{"categories":["\u30b3\u30f3\u30d4\u30e5\u30fc\u30bf"],"blog_title":"\u53d6\u7de0\u5f79 \u5e73\u793e\u54e1 \u30d6\u30ed\u30b0 (\u30d9\u30fc\u30bf\u7248) ","type":"rich","blog_url":"https://tsusuzuki.hatenadiary.jp/","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Ftsusuzuki.hatenadiary.jp%2Fentry%2F20100429%2F1272529049\" title=\" \u7d9a\u30fb\u591a\u5c64\u9632\u5fa1 - \u53d6\u7de0\u5f79 \u5e73\u793e\u54e1 \u30d6\u30ed\u30b0 (\u30d9\u30fc\u30bf\u7248) \" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","author_url":"https://blog.hatena.ne.jp/TsuSUZUKI/","description":"\u30c9\u30ad\u30e5\u30e1\u30f3\u30c8\u3001\u767a\u898b\u3057\u305f\u3068\u601d\u3044\u307e\u3059\u3001\u305f\u3076\u3093\u3002 \u30bb\u30ea\u30d5\u306f\u3001\u300c Sure, I\u2019m paranoid. But am I paranoid enough? \u300d \u3067\u3057\u305f\u3002 Trusted Information Systems http://www.fwtk.org/fwtk/docs/presentation.pdf > Internet Firewall Toolkit - An Overview \u300c Copyright Trusted Information Systems 1993 \u300d\u3001\u53e4\u3044\u3067\u3059\u3002 P.9 \u306b\u300c Defense In Depth \u300d\u3068\u51fa\u3066\u304d\u307e\u3059\u3002\u57fa\u790e\u3092\u62bc\u3055\u3048\u308b\u306b\u306f\u826f\u3044\u304b\u3082\u3057\u308c\u307e\u2026","url":"https://tsusuzuki.hatenadiary.jp/entry/20100429/1272529049","image_url":"https://cdn-ak.d.st-hatena.com/diary/TsuSUZUKI/2010-04-29.jpg","provider_url":"https://hatena.blog","title":" \u7d9a\u30fb\u591a\u5c64\u9632\u5fa1","version":"1.0","published":"2010-04-29 17:17:29","author_name":"TsuSUZUKI","provider_name":"Hatena Blog","width":"100%","height":"190"}