{"id":3982,"date":"2018-03-23T11:43:10","date_gmt":"2018-03-23T17:43:10","guid":{"rendered":"http:\/\/anuies-tic.anuies.mx\/web\/wp-content\/uploads\/2018\/03\/La_ciberseguridad_empieza_por_ti_A2.png"},"modified":"2018-03-23T11:43:10","modified_gmt":"2018-03-23T17:43:10","slug":"la_ciberseguridad_empieza_por_ti_a2","status":"inherit","type":"attachment","link":"https:\/\/anuies-tic.anuies.mx\/web\/la_ciberseguridad_empieza_por_ti_a2\/","title":{"rendered":"La_ciberseguridad_empieza_por_ti_A2"},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"class_list":["post-3982","attachment","type-attachment","status-inherit","hentry","post"],"description":{"rendered":"<p class=\"attachment\"><a href='https:\/\/anuies-tic.anuies.mx\/web\/wp-content\/uploads\/2018\/03\/La_ciberseguridad_empieza_por_ti_A2.png'><img loading=\"lazy\" decoding=\"async\" width=\"212\" height=\"300\" src=\"https:\/\/anuies-tic.anuies.mx\/web\/wp-content\/uploads\/2018\/03\/La_ciberseguridad_empieza_por_ti_A2-212x300.png\" class=\"attachment-medium size-medium\" alt=\"\" srcset=\"https:\/\/anuies-tic.anuies.mx\/web\/wp-content\/uploads\/2018\/03\/La_ciberseguridad_empieza_por_ti_A2-212x300.png 212w, https:\/\/anuies-tic.anuies.mx\/web\/wp-content\/uploads\/2018\/03\/La_ciberseguridad_empieza_por_ti_A2-768x1086.png 768w, https:\/\/anuies-tic.anuies.mx\/web\/wp-content\/uploads\/2018\/03\/La_ciberseguridad_empieza_por_ti_A2-724x1024.png 724w\" sizes=\"auto, (max-width: 212px) 100vw, 212px\" \/><\/a><\/p>\n"},"caption":{"rendered":""},"alt_text":"","media_type":"image","mime_type":"image\/png","media_details":{"width":4961,"height":7016,"file":"2018\/03\/La_ciberseguridad_empieza_por_ti_A2.png","sizes":{"thumbnail":{"file":"La_ciberseguridad_empieza_por_ti_A2-150x150.png","width":150,"height":150,"mime_type":"image\/png","source_url":"https:\/\/anuies-tic.anuies.mx\/web\/wp-content\/uploads\/2018\/03\/La_ciberseguridad_empieza_por_ti_A2-150x150.png"},"medium":{"file":"La_ciberseguridad_empieza_por_ti_A2-212x300.png","width":212,"height":300,"mime_type":"image\/png","source_url":"https:\/\/anuies-tic.anuies.mx\/web\/wp-content\/uploads\/2018\/03\/La_ciberseguridad_empieza_por_ti_A2-212x300.png"},"medium_large":{"file":"La_ciberseguridad_empieza_por_ti_A2-768x1086.png","width":768,"height":1086,"mime_type":"image\/png","source_url":"https:\/\/anuies-tic.anuies.mx\/web\/wp-content\/uploads\/2018\/03\/La_ciberseguridad_empieza_por_ti_A2-768x1086.png"},"large":{"file":"La_ciberseguridad_empieza_por_ti_A2-724x1024.png","width":724,"height":1024,"mime_type":"image\/png","source_url":"https:\/\/anuies-tic.anuies.mx\/web\/wp-content\/uploads\/2018\/03\/La_ciberseguridad_empieza_por_ti_A2-724x1024.png"},"post-thumbnail":{"file":"La_ciberseguridad_empieza_por_ti_A2-720x380.png","width":720,"height":380,"mime_type":"image\/png","source_url":"https:\/\/anuies-tic.anuies.mx\/web\/wp-content\/uploads\/2018\/03\/La_ciberseguridad_empieza_por_ti_A2-720x380.png"},"vantage-thumbnail-no-sidebar":{"file":"La_ciberseguridad_empieza_por_ti_A2-1080x380.png","width":1080,"height":380,"mime_type":"image\/png","source_url":"https:\/\/anuies-tic.anuies.mx\/web\/wp-content\/uploads\/2018\/03\/La_ciberseguridad_empieza_por_ti_A2-1080x380.png"},"vantage-slide":{"file":"La_ciberseguridad_empieza_por_ti_A2-960x480.png","width":960,"height":480,"mime_type":"image\/png","source_url":"https:\/\/anuies-tic.anuies.mx\/web\/wp-content\/uploads\/2018\/03\/La_ciberseguridad_empieza_por_ti_A2-960x480.png"},"vantage-carousel":{"file":"La_ciberseguridad_empieza_por_ti_A2-272x182.png","width":272,"height":182,"mime_type":"image\/png","source_url":"https:\/\/anuies-tic.anuies.mx\/web\/wp-content\/uploads\/2018\/03\/La_ciberseguridad_empieza_por_ti_A2-272x182.png"},"vantage-grid-loop":{"file":"La_ciberseguridad_empieza_por_ti_A2-436x272.png","width":436,"height":272,"mime_type":"image\/png","source_url":"https:\/\/anuies-tic.anuies.mx\/web\/wp-content\/uploads\/2018\/03\/La_ciberseguridad_empieza_por_ti_A2-436x272.png"},"sow-carousel-default":{"file":"La_ciberseguridad_empieza_por_ti_A2-272x182.png","width":272,"height":182,"mime_type":"image\/png","source_url":"https:\/\/anuies-tic.anuies.mx\/web\/wp-content\/uploads\/2018\/03\/La_ciberseguridad_empieza_por_ti_A2-272x182.png"},"full":{"file":"La_ciberseguridad_empieza_por_ti_A2.png","width":4961,"height":7016,"mime_type":"image\/png","source_url":"https:\/\/anuies-tic.anuies.mx\/web\/wp-content\/uploads\/2018\/03\/La_ciberseguridad_empieza_por_ti_A2.png"}},"image_meta":{"aperture":"0","credit":"","camera":"","caption":"","created_timestamp":"0","copyright":"","focal_length":"0","iso":"0","shutter_speed":"0","title":"","orientation":"0","keywords":[]}},"post":null,"source_url":"https:\/\/anuies-tic.anuies.mx\/web\/wp-content\/uploads\/2018\/03\/La_ciberseguridad_empieza_por_ti_A2.png","_links":{"self":[{"href":"https:\/\/anuies-tic.anuies.mx\/web\/wp-json\/wp\/v2\/media\/3982","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/anuies-tic.anuies.mx\/web\/wp-json\/wp\/v2\/media"}],"about":[{"href":"https:\/\/anuies-tic.anuies.mx\/web\/wp-json\/wp\/v2\/types\/attachment"}],"author":[{"embeddable":true,"href":"https:\/\/anuies-tic.anuies.mx\/web\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/anuies-tic.anuies.mx\/web\/wp-json\/wp\/v2\/comments?post=3982"}]}}