0%\n200 pages | 200 pages to go",
"url": "https://www.scribd.com/document/804291293/Lightspeed-Ventures",
"doc_type": "document",
"source": "saved"
},
{
"id": "697321982",
"title": "SOCRadar 2023 End of Year Report\nUploaded by Søren Kleist\n0%\n44 pages | 44 pages to go",
"url": "https://www.scribd.com/document/697321982/SOCRadar-2023-End-of-Year-Report",
"doc_type": "document",
"source": "saved"
},
{
"id": "816056322",
"title": "Israeli Cyber Exits Landscape\nUploaded by kassahun\n0%\n22 pages | 22 pages to go",
"url": "https://www.scribd.com/document/816056322/Israeli-Cyber-Exits-Landscape",
"doc_type": "document",
"source": "saved"
},
{
"id": "849584227",
"title": "Web Hacking Incident Database (WHID)\nUploaded by chutiyaland0001\n0%\n32 pages | 32 pages to go",
"url": "https://www.scribd.com/document/849584227/Web-Hacking-Incident-Database-WHID",
"doc_type": "document",
"source": "saved"
},
{
"id": "845256129",
"title": "roblox require scripts 2019-2021\nUploaded by mertdick6\n0%\n25 pages | 25 pages to go",
"url": "https://www.scribd.com/document/845256129/roblox-require-scripts-2019-2021",
"doc_type": "document",
"source": "saved"
},
{
"id": "633734503",
"title": "DauHoang-WebSecurity-Chapter-2-Web-common-attacks.pdf\nUploaded by Lâm Nguyễn\n0%\n153 pages | 153 pages to go",
"url": "https://www.scribd.com/document/633734503/DauHoang-WebSecurity-Chapter-2-Web-common-attacks-pdf",
"doc_type": "document",
"source": "saved"
},
{
"id": "533943193",
"title": "Cyber-defense-Canada-\nUploaded by Foceno Team\n0%\n101 pages | 101 pages to go",
"url": "https://www.scribd.com/document/533943193/Cyber-defense-Canada",
"doc_type": "document",
"source": "saved"
},
{
"id": "849924988",
"title": "Dokumen.pub Gray Hat Hacking the Ethical Hackers Handbook 5nbsped 1260108414 9781260108415\nUploaded by Hichem CHERNI\n0%\n751 pages | 751 pages to go",
"url": "https://www.scribd.com/document/849924988/Dokumen-pub-Gray-Hat-Hacking-the-Ethical-Hackers-Handbook-5nbsped-1260108414-9781260108415",
"doc_type": "document",
"source": "saved"
},
{
"id": "814507639",
"title": "Password Attacks\nUploaded by u412908\n0%\n106 pages | 106 pages to go",
"url": "https://www.scribd.com/document/814507639/Password-Attacks",
"doc_type": "document",
"source": "saved"
},
{
"id": "586952838",
"title": "ELearnSecurity EWPT Notes\nUploaded by akttripathi\n0%\n370 pages | 370 pages to go",
"url": "https://www.scribd.com/document/586952838/ELearnSecurity-EWPT-Notes",
"doc_type": "document",
"source": "saved"
},
{
"id": "798949545",
"title": "Cyber Security Handbook\nUploaded by darasridhar\n0%\n236 pages | 236 pages to go",
"url": "https://www.scribd.com/document/798949545/Cyber-Security-Handbook",
"doc_type": "document",
"source": "saved"
},
{
"id": "906390339",
"title": "511.2\nUploaded by fareselmenair15\n0%\n199 pages | 199 pages to go",
"url": "https://www.scribd.com/document/906390339/511-2",
"doc_type": "document",
"source": "saved"
},
{
"id": "598753504",
"title": "Black_hat_rust - Copy (2)\nUploaded by jeffreydahmer420\n0%\n357 pages | 357 pages to go",
"url": "https://www.scribd.com/document/598753504/Black-hat-rust-Copy-2",
"doc_type": "document",
"source": "saved"
},
{
"id": "516353656",
"title": "The Penetration Tester s Guide to Web Applications\nUploaded by Kocsis Csaba Örkény\n0%\n217 pages | 217 pages to go",
"url": "https://www.scribd.com/document/516353656/The-Penetration-Tester-s-Guide-to-Web-Applications",
"doc_type": "document",
"source": "saved"
},
{
"id": "802552451",
"title": "Cybersecurity Mastery Defeat Cyber Threats\nUploaded by Saina Ralaizanaka\n0%\n371 pages | 371 pages to go",
"url": "https://www.scribd.com/document/802552451/Cybersecurity-Mastery-Defeat-Cyber-Threats",
"doc_type": "document",
"source": "saved"
},
{
"id": "685049794",
"title": "top-50-cybersecurity-threats\nUploaded by eddiebarlowjr\n0%\n101 pages | 101 pages to go",
"url": "https://www.scribd.com/document/685049794/top-50-cybersecurity-threats",
"doc_type": "document",
"source": "saved"
},
{
"id": "473927433",
"title": "Cyber_security_report_Accenture_1571448013\nUploaded by Hassan\n0%\n102 pages | 102 pages to go",
"url": "https://www.scribd.com/document/473927433/Cyber-security-report-Accenture-1571448013",
"doc_type": "document",
"source": "saved"
},
{
"id": "509437745",
"title": "47433_53838_41146_53413_12_ceh_hacking_web_applications\nUploaded by Jacobus Booysen\n0%\n111 pages | 111 pages to go",
"url": "https://www.scribd.com/document/509437745/47433-53838-41146-53413-12-ceh-hacking-web-applications",
"doc_type": "document",
"source": "saved"
},
{
"id": "583822895",
"title": "1st Cyber-Arms-Watch_Transperancy_Report_HCSS_May22\nUploaded by Alexandre Olivio de Andrade\n0%\n188 pages | 188 pages to go",
"url": "https://www.scribd.com/document/583822895/1st-Cyber-Arms-Watch-Transperancy-Report-HCSS-May22",
"doc_type": "document",
"source": "saved"
},
{
"id": "799113382",
"title": "Cyber Security 5 Unit Notes\nUploaded by 217r1a07f1cmrtc.ac.in\n0%\n106 pages | 106 pages to go",
"url": "https://www.scribd.com/document/799113382/Cyber-Security-5-Unit-Notes",
"doc_type": "document",
"source": "saved"
},
{
"id": "470985459",
"title": "Cyber Security_ Learn The Basics of Cyber Security, Threat Management, Cyber Warfare Concepts and Executive-Level Policies.\nUploaded by Bala\n0%\n108 pages | 108 pages to go",
"url": "https://www.scribd.com/document/470985459/Cyber-Security-Learn-The-Basics-of-Cyber-Security-Threat-Management-Cyber-Warfare-Concepts-and-Executive-Level-Policies",
"doc_type": "document",
"source": "saved"
},
{
"id": "712300900",
