{"id":173026,"date":"2024-09-30T14:31:50","date_gmt":"2024-09-30T05:31:50","guid":{"rendered":"http:\/\/ee.presscat.kr\/?post_type=best_course&#038;p=173026"},"modified":"2026-04-06T19:54:30","modified_gmt":"2026-04-06T10:54:30","slug":"prof-yun-insu","status":"publish","type":"best_course","link":"http:\/\/ee.presscat.kr\/en\/best_course\/prof-yun-insu\/","title":{"rendered":"Prof. Yun, Insu"},"content":{"rendered":"<p><strong>Prof. Yun, Insu<\/strong><\/p>\n<p><span style=\"color: #000000\">EE517 Software Hacking Theory and Practice<\/span><\/p>\n<p>(2024 Spring Semester)<\/p>\n","protected":false},"featured_media":173017,"template":"","list_year":[314],"best_division":[193],"best_course_paper":[197],"class_list":["post-173026","best_course","type-best_course","status-publish","has-post-thumbnail","hentry","list_year-314","best_division-computer-en","best_course_paper-grand-en"],"acf":[],"_links":{"self":[{"href":"http:\/\/ee.presscat.kr\/en\/wp-json\/wp\/v2\/best_course\/173026","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/ee.presscat.kr\/en\/wp-json\/wp\/v2\/best_course"}],"about":[{"href":"http:\/\/ee.presscat.kr\/en\/wp-json\/wp\/v2\/types\/best_course"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/ee.presscat.kr\/en\/wp-json\/wp\/v2\/media\/173017"}],"wp:attachment":[{"href":"http:\/\/ee.presscat.kr\/en\/wp-json\/wp\/v2\/media?parent=173026"}],"wp:term":[{"taxonomy":"list_year","embeddable":true,"href":"http:\/\/ee.presscat.kr\/en\/wp-json\/wp\/v2\/list_year?post=173026"},{"taxonomy":"best_division","embeddable":true,"href":"http:\/\/ee.presscat.kr\/en\/wp-json\/wp\/v2\/best_division?post=173026"},{"taxonomy":"best_course_paper","embeddable":true,"href":"http:\/\/ee.presscat.kr\/en\/wp-json\/wp\/v2\/best_course_paper?post=173026"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}