﻿{"id":4265,"date":"2014-11-10T15:19:51","date_gmt":"2014-11-10T13:19:51","guid":{"rendered":"http:\/\/www.zsp2.jaworzno.pl\/?p=4265"},"modified":"2014-11-10T15:20:14","modified_gmt":"2014-11-10T13:20:14","slug":"bezplatny-newsletter-o-bezpieczenstwie-komputerowym-5","status":"publish","type":"post","link":"https:\/\/zsp2.jaworzno.edu.pl\/?p=4265","title":{"rendered":"Bezp\u0142atny newsletter o&nbsp;bezpiecze\u0144stwie komputerowym"},"content":{"rendered":"<p style=\"text-align: justify;\">Ukaza\u0142 si\u0119 nowy listopadowy numer Biuletynu Bezpiecze\u0144stwa Komputerowego OUCH! Temat przewodni <em>\u201eSocjotechnika\u201d<\/em><\/p>\n<p style=\"text-align: justify;\"><img decoding=\"async\" class=\"logo\" src=\"http:\/\/www.securingthehuman.org\/images\/design-site\/logo.png\" alt=\"SANS: IT Information Security Awareness Training\" \/><\/p>\n<p style=\"text-align: justify;\">W tym numerze:<\/p>\n<ul>\n<li style=\"text-align: justify;\">Socjotechnika<\/li>\n<li style=\"text-align: justify;\">Wykrywanie\/powstrzymywanie ataku socjotechnicznego<\/li>\n<li style=\"text-align: justify;\">Zapobieganie atakom socjotechnicznym w&nbsp;przysz\u0142o\u015bci<\/li>\n<\/ul>\n<p><a href=\"http:\/\/www.securingthehuman.org\/newsletters\/ouch\/issues\/OUCH-201411_po.pdf\" target=\"_blank\">czytaj &#8230;<\/a><\/p>\n<h5>\u017ar\u00f3d\u0142o: http:\/\/www.securingthehuman.org<\/h5>\n","protected":false},"excerpt":{"rendered":"<p>Ukaza\u0142 si\u0119 nowy listopadowy numer Biuletynu Bezpiecze\u0144stwa Komputerowego OUCH! Temat przewodni \u201eSocjotechnika\u201d W tym numerze: Socjotechnika Wykrywanie\/powstrzymywanie ataku socjotechnicznego Zapobieganie atakom socjotechnicznym w&nbsp;przysz\u0142o\u015bci czytaj &#8230; \u017ar\u00f3d\u0142o: http:\/\/www.securingthehuman.org<\/p>\n","protected":false},"author":1,"featured_media":3472,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[101,4,8],"tags":[464,153,303,505,466,560,147],"class_list":["post-4265","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ciekawostki","category-informacje","category-kola-zainteresowan","tag-bezplatny-newsletter-o-bezpieczenstwie-komputerowym","tag-informatyk-jaworzno","tag-informatyka-jaworzno","tag-nask","tag-ouch","tag-socjotechnika","tag-technik-informatyk-jaworzno"],"_links":{"self":[{"href":"https:\/\/zsp2.jaworzno.edu.pl\/index.php?rest_route=\/wp\/v2\/posts\/4265","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zsp2.jaworzno.edu.pl\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zsp2.jaworzno.edu.pl\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zsp2.jaworzno.edu.pl\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/zsp2.jaworzno.edu.pl\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4265"}],"version-history":[{"count":0,"href":"https:\/\/zsp2.jaworzno.edu.pl\/index.php?rest_route=\/wp\/v2\/posts\/4265\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/zsp2.jaworzno.edu.pl\/index.php?rest_route=\/wp\/v2\/media\/3472"}],"wp:attachment":[{"href":"https:\/\/zsp2.jaworzno.edu.pl\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4265"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zsp2.jaworzno.edu.pl\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4265"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zsp2.jaworzno.edu.pl\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4265"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}