

{"id":815,"date":"2016-01-17T20:10:14","date_gmt":"2016-01-17T19:10:14","guid":{"rendered":"https:\/\/www.trucnet.com\/?post_type=mbt_book&#038;p=815"},"modified":"2016-01-17T20:10:32","modified_gmt":"2016-01-17T19:10:32","slug":"securite-informatique-ethical-hacking","status":"publish","type":"mbt_book","link":"https:\/\/www.trucnet.com\/en\/livres\/securite-informatique-ethical-hacking\/","title":{"rendered":"S\u00e9curit\u00e9 informatique &#8211; Ethical Hacking"},"template":"","meta":{"_lmt_disableupdate":"","_lmt_disable":"","_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0},"mbt_author":[347],"mbt_genre":[241],"mbt_series":[],"mbt_tag":[],"class_list":["post-815","mbt_book","type-mbt_book","status-publish","hentry","mbt_author-acissi","mbt_genre-technologie-informatique"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.trucnet.com\/en\/wp-json\/wp\/v2\/mbt_book\/815","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.trucnet.com\/en\/wp-json\/wp\/v2\/mbt_book"}],"about":[{"href":"https:\/\/www.trucnet.com\/en\/wp-json\/wp\/v2\/types\/mbt_book"}],"wp:attachment":[{"href":"https:\/\/www.trucnet.com\/en\/wp-json\/wp\/v2\/media?parent=815"}],"wp:term":[{"taxonomy":"mbt_author","embeddable":true,"href":"https:\/\/www.trucnet.com\/en\/wp-json\/wp\/v2\/mbt_author?post=815"},{"taxonomy":"mbt_genre","embeddable":true,"href":"https:\/\/www.trucnet.com\/en\/wp-json\/wp\/v2\/mbt_genre?post=815"},{"taxonomy":"mbt_series","embeddable":true,"href":"https:\/\/www.trucnet.com\/en\/wp-json\/wp\/v2\/mbt_series?post=815"},{"taxonomy":"mbt_tag","embeddable":true,"href":"https:\/\/www.trucnet.com\/en\/wp-json\/wp\/v2\/mbt_tag?post=815"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}