{"id":56354,"date":"2019-11-07T13:02:43","date_gmt":"2019-11-07T02:02:43","guid":{"rendered":"https:\/\/augstudy.com\/?p=56354"},"modified":"2020-01-14T13:27:30","modified_gmt":"2020-01-14T02:27:30","slug":"cyber-security-macquarie-university","status":"publish","type":"post","link":"https:\/\/augstudy.com\/zh\/cyber-security-macquarie-university\/","title":{"rendered":"\u9ea6\u8003\u745e\u5927\u5b66\u7f51\u7edc\u5b89\u5168"},"content":{"rendered":"<div class=\"vc_row wpb_row vc_row-fluid aug_news\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\">\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><img decoding=\"async\" class=\"aligncenter\" src=\"\/aug-website-files\/wp-content\/uploads\/2019\/11\/news_macquarie_university_cyber_security_620x414.jpg\" width=\"100%\" \/><\/p>\n<div style=\"background-color:; height: 15px;\" class=\"nicdark_section\"><\/div>\n<p>\u7f51\u7edc\u5b89\u5168\u8d8b\u52bf\u6b63\u5728\u5f15\u53d1\u4eba\u4eec\u5bf9\u739b\u96c5\u4e16\u754c\u4e2d\u7684\u72af\u7f6a\u6d3b\u52a8\u7684\u5173\u6ce8\u3002\u8ffd\u6c42\u4e13\u4e1a\u5316\u7684\u7f51\u7edc\u5b89\u5168\u7ba1\u7406\uff0c\u4e0d\u4ec5\u8981\u5bf9\u5ba2\u6237\u8d1f\u8d23\uff0c\u66f4\u8981\u5bf9\u5ba2\u6237\u8d1f\u8d23\uff0c\u8fd9\u6837\u624d\u80fd\u786e\u4fdd\u5ba2\u6237\u7684\u5b89\u5168\uff0c\u800c\u4e0d\u662f\u8ba9\u5ba2\u6237\u5931\u671b\u3002<\/p>\n<div style=\"background-color:; height: 15px;\" class=\"nicdark_section\"><\/div>\n<p>\u4e3a\u4e86\u66f4\u597d\u5730\u7406\u89e3\u8fd9\u4e00\u70b9\uff0c\u6211\u4eec\u5fc5\u987b\u8981\u4e86\u89e3\u6fb3\u5927\u5229\u4e9a\u6700\u597d\u768410\u6240\u5927\u5b66\uff0c <span style=\"text-decoration: underline;\"><a href=\"\/zh\/%e6%9c%ba%e6%9e%84\/macquarie-university\/\">\u9ea6\u8003\u745e\u5927\u5b66<\/a><\/span> \u63d0\u4f9b\u7f51\u7edc\u5b89\u5168\u8ba1\u5212\u3002\u968f\u7740\u6fb3\u5927\u5229\u4e9a\u7f51\u7edc\u5b89\u5168\u8ba1\u5212\u7684\u4e0d\u65ad\u66f4\u65b0\uff0c\u5b83\u5df2\u6210\u4e3a\u6fb3\u5927\u5229\u4e9a\u7f51\u7edc\u5b89\u5168\u9886\u57df\u7684\u4e13\u5bb6\u3002<\/p>\n<div style=\"background-color:; height: 20px;\" class=\"nicdark_section\"><\/div>\n<p><em>\u4e86\u89e3\u6709\u5173\u7f51\u7edc\u5b89\u5168\u7684\u66f4\u591a\u4fe1\u606f\u3002<\/em><\/p>\n<div style=\"background-color:; height: 15px;\" class=\"nicdark_section\"><\/div>\n<p>\u6211\u7684\u76ee\u6807\u662f\u5728\u4fe1\u606f\u6280\u672f\u548c\u5b89\u5168\u5206\u6790\u9886\u57df\u5b9e\u73b0\u7f51\u7edc\u5b89\u5168\u3002\u7814\u7a76\u4eba\u5458\u5c06\u7f51\u7edc\u5b89\u5168\u89c6\u4e3a\u4e00\u9879\u91cd\u8981\u7814\u7a76\uff0c\u65e8\u5728\u4e3a\u739b\u96c5\u4e16\u754c\u5e26\u6765\u5b89\u5168\uff0c\u540c\u65f6\u4e3a\u739b\u96c5\u4e16\u754c\u72af\u7f6a\u5206\u5b50\u63d0\u4f9b\u5fc3\u7406\u8f85\u5bfc\u3001\u5fc3\u7406\u54a8\u8be2\u548c\u5fc3\u7406\u6cbb\u7597\uff1b\u5e76\u81f4\u529b\u4e8e\u5728\u4fe1\u606f\u5b89\u5168\u3001\u6570\u636e\u9690\u79c1\u3001\u653b\u51fb\u6027\u5b89\u5168\u3001\u6570\u5b57\u53d6\u8bc1\u3001\u5e94\u7528\u5bc6\u7801\u5b66\u3001\u5b89\u5168\u7f16\u7801\u548c\u4eba\u5de5\u667a\u80fd\uff08AI\uff09\u7b49\u9886\u57df\u5efa\u7acb\u4e25\u683c\u800c\u6301\u4e45\u7684\u8054\u7cfb\u3002<\/p>\n<div style=\"background-color:; height: 15px;\" class=\"nicdark_section\"><\/div>\n<p>\u5728\u8fc7\u53bb\u51e0\u5e74\u4e2d\uff082008 \u5e74\uff09\uff0c\u4eba\u4eec\u4e00\u76f4\u8bd5\u56fe\u5728\u57fa\u7840\u5de5\u4e1a\u9879\u76ee\u4e2d\u5b9e\u73b0\u771f\u6b63\u7684\u5b89\u5168\uff0c\u4f46\u7ed3\u679c\u5374\u5e76\u975e\u5982\u6b64\u3002\u6211\u4eec\u8fd8\u4e86\u89e3\u5230\uff0cOptus