{"id":2680,"date":"2018-10-18T14:52:00","date_gmt":"2018-10-18T18:52:00","guid":{"rendered":"https:\/\/opanlcom-cp6.wordpresstemporal.com\/JID\/wp-content\/uploads\/2018\/10\/Ciberdefensa.jpg"},"modified":"2018-10-18T14:52:00","modified_gmt":"2018-10-18T18:52:00","slug":"ciberdefensa","status":"inherit","type":"attachment","link":"https:\/\/jid.org\/en\/ciberdefensa\/","title":{"rendered":"Cyber Defense"},"author":28,"featured_media":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"class_list":["post-2680","attachment","type-attachment","status-inherit","hentry"],"description":{"rendered":"<p class=\"attachment\"><a href='https:\/\/jid.org\/wp-content\/uploads\/2018\/10\/Ciberdefensa.jpg'><img fetchpriority=\"high\" decoding=\"async\" width=\"260\" height=\"300\" src=\"https:\/\/jid.org\/wp-content\/uploads\/2018\/10\/Ciberdefensa-260x300.jpg\" class=\"attachment-medium size-medium\" alt=\"\" srcset=\"https:\/\/jid.org\/wp-content\/uploads\/2018\/10\/Ciberdefensa-260x300.jpg 260w, https:\/\/jid.org\/wp-content\/uploads\/2018\/10\/Ciberdefensa.jpg 390w\" sizes=\"(max-width: 260px) 100vw, 260px\" \/><\/a><\/p>\n"},"caption":{"rendered":""},"alt_text":"","media_type":"image","mime_type":"image\/jpeg","media_details":{"width":390,"height":450,"file":"2018\/10\/Ciberdefensa.jpg","sizes":{"thumbnail":{"file":"Ciberdefensa-150x150.jpg","width":150,"height":150,"mime_type":"image\/jpeg","source_url":"https:\/\/jid.org\/wp-content\/uploads\/2018\/10\/Ciberdefensa-150x150.jpg"},"medium":{"file":"Ciberdefensa-260x300.jpg","width":260,"height":300,"mime_type":"image\/jpeg","source_url":"https:\/\/jid.org\/wp-content\/uploads\/2018\/10\/Ciberdefensa-260x300.jpg"},"colormag-highlighted-post":{"file":"Ciberdefensa-390x272.jpg","width":390,"height":272,"mime_type":"image\/jpeg","source_url":"https:\/\/jid.org\/wp-content\/uploads\/2018\/10\/Ciberdefensa-390x272.jpg"},"colormag-featured-post-medium":{"file":"Ciberdefensa-390x205.jpg","width":390,"height":205,"mime_type":"image\/jpeg","source_url":"https:\/\/jid.org\/wp-content\/uploads\/2018\/10\/Ciberdefensa-390x205.jpg"},"colormag-featured-post-small":{"file":"Ciberdefensa-130x90.jpg","width":130,"height":90,"mime_type":"image\/jpeg","source_url":"https:\/\/jid.org\/wp-content\/uploads\/2018\/10\/Ciberdefensa-130x90.jpg"},"colormag-featured-image":{"file":"Ciberdefensa-390x445.jpg","width":390,"height":445,"mime_type":"image\/jpeg","source_url":"https:\/\/jid.org\/wp-content\/uploads\/2018\/10\/Ciberdefensa-390x445.jpg"},"full":{"file":"Ciberdefensa.jpg","width":390,"height":450,"mime_type":"image\/jpeg","source_url":"https:\/\/jid.org\/wp-content\/uploads\/2018\/10\/Ciberdefensa.jpg"}},"image_meta":{"aperture":"0","credit":"","camera":"","caption":"","created_timestamp":"0","copyright":"","focal_length":"0","iso":"0","shutter_speed":"0","title":"","orientation":"0","keywords":[]}},"post":null,"source_url":"https:\/\/jid.org\/wp-content\/uploads\/2018\/10\/Ciberdefensa.jpg","_links":{"self":[{"href":"https:\/\/jid.org\/en\/wp-json\/wp\/v2\/media\/2680","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jid.org\/en\/wp-json\/wp\/v2\/media"}],"about":[{"href":"https:\/\/jid.org\/en\/wp-json\/wp\/v2\/types\/attachment"}],"author":[{"embeddable":true,"href":"https:\/\/jid.org\/en\/wp-json\/wp\/v2\/users\/28"}],"replies":[{"embeddable":true,"href":"https:\/\/jid.org\/en\/wp-json\/wp\/v2\/comments?post=2680"}]}}