
{"id":349,"date":"2008-06-17T09:18:16","date_gmt":"2008-06-17T12:18:16","guid":{"rendered":"http:\/\/www.talsoft.com.ar\/site\/?p=349"},"modified":"2008-06-17T09:18:16","modified_gmt":"2008-06-17T12:18:16","slug":"posters-sobre-concietizacion-en-seguridad","status":"publish","type":"post","link":"https:\/\/www.talsoft.com.ar\/site\/es\/posters-sobre-concietizacion-en-seguridad\/","title":{"rendered":"Posters sobre Concietizaci\u00c3\u00b3n en Seguridad"},"content":{"rendered":"<p>Una buena forma de capacitar y concientizar en lo que respecta a la seguridad inform\u00c3\u00a1tica es hacer campa\u00c3\u00b1as utilizando p\u00c3\u00b3sters:<\/p>\n<p>A continuaci\u00c3\u00b3n pueden encontrarse algunos sitios \u00c3\u00batiles:<\/p>\n<p>http:\/\/nativeintelligence.com\/posters\/posters.asp<br \/>\nhttp:\/\/www.iwar.org.uk\/comsec\/resources\/ia-awareness-posters\/index.htm<br \/>\nhttp:\/\/members.impulse.net\/~sate\/posters.html<br \/>\nhttp:\/\/iase.disa.mil\/iaposters\/index.html<br \/>\nhttp:\/\/www.noticebored.com\/html\/about_noticebored.html<br \/>\nhttp:\/\/download.microsoft.com\/download\/1\/9\/9\/1990AA19-2C4F-42D0-9A22-1E158EF0ABBC\/Security%20Awareness%20Content.zip<br \/>\nhttp:\/\/www.nativeintelligence.com\/ni-posters\/posters.asp<br \/>\nhttp:\/\/members.impulse.net\/~sate\/posters.html<br \/>\nhttp:\/\/www.iwar.org.uk\/comsec\/resources\/ia-awareness-posters\/index.htm<br \/>\nhttp:\/\/www.securityawareness.com\/ov_tutorials.htm<br \/>\nwww.iso27000.es\/doc_herramientas_all.htm<\/p>\n<p>Fuente: seguinfo.blogspot.com<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Una buena forma de capacitar y concientizar en lo que respecta a la seguridad inform\u00c3\u00a1tica es hacer campa\u00c3\u00b1as utilizando p\u00c3\u00b3sters: A continuaci\u00c3\u00b3n pueden encontrarse algunos sitios \u00c3\u00batiles: http:\/\/nativeintelligence.com\/posters\/posters.asp http:\/\/www.iwar.org.uk\/comsec\/resources\/ia-awareness-posters\/index.htm http:\/\/members.impulse.net\/~sate\/posters.html http:\/\/iase.disa.mil\/iaposters\/index.html http:\/\/www.noticebored.com\/html\/about_noticebored.html http:\/\/download.microsoft.com\/download\/1\/9\/9\/1990AA19-2C4F-42D0-9A22-1E158EF0ABBC\/Security%20Awareness%20Content.zip http:\/\/www.nativeintelligence.com\/ni-posters\/posters.asp http:\/\/members.impulse.net\/~sate\/posters.html http:\/\/www.iwar.org.uk\/comsec\/resources\/ia-awareness-posters\/index.htm http:\/\/www.securityawareness.com\/ov_tutorials.htm www.iso27000.es\/doc_herramientas_all.htm Fuente: seguinfo.blogspot.com<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-349","post","type-post","status-publish","format-standard","hentry","category-profesional"],"_links":{"self":[{"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/posts\/349","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/comments?post=349"}],"version-history":[{"count":0,"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/posts\/349\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/media?parent=349"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/categories?post=349"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/tags?post=349"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}