"title": "Building Cyber Security Warriors in 30 Days\nUploaded by Foryanto J. Wiguna\n0%\n191 pages | 191 pages to go",
"url": "https://www.scribd.com/document/712300900/Building-Cyber-Security-Warriors-in-30-Days",
"doc_type": "document",
"source": "saved"
},
{
"id": "819046623",
"title": "The Art of Penetration Testing a Practical Guide\nUploaded by Rose Storm\n0%\n221 pages | 221 pages to go",
"url": "https://www.scribd.com/document/819046623/The-Art-of-Penetration-Testing-a-Practical-Guide",
"doc_type": "document",
"source": "saved"
},
{
"id": "698131480",
"title": "Breaching_the_Cloud_Perimeter_Slides\nUploaded by refakyu\n0%\n144 pages | 144 pages to go",
"url": "https://www.scribd.com/document/698131480/Breaching-the-Cloud-Perimeter-Slides",
"doc_type": "document",
"source": "saved"
},
{
"id": "721063118",
"title": "EXP-301 _ Windows User Mode Exploit Development [OSED] 2022 -- Offensive Security -- 2022 -- 09aa42f050385fc0f63f7fb252ced659 -- Anna’s Archive\nUploaded by ye.jianzhang\n0%\n604 pages | 604 pages to go",
"url": "https://www.scribd.com/document/721063118/EXP-301-Windows-User-Mode-Exploit-Development-OSED-2022-Offensive-Security-2022-09aa42f050385fc0f63f7fb252ced659-Anna-s-Archive",
"doc_type": "document",
"source": "saved"
},
{
"id": "238195123",
"title": "FolderListDump\nUploaded by DonovanSanchez\n0%\n17,477 pages | 17,477 pages to go",
"url": "https://www.scribd.com/document/238195123/FolderListDump",
"doc_type": "document",
"source": "saved"
},
{
"id": "709607420",
"title": "Sylvain Kerkour - Black Hat Rust_ Applied offensive security with the Rust programming language\nUploaded by martykaanfx\n0%\n441 pages | 441 pages to go",
"url": "https://www.scribd.com/document/709607420/Sylvain-Kerkour-Black-Hat-Rust-Applied-offensive-security-with-the-Rust-programming-language",
"doc_type": "document",
"source": "saved"
},
{
"id": "542898343",
"title": "The Red Team Guide\nUploaded by Kunal B\n0%\n241 pages | 241 pages to go",
"url": "https://www.scribd.com/document/542898343/The-Red-Team-Guide",
"doc_type": "document",
"source": "saved"
},
{
"id": "660641847",
"title": "Host-and-Network-Penetration--Testing-System-Host-Based-Attacks\nUploaded by Michael Michael\n0%\n124 pages | 124 pages to go",
"url": "https://www.scribd.com/document/660641847/Host-and-Network-Penetration-Testing-System-Host-Based-Attacks",
"doc_type": "document",
"source": "saved"
},
{
"id": "409902453",
"title": "Best 20 Hacking Tutorials\nUploaded by Samrat\n0%\n404 pages | 404 pages to go",
"url": "https://www.scribd.com/document/409902453/Best-20-Hacking-Tutorials",
"doc_type": "document",
"source": "saved"
},
{
"id": "755628783",
"title": "Web Application Advanced Hacking (Maor Tal) (Z-Library)\nUploaded by Joe Salazar\n0%\n115 pages | 115 pages to go",
"url": "https://www.scribd.com/document/755628783/Web-Application-Advanced-Hacking-Maor-Tal-Z-Library",
"doc_type": "document",
"source": "saved"
},
{
"id": "652755466",
"title": "Tools list\nUploaded by Prem Basnet\n0%\n137 pages | 137 pages to go",
"url": "https://www.scribd.com/document/652755466/Tools-list",
"doc_type": "document",
"source": "saved"
},
{
"id": "766955854",
"title": "Final Book\nUploaded by fogex46858\n0%\n187 pages | 187 pages to go",
"url": "https://www.scribd.com/document/766955854/Final-Book",
"doc_type": "document",
"source": "saved"
},
{
"id": "926701564",
"title": "Traditional Generative Ai Pentesting Hands\nUploaded by christopher ilizarbe\n0%\n316 pages | 316 pages to go",
"url": "https://www.scribd.com/document/926701564/Traditional-Generative-Ai-Pentesting-Hands",
"doc_type": "document",
"source": "saved"
},
{
"id": "223704612",
"title": "Phd Thesis Adrian Furtuna\nUploaded by CristinaDragomir\n0%\n174 pages | 174 pages to go",
"url": "https://www.scribd.com/document/223704612/Phd-Thesis-Adrian-Furtuna",
"doc_type": "document",
"source": "saved"
},
{
"id": "714057145",
"title": "VHL-Penetration-Testing-Courseware-V1_ulknd\nUploaded by Abdullahi Nasir\n0%\n382 pages | 382 pages to go",
"url": "https://www.scribd.com/document/714057145/VHL-Penetration-Testing-Courseware-V1-ulknd",
"doc_type": "document",
"source": "saved"
},
{
"id": "782428956",
"title": "03 Preparing and Defending Against Exploitation\nUploaded by es169371\n0%\n112 pages | 112 pages to go",
"url": "https://www.scribd.com/document/782428956/03-Preparing-and-Defending-Against-Exploitation",
"doc_type": "document",
"source": "saved"
},
{
"id": "621881997",
"title": "Kali Linux - A Comprehensive Step by Step Beginner's Guide to Learn the Basics of Cybersecurity and Ethical Computer Hacking, Including Wireless Penetration Testing Tools to Secure Your Network by Jas",
"url": "https://www.scribd.com/document/621881997/Kali-Linux-A-Comprehensive-Step-by-Step-Beginner-s-Guide-to-Learn-the-Basics-of-Cybersecurity-and-Ethical-Computer-Hacking-Including-Wireless-Penet",
"doc_type": "document",
"source": "saved"
},
{
"id": "695252907",
"title": "web security, xss, Injection\nUploaded by Menberu Munye\n0%\n137 pages | 137 pages to go",
"url": "https://www.scribd.com/document/695252907/web-security-xss-Injection",
"doc_type": "document",
"source": "saved"
},
{
"id": "707719177",
"title": "2023 Training Catalogue Q2 Single v7 2023\nUploaded by tdbsp\n0%\n127 pages | 127 pages to go",
"url": "https://www.scribd.com/document/707719177/2023-Training-Catalogue-Q2-Single-v7-2023",
"doc_type": "document",
"source": "saved"
},
{
"id": "725110882",
"title": "Abaimov & Martellini (2020) Cyber Arms Security in Cyberspace\nUploaded by Finnegan\n0%\n254 pages | 254 pages to go",
