array(38) {
["id"]=>
string(4) "5117"
["position"]=>
string(2) "93"
["release"]=>
string(1) "1"
["name"]=>
string(46) "Cybersécurité : s’organiser face au risque"
["description"]=>
string(0) ""
["slug"]=>
string(40) "cybersecurite-s-organiser-face-au-risque"
["hashcode"]=>
string(40) "f670ecba1a47670b6534c7693edbc5833bec9d83"
["id_dict"]=>
string(40) "cybersecurite-s-organiser-face-au-risque"
["subtitle"]=>
string(0) ""
["issue_number"]=>
string(0) ""
["price"]=>
string(1) "0"
["pages"]=>
string(2) "32"
["category_id"]=>
string(3) "465"
["area_id"]=>
NULL
["date"]=>
string(19) "2023-01-03 14:41:19"
["date_publication"]=>
string(19) "2023-01-03 14:41:19"
["support_url"]=>
string(0) ""
["index"]=>
string(1) "1"
["searching"]=>
string(1) "1"
["bookmarks"]=>
string(1) "1"
["sharing"]=>
string(1) "1"
["downloadable"]=>
string(1) "0"
["iphone_double_pages"]=>
string(1) "0"
["ipad_double_pages"]=>
string(1) "1"
["landscape_mode"]=>
string(1) "0"
["sample_url"]=>
string(0) ""
["cover_url"]=>
string(175) "https://flippad-database.s3-accelerate.amazonaws.com/l-abecedaire-des-institutions/cybersecurite-s-organiser-face-au-risque/covers/e9ec9b2253f8e7cbdc0214b12489732eb395a24a.jpg"
["download_url"]=>
string(175) "https://s3.amazonaws.com/flippad-database/l-abecedaire-des-institutions/cybersecurite-s-organiser-face-au-risque/docs/download_url-151641239eb01e8b5e72d6f7efca42a83e1ff403.zip"
["data_flux_url"]=>
NULL
["user_id"]=>
string(3) "439"
["created"]=>
string(19) "2023-01-03 12:51:31"
["updated"]=>
string(19) "2023-01-04 14:41:19"
["application_id"]=>
string(2) "72"
["color"]=>
string(1) "0"
["display_mode"]=>
string(1) "0"
["active"]=>
string(1) "1"
["is_sample"]=>
string(1) "0"
["sample_id"]=>
string(0) ""
}