{"id":1294,"date":"2020-09-23T12:29:23","date_gmt":"2020-09-23T10:29:23","guid":{"rendered":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-content\/uploads\/sites\/47\/2018\/03\/02_documento_formativo_UGR_compressed.pdf"},"modified":"2020-09-23T12:29:23","modified_gmt":"2020-09-23T10:29:23","slug":"02_documento_formativo_ugr_compressed","status":"inherit","type":"attachment","link":"https:\/\/blogs.ugr.es\/seguridadinformatica\/ens\/02_documento_formativo_ugr_compressed\/","title":{"rendered":"02_documento_formativo_UGR_compressed"},"author":27,"featured_media":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":""},"class_list":{"0":"post-1294","1":"attachment","2":"type-attachment","3":"status-inherit","5":"entry"},"description":{"rendered":"<p class=\"attachment\"><a href='https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-content\/uploads\/sites\/47\/2018\/03\/02_documento_formativo_UGR_compressed.pdf'><img loading=\"lazy\" decoding=\"async\" width=\"212\" height=\"300\" src=\"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-content\/uploads\/sites\/47\/2018\/03\/02_documento_formativo_UGR_compressed-pdf-212x300.jpg\" class=\"attachment-medium size-medium\" alt=\"\" \/><\/a><\/p>\n"},"caption":{"rendered":""},"alt_text":"","media_type":"file","mime_type":"application\/pdf","media_details":{"sizes":{"full":{"file":"02_documento_formativo_UGR_compressed-pdf.jpg","width":1058,"height":1497,"mime_type":"application\/pdf","source_url":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-content\/uploads\/sites\/47\/2018\/03\/02_documento_formativo_UGR_compressed-pdf.jpg"},"medium":{"file":"02_documento_formativo_UGR_compressed-pdf-212x300.jpg","width":212,"height":300,"mime_type":"image\/jpeg","source_url":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-content\/uploads\/sites\/47\/2018\/03\/02_documento_formativo_UGR_compressed-pdf-212x300.jpg"},"large":{"file":"02_documento_formativo_UGR_compressed-pdf-495x700.jpg","width":495,"height":700,"mime_type":"image\/jpeg","source_url":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-content\/uploads\/sites\/47\/2018\/03\/02_documento_formativo_UGR_compressed-pdf-495x700.jpg"},"thumbnail":{"file":"02_documento_formativo_UGR_compressed-pdf-106x150.jpg","width":106,"height":150,"mime_type":"image\/jpeg","source_url":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-content\/uploads\/sites\/47\/2018\/03\/02_documento_formativo_UGR_compressed-pdf-106x150.jpg"}}},"post":181,"source_url":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-content\/uploads\/sites\/47\/2018\/03\/02_documento_formativo_UGR_compressed.pdf","_links":{"self":[{"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/media\/1294","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/media"}],"about":[{"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/types\/attachment"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/comments?post=1294"}],"wp:attached-to":[{"embeddable":true,"post_type":"post","id":181,"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/posts\/181"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}