{"id":40,"date":"2008-03-05T03:01:04","date_gmt":"2008-03-04T19:01:04","guid":{"rendered":"http:\/\/localhost\/portal\/2008\/03\/05\/cisa-cism-december-2007-top-3\/"},"modified":"2008-03-05T03:01:04","modified_gmt":"2008-03-04T19:01:04","slug":"cisa-cism-december-2007-top-3","status":"publish","type":"post","link":"https:\/\/www.cyberhunter.com.tw\/?p=40","title":{"rendered":"CISA \/ CISM December 2007 \u699c\u55ae\u53caTop 3 \u516c\u544a"},"content":{"rendered":"<p>\u00a0CISA\u8207CISM 2007\u5e7412\u6708\u8003\u8a66\u7d50\u679c\u5df2\u7d93\u516c\u4f48\uff0cCISM\u9304\u53d6\u7387\u70ba 27.8%\uff0c\u9ad8\u65bcCISA 21.4%\u3002<\/p>\n<p>\u00a0\u4ee5\u4e0b\u8cc7\u6599\u70ba<a href=\"http:\/\/www.caa.org.tw\/news-detail.asp?id=227\" target=\"_blank\" title=\"caa\" rel=\"noopener\">\u4e2d\u83ef\u6c11\u570b\u96fb\u8166\u7a3d\u6838\u5354\u6703\u7db2\u7ad9<\/a>\u516c\u544a\u4e4b\u5b98\u65b9\u7d71\u8a08\u8cc7\u6599\uff1a <\/p>\n<p>&nbsp;<\/p>\n<table border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"96%\" align=\"center\">\n<tbody>\n<tr>\n<td colspan=\"2\" align=\"left\">CISA \/ CISM December 2007 \u8003\u8a66\u7d50\u679c\u5df2\u516c\u5e03\uff0c12\u6708\u8003\u8a66\u5171\u670998\u4eba\u5831\u8003CISA\uff0c18\u4eba\u5831\u8003CISM\uff1b\u800c\u6b64\u6b21\u516c\u5e03\u7684\u540d\u55ae\u4e2d\u670921\u4f4d\u901a\u904eCISA\u8003\u8a66\uff0c5\u4f4d\u901a\u904eCISM\u8003\u8a66\uff0c\u606d\u79a7\u4ed6\u5011\uff01<\/p>\n<p>\tID No.\tExam Type\u3000\u3000\u3000\u3000Name\t\tTop 3<br \/>1\t135509\tCISA\t\u3000Tzu-Tsung Fang\t<br \/>2\t219438\tCISA\t\u3000Weng Kun-Tang\t<br \/>3\t325259\tCISA\t\u3000Mr. Nieh Chi-Hsien\tCISA\u7b2c\u4e00\u540d<br \/>4\t341236\tCISA\t\u3000Chen Hsin Ju\t<br \/>5\t360601\tCISA\t\u3000Hui-Peng Hu\t<br \/>6\t378298\tCISA\t\u3000Mr. Wu Feng-Yu\t<br \/>7\t383628\tCISA\t\u3000Mr. Chien Chih-Chung\t<br \/>8\t406486\tCISA\t\u3000Mr. Yang Chi Mou, Sr.\t<br \/>9\t407606\tCISA\t\u3000Miss Chen Yan-Yan\tCISA\u7b2c\u4e09\u540d<br \/>10\t409202\tCISA\t\u3000Mr. Chou Chai-Rong\t<br \/>11\t419946\tCISA\t\u3000PeiHsuan Chen\t<br \/>12\t421136\tCISA\t\u3000HUNG PIN CHU\t\tCISA\u7b2c\u4e8c\u540d<br \/>13\t425099\tCISA\t\u3000Mr. Yu-Feng Chiu\t<br \/>14\t436155\tCISA\t\u3000Tu Hsing Hua\t<br \/>15\t446441\tCISA\t\u3000Mr. Hung-Chi Chen\t<br \/>16\t447140\tCISA\t\u3000Mr. Chih-Ming Chen\t<br \/>17\t448194\tCISA\t\u3000Lai Chu Cheng\t<br \/>18\t452088\tCISA\t\u3000Ms. Chang Shu-Ya\t<br \/>19\t457593\tCISA\t\u3000Huang Checng-Chieh\t<br \/>20\t460834\tCISA\t\u3000Mr. CHANG SHOU-CHIEH\t<br \/>21\t460895\tCISA\t\u3000Chih-Yuan Wen\t\tCISA \u7b2c\u4e09\u540d<br \/>22\t348259\tCISM\t\u3000Mr. Lin Chih Sheng\u3000\u3000CISM \u7b2c\u4e09\u540d<br \/>23\t384176\tCISM\t\u3000Mr. Wan-nien Pan\tCISM \u7b2c\u4e00\u540d<br \/>24\t411061\tCISM\t\u3000Mr. Chen Liang Horng\tCISM \u7b2c\u4e09\u540d<br \/>25\t463729\tCISM\t\u3000Shih-Ming Shu\t\tCISM \u7b2c\u4e8c\u540d<br \/>26\t463978\tCISM\t\u3000Mr. Hsieh Sungchi\t<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" height=\"10\">&nbsp;<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" align=\"left\" valign=\"top\">\u53c3\u8003\u6a94\u6848\uff1a<a class=\"a-blue\" href=\"http:\/\/www.caa.org.tw\/upload\/news\/20070813144940-200712%20Exam%20Passers.pdf\" target=\"_dynamic\" rel=\"noopener\">200712 Exam Passers<\/a>\u00a0\u00a0<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00a0CISA\u8207CISM 2007\u5e7412\u6708\u8003\u8a66\u7d50\u679c\u5df2\u7d93\u516c\u4f48\uff0cCISM\u9304\u53d6\u7387\u70ba 27.8%\uff0c\u9ad8\u65bcCISA 21.4% [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[],"class_list":["post-40","post","type-post","status-publish","format-standard","hentry","category-informationsecurity"],"_links":{"self":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/40","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=40"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/40\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=40"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=40"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=40"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}