[{"id":"153","title":"Intrusion detection","votes":"2","type":"x","order":"2","pct":13.33,"resources":[]},{"id":"154","title":"Penetration testing","votes":"4","type":"x","order":"3","pct":26.67,"resources":[]},{"id":"155","title":"Reverse engineering ","votes":"2","type":"x","order":"4","pct":13.33,"resources":[]},{"id":"157","title":"More than one of these options","votes":"7","type":"x","order":"4","pct":46.67,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350