{"version":"1.0","provider_name":"Camdemy1.0","provider_url":"https:\/\/eclass.uch.edu.tw","title":"2-5-Cybersecurity(part2\u9078\u64c7\u984c)19-23","description":"","author_name":"","author_url":"https:\/\/eclass.uch.edu.tw\/user\/","converting":0,"thumbnail_url":"https:\/\/eclass.uch.edu.tw\/sysdata\/doc\/0\/0d859472ab6d7e4b\/fbfc_l.jpg","thumbnail_height":360,"thumbnail_width":640,"html":"<iframe width='720' height='405' id='ccShare44545' frameborder='0' scrolling='no' src='http:\/\/eclass.uch.edu.tw\/media\/e\/44545'><\/iframe>","type":"video","width":720,"height":405,"duration":"15:01","index":{"item_1":{"title":"2-5-Cybersecurity(part2\u9078\u64c7\u984c)19-23","time":"0","indent":"0","sn":"1"}},"resolution":{"playtype":"mp4","subtype":"","src":"","mp4":"720x404","mp4_hd":"1280x720","mp4_1920":"1920x1080","mp4_4k":"","mp4_src":"","mp4_base":""},"base_image":{"thumb":"https:\/\/eclass.uch.edu.tw\/sysdata\/doc\/0\/0d859472ab6d7e4b\/fbfc.jpg","cover":"https:\/\/eclass.uch.edu.tw\/sysdata\/doc\/0\/0d859472ab6d7e4b\/4ef0.jpg","storyboard":"https:\/\/eclass.uch.edu.tw\/sysdata\/doc\/0\/0d859472ab6d7e4b\/video\/thumbs\/storyboard.jpg"},"srcFrom":"https:\/\/eclass.uch.edu.tw\/media\/44452","base_url":"https:\/\/eclass.uch.edu.tw\/sysdata\/doc\/0\/0d859472ab6d7e4b","status":true}