{"id":10,"date":"2007-11-23T16:22:44","date_gmt":"2007-11-24T00:22:44","guid":{"rendered":"http:\/\/cubist.cs.washington.edu\/Security\/?page_id=10"},"modified":"2009-01-04T17:00:01","modified_gmt":"2009-01-05T01:00:01","slug":"about","status":"publish","type":"page","link":"https:\/\/secblog.cs.washington.edu\/Security\/about\/","title":{"rendered":"About"},"content":{"rendered":"<p><strong>University of Washington Computer Security Course Blog.<\/strong><\/p>\n<p>Our mission is to help create mature security thinkers.\u00a0 The following articles summarize the role that this blog plays in achieving our mission:<\/p>\n<ul>\n<li><a href=\"http:\/\/cubist.cs.washington.edu\/Security\/?p=3\">Welcome post<\/a><\/li>\n<li><a href=\"http:\/\/cubist.cs.washington.edu\/Security\/?p=7\">Why this blog<\/a><\/li>\n<li><a href=\"http:\/\/cubist.cs.washington.edu\/Security\/?p=5\">What to contribute (Winter 2008)<\/a><\/li>\n<li><a href=\"http:\/\/cubist.cs.washington.edu\/Security\/2009\/01\/04\/what-to-contribute-winter-2009-cse-484-cse-m-584\/\">What to contribute (Winter 2009)<\/a><\/li>\n<\/ul>\n<p>If you&#8217;re interested in learning more about security and privacy research at the <a href=\"http:\/\/www.washington.edu\">University of Washington<\/a>, you might begin by following <a href=\"http:\/\/www.cs.washington.edu\/research\/security.intro.html\">this link<\/a>.  You can also learn more about UW&#8217;s top-ranked computer science and engineering department <a href=\"http:\/\/www.cs.washington.edu\/\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>University of Washington Computer Security Course Blog. Our mission is to help create mature security thinkers.\u00a0 The following articles summarize the role that this blog plays in achieving our mission: Welcome post Why this blog What to contribute (Winter 2008) &hellip; <a href=\"https:\/\/secblog.cs.washington.edu\/Security\/about\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-10","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/pages\/10","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/comments?post=10"}],"version-history":[{"count":2,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/pages\/10\/revisions"}],"predecessor-version":[{"id":293,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/pages\/10\/revisions\/293"}],"wp:attachment":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/media?parent=10"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}