"url": "https://www.scribd.com/document/725110882/Abaimov-Martellini-2020-Cyber-Arms-Security-in-Cyberspace",
"doc_type": "document",
"source": "saved"
},
{
"id": "911962541",
"title": "The Red Team Hacker's Handbook_ Mastering Offensive Security\nUploaded by rohansail456\n0%\n227 pages | 227 pages to go",
"url": "https://www.scribd.com/document/911962541/The-Red-Team-Hacker-s-Handbook-Mastering-Offensive-Security",
"doc_type": "document",
"source": "saved"
},
{
"id": "523513918",
"title": "web_application_advanced\nUploaded by jonattan rodrigues\n0%\n118 pages | 118 pages to go",
"url": "https://www.scribd.com/document/523513918/web-application-advanced",
"doc_type": "document",
"source": "saved"
},
{
"id": "959714563",
"title": "(Ebook) Advanced Web Attacks and Exploitation by F3thinker ! full digital chapters\nUploaded by cassandrajul0501\n0%\n294 pages | 294 pages to go",
"url": "https://www.scribd.com/document/959714563/Ebook-Advanced-Web-Attacks-and-Exploitation-by-F3thinker-full-digital-chapters",
"doc_type": "document",
"source": "saved"
},
{
"id": "533110076",
"title": "Offensive Security Labs\nUploaded by jasjusr\n0%\n324 pages | 324 pages to go",
"url": "https://www.scribd.com/document/533110076/Offensive-Security-Labs",
"doc_type": "document",
"source": "saved"
},
{
"id": "168763288",
"title": "USCC Report Chinese CapabilitiesforComputer NetworkOperationsandCyberEspionage\nUploaded by Stephen Lynch\n0%\n137 pages | 137 pages to go",
"url": "https://www.scribd.com/document/168763288/USCC-Report-Chinese-CapabilitiesforComputer-NetworkOperationsandCyberEspionage",
"doc_type": "document",
"source": "saved"
},
{
"id": "658401691",
"title": "Offensive Security Defense Analyst Overview PT.1\nUploaded by Novac Work Profile\n0%\n299 pages | 299 pages to go",
"url": "https://www.scribd.com/document/658401691/Offensive-Security-Defense-Analyst-Overview-PT-1",
"doc_type": "document",
"source": "saved"
},
{
"id": "743684918",
"title": "Campbell R. Hacking with Kali Linux. Advanced Techniques and Strategies 2023\nUploaded by tdragonvnm01\n0%\n118 pages | 118 pages to go",
"url": "https://www.scribd.com/document/743684918/Campbell-R-Hacking-with-Kali-Linux-Advanced-Techniques-and-Strategies-2023",
"doc_type": "document",
"source": "saved"
},
{
"id": "852839401",
"title": "Kali-Linux-Essentials-Uncover-Security-Flaws-Using-Nmap_-Metasp\nUploaded by ZAK BEN TAMA\n0%\n200 pages | 200 pages to go",
"url": "https://www.scribd.com/document/852839401/Kali-Linux-Essentials-Uncover-Security-Flaws-Using-Nmap-Metasp",
"doc_type": "document",
"source": "saved"
},
{
"id": "633598026",
"title": "OSWA (Offensive Security Web Attacks) – Study Overview PT.1 (2).pdf\nUploaded by James Bond\n0%\n399 pages | 399 pages to go",
"url": "https://www.scribd.com/document/633598026/OSWA-Offensive-Security-Web-Attacks-Study-Overview-PT-1-2-pdf",
"doc_type": "document",
"source": "saved"
},
{
"id": "479703777",
"title": "Cyber Security Questions and Answers.pdf\nUploaded by Geay Peter\n0%\n234 pages | 234 pages to go",
"url": "https://www.scribd.com/document/479703777/Cyber-Security-Questions-and-Answers-pdf",
"doc_type": "document",
"source": "saved"
},
{
"id": "756003360",
"title": "Professor Messer - Professor Messer's SY0-701 COMPTIA Security+ Course Notes - Libgen.li\nUploaded by Hamdigle Douglas\n0%\n107 pages | 107 pages to go",
"url": "https://www.scribd.com/document/756003360/Professor-Messer-Professor-Messer-s-SY0-701-COMPTIA-Security-Course-Notes-Libgen-li",
"doc_type": "document",
"source": "saved"
},
{
"id": "410248484",
"title": "The Hacker Playbook 1- Practical Guide to Penetration Testing\nUploaded by Rafid A. Jassem Alashor\n0%\n308 pages | 308 pages to go",
"url": "https://www.scribd.com/document/410248484/The-Hacker-Playbook-1-Practical-Guide-to-Penetration-Testing",
"doc_type": "document",
"source": "saved"
},
{
"id": "807938788",
"title": "Offensive IoT Exploitation - SecurityTube\nUploaded by CI CD\n0%\n310 pages | 310 pages to go",
"url": "https://www.scribd.com/document/807938788/Offensive-IoT-Exploitation-SecurityTube",
"doc_type": "document",
"source": "saved"
},
{
"id": "718008402",
"title": "CompTIA Security+ (SY0-701)\nUploaded by Calisto Junior\n0%\n405 pages | 405 pages to go",
"url": "https://www.scribd.com/document/718008402/CompTIA-Security-SY0-701",
"doc_type": "document",
"source": "saved"
},
{
"id": "842218910",
"title": "Ai_InCyber_073109-1\nUploaded by kh355406fm\n0%\n11 pages | 11 pages to go",
"url": "https://www.scribd.com/document/842218910/Ai-InCyber-073109-1",
"doc_type": "document",
"source": "saved"
},
{
"id": "873340843",
"title": "4. Introduction to Threat Hunting & Hunting With Elastic\nUploaded by Coelho Coelho\n0%\n48 pages | 48 pages to go",
"url": "https://www.scribd.com/document/873340843/4-Introduction-to-Threat-Hunting-Hunting-With-Elastic",
"doc_type": "document",
"source": "saved"
},
{
"id": "833123680",
"title": "CTI Guide 2025\nUploaded by passionatesale\n0%\n29 pages | 29 pages to go",
"url": "https://www.scribd.com/document/833123680/CTI-Guide-2025",
"doc_type": "document",
"source": "saved"
},
{
"id": "916499214",
"title": "Ibm x Force Threat Intelligence Index 2025 Report\nUploaded by Fredy Enrique Alfonso\n0%\n64 pages | 64 pages to go",
"url": "https://www.scribd.com/document/916499214/Ibm-x-Force-Threat-Intelligence-Index-2025-Report",
"doc_type": "document",
"source": "saved"
},
{
"id": "899834377",
"title": "ec council certified soc analyst Module 5_ Enhanced Incident Detection with Threat Intelligence\nUploaded by info\n0%\n10 pages | 10 pages to go",
