{"version":"1.0","provider_name":"Camdemy1.0","provider_url":"https:\/\/eclass.uch.edu.tw","title":"2-8-Cybersecurity(part2\u9078\u64c7\u984c)37-40","description":"","author_name":"","author_url":"https:\/\/eclass.uch.edu.tw\/user\/","converting":0,"thumbnail_url":"https:\/\/eclass.uch.edu.tw\/sysdata\/doc\/c\/caf46f8c1dcbbdb8\/794b_l.jpg","thumbnail_height":360,"thumbnail_width":640,"html":"<iframe width='720' height='404' id='ccShare44548' frameborder='0' scrolling='no' src='http:\/\/eclass.uch.edu.tw\/media\/e\/44548'><\/iframe>","type":"video","width":720,"height":404,"duration":"16:13","index":{"item_1":{"title":"2-8-Cybersecurity(part2\u9078\u64c7\u984c)37-40","time":"0","indent":"0","sn":"1"}},"resolution":{"playtype":"mp4","subtype":"","src":"","mp4":"720x404","mp4_hd":"","mp4_1920":"","mp4_4k":"","mp4_src":"","mp4_base":""},"base_image":{"thumb":"https:\/\/eclass.uch.edu.tw\/sysdata\/doc\/c\/caf46f8c1dcbbdb8\/794b.jpg","cover":"https:\/\/eclass.uch.edu.tw\/sysdata\/doc\/c\/caf46f8c1dcbbdb8\/fbc2.jpg","storyboard":"https:\/\/eclass.uch.edu.tw\/sysdata\/doc\/c\/caf46f8c1dcbbdb8\/video\/thumbs\/storyboard.jpg"},"srcFrom":"https:\/\/eclass.uch.edu.tw\/media\/44460","base_url":"https:\/\/eclass.uch.edu.tw\/sysdata\/doc\/c\/caf46f8c1dcbbdb8","status":true}