__CONFIG_colors_palette__{"active_palette":0,"config":{"colors":{"7b875":{"name":"Main Accent","parent":-1},"5a321":{"name":"Accent Transparent","parent":"7b875"}},"gradients":[]},"palettes":[{"name":"Default","value":{"colors":{"7b875":{"val":"var(--tva-skin-color-4)","hsl":{"h":210,"s":0.7778,"l":0.5412,"a":1}},"5a321":{"val":"rgba(46, 138, 229, 0.15)","hsl_parent_dependency":{"h":210,"l":0.54,"s":0.78}}},"gradients":[]},"original":{"colors":{"7b875":{"val":"rgb(55, 179, 233)","hsl":{"h":198,"s":0.8,"l":0.56,"a":1}},"5a321":{"val":"rgba(55, 179, 233, 0.15)","hsl_parent_dependency":{"h":198,"s":0.8,"l":0.56,"a":0.15}}},"gradients":[]}}]}__CONFIG_colors_palette__
__CONFIG_colors_palette__{"active_palette":0,"config":{"colors":{"7b875":{"name":"Main Accent","parent":-1},"5a321":{"name":"Accent Transparent","parent":"7b875"}},"gradients":[]},"palettes":[{"name":"Default","value":{"colors":{"7b875":{"val":"var(--tva-skin-color-4)","hsl":{"h":210,"s":0.7778,"l":0.5412,"a":1}},"5a321":{"val":"rgba(46, 138, 229, 0.15)","hsl_parent_dependency":{"h":210,"l":0.54,"s":0.78}}},"gradients":[]},"original":{"colors":{"7b875":{"val":"rgb(55, 179, 233)","hsl":{"h":198,"s":0.8,"l":0.56,"a":1}},"5a321":{"val":"rgba(55, 179, 233, 0.15)","hsl_parent_dependency":{"h":198,"s":0.8,"l":0.56,"a":0.15}}},"gradients":[]}}]}__CONFIG_colors_palette__
Home
Courses
Use Cases
Pricing
Resources
Courses
Security Requirements Management
Conclusion and Next Steps
Where to go next?
This is barely touching the surface
This is barely touching the surface
Mark lesson complete
Comments are closed.
{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}
Pen
Comments are closed.