Macquarie University \u7f51\u7edc\u5b89\u5168\u4e2d\u5fc3\u5df2\u5c06\u4e16\u754c\u5b89\u5168\u89c6\u4e3a\u91cd\u4e2d\u4e4b\u91cd\u3002<\/p>\n<div style=\"background-color:; height: 20px;\" class=\"nicdark_section\"><\/div>\n<p><img decoding=\"async\" class=\"aligncenter\" src=\"\/aug-website-files\/wp-content\/uploads\/2019\/11\/news_macquarie_university_cyber_security_2_620x414.jpg\" width=\"100%\" \/><\/p>\n<div style=\"background-color:; height: 15px;\" class=\"nicdark_section\"><\/div>\n<p>\u8be5\u9879\u76ee\u65e8\u5728\u83b7\u5f97\u7f51\u7edc\u5b89\u5168\u3001\u60c5\u62a5\u3001\u5b89\u5168\u548c\u6218\u7565\u7814\u7a76\u3001\u7f51\u7edc\u6cbb\u7406\u548c\u7ba1\u7406\u7b49\u5b66\u58eb\u548c\u7855\u58eb\u5b66\u4f4d\uff0c\u6216\u83b7\u5f97\u5176\u4ed6\u76f8\u5173\u5b66\u4f4d\u3002\u9664\u6b64\u4e4b\u5916\uff0c\u8fd8\u6d89\u53ca\u79c1\u4eba\u8d22\u4ea7\u7684\u5206\u914d\u3002<\/p>\n<div style=\"background-color:; height: 15px;\" class=\"nicdark_section\"><\/div>\n<p>Lulusan \u7f51\u7edc\u5b89\u5168\u4e13\u4e1a\u6bd5\u4e1a\u751f\u76ee\u524d\u62c5\u4efb\u9053\u5fb7\u9ed1\u5ba2\u3001\u98ce\u9669\u5206\u6790\u5e08\u3001\u5b89\u5168\u67b6\u6784\u5e08\u3002\u8bf7\u8bb0\u4f4f\uff0c\u5bf9\u4e8e\u6765\u81ea\u5927\u5b66\u6216\u793e\u533a\u7684\u7814\u7a76\u4eba\u5458\u6765\u8bf4\uff0c\u8fd9\u540c\u6837\u91cd\u8981\u3002<\/p>\n<div style=\"background-color:; height: 15px;\" class=\"nicdark_section\"><\/div>\n<p>\u4e3a\u4e86\u66f4\u597d\u5730\u4e86\u89e3\u9ea6\u8003\u745e\u5927\u5b66\u7684\u7f51\u7edc\u5b89\u5168\u4e13\u4e1a\uff0c <span style=\"text-decoration: underline;\"><a href=\"\/zh\/%e5%9f%b9%e8%ae%ad%e7%8f%ad\/?nd_learning_arrive_from_advsearch=true&amp;destination-course=&amp;s=Cyber+Security+Macquarie+University&amp;studyfield-course=&amp;studylevel-course=&amp;location-course=&amp;duration-course=\">\u6ca1\u6709\u4eba<\/a><\/span>.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>\u7f51\u7edc\u5b89\u5168\u8d8b\u52bf\u6b63\u5728\u5f15\u53d1\u4eba\u4eec\u5bf9\u739b\u96c5\u4e16\u754c\u4e2d\u7684\u72af\u7f6a\u6d3b\u52a8\u7684\u5173\u6ce8\u3002\u6211\u60f3\u8981\u7684\u662f\u2026\u2026<\/p>","protected":false},"author":4,"featured_media":56372,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[171],"tags":[],"class_list":["post-56354","post","type-post","status-publish","format-standard","hentry","category-indonesia-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cyber Security di Macquarie University - AUG Student Services<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/augstudy.com\/zh\/cyber-security-macquarie-university\/\" \/>\n<meta property=\"og:locale\" content=\"zh_CN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security di Macquarie University\" \/>\n<meta property=\"og:description\" content=\"Tren Cyber Security saat ini kian bertambah seiring dengan meningkatnya ancaman tindakan kriminal di dunia maya. Kebutuhan akan tenaga ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/augstudy.com\/zh\/cyber-security-macquarie-university\/\" \/>\n<meta property=\"og:site_name\" content=\"AUG Student Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/augmalaysia\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-11-07T02:02:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-01-14T02:27:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/augstudy.com\/aug-website-files\/wp-content\/uploads\/2019\/11\/news_macquarie_university_cyber_security_273x161.