{"id":2854,"date":"2025-05-15T06:43:21","date_gmt":"2025-05-15T06:43:21","guid":{"rendered":"https:\/\/renic.es\/agente\/information-security-group\/"},"modified":"2025-05-15T06:43:21","modified_gmt":"2025-05-15T06:43:21","slug":"information-security-group","status":"publish","type":"agente","link":"https:\/\/renic.es\/en\/agente\/information-security-group\/","title":{"rendered":"INFORMATION SECURITY GROUP"},"content":{"rendered":"","protected":false},"template":"","topics-investigacion-egente":[476,681,682,435,568,441,647,448,455,481,444,552,523,639,553,459,565,475,582,627,587,662,625,572,594,710,426,715],"area-investigacion-agente":[414,415,423,421,419,418,424],"ccaa-agente":[724],"ente-juridico-agente":[772],"tipologia-agente":[],"class_list":["post-2854","agente","type-agente","status-publish","hentry","topics-investigacion-egente-access-control-and-authentication","topics-investigacion-egente-anonymity-systems","topics-investigacion-egente-anonymous-authentication-systems","topics-investigacion-egente-application-of-drm-techniques","topics-investigacion-egente-attacker-identification-and-location","topics-investigacion-egente-audits-of-security-systems","topics-investigacion-egente-authentication-protocols","topics-investigacion-egente-blockchain-en","topics-investigacion-egente-certification","topics-investigacion-egente-creation-of-barriers-to-entry","topics-investigacion-egente-cryptographic-authentication","topics-investigacion-egente-digital-rights-management","topics-investigacion-egente-distributed-ledger-technologies-en","topics-investigacion-egente-e-commerce-protection","topics-investigacion-egente-electronic-evidence-management","topics-investigacion-egente-forensic-science","topics-investigacion-egente-ids-ips-firewalls-en","topics-investigacion-egente-integrity-and-authenticity-control-of-multimedia-objects","topics-investigacion-egente-internet-of-things","topics-investigacion-egente-iot-privacy","topics-investigacion-egente-management-of-identity","topics-investigacion-egente-network-security","topics-investigacion-egente-privacy","topics-investigacion-egente-social-engineering","topics-investigacion-egente-system-performance-improvement","topics-investigacion-egente-usability-of-authentication-systems","topics-investigacion-egente-usable-public-key-algorithms","topics-investigacion-egente-virtualization-and-network-management","area-investigacion-agente-attack-and-defence-against-threats","area-investigacion-agente-evaluation-of-systems-and-cyber-risk","area-investigacion-agente-identity-management","area-investigacion-agente-interaction-with-the-user-usability","area-investigacion-agente-others","area-investigacion-agente-privacy","area-investigacion-agente-promotion-and-awareness-of-safety","ccaa-agente-cataluna-en","ente-juridico-agente-universitat-politecnica-de-catalunya-en"],"_links":{"self":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/agente\/2854","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/agente"}],"about":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/types\/agente"}],"wp:attachment":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/media?parent=2854"}],"wp:term":[{"taxonomy":"topics-investigacion-egente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/topics-investigacion-egente?post=2854"},{"taxonomy":"area-investigacion-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/area-investigacion-agente?post=2854"},{"taxonomy":"ccaa-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/ccaa-agente?post=2854"},{"taxonomy":"ente-juridico-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/ente-juridico-agente?post=2854"},{"taxonomy":"tipologia-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/tipologia-agente?post=2854"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}