{"id":2593,"date":"2009-10-20T07:32:54","date_gmt":"2009-10-20T05:32:54","guid":{"rendered":"http:\/\/security-planet.de\/?p=2593"},"modified":"2009-10-20T07:32:54","modified_gmt":"2009-10-20T05:32:54","slug":"freies-wlan-tutorial","status":"publish","type":"post","link":"https:\/\/cyber-fi.net\/index.php\/2009\/10\/20\/freies-wlan-tutorial\/","title":{"rendered":"Freies WLAN-Tutorial"},"content":{"rendered":"<p>Bei der IEEE-ComSoc gibt es gerade ein freies Tutorial mit dem Titel &#8220;Emerging Technologies in Wireless LANs&#8221;. Ob es wirklich gut ist, kann ich nicht sagen; nach zehn Minuten bin ich eingeschlafen &#8230; Pr\u00e4sentiert wurde es von Benny Bing vom Georgia Institute of Technology w\u00e4hrend des IEEE WCNC am 1 April 2008 in Las Vegas.<br \/>\n<figure id=\"attachment_2594\" aria-describedby=\"caption-attachment-2594\" style=\"width: 380px\" class=\"wp-caption aligncenter\"><a href=\"http:\/\/www.comsoc.org\/freetutorials\/springer\/springer.htm\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blog.iwen.de\/wp-content\/uploads\/2009\/10\/wlan-tutorial.png\" alt=\"Emerging Technologies in Wireless LANs\" title=\"WLAN-Tutorial\" width=\"380\" height=\"346\" class=\"size-full wp-image-2594\" srcset=\"https:\/\/cyber-fi.net\/wp-content\/uploads\/2009\/10\/wlan-tutorial.png 380w, https:\/\/cyber-fi.net\/wp-content\/uploads\/2009\/10\/wlan-tutorial-300x273.png 300w\" sizes=\"auto, (max-width: 380px) 100vw, 380px\" \/><\/a><figcaption id=\"caption-attachment-2594\" class=\"wp-caption-text\">Emerging Technologies in Wireless LANs<\/figcaption><\/figure><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Bei der IEEE-ComSoc gibt es gerade ein freies Tutorial mit dem Titel &#8220;Emerging Technologies in Wireless LANs&#8221;. Ob es wirklich gut ist, kann ich nicht sagen; nach zehn Minuten bin ich eingeschlafen &#8230; Pr\u00e4sentiert wurde es von Benny Bing vom Georgia Institute of Technology w\u00e4hrend des IEEE WCNC am 1 April 2008 in Las Vegas.<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[2],"tags":[91,160,296,664],"class_list":["post-2593","post","type-post","status-publish","format-standard","hentry","category-allgemeines","tag-benny-bing","tag-comsoc","tag-ieee","tag-wlan"],"_links":{"self":[{"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/posts\/2593","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/comments?post=2593"}],"version-history":[{"count":0,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/posts\/2593\/revisions"}],"wp:attachment":[{"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/media?parent=2593"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/categories?post=2593"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/tags?post=2593"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}