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"273\" \/>\n\t<meta property=\"og:image:height\" content=\"161\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Fisher Lim\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fisher Lim\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9884\u8ba1\u9605\u8bfb\u65f6\u95f4\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 \u5206\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/augstudy.com\\\/cyber-security-macquarie-university\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/augstudy.com\\\/cyber-security-macquarie-university\\\/\"},\"author\":{\"name\":\"Fisher Lim\",\"@id\":\"https:\\\/\\\/augstudy.com\\\/#\\\/schema\\\/person\\\/0206c6be41d147727073ec35f887055e\"},\"headline\":\"Cyber Security di Macquarie University\",\"datePublished\":\"2019-11-07T02:02:43+00:00\",\"dateModified\":\"2020-01-14T02:27:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/augstudy.com\\\/cyber-security-macquarie-university\\\/\"},\"wordCount\":364,\"image\":{\"@id\":\"https:\\\/\\\/augstudy.com\\\/cyber-security-macquarie-university\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/augstudy.com\\\/aug-website-files\\\/wp-content\\\/uploads\\\/2019\\\/11\\\/news_macquarie_university_cyber_security_273x161.jpg\",\"articleSection\":[\"Indonesia News\"],\"inLanguage\":\"zh-Hans\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/augstudy.com\\\/cyber-security-macquarie-university\\\/\",\"url\":\"https:\\\/\\\/augstudy.com\\\/cyber-security-macquarie-university\\\/\",\"name\":\"Cyber Security di Macquarie University - AUG Student Services\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/augstudy.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/augstudy.com\\\/cyber-security-macquarie-university\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/augstudy.com\\\/cyber-security-macquarie-university\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/augstudy.com\\\/aug-website-files\\\/wp-content\\\/uploads\\\/2019\\\/11\\\/news_macquarie_university_cyber_security_273x161.jpg\",\"datePublished\":\"2019-11-07T02:02:43+00:00\",\"dateModified\":\"2020-01-14T02:27:30+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/augstudy.com\\\/#\\\/schema\\\/person\\\/0206c6be41d147727073ec35f887055e\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/augstudy.com\\\/cyber-security-macquarie-university\\\/#breadcrumb\"},\"inLanguage\":\"zh-Hans\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/augstudy.com\\\/cyber-security-macquarie-university\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-Hans\",\"@id\":\"https:\\\/\\\/augstudy.com\\\/cyber-security-macquarie-university\\\/#primaryimage\",\"url\":\"https:\\\/\\\/augstudy.com\\\/aug-website-files\\\/wp-content\\\/uploads\\\/2019\\\/11\\\/news_macquarie_university_cyber_security_273x161.jpg\",\"contentUrl\":\"https:\\\/\\\/augstudy.com\\\/aug-website-files\\\/wp-content\\\/uploads\\\/2019\\\/11\\\/news_macquarie_university_cyber_security_273x161.jpg\",\"width\":273,\"height\":161},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/augstudy.com\\\/cyber-security-macquarie-university\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/augstudy.