"url": "https://www.scribd.com/document/899834377/ec-council-certified-soc-analyst-Module-5-Enhanced-Incident-Detection-with-Threat-Intelligence",
"doc_type": "document",
"source": "saved"
},
{
"id": "846401212",
"title": "Threat Intelligence Essentials Tie Brochure\nUploaded by Will James\n0%\n15 pages | 15 pages to go",
"url": "https://www.scribd.com/document/846401212/Threat-Intelligence-Essentials-Tie-Brochure",
"doc_type": "document",
"source": "saved"
},
{
"id": "884807069",
"title": "Cyber Threat Intelligence for SOC Analysts\nUploaded by Anish Sharma\n0%\n9 pages | 9 pages to go",
"url": "https://www.scribd.com/document/884807069/Cyber-Threat-Intelligence-for-SOC-Analysts",
"doc_type": "document",
"source": "saved"
},
{
"id": "899145775",
"title": "Artificial Intelligence in Cybersecurity Advancing Threat Modeling and Vulnerability Assessment\nUploaded by nawrami\n0%\n11 pages | 11 pages to go",
"url": "https://www.scribd.com/document/899145775/Artificial-Intelligence-in-Cybersecurity-Advancing-Threat-Modeling-and-Vulnerability-Assessment",
"doc_type": "document",
"source": "saved"
},
{
"id": "892046934",
"title": "KL P39.05. Kaspersky Threat Intelligence\nUploaded by valweb\n0%\n57 pages | 57 pages to go",
"url": "https://www.scribd.com/document/892046934/KL-P39-05-Kaspersky-Threat-Intelligence",
"doc_type": "document",
"source": "saved"
},
{
"id": "807521187",
"title": "State of Threat Intelligence 2024\nUploaded by manikantannarayanan2020\n0%\n26 pages | 26 pages to go",
"url": "https://www.scribd.com/document/807521187/State-of-Threat-Intelligence-2024",
"doc_type": "document",
"source": "saved"
},
{
"id": "715942828",
"title": "Mckinsey 7s Literature Review\nUploaded by c5p64m3t\n0%\n5 pages | 5 pages to go",
"url": "https://www.scribd.com/document/715942828/Mckinsey-7s-Literature-Review",
"doc_type": "document",
"source": "saved"
},
{
"id": "832929156",
"title": "The McKinsey Way PDF\nUploaded by Mohsin Ali\n0%\n30 pages | 30 pages to go",
"url": "https://www.scribd.com/document/832929156/The-McKinsey-Way-PDF",
"doc_type": "document",
"source": "saved"
},
{
"id": "655987954",
"title": "Slideworks_consulting toolkit_OVERVIEW\nUploaded by Bamrung Sungnoen\n0%\n9 pages | 9 pages to go",
"url": "https://www.scribd.com/document/655987954/Slideworks-consulting-toolkit-OVERVIEW",
"doc_type": "document",
"source": "saved"
},
{
"id": "215427256",
"title": "Ansoff growth matrix templates\nUploaded by Slidebooks Consulting\n0%\n16 pages | 16 pages to go",
"url": "https://www.scribd.com/document/215427256/Ansoff-growth-matrix-templates",
"doc_type": "document",
"source": "saved"
},
{
"id": "221533631",
"title": "Strategy Definition Training & Templates\nUploaded by Slidebooks Consulting\n0%\n94 pages | 94 pages to go",
"url": "https://www.scribd.com/document/221533631/Strategy-Definition-Training-Templates",
"doc_type": "document",
"source": "saved"
},
{
"id": "215429330",
"title": "Mc Kinsey seven S Templates in Powerpoint\nUploaded by Slidebooks Consulting\n0%\n14 pages | 14 pages to go",
"url": "https://www.scribd.com/document/215429330/Mc-Kinsey-seven-S-Templates-in-Powerpoint",
"doc_type": "document",
"source": "saved"
},
{
"id": "740472162",
"title": "slideworksbusinesscaseslideshare-231002115608-b95e353d\nUploaded by Salah Zaamout\n0%\n14 pages | 14 pages to go",
"url": "https://www.scribd.com/document/740472162/slideworksbusinesscaseslideshare-231002115608-b95e353d",
"doc_type": "document",
"source": "saved"
},
{
"id": "749763570",
"title": "Slideworks_business_strategy_OVERVIEW\nUploaded by mohamed swidan\n0%\n18 pages | 18 pages to go",
"url": "https://www.scribd.com/document/749763570/Slideworks-business-strategy-OVERVIEW",
"doc_type": "document",
"source": "saved"
},
{
"id": "99881922",
"title": "mckinseyppttemplate-111106103655-phpapp02\nUploaded by priyapatel497\n0%\n254 pages | 254 pages to go",
"url": "https://www.scribd.com/document/99881922/mckinseyppttemplate-111106103655-phpapp02",
"doc_type": "document",
"source": "saved"
},
{
"id": "561494213",
"title": "Pdfcookie.com Mckinsey Power Point Presentation Consulting Slide Base Templates\nUploaded by dev das\n0%\n307 pages | 307 pages to go",
"url": "https://www.scribd.com/document/561494213/Pdfcookie-com-Mckinsey-Power-Point-Presentation-Consulting-Slide-Base-Templates",
"doc_type": "document",
"source": "saved"
},
{
"id": "263530330",
"title": "Cyber Security Book\nUploaded by SiddharthJoshi\n0%\n153 pages | 153 pages to go",
"url": "https://www.scribd.com/document/263530330/Cyber-Security-Book",
"doc_type": "document",
"source": "saved"
},
{
"id": "750147057",
"title": "Strategic Cyber Security\nUploaded by ozgurerdogan\n0%\n269 pages | 269 pages to go",
"url": "https://www.scribd.com/document/750147057/Strategic-Cyber-Security",
"doc_type": "document",
"source": "saved"
},
{
"id": "625693314",
"title": "2023-cyber-security-report\nUploaded by Paul Chan\n0%\n109 pages | 109 pages to go",
"url": "https://www.scribd.com/document/625693314/2023-cyber-security-report",
"doc_type": "document",
"source": "saved"
},
{
"id": "733980565",
"title": "Cyberattacks and Cybersecurity\nUploaded by Alan Jay Manzano\n0%\n185 pages | 185 pages to go",
"url": "https://www.scribd.com/document/733980565/Cyberattacks-and-Cybersecurity",
"doc_type": "document",
"source": "saved"
},
{
"id": "522297780",
"title": "Cyber Threats and NATO 2030\nUploaded by nitsuga71\n0%\n267 pages | 267 pages to go",
"url": "https://www.scribd.com/document/522297780/Cyber-Threats-and-NATO-2030",
"doc_type": "document",
"source": "saved"
},
{
"id": "763082205",
