{"id":31669,"date":"2023-05-15T12:38:41","date_gmt":"2023-05-15T05:38:41","guid":{"rendered":"https:\/\/www-dev.lib.buu.ac.th\/?p=31669"},"modified":"2023-05-15T12:42:19","modified_gmt":"2023-05-15T05:42:19","slug":"elementor-31669","status":"publish","type":"post","link":"https:\/\/www-dev.lib.buu.ac.th\/index.php\/en\/2023\/05\/15\/elementor-31669\/","title":{"rendered":"Burapha University Library Held the Training on the Topic of \u201cFundamentals of Communication Network and Secure Connection Requirement for Security Equipment Network, Intrusion Detection System and Virtual Private Network, Security for Wireless Network, Identification, Authentication and Authorization\u201d"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"31669\" class=\"elementor elementor-31669\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a79796e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a79796e\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2042732\" data-id=\"2042732\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e6c586c elementor-widget elementor-widget-heading\" data-id=\"e6c586c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Burapha University Library Held the Training on the Topic of \u201cFundamentals of Communication Network and Secure Connection Requirement for Security Equipment Network, Intrusion Detection System and Virtual Private Network, Security for Wireless Network, Identification, Authentication and Authorization\u201d<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a1ee58c elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"a1ee58c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-6133b44 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6133b44\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-a702c0c\" data-id=\"a702c0c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a84ca6d elementor-widget elementor-widget-image\" data-id=\"a84ca6d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/www-dev.lib.buu.ac.th\/wp-content\/uploads\/2023\/04\/network-security-1-1024x683.jpg\" class=\"attachment-large size-large wp-image-30329\" alt=\"\" srcset=\"https:\/\/www-dev.lib.buu.ac.th\/wp-content\/uploads\/2023\/04\/network-security-1-1024x683.jpg 1024w, https:\/\/www-dev.lib.buu.ac.th\/wp-content\/uploads\/2023\/04\/network-security-1-300x200.jpg 300w, https:\/\/www-dev.lib.buu.ac.th\/wp-content\/uploads\/2023\/04\/network-security-1-768x512.jpg 768w, https:\/\/www-dev.lib.buu.ac.th\/wp-content\/uploads\/2023\/04\/network-security-1-1536x1024.jpg 1536w, https:\/\/www-dev.lib.buu.ac.th\/wp-content\/uploads\/2023\/04\/network-security-1.jpg 1731w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-cb85ef8\" data-id=\"cb85ef8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-00079ac elementor-widget elementor-widget-text-editor\" data-id=\"00079ac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>\u00a0 \u00a0 \u00a0Burapha University Library held the training on the topic of &#8220;Fundamentals of Communication Network and Secure Connection Requirement for Security Equipment Network, Intrusion Detection System and Virtual Private Network, Security for Wireless Network, Identification, Authentication and Authorization&#8221; by the guest speaker, Ajarn Pongsanan Chanchaichinnawat, the lecturer at the Faculty of Science and Social Sciences, Burapha University Sa Kaeo Campus on 8 February 2023 at Cyber \u200b\u200bZone I Room on the 6<sup>th<\/sup> Floor of the library.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ade9308 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ade9308\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e60d654\" data-id=\"e60d654\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5b1df42 elementor-widget elementor-widget-html\" data-id=\"5b1df42\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\tngg_shortcode_0_placeholder\"\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Burapha University Library Held the Training on the Topic of \u201cFundamentals of Communication Network and Secure Connection Requirement for Security Equipment Network, Intrusion Detection System and Virtual Private Network, Security for Wireless Network, Identification, Authentication and Authorization\u201d &nbsp; &nbsp; &nbsp;Burapha University Library held the training on the topic of &#8220;Fundamentals of Communication Network and Secure [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"plain-container","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ngg_post_thumbnail":0,"footnotes":""},"categories":[80],"tags":[],"class_list":["post-31669","post","type-post","status-publish","format-standard","hentry","category-news-and-event_en"],"_links":{"self":[{"href":"https:\/\/www-dev.lib.buu.ac.th\/index.php\/wp-json\/wp\/v2\/posts\/31669","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www-dev.lib.buu.ac.th\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www-dev.lib.buu.ac.th\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www-dev.lib.buu.ac.th\/index.php\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www-dev.lib.buu.ac.th\/index.php\/wp-json\/wp\/v2\/comments?post=31669"}],"version-history":[{"count":0,"href":"https:\/\/www-dev.lib.buu.ac.th\/index.php\/wp-json\/wp\/v2\/posts\/31669\/revisions"}],"wp:attachment":[{"href":"https:\/\/www-dev.lib.buu.ac.th\/index.php\/wp-json\/wp\/v2\/media?parent=31669"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www-dev.lib.buu.ac.th\/index.php\/wp-json\/wp\/v2\/categories?post=31669"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www-dev.lib.buu.ac.th\/index.php\/wp-json\/wp\/v2\/tags?post=31669"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}