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security di Macquarie University\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/augstudy.com\\\/#website\",\"url\":\"https:\\\/\\\/augstudy.com\\\/\",\"name\":\"AUG Student Services\",\"description\":\"Student Services\",\"alternateName\":\"AUG Global\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/augstudy.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-Hans\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/augstudy.com\\\/#\\\/schema\\\/person\\\/0206c6be41d147727073ec35f887055e\",\"name\":\"Fisher Lim\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-Hans\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bef5cde95988c74bd211a58290e56fd8f1561875c125b70719d7aa6584079d5e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bef5cde95988c74bd211a58290e56fd8f1561875c125b70719d7aa6584079d5e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bef5cde95988c74bd211a58290e56fd8f1561875c125b70719d7aa6584079d5e?s=96&d=mm&r=g\",\"caption\":\"Fisher Lim\"},\"gender\":\"male\",\"jobTitle\":\"Computer Network and Systems Engineer\",\"worksFor\":\"AusEd-UniEd International Pty Ltd\",\"url\":\"https:\\\/\\\/augstudy.com\\\/zh\\\/author\\\/fish-lim\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber Security di Macquarie University - AUG Student Services","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/augstudy.com\/zh\/cyber-security-macquarie-university\/","og_locale":"zh_CN","og_type":"article","og_title":"Cyber Security di Macquarie University","og_description":"Tren Cyber Security saat ini kian bertambah seiring dengan meningkatnya ancaman tindakan kriminal di dunia maya. Kebutuhan akan tenaga ...","og_url":"https:\/\/augstudy.com\/zh\/cyber-security-macquarie-university\/","og_site_name":"AUG Student Services","article_publisher":"https:\/\/www.facebook.com\/augmalaysia\/","article_published_time":"2019-11-07T02:02:43+00:00","article_modified_time":"2020-01-14T02:27:30+00:00","og_image":[{"width":273,"height":161,"url":"https:\/\/augstudy.com\/aug-website-files\/wp-content\/uploads\/2019\/11\/news_macquarie_university_cyber_security_273x161.jpg","type":"image\/jpeg"}],"author":"Fisher Lim","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"Fisher Lim","\u9884\u8ba1\u9605\u8bfb\u65f6\u95f4":"2 \u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/augstudy.com\/cyber-security-macquarie-university\/#article","isPartOf":{"@id":"https:\/\/augstudy.com\/cyber-security-macquarie-university\/"},"author":{"name":"Fisher Lim","@id":"https:\/\/augstudy.com\/#\/schema\/person\/0206c6be41d147727073ec35f887055e"},"headline":"Cyber Security di Macquarie University","datePublished":"2019-11-07T02:02:43+00:00","dateModified":"2020-01-14T02:27:30+00:00","mainEntityOfPage":{"@id":"https:\/\/augstudy.com\/cyber-security-macquarie-university\/"},"wordCount":364,"image":{"@id":"https:\/\/augstudy.com\/cyber-security-macquarie-university\/#primaryimage"},"thumbnailUrl":"https:\/\/augstudy.com\/aug-website-files\/wp-content\/uploads\/2019\/11\/news_macquarie_university_cyber_security_273x161.jpg","articleSection":["Indonesia News"],"inLanguage":"zh-Hans"},{"@type":"WebPage","@id":"https:\/\/augstudy.com\/cyber-security-macquarie-university\/","url":"https:\/\/augstudy.com\/cyber-security-macquarie-university\/","name":"Cyber Security di Macquarie University - AUG Student Services","isPartOf":{"@id":"https:\/\/augstudy.