{"id":264,"date":"2021-09-10T03:03:05","date_gmt":"2021-09-10T03:03:05","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/tftcybersecurity\/?page_id=264"},"modified":"2023-12-09T04:10:22","modified_gmt":"2023-12-09T04:10:22","slug":"journals","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/tftcybersecurity\/journals\/","title":{"rendered":"Journals and writings"},"content":{"rendered":"<a href=\"https:\/\/sites.wp.odu.edu\/tftcybersecurity\/wp-content\/uploads\/sites\/25899\/2023\/12\/professional-career-remix.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">professional-career-remix<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/tftcybersecurity\/wp-content\/uploads\/sites\/25899\/2021\/09\/cyber.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">cyber<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/tftcybersecurity\/wp-content\/uploads\/sites\/25899\/2021\/12\/journal-2-.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">journal-2-<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/tftcybersecurity\/wp-content\/uploads\/sites\/25899\/2021\/12\/Journal-3.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Journal-3<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/tftcybersecurity\/wp-content\/uploads\/sites\/25899\/2021\/12\/Journal-4.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Journal-4<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/tftcybersecurity\/wp-content\/uploads\/sites\/25899\/2021\/12\/Journal-5.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Journal-5<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/tftcybersecurity\/wp-content\/uploads\/sites\/25899\/2021\/12\/Journal-6.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Journal-6<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/tftcybersecurity\/wp-content\/uploads\/sites\/25899\/2021\/12\/Journal-7.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Journal-7<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/tftcybersecurity\/wp-content\/uploads\/sites\/25899\/2021\/12\/Journal-8.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Journal-8<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/tftcybersecurity\/wp-content\/uploads\/sites\/25899\/2021\/12\/Journal-9.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Journal-9<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/tftcybersecurity\/wp-content\/uploads\/sites\/25899\/2021\/12\/Journal-10.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Journal-10<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/tftcybersecurity\/wp-content\/uploads\/sites\/25899\/2021\/12\/Journal-11.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Journal-11<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/tftcybersecurity\/wp-content\/uploads\/sites\/25899\/2021\/12\/Journal-12-11-1.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Journal-12-11-1<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/tftcybersecurity\/wp-content\/uploads\/sites\/25899\/2021\/12\/Journal-13-1.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Journal-13-1<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/tftcybersecurity\/wp-content\/uploads\/sites\/25899\/2021\/12\/Journal-14-11.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Journal-14-11<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/tftcybersecurity\/wp-content\/uploads\/sites\/25899\/2021\/12\/Journal-15.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Journal-15<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/tftcybersecurity\/wp-content\/uploads\/sites\/25899\/2021\/12\/Journal-16.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Journal-16<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/tftcybersecurity\/wp-content\/uploads\/sites\/25899\/2021\/12\/Journal-17.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Journal-17<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/tftcybersecurity\/wp-content\/uploads\/sites\/25899\/2021\/12\/Journal-18.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Journal-18<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/tftcybersecurity\/wp-content\/uploads\/sites\/25899\/2021\/12\/Did-you-know-that-45-percent-of-cyber.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Did-you-know-that-45-percent-of-cyber<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/tftcybersecurity\/wp-content\/uploads\/sites\/25899\/2021\/12\/did-you-know.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">did-you-know<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":21783,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/tftcybersecurity\/wp-json\/wp\/v2\/pages\/264"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/tftcybersecurity\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/tftcybersecurity\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tftcybersecurity\/wp-json\/wp\/v2\/users\/21783"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tftcybersecurity\/wp-json\/wp\/v2\/comments?post=264"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/tftcybersecurity\/wp-json\/wp\/v2\/pages\/264\/revisions"}],"predecessor-version":[{"id":417,"href":"https:\/\/sites.wp.odu.edu\/tftcybersecurity\/wp-json\/wp\/v2\/pages\/264\/revisions\/417"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/tftcybersecurity\/wp-json\/wp\/v2\/media?parent=264"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}