"title": "Cyber Law Ppt-PDF\nUploaded by Fernando Daihatsu\n0%\n192 pages | 192 pages to go",
"url": "https://www.scribd.com/document/763082205/Cyber-Law-Ppt-PDF",
"doc_type": "document",
"source": "saved"
},
{
"id": "468341682",
"title": "Building_a_Cyber_Resilient_Society_in_SEE_-_Research_Study.pdf\nUploaded by das\n0%\n136 pages | 136 pages to go",
"url": "https://www.scribd.com/document/468341682/Building-a-Cyber-Resilient-Society-in-SEE-Research-Study-pdf",
"doc_type": "document",
"source": "saved"
},
{
"id": "447020613",
"title": "imageprocessing_ir_Cyber_Security.pdf\nUploaded by Pouyan Razm\n0%\n295 pages | 295 pages to go",
"url": "https://www.scribd.com/document/447020613/imageprocessing-ir-Cyber-Security-pdf",
"doc_type": "document",
"source": "saved"
},
{
"id": "486057950",
"title": "Cyber security news (2).xlsx\nUploaded by herambithape\n0%\n1,219 pages | 1,219 pages to go",
"url": "https://www.scribd.com/document/486057950/Cyber-security-news-2-xlsx",
"doc_type": "document",
"source": "saved"
},
{
"id": "433425574",
"title": "EUISS | Guardian of the galaxy\nUploaded by Anonymous znvJ04\n0%\n105 pages | 105 pages to go",
"url": "https://www.scribd.com/document/433425574/EUISS-Guardian-of-the-galaxy",
"doc_type": "document",
"source": "saved"
},
{
"id": "515323685",
"title": "Cyber Security Ro 2019\nUploaded by kjsfhkjasfhkjahlerfewuihf\n0%\n342 pages | 342 pages to go",
"url": "https://www.scribd.com/document/515323685/Cyber-Security-Ro-2019",
"doc_type": "document",
"source": "saved"
},
{
"id": "463878584",
"title": "ecs-cppp-industry-proposal\nUploaded by khalibandi\n0%\n115 pages | 115 pages to go",
"url": "https://www.scribd.com/document/463878584/ecs-cppp-industry-proposal",
"doc_type": "document",
"source": "saved"
},
{
"id": "442401015",
"title": "Handbook on Cyber Security (Volume V, 2nd edition, 2019).pdf\nUploaded by Singh\n0%\n266 pages | 266 pages to go",
"url": "https://www.scribd.com/document/442401015/Handbook-on-Cyber-Security-Volume-V-2nd-edition-2019-pdf",
"doc_type": "document",
"source": "saved"
},
{
"id": "91800656",
"title": "Cyber Security\nUploaded by Nikola Schmidt\n0%\n16 pages | 16 pages to go",
"url": "https://www.scribd.com/document/91800656/Cyber-Security",
"doc_type": "document",
"source": "saved"
},
{
"id": "331684595",
"title": "Cyber Security\nUploaded by Jaasindah Mir\n0%\n29 pages | 29 pages to go",
"url": "https://www.scribd.com/document/331684595/Cyber-Security",
"doc_type": "document",
"source": "saved"
},
{
"id": "703741939",
"title": "legal cyber proj ORG\nUploaded by lumos maxima\n0%\n20 pages | 20 pages to go",
"url": "https://www.scribd.com/document/703741939/legal-cyber-proj-ORG",
"doc_type": "document",
"source": "saved"
},
{
"id": "803224823",
"title": "Written Paper\nUploaded by karimabdelkarim1996\n0%\n13 pages | 13 pages to go",
"url": "https://www.scribd.com/document/803224823/Written-Paper",
"doc_type": "document",
"source": "saved"
},
{
"id": "506157687",
"title": "CyberSecurity of Romania\nUploaded by Ion Artin\n0%\n9 pages | 9 pages to go",
"url": "https://www.scribd.com/document/506157687/CyberSecurity-of-Romania",
"doc_type": "document",
"source": "saved"
},
{
"id": "907603329",
"title": "Preparing manufacturers for the EU Cyber Resilience Act\nUploaded by Felix Bwalanda\n0%\n2 pages | 2 pages to go",
"url": "https://www.scribd.com/document/907603329/Preparing-manufacturers-for-the-EU-Cyber-Resilience-Act",
"doc_type": "document",
"source": "saved"
},
{
"id": "414580879",
"title": "20190603_EEAS EU Cyber Diplomacy Toolbox\nUploaded by Karthik\n0%\n9 pages | 9 pages to go",
"url": "https://www.scribd.com/document/414580879/20190603-EEAS-EU-Cyber-Diplomacy-Toolbox",
"doc_type": "document",
"source": "saved"
},
{
"id": "937653078",
"title": "ITI - CyberSecurity Fundamentals Course\nUploaded by danelkhalil825\n0%\n190 pages | 190 pages to go",
"url": "https://www.scribd.com/document/937653078/ITI-CyberSecurity-Fundamentals-Course",
"doc_type": "document",
"source": "saved"
},
{
"id": "818660799",
"title": "CYBER Law Llm 1st Notes\nUploaded by stuffanother0\n0%\n108 pages | 108 pages to go",
"url": "https://www.scribd.com/document/818660799/CYBER-Law-Llm-1st-Notes",
"doc_type": "document",
"source": "saved"
},
{
"id": "839597147",
"title": "Cyber Security Handbook Protect Yourself Against Cyber Crime\nUploaded by jolo200test1\n0%\n143 pages | 143 pages to go",
"url": "https://www.scribd.com/document/839597147/Cyber-Security-Handbook-Protect-Yourself-Against-Cyber-Crime",
"doc_type": "document",
"source": "saved"
},
{
"id": "824971345",
"title": "Book 96 - Cyber Crimes and Fraud Management\nUploaded by rknishan\n0%\n182 pages | 182 pages to go",
"url": "https://www.scribd.com/document/824971345/Book-96-Cyber-Crimes-and-Fraud-Management",
"doc_type": "document",
"source": "saved"
},
{
"id": "818862548",
"title": "Cs205 Information Security Lecture Handouts Full\nUploaded by anzeelahameed3861\n0%\n212 pages | 212 pages to go",
"url": "https://www.scribd.com/document/818862548/Cs205-Information-Security-Lecture-Handouts-Full",
"doc_type": "document",
"source": "saved"
},
{
"id": "905638955",
"title": "Livre-Blanc-Cyber-Souverainete-Senegal\nUploaded by hamediallow\n0%\n138 pages | 138 pages to go",
"url": "https://www.scribd.com/document/905638955/Livre-Blanc-Cyber-Souverainete-Senegal",
"doc_type": "document",
"source": "saved"
},
{
"id": "850540169",
"title": "cyber crime_merged\nUploaded by rachnaydv\n0%\n125 pages | 125 pages to go",
"url": "https://www.scribd.com/document/850540169/cyber-crime-merged",
"doc_type": "document",
"source": "saved"
},
{
