{"id":463,"date":"2009-01-30T08:25:50","date_gmt":"2009-01-30T00:25:50","guid":{"rendered":"http:\/\/localhost\/portal\/2009\/01\/30\/info-security-2009\/"},"modified":"2009-01-30T08:25:50","modified_gmt":"2009-01-30T00:25:50","slug":"info-security-2009","status":"publish","type":"post","link":"https:\/\/www.cyberhunter.com.tw\/?p=463","title":{"rendered":"Info Security 2009"},"content":{"rendered":"<p>\u4ee5\u4e0b\u6587\u5b57\u4f86\u81ea\uff1a<a href=\"http:\/\/www.secutech.com\/09\/is\/isindex.aspx?fm=2\" target=\"_blank\" rel=\"noopener\">\u8cc7\u5b89\u4eba<\/a> <\/p>\n<h1><span style=\"color: rgb(0, 0, 255);\">\u53f0\u5317\u570b\u969b\u8cc7\u8a0a\u5b89\u5168\u79d1\u6280\u5c55<\/span><\/h1>\n<h2><span style=\"color: rgb(0, 0, 255);\">April 22-24, 2009<br \/>\n\u53f0\u5317\u4e16\u8cbf\u5357\u6e2f\u9928 \u53f0\u5317\u5e02\u5357\u6e2f\u5340\u7d93\u8cbf\u4e8c\u8def1\u865f<\/span><\/h2>\n<p>\n\u00a0\u00a0\u00a0\u00a0 \u53f0\u7063\u552f\u4e00\u8cc7\u5b89\u570b\u969b\u5c55\u89bd\u5e73\u53f0-Info Security 2009\uff0c\u63d0\u4f9b\u4f01\u696d\u5f9eIT\u6cbb\u7406\u5230\u5404\u9805\u8cc7\u5b89\u61c9\u7528\uff0c\u8b93\u4f01\u696d\u7528\u6236\u53ef\u4e00\u6b21\u4e86\u89e3\u570b\u5167\u5916\u6700\u65b0\u3001\u6700\u5b8c\u6574\u7684\u8cc7\u5b89\u89e3\u6c7a\u65b9\u6848\u3002<\/p>\n<p>\u8209\u8fa6\u516b\u5e74\u7684Info Security\uff0c\u7d2f\u7a4d\u9f90\u5927\u8cc7\u5b89\u80fd\u91cf\uff0c\u5c07\u6700\u65b0\u4e00\u624b\u7684\u6d88\u606f\u63a8\u5411\u66f4\u591a\u7684\u55ae\u4f4d\u6c7a\u7b56\u8005\uff0c\u70ba\u5168\u570b\u8cc7\u5b89\u5de5\u4f5c\u4eba\u54e1\u722d\u53d6\u66f4\u591a\u7684\u8cc7\u6e90\u8207\u652f\u6301\uff0c\u66f4\u70ba\u63a8\u52d5\u53f0\u7063\u8cc7\u5b89\u7522\u696d\u767c\u5c55\u76e1\u4e00\u4efd\u529b\u91cf\u3002\u6211\u5011\u8aa0\u646f\u7684\u9080\u8acb\u8cc7\u5b89\u696d\u754c\u670b\u53cb\uff0c\u4e00\u540c\u70ba\u8cc7\u5b89\u76e1\u4efd\u5fc3\u529b\u3001\u4e00\u8d77\u70ba\u8cc7\u5b89\u52a0\u5206\u3002<br type=\"_moz\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u4ee5\u4e0b\u6587\u5b57\u4f86\u81ea\uff1a\u8cc7\u5b89\u4eba \u53f0\u5317\u570b\u969b\u8cc7\u8a0a\u5b89\u5168\u79d1\u6280\u5c55 April 22-24, 2009 \u53f0\u5317\u4e16\u8cbf\u5357\u6e2f\u9928 \u53f0\u5317\u5e02\u5357\u6e2f\u5340 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[],"class_list":["post-463","post","type-post","status-publish","format-standard","hentry","category-informationsecurity"],"_links":{"self":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/463","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=463"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/463\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=463"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=463"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=463"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}