{"id":51,"date":"2021-03-30T17:15:38","date_gmt":"2021-03-30T14:15:38","guid":{"rendered":"http:\/\/web.archive.org\/web\/20210428024315\/http:\/\/cyberdefenders.org.ua\?page_id=51"},"modified":"2021-04-12T14:25:45","modified_gmt":"2021-04-12T11:25:45","slug":"social-adaptation","status":"publish","type":"page","link":"http:\/\/web.archive.org\/web\/20210428024315\/https:\/\/cyberdefenders.org.ua\/en\/social-adaptation\/","title":{"rendered":"Social adaptation"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"template-social.php","meta":[],"_links":{"self":[{"href":"http:\/\/web.archive.org\/web\/20210428024315\/https:\/\/cyberdefenders.org.ua\/wp-json\/wp\/v2\/pages\/51"}],"collection":[{"href":"http:\/\/web.archive.org\/web\/20210428024315\/https:\/\/cyberdefenders.org.ua\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/web.archive.org\/web\/20210428024315\/https:\/\/cyberdefenders.org.ua\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/web.archive.org\/web\/20210428024315\/https:\/\/cyberdefenders.org.ua\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/web.archive.org\/web\/20210428024315\/https:\/\/cyberdefenders.org.ua\/wp-json\/wp\/v2\/comments?post=51"}],"version-history":[{"count":7,"href":"http:\/\/web.archive.org\/web\/20210428024315\/https:\/\/cyberdefenders.org.ua\/wp-json\/wp\/v2\/pages\/51\/revisions"}],"predecessor-version":[{"id":850,"href":"http:\/\/web.archive.org\/web\/20210428024315\/https:\/\/cyberdefenders.org.ua\/wp-json\/wp\/v2\/pages\/51\/revisions\/850"}],"wp:attachment":[{"href":"http:\/\/web.archive.org\/web\/20210428024315\/https:\/\/cyberdefenders.org.ua\/wp-json\/wp\/v2\/media?parent=51"}],"curies":[{"name":"wp","href":"http:\/\/web.archive.org\/web\/20210428024315\/https:\/\/api.w.org\/{rel}","templated":true}]}}