{"id":487,"date":"2026-04-16T18:56:34","date_gmt":"2026-04-16T18:56:34","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ianhagmann\/?page_id=487"},"modified":"2026-04-16T18:56:34","modified_gmt":"2026-04-16T18:56:34","slug":"windows-system-management-and-security","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/ianhagmann\/windows-system-management-and-security\/","title":{"rendered":"Windows System Management and Security"},"content":{"rendered":"\n<p>Here are the instructions for a research paper in this course:<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/ianhagmann\/wp-content\/uploads\/sites\/30545\/2026\/04\/CYSE-280-Research-Paper-Submisssion-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of CYSE-280-Research-Paper-Submisssion-1.\"><\/object><a id=\"wp-block-file--media-d334d41b-90a8-4416-978c-232e1c7637f6\" href=\"https:\/\/sites.wp.odu.edu\/ianhagmann\/wp-content\/uploads\/sites\/30545\/2026\/04\/CYSE-280-Research-Paper-Submisssion-1.pdf\">CYSE-280-Research-Paper-Submisssion-1<\/a><\/div>\n\n\n\n<p>And here is my research paper on Bluetooth security:<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/ianhagmann\/wp-content\/uploads\/sites\/30545\/2026\/04\/WinSysResearchPaper.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of WinSysResearchPaper.\"><\/object><a id=\"wp-block-file--media-7cf3c586-8064-4168-bd8d-b732a1c8ede6\" href=\"https:\/\/sites.wp.odu.edu\/ianhagmann\/wp-content\/uploads\/sites\/30545\/2026\/04\/WinSysResearchPaper.pdf\">WinSysResearchPaper<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Here are the instructions for a research paper in this course: And here is my research paper on Bluetooth security:<\/p>\n","protected":false},"author":24902,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ianhagmann\/wp-json\/wp\/v2\/pages\/487"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ianhagmann\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ianhagmann\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ianhagmann\/wp-json\/wp\/v2\/users\/24902"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ianhagmann\/wp-json\/wp\/v2\/comments?post=487"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/ianhagmann\/wp-json\/wp\/v2\/pages\/487\/revisions"}],"predecessor-version":[{"id":490,"href":"https:\/\/sites.wp.odu.edu\/ianhagmann\/wp-json\/wp\/v2\/pages\/487\/revisions\/490"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ianhagmann\/wp-json\/wp\/v2\/media?parent=487"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}