[{"id":1561,"name":"5.3 Cyber security Part 2","extension":"pdf","fileType":"2","modifiedDate":"2024-07-18 15:49:47","ownerId":"2","publicity":"2","driveContentType":2,"inUsedCode":"1","fileFor":1,"lastestVersion":1,"Version":{"1":{"versionNumber":1,"extension":"pdf","createdDate":"2024-07-18 15:49:47"}},"recordedDate":"2024-07-18 15:49:55","recordedBy":"4","directoryId":"655"},{"id":1561,"name":"5.3 Cyber security Part 2","extension":"pdf","fileType":"2","modifiedDate":"2024-07-18 15:49:47","ownerId":"2","publicity":"1","driveContentType":2,"inUsedCode":"1","fileFor":1,"lastestVersion":1,"Version":{"1":{"versionNumber":1,"extension":"pdf","createdDate":"2024-07-18 15:49:47"}},"recordedDate":"2024-07-18 15:49:47","recordedBy":"4","directoryId":"655"},{"id":1561,"name":"5.3 Cyber security Part 2","extension":"pdf","fileType":"2","modifiedDate":"2024-07-18 15:49:47","ownerId":"2","directoryId":"655","publicity":"1","driveContentType":2,"inUsedCode":"1","fileFor":1}]