{"id":316,"date":"2012-04-24T01:28:28","date_gmt":"2012-04-23T18:28:28","guid":{"rendered":"https:\/\/dosen.unila.ac.id\/rasp\/?p=316"},"modified":"2012-04-24T02:01:34","modified_gmt":"2012-04-23T19:01:34","slug":"keamanan-komputer-2","status":"publish","type":"post","link":"https:\/\/dosen.unila.ac.id\/rasp\/2012\/04\/24\/keamanan-komputer-2\/","title":{"rendered":"Keamanan Komputer 2"},"content":{"rendered":"<p>Kuliah Senin 23 April 2012 membahas materi sebagai berikut.\u00a0The information society.<\/p>\n<div>\u2022Dua abad lampau, 90 dari 100 orang bekerja menghasilkan makanan. Ketika orang menjadi lebih efisien dalam produksi makanan, masyarakat agraris tumbuh menjadi masyarakat industri.<\/div>\n<div>\u2022Our transition to an industrial society was slow and marked with social strife. Each new technological innovation had a profound impact.<\/div>\n<div>We know that<\/div>\n<div>\n<div>\u2022The Industrial Revolution shortened the work week, provided greater opportunities for employment, and improved the quality of life for all.<\/div>\n<div>\u2022Today two people produce enough food for the remaining 98, and we are in the middle of a transition from an industrial society to an information society.<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Kuliah Senin 23 April 2012 membahas materi sebagai berikut.\u00a0The information society. \u2022Dua abad lampau, 90 dari 100 orang bekerja menghasilkan makanan. Ketika orang menjadi lebih efisien dalam produksi makanan, masyarakat agraris tumbuh menjadi masyarakat industri. \u2022Our transition to an industrial society was slow and marked with social strife. Each new technological innovation had a profound &hellip; <a href=\"https:\/\/dosen.unila.ac.id\/rasp\/2012\/04\/24\/keamanan-komputer-2\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Keamanan Komputer 2&#8221;<\/span><\/a><\/p>\n","protected":false},"author":14,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[],"class_list":["post-316","post","type-post","status-publish","format-standard","hentry","category-computer-security"],"_links":{"self":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts\/316"}],"collection":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/comments?post=316"}],"version-history":[{"count":0,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts\/316\/revisions"}],"wp:attachment":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/media?parent=316"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/categories?post=316"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/tags?post=316"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}