{"id":25,"date":"2021-03-30T16:52:44","date_gmt":"2021-03-30T13:52:44","guid":{"rendered":"http:\/\/web.archive.org\/web\/20210428160934\/http:\/\/cyberdefenders.org.ua\?page_id=25"},"modified":"2021-04-22T19:34:36","modified_gmt":"2021-04-22T16:34:36","slug":"about-program-2","status":"publish","type":"page","link":"http:\/\/web.archive.org\/web\/20210428160934\/https:\/\/cyberdefenders.org.ua\/en\/about-program-2\/","title":{"rendered":"About program"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"template-program.php","meta":[],"_links":{"self":[{"href":"http:\/\/web.archive.org\/web\/20210428160934\/https:\/\/cyberdefenders.org.ua\/wp-json\/wp\/v2\/pages\/25"}],"collection":[{"href":"http:\/\/web.archive.org\/web\/20210428160934\/https:\/\/cyberdefenders.org.ua\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/web.archive.org\/web\/20210428160934\/https:\/\/cyberdefenders.org.ua\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/web.archive.org\/web\/20210428160934\/https:\/\/cyberdefenders.org.ua\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/web.archive.org\/web\/20210428160934\/https:\/\/cyberdefenders.org.ua\/wp-json\/wp\/v2\/comments?post=25"}],"version-history":[{"count":11,"href":"http:\/\/web.archive.org\/web\/20210428160934\/https:\/\/cyberdefenders.org.ua\/wp-json\/wp\/v2\/pages\/25\/revisions"}],"predecessor-version":[{"id":967,"href":"http:\/\/web.archive.org\/web\/20210428160934\/https:\/\/cyberdefenders.org.ua\/wp-json\/wp\/v2\/pages\/25\/revisions\/967"}],"wp:attachment":[{"href":"http:\/\/web.archive.org\/web\/20210428160934\/https:\/\/cyberdefenders.org.ua\/wp-json\/wp\/v2\/media?parent=25"}],"curies":[{"name":"wp","href":"http:\/\/web.archive.org\/web\/20210428160934\/https:\/\/api.w.org\/{rel}","templated":true}]}}