{"id":405,"date":"2025-04-17T18:04:22","date_gmt":"2025-04-17T18:04:22","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/nguyenportfolio\/?page_id=405"},"modified":"2025-04-17T18:05:28","modified_gmt":"2025-04-17T18:05:28","slug":"career-paper","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/nguyenportfolio\/career-paper\/","title":{"rendered":"Career Paper"},"content":{"rendered":"\n<p>Career Paper &#8211; <a href=\"https:\/\/olddominion-my.sharepoint.com\/:w:\/g\/personal\/nnguy030_odu_edu\/EbSzOef1EZ5LnX-t_vmaTmUB8RzUhZnqcmwGiF2Igki0PA?e=xGgVR2\">Cyber Forensics.docx<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Career Paper &#8211; Cyber Forensics.docx<\/p>\n","protected":false},"author":30293,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/nguyenportfolio\/wp-json\/wp\/v2\/pages\/405"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/nguyenportfolio\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/nguyenportfolio\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nguyenportfolio\/wp-json\/wp\/v2\/users\/30293"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nguyenportfolio\/wp-json\/wp\/v2\/comments?post=405"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/nguyenportfolio\/wp-json\/wp\/v2\/pages\/405\/revisions"}],"predecessor-version":[{"id":409,"href":"https:\/\/sites.wp.odu.edu\/nguyenportfolio\/wp-json\/wp\/v2\/pages\/405\/revisions\/409"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/nguyenportfolio\/wp-json\/wp\/v2\/media?parent=405"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}