%PDF-1.5
%
7 0 obj
<<
/Length 65
/Filter /FlateDecode
>>
stream
x3T0 BC]=0efUeg```dQĆHBA=sM\@!(N e
endstream
endobj
4 0 obj
<<
/Type /XObject
/Subtype /Form
/FormType 1
/PTEX.FileName (/srv/http/sutty.kefir.red/shared/_sites/cyber-women.com/img/covers/en/digital-security-basics-1.pdf)
/PTEX.PageNumber 1
/PTEX.InfoDict 11 0 R
/BBox [0 0 419.527557 595.275574]
/Group 8 0 R
/Resources <<
/ExtGState <<
/a0 <<
/CA 1
/ca 1
>>
>>/XObject <<
/x6 12 0 R
/x7 13 0 R
>>>>
/Length 12778
/Filter /FlateDecode
>>
stream
xu}I-9N.PƙԪ%.RY:~S
;C$# 73N bЗ^&T%Cdqc~s_:kjKcZ%KhtEw5@_fks5|y̵3V'Mza;`\Z8b:)P85᭯+czaE{@s'bEn<%58`ILkqe%Nsj"=s\pm,TNL'hӦzf>P>e4wx 5iꔒH| 2~1ax&{u`&ƌ̑0o]Zk!O{Lb{5Ե5ksiBеGlFN*KKb\Jhx8L͆9]V@(s6/˜lnt.`%Ͻ>Mgi,a:iMiZ~?]yh1)Q*ð8ӫ+7v*f)}<Εq?v/d %>[$sNk̈́;81xVs9ڈg \3esI?h7ڲA4&v4+T" s -O@Ĺ!C*GZ_I/jt-K(\(0ّ~LiKfVuvM[:M\AS'Cm;Mr7IKK"Ag_gX8p[ƹ(Vį."mHbt{} tk