{"id":15343,"date":"2014-05-07T19:53:38","date_gmt":"2014-05-07T17:53:38","guid":{"rendered":"https:\/\/www.itspy.cz\/thesis\/an-analysis-of-selected-ipv6-network-attacks\/"},"modified":"2014-05-07T19:53:38","modified_gmt":"2014-05-07T17:53:38","slug":"an-analysis-of-selected-ipv6-network-attacks","status":"publish","type":"thesis","link":"https:\/\/www.itspy.cz\/sk\/thesis\/an-analysis-of-selected-ipv6-network-attacks\/","title":{"rendered":"An Analysis of Selected IPv6 Network Attacks"},"content":{"rendered":"","protected":false},"featured_media":4285,"template":"","meta":{"_acf_changed":false,"_links_to":"","_links_to_target":""},"university":[23,22],"thesis-year":[53],"class_list":["post-15343","thesis","type-thesis","status-publish","has-post-thumbnail","hentry","thesis-year-53"],"acf":{"autor":"Pivarn\u00edk Jozef","portret":"","vedouci":"Gr\u00e9gr Mat\u011bj"},"_links":{"self":[{"href":"https:\/\/www.itspy.cz\/sk\/wp-json\/wp\/v2\/thesis\/15343","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itspy.cz\/sk\/wp-json\/wp\/v2\/thesis"}],"about":[{"href":"https:\/\/www.itspy.cz\/sk\/wp-json\/wp\/v2\/types\/thesis"}],"version-history":[{"count":0,"href":"https:\/\/www.itspy.cz\/sk\/wp-json\/wp\/v2\/thesis\/15343\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.itspy.cz\/sk\/wp-json\/wp\/v2\/media\/4285"}],"wp:attachment":[{"href":"https:\/\/www.itspy.cz\/sk\/wp-json\/wp\/v2\/media?parent=15343"}],"wp:term":[{"taxonomy":"university","embeddable":true,"href":"https:\/\/www.itspy.cz\/sk\/wp-json\/wp\/v2\/university?post=15343"},{"taxonomy":"thesis-year","embeddable":true,"href":"https:\/\/www.itspy.cz\/sk\/wp-json\/wp\/v2\/thesis-year?post=15343"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}