{"id":22652,"date":"2023-10-11T11:40:56","date_gmt":"2023-10-11T09:40:56","guid":{"rendered":"https:\/\/www.itspy.cz\/thesis\/evaluation-comparison-of-authentication-methods-in-the-low-code-platform-mendix\/"},"modified":"2023-10-11T11:40:56","modified_gmt":"2023-10-11T09:40:56","slug":"evaluation-comparison-of-authentication-methods-in-the-low-code-platform-mendix","status":"publish","type":"thesis","link":"https:\/\/www.itspy.cz\/en\/thesis\/evaluation-comparison-of-authentication-methods-in-the-low-code-platform-mendix\/","title":{"rendered":"Evaluation  comparison of authentication methods in the Low-Code platform Mendix"},"content":{"rendered":"","protected":false},"featured_media":20819,"template":"","meta":{"_acf_changed":false,"_links_to":"","_links_to_target":""},"university":[366,365],"thesis-year":[350],"class_list":["post-22652","thesis","type-thesis","status-publish","has-post-thumbnail","hentry","thesis-year-350"],"acf":{"autor":"Tom\u00e1\u0161 Mat\u011bjka","portret":"","vedouci":"Petr Doucek"},"_links":{"self":[{"href":"https:\/\/www.itspy.cz\/en\/wp-json\/wp\/v2\/thesis\/22652","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itspy.cz\/en\/wp-json\/wp\/v2\/thesis"}],"about":[{"href":"https:\/\/www.itspy.cz\/en\/wp-json\/wp\/v2\/types\/thesis"}],"version-history":[{"count":0,"href":"https:\/\/www.itspy.cz\/en\/wp-json\/wp\/v2\/thesis\/22652\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.itspy.cz\/en\/wp-json\/wp\/v2\/media\/20819"}],"wp:attachment":[{"href":"https:\/\/www.itspy.cz\/en\/wp-json\/wp\/v2\/media?parent=22652"}],"wp:term":[{"taxonomy":"university","embeddable":true,"href":"https:\/\/www.itspy.cz\/en\/wp-json\/wp\/v2\/university?post=22652"},{"taxonomy":"thesis-year","embeddable":true,"href":"https:\/\/www.itspy.cz\/en\/wp-json\/wp\/v2\/thesis-year?post=22652"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}