
{"id":6599,"date":"2019-11-06T23:26:04","date_gmt":"2019-11-06T14:26:04","guid":{"rendered":"http:\/\/infosec.pusan.ac.kr\/?p=6599"},"modified":"2025-12-23T19:51:17","modified_gmt":"2025-12-23T10:51:17","slug":"8%ec%a3%bc%ec%b0%a8-%ea%b0%95%ec%9d%98%ec%9e%90%eb%a3%8c%ec%9e%85%eb%8b%88%eb%8b%a4-2","status":"publish","type":"post","link":"https:\/\/infosec.pusan.ac.kr\/index.php\/6599\/","title":{"rendered":"8\uc8fc\ucc28 \uac15\uc758\uc790\ub8cc\uc785\ub2c8\ub2e4."},"content":{"rendered":"<p><a href=\"https:\/\/infosec.pusan.ac.kr\/wp-content\/uploads\/2019\/11\/8\uc8fc\ucc28_\uc218.pdf\">8\uc8fc\ucc28_\uc218<\/a><\/p>\n<p><a href=\"https:\/\/infosec.pusan.ac.kr\/wp-content\/uploads\/2019\/11\/\ud140\ud504\ub85c\uc81d\ud2b8.zip\">\ud140\ud504\ub85c\uc81d\ud2b8<\/a><\/p>\n<p><a href=\"https:\/\/infosec.pusan.ac.kr\/wp-content\/uploads\/2019\/11\/LTP.zip\">LTP<\/a><\/p>\n<\/p>\n<\/p>\n<\/p>\n<\/p>\n<\/p>\n<\/p>\n<\/p>\n<\/p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>8\uc8fc\ucc28_\uc218 \ud140\ud504\ub85c\uc81d\ud2b8 LTP<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5,123,125,127],"tags":[],"class_list":["post-6599","post","type-post","status-publish","format-standard","hentry","category-lecture","category-lecture2019_1st_under_graduate-lecture","category-logic_circuit_design2_2019","category-logic_circuit_design2_note2019"],"_links":{"self":[{"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/posts\/6599","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/comments?post=6599"}],"version-history":[{"count":2,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/posts\/6599\/revisions"}],"predecessor-version":[{"id":9390,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/posts\/6599\/revisions\/9390"}],"wp:attachment":[{"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/media?parent=6599"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/categories?post=6599"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/tags?post=6599"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}