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/augstudy.com\/cyber-security-macquarie-university\/#primaryimage"},"image":{"@id":"https:\/\/augstudy.com\/cyber-security-macquarie-university\/#primaryimage"},"thumbnailUrl":"https:\/\/augstudy.com\/aug-website-files\/wp-content\/uploads\/2019\/11\/news_macquarie_university_cyber_security_273x161.jpg","datePublished":"2019-11-07T02:02:43+00:00","dateModified":"2020-01-14T02:27:30+00:00","author":{"@id":"https:\/\/augstudy.com\/#\/schema\/person\/0206c6be41d147727073ec35f887055e"},"breadcrumb":{"@id":"https:\/\/augstudy.com\/cyber-security-macquarie-university\/#breadcrumb"},"inLanguage":"zh-Hans","potentialAction":[{"@type":"ReadAction","target":["https:\/\/augstudy.com\/cyber-security-macquarie-university\/"]}]},{"@type":"ImageObject","inLanguage":"zh-Hans","@id":"https:\/\/augstudy.com\/cyber-security-macquarie-university\/#primaryimage","url":"https:\/\/augstudy.com\/aug-website-files\/wp-content\/uploads\/2019\/11\/news_macquarie_university_cyber_security_273x161.jpg","contentUrl":"https:\/\/augstudy.com\/aug-website-files\/wp-content\/uploads\/2019\/11\/news_macquarie_university_cyber_security_273x161.jpg","width":273,"height":161},{"@type":"BreadcrumbList","@id":"https:\/\/augstudy.com\/cyber-security-macquarie-university\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/augstudy.com\/"},{"@type":"ListItem","position":2,"name":"Cyber Security di Macquarie University"}]},{"@type":"WebSite","@id":"https:\/\/augstudy.com\/#website","url":"https:\/\/augstudy.com\/","name":"AUG\u5b66\u751f\u670d\u52a1","description":"\u5b66\u751f\u670d\u52a1","alternateName":"AUG Global","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/augstudy.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-Hans"},{"@type":"Person","@id":"https:\/\/augstudy.com\/#\/schema\/person\/0206c6be41d147727073ec35f887055e","name":"\u6797\u8d39\u820d\u5c14","image":{"@type":"ImageObject","inLanguage":"zh-Hans","@id":"https:\/\/secure.gravatar.com\/avatar\/bef5cde95988c74bd211a58290e56fd8f1561875c125b70719d7aa6584079d5e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/bef5cde95988c74bd211a58290e56fd8f1561875c125b70719d7aa6584079d5e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bef5cde95988c74bd211a58290e56fd8f1561875c125b70719d7aa6584079d5e?s=96&d=mm&r=g","caption":"Fisher Lim"},"gender":"male","jobTitle":"Computer Network and Systems Engineer","worksFor":"AusEd-UniEd International Pty Ltd","url":"https:\/\/augstudy.com\/zh\/author\/fish-lim\/"}]}},"_links":{"self":[{"href":"https:\/\/augstudy.com\/zh\/wp-json\/wp\/v2\/posts\/56354","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/augstudy.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/augstudy.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/augstudy.com\/zh\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/augstudy.com\/zh\/wp-json\/wp\/v2\/comments?post=56354"}],"version-history":[{"count":0,"href":"https:\/\/augstudy.com\/zh\/wp-json\/wp\/v2\/posts\/56354\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/augstudy.com\/zh\/wp-json\/wp\/v2\/media\/56372"}],"wp:attachment":[{"href":"https:\/\/augstudy.com\/zh\/wp-json\/wp\/v2\/media?parent=56354"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/augstudy.com\/zh\/wp-json\/wp\/v2\/categories?post=56354"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/augstudy.com\/zh\/wp-json\/wp\/v2\/tags?post=56354"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}