{"id":53,"date":"2018-12-10T04:05:48","date_gmt":"2018-12-10T04:05:48","guid":{"rendered":"https:\/\/student.wp.odu.edu\/kwill068\/?page_id=53"},"modified":"2018-12-10T04:07:33","modified_gmt":"2018-12-10T04:07:33","slug":"media","status":"publish","type":"page","link":"https:\/\/student.wp.odu.edu\/kwill068\/media\/","title":{"rendered":"Media"},"content":{"rendered":"<p><a href=\"http:\/\/student.wp.odu.edu\/kwill068\/wp-content\/uploads\/sites\/10689\/2018\/12\/Asymmetric-encryption-1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-54\" src=\"http:\/\/student.wp.odu.edu\/kwill068\/wp-content\/uploads\/sites\/10689\/2018\/12\/Asymmetric-encryption-1-300x213.jpg\" alt=\"\" width=\"300\" height=\"213\" srcset=\"https:\/\/student.wp.odu.edu\/kwill068\/wp-content\/uploads\/sites\/10689\/2018\/12\/Asymmetric-encryption-1-300x213.jpg 300w, https:\/\/student.wp.odu.edu\/kwill068\/wp-content\/uploads\/sites\/10689\/2018\/12\/Asymmetric-encryption-1.jpg 516w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a> <a href=\"http:\/\/student.wp.odu.edu\/kwill068\/wp-content\/uploads\/sites\/10689\/2018\/12\/Symmetric-Encryption.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-45\" src=\"http:\/\/student.wp.odu.edu\/kwill068\/wp-content\/uploads\/sites\/10689\/2018\/12\/Symmetric-Encryption-300x164.png\" alt=\"\" width=\"300\" height=\"164\" srcset=\"https:\/\/student.wp.odu.edu\/kwill068\/wp-content\/uploads\/sites\/10689\/2018\/12\/Symmetric-Encryption-300x164.png 300w, https:\/\/student.wp.odu.edu\/kwill068\/wp-content\/uploads\/sites\/10689\/2018\/12\/Symmetric-Encryption-768x420.png 768w, https:\/\/student.wp.odu.edu\/kwill068\/wp-content\/uploads\/sites\/10689\/2018\/12\/Symmetric-Encryption.png 796w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a> <a href=\"http:\/\/student.wp.odu.edu\/kwill068\/wp-content\/uploads\/sites\/10689\/2018\/12\/Mobile-device-management.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-44\" src=\"http:\/\/student.wp.odu.edu\/kwill068\/wp-content\/uploads\/sites\/10689\/2018\/12\/Mobile-device-management-300x233.jpg\" alt=\"\" width=\"300\" height=\"233\" srcset=\"https:\/\/student.wp.odu.edu\/kwill068\/wp-content\/uploads\/sites\/10689\/2018\/12\/Mobile-device-management-300x233.jpg 300w, https:\/\/student.wp.odu.edu\/kwill068\/wp-content\/uploads\/sites\/10689\/2018\/12\/Mobile-device-management-768x595.jpg 768w, https:\/\/student.wp.odu.edu\/kwill068\/wp-content\/uploads\/sites\/10689\/2018\/12\/Mobile-device-management-1024x794.jpg 1024w, https:\/\/student.wp.odu.edu\/kwill068\/wp-content\/uploads\/sites\/10689\/2018\/12\/Mobile-device-management.jpg 1200w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a> <a href=\"http:\/\/student.wp.odu.edu\/kwill068\/wp-content\/uploads\/sites\/10689\/2018\/12\/Pivot-table.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-43\" src=\"http:\/\/student.wp.odu.edu\/kwill068\/wp-content\/uploads\/sites\/10689\/2018\/12\/Pivot-table-300x169.jpg\" alt=\"\" width=\"300\" height=\"169\" srcset=\"https:\/\/student.wp.odu.edu\/kwill068\/wp-content\/uploads\/sites\/10689\/2018\/12\/Pivot-table-300x169.jpg 300w, https:\/\/student.wp.odu.edu\/kwill068\/wp-content\/uploads\/sites\/10689\/2018\/12\/Pivot-table-768x432.jpg 768w, https:\/\/student.wp.odu.edu\/kwill068\/wp-content\/uploads\/sites\/10689\/2018\/12\/Pivot-table-1024x576.jpg 1024w, https:\/\/student.wp.odu.edu\/kwill068\/wp-content\/uploads\/sites\/10689\/2018\/12\/Pivot-table.jpg 1280w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a> <a href=\"http:\/\/student.wp.odu.edu\/kwill068\/wp-content\/uploads\/sites\/10689\/2018\/12\/NIST-cybersecurity-framework.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-42\" src=\"http:\/\/student.wp.odu.edu\/kwill068\/wp-content\/uploads\/sites\/10689\/2018\/12\/NIST-cybersecurity-framework-300x123.png\" alt=\"\" width=\"300\" height=\"123\" srcset=\"https:\/\/student.wp.odu.edu\/kwill068\/wp-content\/uploads\/sites\/10689\/2018\/12\/NIST-cybersecurity-framework-300x123.png 300w, https:\/\/student.wp.odu.edu\/kwill068\/wp-content\/uploads\/sites\/10689\/2018\/12\/NIST-cybersecurity-framework-768x316.png 768w, https:\/\/student.wp.odu.edu\/kwill068\/wp-content\/uploads\/sites\/10689\/2018\/12\/NIST-cybersecurity-framework-1024x421.png 1024w, https:\/\/student.wp.odu.edu\/kwill068\/wp-content\/uploads\/sites\/10689\/2018\/12\/NIST-cybersecurity-framework.png 1996w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p class=\"excerpt\"> <a href=\"https:\/\/student.wp.odu.edu\/kwill068\/media\/\">Read more &rarr;<\/a><\/p>\n","protected":false},"author":11559,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/kwill068\/wp-json\/wp\/v2\/pages\/53"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/kwill068\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/kwill068\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/kwill068\/wp-json\/wp\/v2\/users\/11559"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/kwill068\/wp-json\/wp\/v2\/comments?post=53"}],"version-history":[{"count":2,"href":"https:\/\/student.wp.odu.edu\/kwill068\/wp-json\/wp\/v2\/pages\/53\/revisions"}],"predecessor-version":[{"id":56,"href":"https:\/\/student.wp.odu.edu\/kwill068\/wp-json\/wp\/v2\/pages\/53\/revisions\/56"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/kwill068\/wp-json\/wp\/v2\/media?parent=53"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}