{"version":"1.0","provider_name":"C\u00f4ng Ty C\u1ed5 Ph\u1ea7n \u0110\u1ea7u T\u01b0 V\u00e0 C\u00f4ng Ngh\u1ec7 BAP","provider_url":"https:\/\/bap-software.net\/vi","author_name":"Hu\u1ebf Phan","author_url":"https:\/\/bap-software.net\/vi\/author\/huept\/","title":"Cyber Security - M\u1ed1i quan ng\u1ea1i trong th\u1eddi k\u1ef3 4.0 v\u00e0 c\u01a1 h\u1ed9i vi\u1ec7c l\u00e0m tuy\u1ec7t v\u1eddi!","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"Cl914c7ewW\"><a href=\"https:\/\/bap-software.net\/vi\/knowledge\/cyber-security\/\">Cyber Security &#8211; M\u1ed1i quan ng\u1ea1i trong th\u1eddi k\u1ef3 4.0 v\u00e0 c\u01a1 h\u1ed9i vi\u1ec7c l\u00e0m tuy\u1ec7t v\u1eddi!<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/bap-software.net\/vi\/knowledge\/cyber-security\/embed\/#?secret=Cl914c7ewW\" width=\"600\" height=\"338\" title=\"&#8220;Cyber Security &#8211; M\u1ed1i quan ng\u1ea1i trong th\u1eddi k\u1ef3 4.0 v\u00e0 c\u01a1 h\u1ed9i vi\u1ec7c l\u00e0m tuy\u1ec7t v\u1eddi!&#8221; &#8212; C\u00f4ng Ty C\u1ed5 Ph\u1ea7n \u0110\u1ea7u T\u01b0 V\u00e0 C\u00f4ng Ngh\u1ec7 BAP\" data-secret=\"Cl914c7ewW\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/cdn.bap-software.net\/2024\/06\/27220717\/Cyber-Security.jpg","thumbnail_width":800,"thumbnail_height":500,"description":"Cyber Security (hay An ninh m\u1ea1ng) l\u00e0 qu\u00e1 tr\u00ecnh b\u1ea3o v\u1ec7 h\u1ec7 th\u1ed1ng m\u00e1y t\u00ednh c\u0169ng nh\u01b0 c\u01a1 s\u1edf h\u1ea1 t\u1ea7ng li\u00ean quan \u0111\u1ebfn tin h\u1ecdc tr\u01b0\u1edbc c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng t\u1eeb nhi\u1ec1u m\u1ed1i..."}