{"version":"1.0","provider_name":"Go Notes Ti\u1ebfng Vi\u1ec7t\u2013 AI Knowledge, Tips &amp; Latest Updates","provider_url":"https:\/\/www.go-notes.com\/vn","author_name":"vpadmin","author_url":"https:\/\/www.go-notes.com\/vn\/author\/vpadmin\/","title":"S\u01a1 \u0111\u1ed3 l\u1edbp UML cho thi\u1ebft k\u1ebf giao th\u1ee9c b\u1ea3o m\u1eadt \ud83d\udee1\ufe0f","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"RDShCx5paU\"><a href=\"https:\/\/www.go-notes.com\/vn\/uml-class-diagrams-security-protocol-design\/\">S\u01a1 \u0111\u1ed3 l\u1edbp UML cho thi\u1ebft k\u1ebf giao th\u1ee9c b\u1ea3o m\u1eadt<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.go-notes.com\/vn\/uml-class-diagrams-security-protocol-design\/embed\/#?secret=RDShCx5paU\" width=\"600\" height=\"338\" title=\"&#8220;S\u01a1 \u0111\u1ed3 l\u1edbp UML cho thi\u1ebft k\u1ebf giao th\u1ee9c b\u1ea3o m\u1eadt&#8221; &#8212; Go Notes Ti\u1ebfng Vi\u1ec7t\u2013 AI Knowledge, Tips &amp; Latest Updates\" data-secret=\"RDShCx5paU\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.go-notes.com\/vn\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/www.go-notes.com\/vn\/wp-content\/uploads\/sites\/25\/2026\/04\/uml-security-protocol-design-chalkboard-infographic.jpg","thumbnail_width":1664,"thumbnail_height":928,"description":"H\u1ecdc c\u00e1ch m\u00f4 h\u00ecnh h\u00f3a c\u00e1c h\u1ec7 th\u1ed1ng an to\u00e0n b\u1eb1ng s\u01a1 \u0111\u1ed3 l\u1edbp UML. Kh\u00e1m ph\u00e1 c\u00e1c m\u1eabu x\u00e1c th\u1ef1c, m\u00e3 h\u00f3a v\u00e0 kh\u1ea3 n\u0103ng hi\u1ec3n th\u1ecb \u0111\u1ec3 thi\u1ebft k\u1ebf giao th\u1ee9c v\u1eefng ch\u1eafc."}