{"id":522,"date":"2015-07-17T15:04:09","date_gmt":"2015-07-17T06:04:09","guid":{"rendered":"http:\/\/guide.jinbo.net\/security\/?page_id=15"},"modified":"2015-10-16T16:23:05","modified_gmt":"2015-10-16T07:23:05","slug":"pdf","status":"publish","type":"page","link":"http:\/\/guide.jinbo.net\/digital-security\/pdf","title":{"rendered":"&#8216;\ub514\uc9c0\ud138\ubcf4\uc548\uac00\uc774\ub4dc&#8217; PDF\ub85c \ubcf4\uae30"},"content":{"rendered":"<section id=\"builder-section-1437112952121\"  class=\" builder-section builder-section-first builder-section-text builder-section-last builder-text-columns-1\" style=\"\">\n<div class=\"builder-section-content\">\n<div class=\"builder-text-column builder-text-column-1\" id=\"builder-section-1437112952121-column-1\">\n<div class=\"builder-text-content\">\n<p>LASIR\uc758 \uc9c0\uc6d0\uc73c\ub85c \uc9c4\ud589\ub41c \u2018\ub514\uc9c0\ud138\ubcf4\uc548\uac00\uc774\ub4dc\u2019\ub294 \ucc45\uc790\ub85c\ub3c4 \uc81c\uc791\ub418\uc5b4 \ubc30\ud3ec\ub418\uc5c8\uc2b5\ub2c8\ub2e4.<\/p>\n<p>\ucc45\uc790 \ud615\ud0dc\uc758 PDF\ud30c\uc77c\uc744 \ubcf4\uc2dc\ub824\uba74 \u2018<a href=\"http:\/\/pds27.egloos.com\/pds\/201510\/16\/84\/Guidebook_II_Digital_Security.pdf\" target=\"_blank\">\uc5ec\uae30<\/a>\u2019\ub97c \ud074\ub9ad, &#8216;<a href=\"http:\/\/pds27.egloos.com\/pds\/201510\/16\/84\/Guidebook_II_Digital_Security.pdf\">\ub2e4\uc6b4\ub85c\ub4dc<\/a>&#8216; \ubc1b\uc73c\uc2e4 \uc218\ub3c4 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/section>\n","protected":false},"excerpt":{"rendered":"<p>LASIR\uc758 \uc9c0\uc6d0\uc73c\ub85c \uc9c4\ud589\ub41c \u2018\ub514\uc9c0\ud138\ubcf4\uc548\uac00\uc774\ub4dc\u2019\ub294 \ucc45\uc790\ub85c\ub3c4 \uc81c\uc791\ub418\uc5b4 \ubc30\ud3ec\ub418\uc5c8\uc2b5\ub2c8\ub2e4. \ucc45\uc790 \ud615\ud0dc\uc758 PDF\ud30c\uc77c\uc744 \ubcf4\uc2dc\ub824\uba74 \u2018\uc5ec\uae30\u2019\ub97c \ud074\ub9ad, &#8216;\ub2e4\uc6b4\ub85c\ub4dc&#8216; \ubc1b\uc73c\uc2e4 \uc218\ub3c4 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"template-builder.php","meta":{"jetpack_post_was_ever_published":false},"categories":[],"tags":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/P6uv38-8q","_links":{"self":[{"href":"http:\/\/guide.jinbo.net\/digital-security\/wp-json\/wp\/v2\/pages\/522"}],"collection":[{"href":"http:\/\/guide.jinbo.net\/digital-security\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/guide.jinbo.net\/digital-security\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/guide.jinbo.net\/digital-security\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/guide.jinbo.net\/digital-security\/wp-json\/wp\/v2\/comments?post=522"}],"version-history":[{"count":0,"href":"http:\/\/guide.jinbo.net\/digital-security\/wp-json\/wp\/v2\/pages\/522\/revisions"}],"wp:attachment":[{"href":"http:\/\/guide.jinbo.net\/digital-security\/wp-json\/wp\/v2\/media?parent=522"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/guide.jinbo.net\/digital-security\/wp-json\/wp\/v2\/categories?post=522"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/guide.jinbo.net\/digital-security\/wp-json\/wp\/v2\/tags?post=522"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}