Похожие видео
array(6) {
["BqpWvESLW78"]=>
object(stdClass)#2513 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "BqpWvESLW78"
["related_video_title"]=>
string(62) "Understanding software supply chain threats | Security Detail"
["posted_time"]=>
string(21) "3 года назад"
["channelName"]=>
NULL
}
["1H4970mUKiE"]=>
object(stdClass)#2516 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "1H4970mUKiE"
["related_video_title"]=>
string(68) "OpenShift Virtualization, Chaos engineering using kubeinvaders game."
["posted_time"]=>
string(25) "2 недели назад"
["channelName"]=>
NULL
}
["WmStvV6w-xs"]=>
object(stdClass)#2511 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "WmStvV6w-xs"
["related_video_title"]=>
string(89) "Cyber Security Day in the Life Work Vlog (Remote) | Cyber Security Analyst Work Vlog 2023"
["posted_time"]=>
string(21) "2 года назад"
["channelName"]=>
NULL
}
["PLbMP1JcGBmSGX05OCYIlcxGduP_0ZA58C"]=>
object(stdClass)#2521 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(34) "PLbMP1JcGBmSGX05OCYIlcxGduP_0ZA58C"
["related_video_title"]=>
string(15) "Security Detail"
["posted_time"]=>
string(0) ""
["channelName"]=>
NULL
}
["r13KcC1-wEw"]=>
object(stdClass)#2505 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "r13KcC1-wEw"
["related_video_title"]=>
string(34) "¿Qué es supply chain management?"
["posted_time"]=>
string(21) "4 года назад"
["channelName"]=>
NULL
}
["u5jDmRSsKZY"]=>
object(stdClass)#2523 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "u5jDmRSsKZY"
["related_video_title"]=>
string(21) "UC20 policy dashboard"
["posted_time"]=>
string(25) "2 месяца назад"
["channelName"]=>
NULL
}
}
Understanding software supply chain threats | Security Detail
OpenShift Virtualization, Chaos engineering using kubeinvaders game.
Cyber Security Day in the Life Work Vlog (Remote) | Cyber Security Analyst Work Vlog 2023
Security Detail
¿Qué es supply chain management?
UC20 policy dashboard