"id": "848077562",
"title": "Introduction to Cyber Security\nUploaded by Dhanushree AN\n0%\n205 pages | 205 pages to go",
"url": "https://www.scribd.com/document/848077562/Introduction-to-Cyber-Security",
"doc_type": "document",
"source": "saved"
},
{
"id": "444275045",
"title": "The_Dark_Side_of_Russia_1579432467\nUploaded by Sabrina Sigfrield\n0%\n18 pages | 18 pages to go",
"url": "https://www.scribd.com/document/444275045/The-Dark-Side-of-Russia-1579432467",
"doc_type": "document",
"source": "saved"
},
{
"id": "473869295",
"title": "blockchain-and-digital-identity\nUploaded by Sanada4real\n0%\n22 pages | 22 pages to go",
"url": "https://www.scribd.com/document/473869295/blockchain-and-digital-identity",
"doc_type": "document",
"source": "saved"
},
{
"id": "544978174",
"title": "Matic Polygon Development - Mobiloitte\nUploaded by Mobiloitte Technologies\n0%\n2 pages | 2 pages to go",
"url": "https://www.scribd.com/document/544978174/Matic-Polygon-Development-Mobiloitte",
"doc_type": "document",
"source": "saved"
},
{
"id": "479699423",
"title": "Describe the features of a simple network and the network infrastructure for a large company\nUploaded by M. Amir Riaz\n0%\n4 pages | 4 pages to go",
"url": "https://www.scribd.com/document/479699423/Describe-the-features-of-a-simple-network-and-the-network-infrastructure-for-a-large-company",
"doc_type": "document",
"source": "saved"
},
{
"id": "358767087",
"title": "Network Base SIS 1-5\nUploaded by McCurtis Akpojaro\n0%\n56 pages | 56 pages to go",
"url": "https://www.scribd.com/document/358767087/Network-Base-SIS-1-5",
"doc_type": "document",
"source": "saved"
},
{
"id": "534675598",
"title": "Self-Sovereign-Identity-The-Future-of-Identity-Self-Sovereignity-Digital-Wallets-and-Blockchain\nUploaded by Pooja Sharma\n0%\n106 pages | 106 pages to go",
"url": "https://www.scribd.com/document/534675598/Self-Sovereign-Identity-The-Future-of-Identity-Self-Sovereignity-Digital-Wallets-and-Blockchain",
"doc_type": "document",
"source": "saved"
},
{
"id": "864425532",
"title": "Trend Vision One - Sovereign and Private Cloud (SPC)\nUploaded by zeynab.atwa\n0%\n2 pages | 2 pages to go",
"url": "https://www.scribd.com/document/864425532/Trend-Vision-One-Sovereign-and-Private-Cloud-SPC",
"doc_type": "document",
"source": "saved"
},
{
"id": "698009906",
"title": "Network Devices (Hub, Repeater, Bridge, Switch, Router, Gateways\nUploaded by tanzaniasamson555\n0%\n9 pages | 9 pages to go",
"url": "https://www.scribd.com/document/698009906/Network-Devices-Hub-Repeater-Bridge-Switch-Router-Gateways",
"doc_type": "document",
"source": "saved"
},
{
"id": "480211382",
"title": "gaia-x-the-european-project-kicks-of-the-next-phase\nUploaded by Rubén Fuentes González\n0%\n13 pages | 13 pages to go",
"url": "https://www.scribd.com/document/480211382/gaia-x-the-european-project-kicks-of-the-next-phase",
"doc_type": "document",
"source": "saved"
},
{
"id": "636441635",
"title": "Digital identity - Blockchain\nUploaded by Battie Cape\n0%\n22 pages | 22 pages to go",
"url": "https://www.scribd.com/document/636441635/Digital-identity-Blockchain",
"doc_type": "document",
"source": "saved"
},
{
"id": "692508151",
"title": "Book_CyberspaceSovereignty_IREYES\nUploaded by Alejandro Morelieras Ramírez\n0%\n511 pages | 511 pages to go",
"url": "https://www.scribd.com/document/692508151/Book-CyberspaceSovereignty-IREYES",
"doc_type": "document",
"source": "saved"
},
{
"id": "755278916",
"title": "-9781789904246.00010\nUploaded by Niyati Srivastava\n0%\n23 pages | 23 pages to go",
"url": "https://www.scribd.com/document/755278916/9781789904246-00010",
"doc_type": "document",
"source": "saved"
},
{
"id": "700680976",
"title": "Self-sovereign identity - Wikipedia\nUploaded by Marat Galoev\n0%\n5 pages | 5 pages to go",
"url": "https://www.scribd.com/document/700680976/Self-sovereign-identity-Wikipedia",
"doc_type": "document",
"source": "saved"
},
{
"id": "765684978",
"title": "in-consulting-nasscom-deloitte-paper-sovereign-GPU-Cloud-noexp\nUploaded by ArvindBalasubramanian\n0%\n16 pages | 16 pages to go",
"url": "https://www.scribd.com/document/765684978/in-consulting-nasscom-deloitte-paper-sovereign-GPU-Cloud-noexp",
"doc_type": "document",
"source": "saved"
},
{
"id": "896335859",
"title": "Types of Network Protocols and Their Uses - GeeksforGeeks\nUploaded by ckazici16\n0%\n9 pages | 9 pages to go",
"url": "https://www.scribd.com/document/896335859/Types-of-Network-Protocols-and-Their-Uses-GeeksforGeeks",
"doc_type": "document",
"source": "saved"
},
{
"id": "410139723",
"title": "The Inevitable Rise of Self Sovereign Identity\nUploaded by DDL\n0%\n24 pages | 24 pages to go",
"url": "https://www.scribd.com/document/410139723/The-Inevitable-Rise-of-Self-Sovereign-Identity",
"doc_type": "document",
"source": "saved"
},
{
"id": "741201541",
"title": "2021_Sovrin_Network_for_Decentralized_Digital_Identity_Analysing_a_Self-Sovereign_Identity_System_Based_on_Distributed_Ledger_Technology\nUploaded by Anas Rachmadi Priambodo\n0%\n7 pages | 7 pages to go",
"url": "https://www.scribd.com/document/741201541/2021-Sovrin-Network-for-Decentralized-Digital-Identity-Analysing-a-Self-Sovereign-Identity-System-Based-on-Distributed-Ledger-Technology",
"doc_type": "document",
"source": "saved"
},
{
"id": "481667040",
"title": "Final Assignment_Business Strategy_Blemba 62_Syindicate 4.pdf\nUploaded by Humaidi Ash Shiddieqy\n0%\n18 pages | 18 pages to go",
"url": "https://www.scribd.com/document/481667040/Final-Assignment-Business-Strategy-Blemba-62-Syindicate-4-pdf",
"doc_type": "document",
"source": "saved"
},
