{"id":8,"date":"2015-07-17T14:57:01","date_gmt":"2015-07-17T05:57:01","guid":{"rendered":"http:\/\/guide.jinbo.net\/security\/?page_id=8"},"modified":"2015-08-17T13:35:41","modified_gmt":"2015-08-17T04:35:41","slug":"computer-security","status":"publish","type":"page","link":"http:\/\/guide.jinbo.net\/digital-security\/computer-security","title":{"rendered":"\ucef4\ud4e8\ud130 \ubcf4\uc548"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"template-builder.php","meta":{"jetpack_post_was_ever_published":false},"categories":[],"tags":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/P6uv38-8","_links":{"self":[{"href":"http:\/\/guide.jinbo.net\/digital-security\/wp-json\/wp\/v2\/pages\/8"}],"collection":[{"href":"http:\/\/guide.jinbo.net\/digital-security\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/guide.jinbo.net\/digital-security\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/guide.jinbo.net\/digital-security\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/guide.jinbo.net\/digital-security\/wp-json\/wp\/v2\/comments?post=8"}],"version-history":[{"count":1,"href":"http:\/\/guide.jinbo.net\/digital-security\/wp-json\/wp\/v2\/pages\/8\/revisions"}],"predecessor-version":[{"id":9,"href":"http:\/\/guide.jinbo.net\/digital-security\/wp-json\/wp\/v2\/pages\/8\/revisions\/9"}],"wp:attachment":[{"href":"http:\/\/guide.jinbo.net\/digital-security\/wp-json\/wp\/v2\/media?parent=8"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/guide.jinbo.net\/digital-security\/wp-json\/wp\/v2\/categories?post=8"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/guide.jinbo.net\/digital-security\/wp-json\/wp\/v2\/tags?post=8"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}