{"id":1764,"date":"2015-06-03T08:49:00","date_gmt":"2015-06-03T06:49:00","guid":{"rendered":"http:\/\/bibliotecas.unileon.es\/ingenierias-industrial-informatica\/?p=1764"},"modified":"2018-12-13T18:06:25","modified_gmt":"2018-12-13T17:06:25","slug":"incibe-de-leon-abre-el-polo-tecnologico-de-la-ciberseguridad-nacional","status":"publish","type":"post","link":"https:\/\/bibliotecas.unileon.es\/ingenierias-industrial-informatica\/2015\/06\/03\/incibe-de-leon-abre-el-polo-tecnologico-de-la-ciberseguridad-nacional\/","title":{"rendered":"Incibe de Le\u00f3n abre el Polo Tecnol\u00f3gico de la Ciberseguridad Nacional"},"content":{"rendered":"\n<!-- This is the start of the WP Twitter Button code -->\n<div id=\"rk_wp_twitter_button\" style=\"margin: 0px 0px 0px 0px; float: right\"><a href=\"http:\/\/twitter.com\/share\" class=\"twitter-share-button\" data-url=\"https:\/\/bibliotecas.unileon.es\/ingenierias-industrial-informatica\/2015\/06\/03\/incibe-de-leon-abre-el-polo-tecnologico-de-la-ciberseguridad-nacional\/\" data-count=\"horizontal\">Tweet<\/a><script type=\"text\/javascript\" src=\"http:\/\/platform.twitter.com\/widgets.js\"><\/script><\/div>\n<!-- This is the end of the WP Twitter Button code -->\n\n<p><img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"http:\/\/www.leonoticias.com\/frontend\/leonoticias\/fotos\/imagen.php?filename=fichero_131302_20150602.jpg&amp;ancho=652&amp;alto=190&amp;corto=0\" alt=\"Presentaci\u00f3n de la Red de Excelencia en Ciberseguridad\" width=\"388\" height=\"287\" \/><\/p>\n<p>El Incibe de Le\u00f3n ser\u00e1 el agente neutral en un polo conformado por las empresas especializadas en soluciones de ciberseguridad<\/p>\n<p><a href=\"http:\/\/www.leonoticias.com\/frontend\/leonoticias\/Incibe-De-Leon-Abre-El-Polo-Tecnologico-De-La-Ciberseguridad-vn176636-vst216\" target=\"_blank\">Lee la noticia completa<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tweet El Incibe de Le\u00f3n ser\u00e1 el agente neutral en un polo conformado por las empresas especializadas en soluciones de ciberseguridad Lee la noticia completa<\/p>\n","protected":false},"author":18,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1764","post","type-post","status-publish","format-standard","hentry","category-sin-categoria"],"_links":{"self":[{"href":"https:\/\/bibliotecas.unileon.es\/ingenierias-industrial-informatica\/wp-json\/wp\/v2\/posts\/1764","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bibliotecas.unileon.es\/ingenierias-industrial-informatica\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bibliotecas.unileon.es\/ingenierias-industrial-informatica\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bibliotecas.unileon.es\/ingenierias-industrial-informatica\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/bibliotecas.unileon.es\/ingenierias-industrial-informatica\/wp-json\/wp\/v2\/comments?post=1764"}],"version-history":[{"count":0,"href":"https:\/\/bibliotecas.unileon.es\/ingenierias-industrial-informatica\/wp-json\/wp\/v2\/posts\/1764\/revisions"}],"wp:attachment":[{"href":"https:\/\/bibliotecas.unileon.es\/ingenierias-industrial-informatica\/wp-json\/wp\/v2\/media?parent=1764"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bibliotecas.unileon.es\/ingenierias-industrial-informatica\/wp-json\/wp\/v2\/categories?post=1764"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bibliotecas.unileon.es\/ingenierias-industrial-informatica\/wp-json\/wp\/v2\/tags?post=1764"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}