{"id":8000,"date":"2021-07-28T11:24:13","date_gmt":"2021-07-28T11:24:13","guid":{"rendered":"https:\/\/www.semantic-systems.com\/semantic-noticias\/?p=8000"},"modified":"2021-12-14T09:50:34","modified_gmt":"2021-12-14T09:50:34","slug":"los-articulos-top-de-seguridad","status":"publish","type":"post","link":"https:\/\/www.semantic-systems.com\/semantic-noticias\/ebooks-tecnologicos\/los-articulos-top-de-seguridad\/","title":{"rendered":"Los Art\u00edculos TOP de Seguridad"},"content":{"rendered":"<p>Una recopilaci\u00f3n de los art\u00edculos TOP de seguridad publicados por Semantic Systems, con tem\u00e1ticas tan interesantes como la securizaci\u00f3n de tus dispositivos, contrase\u00f1as seguras, o phising entre otros.<\/p>\n<p>&nbsp;<\/p>\n<p>Descubre en este ebook los mejores art\u00edculos de seguridad publicados por Semantic Systems.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"color: #ff0000;\"><strong>\u00cdndice<\/strong><\/span><\/h2>\n<ul>\n<li><span style=\"color: #595959;\">Securizando el WiFi de tu hogar<\/span><\/li>\n<li><span style=\"color: #595959;\">Securizando dispositivos personales<\/span><\/li>\n<li><span style=\"color: #595959;\">Creando contrase\u00f1as seguras<\/span><\/li>\n<li><span style=\"color: #595959;\">phishing, Smishing y vishing. los ciberataques \u201caparentemente\u201d menos sofisticados<\/span><\/li>\n<li><span style=\"color: #595959;\">Ingenier\u00eda social, hackeando a las personas<\/span><\/li>\n<li><span style=\"color: #595959;\">Teletrabajo seguro<\/span><\/li>\n<li><span style=\"color: #595959;\">Inteligencia artificial, aliada o enemiga?<\/span><\/li>\n<li><span style=\"color: #595959;\">Tener el control de nuestros datos<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td align=\"center\">\n<table style=\"border-collapse: separate !important;\" border=\"0\" width=\"350\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td style=\"background-color: #e71d1d; color: #ffffff; font-size: 16px; padding: 15px 10px; border-radius: 0px; font-family: Tahoma, Geneva, sans-serif; text-align: center; border: solid 1px #FFFFFF;\"><a style=\"color: #ffffff; text-decoration: none;\" href=\"https:\/\/go.semantic-systems.com\/ebook-top-articulos-seguridad\" target=\"_blank\">Descargar ebook gratuito<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2><\/h2>\n","protected":false},"excerpt":{"rendered":"<p>Una recopilaci\u00f3n de los art\u00edculos TOP de seguridad publicados por Semantic Systems, con tem\u00e1ticas tan interesantes como la securizaci\u00f3n de tus dispositivos, contrase\u00f1as seguras, o phising entre otros. &nbsp; Descubre en este ebook los mejores art\u00edculos de seguridad publicados por Semantic Systems. &nbsp; &nbsp; \u00cdndice Securizando el WiFi de tu hogar Securizando dispositivos personales Creando [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":8001,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[35],"class_list":["post-8000","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ebooks-tecnologicos","tag-ciberseguridad"],"_links":{"self":[{"href":"https:\/\/www.semantic-systems.com\/semantic-noticias\/wp-json\/wp\/v2\/posts\/8000","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.semantic-systems.com\/semantic-noticias\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.semantic-systems.com\/semantic-noticias\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.semantic-systems.com\/semantic-noticias\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.semantic-systems.com\/semantic-noticias\/wp-json\/wp\/v2\/comments?post=8000"}],"version-history":[{"count":5,"href":"https:\/\/www.semantic-systems.com\/semantic-noticias\/wp-json\/wp\/v2\/posts\/8000\/revisions"}],"predecessor-version":[{"id":8006,"href":"https:\/\/www.semantic-systems.com\/semantic-noticias\/wp-json\/wp\/v2\/posts\/8000\/revisions\/8006"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.semantic-systems.com\/semantic-noticias\/wp-json\/wp\/v2\/media\/8001"}],"wp:attachment":[{"href":"https:\/\/www.semantic-systems.com\/semantic-noticias\/wp-json\/wp\/v2\/media?parent=8000"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.semantic-systems.com\/semantic-noticias\/wp-json\/wp\/v2\/categories?post=8000"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.semantic-systems.com\/semantic-noticias\/wp-json\/wp\/v2\/tags?post=8000"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}