{
"id": "416464587",
"title": "Accelerate Business Success Through Digital Transformation\nUploaded by triple_patte\n0%\n62 pages | 62 pages to go",
"url": "https://www.scribd.com/document/416464587/Accelerate-Business-Success-Through-Digital-Transformation",
"doc_type": "document",
"source": "saved"
},
{
"id": "727331905",
"title": "The-Telco-Cloud-Manifesto\nUploaded by tmaillist\n0%\n13 pages | 13 pages to go",
"url": "https://www.scribd.com/document/727331905/The-Telco-Cloud-Manifesto",
"doc_type": "document",
"source": "saved"
},
{
"id": "796904227",
"title": "SK Telecom 6G\nUploaded by Fahmi Yasser\n0%\n42 pages | 42 pages to go",
"url": "https://www.scribd.com/document/796904227/SK-Telecom-6G",
"doc_type": "document",
"source": "saved"
},
{
"id": "523452205",
"title": "telco-cloud-survey-report\nUploaded by ali\n0%\n24 pages | 24 pages to go",
"url": "https://www.scribd.com/document/523452205/telco-cloud-survey-report",
"doc_type": "document",
"source": "saved"
},
{
"id": "509272385",
"title": "SVP GCT Talks-All About Transformation\nUploaded by M. Mukmin Ismail Burhan\n0%\n16 pages | 16 pages to go",
"url": "https://www.scribd.com/document/509272385/SVP-GCT-Talks-All-About-Transformation",
"doc_type": "document",
"source": "saved"
},
{
"id": "798837534",
"title": "tech-talent-in-transition-seven-technology-trends-reshaping-telcos\nUploaded by krmkuran\n0%\n11 pages | 11 pages to go",
"url": "https://www.scribd.com/document/798837534/tech-talent-in-transition-seven-technology-trends-reshaping-telcos",
"doc_type": "document",
"source": "saved"
},
{
"id": "490738566",
"title": "Analysys Mason case study_Etisalat digital transformation - SAHAB a state-of-the-art telco cloud 2019\nUploaded by Andrey Pritulyuk\n0%\n14 pages | 14 pages to go",
"url": "https://www.scribd.com/document/490738566/Analysys-Mason-case-study-Etisalat-digital-transformation-SAHAB-a-state-of-the-art-telco-cloud-2019",
"doc_type": "document",
"source": "saved"
},
{
"id": "654404250",
"title": "0.AWS Telco Transformation Whitepaper 2023\nUploaded by Muhammad Nouman\n0%\n19 pages | 19 pages to go",
"url": "https://www.scribd.com/document/654404250/0-AWS-Telco-Transformation-Whitepaper-2023",
"doc_type": "document",
"source": "saved"
},
{
"id": "614303443",
"title": "Telecom Brochure Tech\nUploaded by testenew\n0%\n9 pages | 9 pages to go",
"url": "https://www.scribd.com/document/614303443/Telecom-Brochure-Tech",
"doc_type": "document",
"source": "saved"
},
{
"id": "35671392",
"title": "Telecom Sector Analysis\nUploaded by Vaibhav Metre\n0%\n8 pages | 8 pages to go",
"url": "https://www.scribd.com/document/35671392/Telecom-Sector-Analysis",
"doc_type": "document",
"source": "saved"
},
{
"id": "457929285",
"title": "SK telecom 5G\nUploaded by Moazzam Tiwana\n0%\n3 pages | 3 pages to go",
"url": "https://www.scribd.com/document/457929285/SK-telecom-5G",
"doc_type": "document",
"source": "saved"
},
{
"id": "311473933",
"title": "Ch 18 E3E4 TF Famalirisation of Telecom Tech\nUploaded by kishnit\n0%\n43 pages | 43 pages to go",
"url": "https://www.scribd.com/document/311473933/Ch-18-E3E4-TF-Famalirisation-of-Telecom-Tech",
"doc_type": "document",
"source": "saved"
},
{
"id": "193208678",
"title": "SWOT Analysis of Telecom Industry\nUploaded by Nakul509\n0%\n9 pages | 9 pages to go",
"url": "https://www.scribd.com/document/193208678/SWOT-Analysis-of-Telecom-Industry",
"doc_type": "document",
"source": "saved"
},
{
"id": "761957939",
"title": "telecom tech\nUploaded by Abdela Aman Mtech\n0%\n13 pages | 13 pages to go",
"url": "https://www.scribd.com/document/761957939/telecom-tech",
"doc_type": "document",
"source": "saved"
},
{
"id": "820607656",
"title": "Tunisie Telecom\nUploaded by NAFAA KEFI\n0%\n24 pages | 24 pages to go",
"url": "https://www.scribd.com/document/820607656/Tunisie-Telecom",
"doc_type": "document",
"source": "saved"
},
{
"id": "812240383",
"title": "Telecom 5G NETWORKS\nUploaded by hicham2012\n0%\n20 pages | 20 pages to go",
"url": "https://www.scribd.com/document/812240383/Telecom-5G-NETWORKS",
"doc_type": "document",
"source": "saved"
},
{
"id": "821439738",
"title": "telecom-inventory-management-and-network-planning-transformation\nUploaded by efficientgpt01\n0%\n6 pages | 6 pages to go",
"url": "https://www.scribd.com/document/821439738/telecom-inventory-management-and-network-planning-transformation",
"doc_type": "document",
"source": "saved"
},
{
"id": "24936515",
"title": "TELEX - The Key to Instant Communication.\nUploaded by bette_ruffles\n0%\n7 pages | 7 pages to go",
"url": "https://www.scribd.com/document/24936515/TELEX-The-Key-to-Instant-Communication",
"doc_type": "document",
"source": "saved"
},
{
"id": "193216040",
"title": "13.Telco Outsourcing Strategies DETECON\nUploaded by Vladimir Podshivalov\n0%\n19 pages | 19 pages to go",
"url": "https://www.scribd.com/document/193216040/13-Telco-Outsourcing-Strategies-DETECON",
"doc_type": "document",
"source": "saved"
},
{
"id": "33954135",
"title": "Telecoms re-invention–death of the traditional telco\nUploaded by quocirca\n0%\n7 pages | 7 pages to go",
"url": "https://www.scribd.com/document/33954135/Telecoms-re-invention-death-of-the-traditional-telco",
"doc_type": "document",
"source": "saved"
},
{
"id": "707882775",
"title": "Why-and-how-to-go-telco-cloud-native-ATT-DISH-and-Rakuten-September-2021\nUploaded by Danny Han\n0%\n39 pages | 39 pages to go",
"url": "https://www.scribd.com/document/707882775/Why-and-how-to-go-telco-cloud-native-ATT-DISH-and-Rakuten-September-2021",
"doc_type": "document",
"source": "saved"
},
{
"id": "816603939",
