
{"id":6289,"date":"2019-09-10T16:08:08","date_gmt":"2019-09-10T07:08:08","guid":{"rendered":"http:\/\/infosec.pusan.ac.kr\/?p=6289"},"modified":"2025-12-23T19:51:15","modified_gmt":"2025-12-23T10:51:15","slug":"pnulib-%ec%a0%81%ec%9a%a9%eb%b0%a9%eb%b2%95","status":"publish","type":"post","link":"https:\/\/infosec.pusan.ac.kr\/index.php\/6289\/","title":{"rendered":"PNULib \uc801\uc6a9\ubc29\ubc95"},"content":{"rendered":"<p><a href=\"https:\/\/infosec.pusan.ac.kr\/wp-content\/uploads\/2019\/09\/PNULib.zip\">PNULib<\/a><\/p>\n<p>C:Program FilesSystem CentroidFlowrian R7Library \ud3f4\ub354 \uc548\uc5d0<\/p>\n<p>PNUlib \uc555\ucd95\ud480\uc5b4\uc11c \uc0ac\uc6a9<\/p>\n<\/p>\n<\/p>\n<\/p>\n<\/p>\n<\/p>\n<\/p>\n<\/p>\n<\/p>\n<\/p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>PNULib C:Program FilesSystem CentroidFlowrian R7Library \ud3f4\ub354 \uc548\uc5d0 PNUlib \uc555\ucd95\ud480\uc5b4\uc11c \uc0ac\uc6a9<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[201,202,5,123],"tags":[],"class_list":["post-6289","post","type-post","status-publish","format-standard","hentry","category-logic_circuit_design1_2019","category-logic_circuit_design1_notice2019","category-lecture","category-lecture2019_1st_under_graduate-lecture"],"_links":{"self":[{"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/posts\/6289","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/comments?post=6289"}],"version-history":[{"count":2,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/posts\/6289\/revisions"}],"predecessor-version":[{"id":9368,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/posts\/6289\/revisions\/9368"}],"wp:attachment":[{"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/media?parent=6289"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/categories?post=6289"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/tags?post=6289"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}