{"id":23,"date":"2021-03-30T16:52:40","date_gmt":"2021-03-30T13:52:40","guid":{"rendered":"http:\/\/web.archive.org\/web\/20210428020525\/http:\/\/cyberdefenders.org.ua\?page_id=23"},"modified":"2021-04-22T19:35:31","modified_gmt":"2021-04-22T16:35:31","slug":"about-program","status":"publish","type":"page","link":"http:\/\/web.archive.org\/web\/20210428020525\/https:\/\/cyberdefenders.org.ua\/about-program\/","title":{"rendered":"\u041f\u0440\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u0443"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"template-program.php","meta":[],"_links":{"self":[{"href":"http:\/\/web.archive.org\/web\/20210428020525\/https:\/\/cyberdefenders.org.ua\/wp-json\/wp\/v2\/pages\/23"}],"collection":[{"href":"http:\/\/web.archive.org\/web\/20210428020525\/https:\/\/cyberdefenders.org.ua\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/web.archive.org\/web\/20210428020525\/https:\/\/cyberdefenders.org.ua\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/web.archive.org\/web\/20210428020525\/https:\/\/cyberdefenders.org.ua\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/web.archive.org\/web\/20210428020525\/https:\/\/cyberdefenders.org.ua\/wp-json\/wp\/v2\/comments?post=23"}],"version-history":[{"count":11,"href":"http:\/\/web.archive.org\/web\/20210428020525\/https:\/\/cyberdefenders.org.ua\/wp-json\/wp\/v2\/pages\/23\/revisions"}],"predecessor-version":[{"id":968,"href":"http:\/\/web.archive.org\/web\/20210428020525\/https:\/\/cyberdefenders.org.ua\/wp-json\/wp\/v2\/pages\/23\/revisions\/968"}],"wp:attachment":[{"href":"http:\/\/web.archive.org\/web\/20210428020525\/https:\/\/cyberdefenders.org.ua\/wp-json\/wp\/v2\/media?parent=23"}],"curies":[{"name":"wp","href":"http:\/\/web.archive.org\/web\/20210428020525\/https:\/\/api.w.org\/{rel}","templated":true}]}}