{"id":45484,"date":"2025-04-22T12:47:30","date_gmt":"2025-04-22T16:47:30","guid":{"rendered":"https:\/\/jid.org\/?post_type=publicaciones&#038;p=45484"},"modified":"2025-04-22T14:15:55","modified_gmt":"2025-04-22T18:15:55","slug":"complemento-a-la-guia-de-ciberdefensa-tecnologias-emergentes","status":"publish","type":"publicaciones","link":"https:\/\/jid.org\/en\/publicaciones\/complemento-a-la-guia-de-ciberdefensa-tecnologias-emergentes\/","title":{"rendered":"\u00abComplemento a la Gu\u00eda de Ciberdefensa: Tecnolog\u00edas Emergentes\u00bb"},"featured_media":45486,"template":"","destacado":[361],"class_list":["post-45484","publicaciones","type-publicaciones","status-publish","has-post-thumbnail","hentry","destacado-si"],"_links":{"self":[{"href":"https:\/\/jid.org\/en\/wp-json\/wp\/v2\/publicaciones\/45484","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jid.org\/en\/wp-json\/wp\/v2\/publicaciones"}],"about":[{"href":"https:\/\/jid.org\/en\/wp-json\/wp\/v2\/types\/publicaciones"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jid.org\/en\/wp-json\/wp\/v2\/media\/45486"}],"wp:attachment":[{"href":"https:\/\/jid.org\/en\/wp-json\/wp\/v2\/media?parent=45484"}],"wp:term":[{"taxonomy":"destacado","embeddable":true,"href":"https:\/\/jid.org\/en\/wp-json\/wp\/v2\/destacado?post=45484"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}