{"id":197,"date":"2025-02-03T02:47:09","date_gmt":"2025-02-03T02:47:09","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/mahad\/?page_id=197"},"modified":"2025-04-28T23:35:11","modified_gmt":"2025-04-28T23:35:11","slug":"cyse-201s","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/mahad\/cyse-201s\/","title":{"rendered":"CYSE 201S"},"content":{"rendered":"\n<p><a href=\"https:\/\/sites.wp.odu.edu\/mahad\/2025\/04\/28\/journal-entries\/\">Journal Entries<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/sites.wp.odu.edu\/mahad\/2025\/04\/28\/article-reviews\/\">Article Reviews<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/sites.wp.odu.edu\/mahad\/2025\/04\/28\/how-social-science-shapes-security-engineering-in-cybersecurity\/\">Career Paper<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Journal Entries Article Reviews Career Paper<\/p>\n","protected":false},"author":30064,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/mahad\/wp-json\/wp\/v2\/pages\/197"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/mahad\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/mahad\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mahad\/wp-json\/wp\/v2\/users\/30064"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mahad\/wp-json\/wp\/v2\/comments?post=197"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/mahad\/wp-json\/wp\/v2\/pages\/197\/revisions"}],"predecessor-version":[{"id":301,"href":"https:\/\/sites.wp.odu.edu\/mahad\/wp-json\/wp\/v2\/pages\/197\/revisions\/301"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/mahad\/wp-json\/wp\/v2\/media?parent=197"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}