%PDF-1.7
%
1 0 obj
<>stream
application/pdfRelevance of Cyber Security on Data Theft of ClientsDeepa Kini P, Gurudath Shenoy
A-PDF Watermark 4.7.6 ; modified using iTextSharp 4.1.6 by 1T3XTIJERT
endstream
endobj
2 0 obj
<>/Lang(en-IN)/Pages 3 0 R/Metadata 1 0 R/Type/Catalog>>
endobj
3 0 obj
<>
endobj
4 0 obj
<>/ExtGState<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI]>>/Contents[22 0 R 23 0 R 24 0 R 25 0 R 26 0 R 27 0 R 28 0 R 29 0 R 30 0 R 31 0 R 32 0 R 33 0 R 34 0 R 35 0 R 36 0 R 37 0 R 38 0 R 39 0 R 40 0 R 41 0 R 42 0 R 43 0 R 44 0 R 45 0 R 46 0 R 47 0 R 48 0 R 49 0 R]/Group<>/Annots[50 0 R]/Type/Page/Tabs/S>>
endobj
31 0 obj
<>stream
x=ks6]3WCH^mJwױ/Vv*ez<ҍF*}CLdUSeuUU}2_gnͼ>yc>vnyR.Z\f/λ}[78ά῟>yUYu+pqYؼ`K-rZy`^n^v^R\S`}EF@7e&AloaByduaHkUZ,rYe5OPl{-ۅj{DҖy%&r,2{ju
SfۭZ\?;gVzq?3^VO>.:l@8R沞ZH UL wۥBFB&˗ ;:3umr%xT""
TX]2z'GHp3RztkqEdit*/fb_t}V
AeݵC>}vgpo_CϢD٬f߃͋v :bԲ{"i4GuGĮ56Ѻ$wHw+F@\eﯺRcEJMDZ}BaADJ6*o۩3%k eDʀ>нͭGXra s}vMj\Ghbz֜w7탓/:hꄘ ʛz}Mbvt
Jƶó{PO wo֩ٛDK?
i1>~NQv+`5G}ص+ƢRy@;CA[F03rm#(m9(6+\
ikMYlq~)*+x'#ms(r8z7f22cV3sXͩ/K<ֽ4J4x{7n;7"q̨Z4s~I(1c:W&gLɢ䌬51˾?y%'idn`8e0_#0y\̃INd+PBKR&y7 %▦IṈ}X
3W1t
_=CwΗL(o#RPIxnmϐD 1EZ&TѸҬa~<%!f(& 2|T &")
H,ny1Qvj[(J?3*Q/Kk8<`[t!i~#ɞh^ª$V8KDd2nޭ0B1l;֡Q!$xwKDF-]1.HU/fO}C6rZVMZ˒Osत~p5dG"NED-zqK.x#9\;wAnMw"o`ؕAdgs4N&vTt6;IGM`k@VPA3mMOyg 49^^UOJFZHzy{`K!`96Bn̥ڲ.q)_=ˊM
H`!$_BRdkx\[5u.̎48xK2&si#<)}PX cdU/p٪$;qiKw Ƨ}*tVM"Pe{Ȫ[[ P8s~/X6f 3$tmθyUq8z˱;fQs ~iv,J&cvfOUyYM'77h{u5@^<·6TPs1
G^\]Z.
39a8{F
ƫ
^=[KQcF՛ղ
]@?NZh`bsD'0\|'51,L:0uP+~&Ul
8~)ag"߾ |H8si5o?ÈQy$
D1O"bTYsd)h;6=Z{!qv4se7+'Z@qIF+8{B|5
ȍpV~szuᦺ@uݶ3y hڬ]F;mዑ"dG<\/
}@(S!F:ל ֙9
/-gdh'+s4Q_(Z#.qp0~CKR
Eqۘq8ެ;+Ad $-X_aWtlGil9 jD#i)Vځ~+4F(OƚVG(XlPc3]u7ZfUFܫ7lJyPzGm^Yny0'|NK̏>P<ƷÉJt]XaC!qm56Y.ڿnY4U&PmPr=>qv>9
5h>Iʪt(uU
q4e\TFi1HɼC@:x>öz@5VaΚBDamc5N檕HG?)~}k3/0&C/kBLZ獮&h5h3?[YH4dbHeC{~dCᦣ2
Bŷ~YYf}@'