

{"id":900,"date":"2016-01-23T22:49:51","date_gmt":"2016-01-23T21:49:51","guid":{"rendered":"https:\/\/www.trucnet.com\/?post_type=mbt_book&#038;p=900"},"modified":"2016-01-23T22:50:50","modified_gmt":"2016-01-23T21:50:50","slug":"tableaux-de-bord-de-la-securite-reseaux","status":"publish","type":"mbt_book","link":"https:\/\/www.trucnet.com\/en\/livres\/tableaux-de-bord-de-la-securite-reseaux\/","title":{"rendered":"Tableaux de bord de la securite reseaux"},"template":"","meta":{"_lmt_disableupdate":"","_lmt_disable":"","_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0},"mbt_author":[404,406,405],"mbt_genre":[241],"mbt_series":[],"mbt_tag":[],"class_list":["post-900","mbt_book","type-mbt_book","status-publish","hentry","mbt_author-cedric-llorens","mbt_author-denis-valois","mbt_author-laurent-levier","mbt_genre-technologie-informatique"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.trucnet.com\/en\/wp-json\/wp\/v2\/mbt_book\/900","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.trucnet.com\/en\/wp-json\/wp\/v2\/mbt_book"}],"about":[{"href":"https:\/\/www.trucnet.com\/en\/wp-json\/wp\/v2\/types\/mbt_book"}],"wp:attachment":[{"href":"https:\/\/www.trucnet.com\/en\/wp-json\/wp\/v2\/media?parent=900"}],"wp:term":[{"taxonomy":"mbt_author","embeddable":true,"href":"https:\/\/www.trucnet.com\/en\/wp-json\/wp\/v2\/mbt_author?post=900"},{"taxonomy":"mbt_genre","embeddable":true,"href":"https:\/\/www.trucnet.com\/en\/wp-json\/wp\/v2\/mbt_genre?post=900"},{"taxonomy":"mbt_series","embeddable":true,"href":"https:\/\/www.trucnet.com\/en\/wp-json\/wp\/v2\/mbt_series?post=900"},{"taxonomy":"mbt_tag","embeddable":true,"href":"https:\/\/www.trucnet.com\/en\/wp-json\/wp\/v2\/mbt_tag?post=900"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}