{"id":24287,"date":"2024-09-24T15:46:42","date_gmt":"2024-09-24T13:46:42","guid":{"rendered":"https:\/\/www.itspy.cz\/thesis\/windows-sandbox-analysis-and-verification-of-knownvulnerabilities\/"},"modified":"2024-09-24T15:46:42","modified_gmt":"2024-09-24T13:46:42","slug":"windows-sandbox-analysis-and-verification-of-knownvulnerabilities","status":"publish","type":"thesis","link":"https:\/\/www.itspy.cz\/en\/thesis\/windows-sandbox-analysis-and-verification-of-knownvulnerabilities\/","title":{"rendered":"Windows Sandbox: Analysis and Verification of Known\nVulnerabilities"},"content":{"rendered":"","protected":false},"featured_media":23607,"template":"","meta":{"_acf_changed":false,"_links_to":"","_links_to_target":""},"university":[45,284],"thesis-year":[391,406],"class_list":["post-24287","thesis","type-thesis","status-publish","has-post-thumbnail","hentry","thesis-year-391","thesis-year-406"],"acf":{"autor":"Jakub \u0160trom","portret":"","vedouci":"Ing. Josef Koke\u0161, Ph.D."},"_links":{"self":[{"href":"https:\/\/www.itspy.cz\/en\/wp-json\/wp\/v2\/thesis\/24287","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itspy.cz\/en\/wp-json\/wp\/v2\/thesis"}],"about":[{"href":"https:\/\/www.itspy.cz\/en\/wp-json\/wp\/v2\/types\/thesis"}],"version-history":[{"count":0,"href":"https:\/\/www.itspy.cz\/en\/wp-json\/wp\/v2\/thesis\/24287\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.itspy.cz\/en\/wp-json\/wp\/v2\/media\/23607"}],"wp:attachment":[{"href":"https:\/\/www.itspy.cz\/en\/wp-json\/wp\/v2\/media?parent=24287"}],"wp:term":[{"taxonomy":"university","embeddable":true,"href":"https:\/\/www.itspy.cz\/en\/wp-json\/wp\/v2\/university?post=24287"},{"taxonomy":"thesis-year","embeddable":true,"href":"https:\/\/www.itspy.cz\/en\/wp-json\/wp\/v2\/thesis-year?post=24287"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}