{"id":2898,"date":"2025-05-15T06:43:24","date_gmt":"2025-05-15T06:43:24","guid":{"rendered":"https:\/\/renic.es\/agente\/network-engineering-security-group\/"},"modified":"2025-06-02T11:11:08","modified_gmt":"2025-06-02T11:11:08","slug":"network-engineering-security-group","status":"publish","type":"agente","link":"https:\/\/renic.es\/en\/agente\/network-engineering-security-group\/","title":{"rendered":"Network Engineering &#038; Security Group"},"content":{"rendered":"","protected":false},"template":"","topics-investigacion-egente":[512,427,441,600,465,469,493,657,504,501,515,553,459,565,429,587,591,662,689,526,625,622,669,680],"area-investigacion-agente":[414,416,415,420,418],"ccaa-agente":[718],"ente-juridico-agente":[761],"tipologia-agente":[],"class_list":["post-2898","agente","type-agente","status-publish","hentry","topics-investigacion-egente-anomaly-detection","topics-investigacion-egente-antivirus-en","topics-investigacion-egente-audits-of-security-systems","topics-investigacion-egente-composite-metric-models","topics-investigacion-egente-computation-of-relevant-metadata","topics-investigacion-egente-computing-and-harvesting-of-metrics","topics-investigacion-egente-data-mining-en","topics-investigacion-egente-data-sanitization-and-anonymization","topics-investigacion-egente-development-of-data-harvesting-mechanisms","topics-investigacion-egente-development-of-threat-detection-tools","topics-investigacion-egente-early-detection-of-cyber-risks","topics-investigacion-egente-electronic-evidence-management","topics-investigacion-egente-forensic-science","topics-investigacion-egente-ids-ips-firewalls-en","topics-investigacion-egente-large-scale-data-analysis","topics-investigacion-egente-management-of-identity","topics-investigacion-egente-mechanisms-for-data-harvesting","topics-investigacion-egente-network-security","topics-investigacion-egente-operating-systems","topics-investigacion-egente-preparation-of-mechanisms-to-respond-to-attacks","topics-investigacion-egente-privacy","topics-investigacion-egente-privacy-policies","topics-investigacion-egente-security-of-mobile-devices","topics-investigacion-egente-simulation-of-dangerous-environments","area-investigacion-agente-attack-and-defence-against-threats","area-investigacion-agente-data-processing","area-investigacion-agente-evaluation-of-systems-and-cyber-risk","area-investigacion-agente-metrics","area-investigacion-agente-privacy","ccaa-agente-andalucia-en","ente-juridico-agente-universidad-de-granada-en"],"_links":{"self":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/agente\/2898","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/agente"}],"about":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/types\/agente"}],"wp:attachment":[{"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/media?parent=2898"}],"wp:term":[{"taxonomy":"topics-investigacion-egente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/topics-investigacion-egente?post=2898"},{"taxonomy":"area-investigacion-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/area-investigacion-agente?post=2898"},{"taxonomy":"ccaa-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/ccaa-agente?post=2898"},{"taxonomy":"ente-juridico-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/ente-juridico-agente?post=2898"},{"taxonomy":"tipologia-agente","embeddable":true,"href":"https:\/\/renic.es\/en\/wp-json\/wp\/v2\/tipologia-agente?post=2898"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}