{"id":6,"date":"2015-07-17T14:56:38","date_gmt":"2015-07-17T05:56:38","guid":{"rendered":"http:\/\/guide.jinbo.net\/security\/?page_id=6"},"modified":"2015-08-17T13:35:41","modified_gmt":"2015-08-17T04:35:41","slug":"overviews","status":"publish","type":"page","link":"http:\/\/guide.jinbo.net\/digital-security\/overviews","title":{"rendered":"\ub514\uc9c0\ud138 \ubcf4\uc548\uc5d0 \ub300\ud55c \uc774\ud574"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"template-builder.php","meta":{"jetpack_post_was_ever_published":false},"categories":[],"tags":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/P6uv38-6","_links":{"self":[{"href":"http:\/\/guide.jinbo.net\/digital-security\/wp-json\/wp\/v2\/pages\/6"}],"collection":[{"href":"http:\/\/guide.jinbo.net\/digital-security\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/guide.jinbo.net\/digital-security\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/guide.jinbo.net\/digital-security\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/guide.jinbo.net\/digital-security\/wp-json\/wp\/v2\/comments?post=6"}],"version-history":[{"count":1,"href":"http:\/\/guide.jinbo.net\/digital-security\/wp-json\/wp\/v2\/pages\/6\/revisions"}],"predecessor-version":[{"id":7,"href":"http:\/\/guide.jinbo.net\/digital-security\/wp-json\/wp\/v2\/pages\/6\/revisions\/7"}],"wp:attachment":[{"href":"http:\/\/guide.jinbo.net\/digital-security\/wp-json\/wp\/v2\/media?parent=6"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/guide.jinbo.net\/digital-security\/wp-json\/wp\/v2\/categories?post=6"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/guide.jinbo.net\/digital-security\/wp-json\/wp\/v2\/tags?post=6"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}