{"id":224,"date":"2019-05-27T15:00:56","date_gmt":"2019-05-27T06:00:56","guid":{"rendered":"http:\/\/www.iamas.ac.jp\/vhost\/system\/?p=224"},"modified":"2019-05-27T15:11:00","modified_gmt":"2019-05-27T06:11:00","slug":"%e3%82%a6%e3%82%a3%e3%83%ab%e3%82%b9%e5%af%be%e7%ad%96%e3%82%bd%e3%83%95%e3%83%88%e3%82%a4%e3%83%b3%e3%82%b9%e3%83%88%e3%83%bc%e3%83%ab%e3%81%ae%e3%81%8a%e9%a1%98%e3%81%84","status":"publish","type":"post","link":"https:\/\/www.iamas.ac.jp\/system\/224","title":{"rendered":"\u30a6\u30a3\u30eb\u30b9\u5bfe\u7b56\u30bd\u30d5\u30c8\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u306e\u304a\u9858\u3044"},"content":{"rendered":"  <p>\r\n    \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5f37\u5316\u306e\u305f\u3081\u306b\u5b66\u5185\u3067\u5229\u7528\u3059\u308b\u30b3\u30f3\u30d4\u30e5\u30fc\u30bf\u306b\u306f\u5fc5\u305a\u30a6\u30a3\u30eb\u30b9\u5bfe\u7b56\u30bd\u30d5\u30c8\u3092\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u3057\u3066\u304f\u3060\u3055\u3044\u3002\r\n  <\/p>\r\n  <p>\r\n    IAMAS\u3067\u306fESET Endpoint Security (\u4ee5\u4e0bEES)\u304c\u5229\u7528\u3067\u304d\u307e\u3059\u3002EES\u306f\u5b66\u6821\u5099\u54c1\u306e\u30b3\u30f3\u30d4\u30e5\u30fc\u30bf\u4ee5\u5916\u306b\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u305b\u3093\u3002\r\n  <\/p>\r\n  <p>\r\n    EES\u306f\u30b0\u30eb\u30fc\u30d7\u30a6\u30a7\u30a2\u4e0a\u306e\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u304b\u3089\u5165\u624b\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u304b\u3089\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u307e\u3067\u306f\u5b66\u5185\u3067\u884c\u3063\u3066\u304f\u3060\u3055\u3044\u3002\r\n  <\/p>\r\n","protected":false},"excerpt":{"rendered":"<p>\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5f37\u5316\u306e\u305f\u3081\u306b\u5b66\u5185\u3067\u5229\u7528\u3059\u308b\u30b3\u30f3\u30d4\u30e5\u30fc\u30bf\u306b\u306f\u5fc5\u305a\u30a6\u30a3\u30eb\u30b9\u5bfe\u7b56\u30bd\u30d5\u30c8\u3092\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u3057\u3066\u304f\u3060\u3055\u3044\u3002 IAMAS\u3067\u306fESET Endpoint Security (\u4ee5\u4e0bEES)\u304c\u5229\u7528\u3067\u304d\u307e\u3059\u3002EES\u306f\u5b66\u6821\u5099\u54c1\u306e\u30b3\u30f3\u30d4 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_locale":"ja","_original_post":"224","footnotes":""},"categories":[1],"tags":[6,10],"class_list":["post-224","post","type-post","status-publish","format-standard","hentry","category-1","tag-inside","tag-important","ja"],"_links":{"self":[{"href":"https:\/\/www.iamas.ac.jp\/system\/wp-json\/wp\/v2\/posts\/224","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.iamas.ac.jp\/system\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.iamas.ac.jp\/system\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.iamas.ac.jp\/system\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.iamas.ac.jp\/system\/wp-json\/wp\/v2\/comments?post=224"}],"version-history":[{"count":7,"href":"https:\/\/www.iamas.ac.jp\/system\/wp-json\/wp\/v2\/posts\/224\/revisions"}],"predecessor-version":[{"id":698,"href":"https:\/\/www.iamas.ac.jp\/system\/wp-json\/wp\/v2\/posts\/224\/revisions\/698"}],"wp:attachment":[{"href":"https:\/\/www.iamas.ac.jp\/system\/wp-json\/wp\/v2\/media?parent=224"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.iamas.ac.jp\/system\/wp-json\/wp\/v2\/categories?post=224"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.iamas.ac.jp\/system\/wp-json\/wp\/v2\/tags?post=224"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}