"title": "Telco to Techco Transformation- The Ultimate Guide (1)\nUploaded by hatiim2000\n87%\n46 pages | 6 pages to go",
"url": "https://www.scribd.com/document/816603939/Telco-to-Techco-Transformation-The-Ultimate-Guide-1",
"doc_type": "document",
"source": "saved"
},
{
"id": "726394075",
"title": "cloud-cost-management-poster\nUploaded by vandnan\n0%\n2 pages | 2 pages to go",
"url": "https://www.scribd.com/document/726394075/cloud-cost-management-poster",
"doc_type": "document",
"source": "saved"
},
{
"id": "509681682",
"title": "original\nUploaded by Ines Plantak\n0%\n36 pages | 36 pages to go",
"url": "https://www.scribd.com/document/509681682/original",
"doc_type": "document",
"source": "saved"
},
{
"id": "468898027",
"title": "AI Infrastructure 101\nUploaded by nicolepetrescu\n0%\n8 pages | 8 pages to go",
"url": "https://www.scribd.com/document/468898027/AI-Infrastructure-101",
"doc_type": "document",
"source": "saved"
},
{
"id": "603687704",
"title": "Critical Infrastructure Security and Resilience\nUploaded by Omotayo Joseph Oladapo\n0%\n311 pages | 311 pages to go",
"url": "https://www.scribd.com/document/603687704/Critical-Infrastructure-Security-and-Resilience",
"doc_type": "document",
"source": "saved"
},
{
"id": "496457466",
"title": "bus_ethics_q3_mod3_Code of Ethics in Business_final",
"url": "https://www.scribd.com/document/496457466/bus-ethics-q3-mod3-Code-of-Ethics-in-Business-final",
"doc_type": "document",
"source": "search:AI ethics business"
},
{
"id": "435380560",
"title": "Business Ethics Module 1",
"url": "https://www.scribd.com/document/435380560/Business-Ethics-Module-1",
"doc_type": "document",
"source": "search:AI ethics business"
},
{
"id": "496738671",
"title": "Business Ethics Reviewer",
"url": "https://www.scribd.com/document/496738671/BUSINESS-ETHICS-REVIEWER",
"doc_type": "document",
"source": "search:AI ethics business"
},
{
"id": "436748674",
"title": "ABM Business Ethics and Social Responsibility CG",
"url": "https://www.scribd.com/document/436748674/ABM-Business-Ethics-and-Social-Responsibility-CG",
"doc_type": "document",
"source": "search:AI ethics business"
},
{
"id": "328017277",
"title": "3as Unit Plan Ethics in Business",
"url": "https://www.scribd.com/document/328017277/3as-Unit-Plan-Ethics-in-Business",
"doc_type": "document",
"source": "search:AI ethics business"
},
{
"id": "689534655",
"title": "Generative AI in The Enterprise",
"url": "https://www.scribd.com/document/689534655/Generative-AI-in-the-Enterprise",
"doc_type": "document",
"source": "search:generative AI strategy"
},
{
"id": "633872065",
"title": "The CEO's Guide To The Generative AI Revolution - BCG",
"url": "https://www.scribd.com/document/633872065/The-CEO-s-Guide-to-the-Generative-AI-Revolution-BCG",
"doc_type": "document",
"source": "search:generative AI strategy"
},
{
"id": "685476118",
"title": "CB Insights Generative AI Bible",
"url": "https://www.scribd.com/document/685476118/CB-Insights-Generative-AI-Bible",
"doc_type": "document",
"source": "search:generative AI strategy"
},
{
"id": "688101114",
"title": "four-essential-questions-for-boards-to -ask-about-generative-ai",
"url": "https://www.scribd.com/document/688101114/four-essential-questions-for-boards-to-ask-about-generative-ai",
"doc_type": "document",
"source": "search:generative AI strategy"
},
{
"id": "720162387",
"title": "Generative AI Roadmap for Executives",
"url": "https://www.scribd.com/document/720162387/01-Build-Your-Generative-AI-Roadmap-Phases-1-4",
"doc_type": "document",
"source": "search:generative AI strategy"
},
{
"id": "653871530",
"title": "Artifcial Intelligence and Cybersecurity",
"url": "https://www.scribd.com/document/653871530/Artifcial-Intelligence-and-cybersecurity",
"doc_type": "document",
"source": "search:cybersecurity threat intelligence"
},
{
"id": "655784594",
"title": "Industrial Cybersecurity USB Threat Report 2022",
"url": "https://www.scribd.com/document/655784594/Industrial-Cybersecurity-USB-Threat-Report-2022",
"doc_type": "document",
"source": "search:cybersecurity threat intelligence"
},
{
"id": "704069915",
"title": "Visual Threat Intelligence",
"url": "https://www.scribd.com/document/704069915/Visual-Threat-Intelligence",
"doc_type": "document",
"source": "search:cybersecurity threat intelligence"
},
{
"id": "746089212",
"title": "Lesson 2 Explaining Threat Actors and Threat Intelligence",
"url": "https://www.scribd.com/document/746089212/Lesson-2-Explaining-Threat-Actors-and-Threat-Intelligence",
"doc_type": "document",
"source": "search:cybersecurity threat intelligence"
},
{
"id": "770417703",
"title": "Driving Digital Transformation",
"url": "https://www.scribd.com/document/770417703/Driving-Digital-Transformation",
"doc_type": "document",
"source": "search:digital transformation"
},
{
"id": "311881605",
"title": "Transform to the Power of Digital Imp",
"url": "https://www.scribd.com/document/311881605",
"doc_type": "document",
"source": "search:digital transformation"
},
{
"id": "354616142",
"title": "Digital Transformation",
"url": "https://www.scribd.com/document/354616142/Digital-Transformation",
"doc_type": "document",
"source": "search:digital transformation"
},
{
"id": "702711832",
"title": "Digital Transformation",
"url": "https://www.scribd.com/document/702711832/Digital-Transformation",
"doc_type": "document",
"source": "search:digital transformation"
},
{
"id": "306299688",
"title": "Digital Transformation Framework",
"url": "https://www.scribd.com/document/306299688/Digital-Transformation-Framework",
"doc_type": "document",
"source": "search:digital transformation"
}
]