{"id":17848,"date":"2017-11-08T14:23:01","date_gmt":"2017-11-08T13:23:01","guid":{"rendered":"https:\/\/www.itspy.cz\/thesis\/hejnovy-malware-2\/"},"modified":"2017-11-08T14:23:01","modified_gmt":"2017-11-08T13:23:01","slug":"hejnovy-malware-2","status":"publish","type":"thesis","link":"https:\/\/www.itspy.cz\/en\/thesis\/hejnovy-malware-2\/","title":{"rendered":"Hejnov\u00fd malware"},"content":{"rendered":"","protected":false},"featured_media":16504,"template":"","meta":{"_acf_changed":false,"_links_to":"","_links_to_target":""},"university":[139,203],"thesis-year":[256],"class_list":["post-17848","thesis","type-thesis","status-publish","has-post-thumbnail","hentry","thesis-year-256"],"acf":{"autor":"Lubom\u00edr Sikora","portret":"","vedouci":"prof. Ing. Ivan Zelinka, Ph.D."},"_links":{"self":[{"href":"https:\/\/www.itspy.cz\/en\/wp-json\/wp\/v2\/thesis\/17848","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itspy.cz\/en\/wp-json\/wp\/v2\/thesis"}],"about":[{"href":"https:\/\/www.itspy.cz\/en\/wp-json\/wp\/v2\/types\/thesis"}],"version-history":[{"count":0,"href":"https:\/\/www.itspy.cz\/en\/wp-json\/wp\/v2\/thesis\/17848\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.itspy.cz\/en\/wp-json\/wp\/v2\/media\/16504"}],"wp:attachment":[{"href":"https:\/\/www.itspy.cz\/en\/wp-json\/wp\/v2\/media?parent=17848"}],"wp:term":[{"taxonomy":"university","embeddable":true,"href":"https:\/\/www.itspy.cz\/en\/wp-json\/wp\/v2\/university?post=17848"},{"taxonomy":"thesis-year","embeddable":true,"href":"https:\/\/www.itspy.cz\/en\/wp-json\/wp\/v2\/thesis-year?post=17848"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}