{"id":1875,"date":"2024-02-27T16:32:34","date_gmt":"2024-02-27T16:32:34","guid":{"rendered":"https:\/\/wilkietech.com\/?post_type=product&#038;p=1875"},"modified":"2024-02-28T19:18:32","modified_gmt":"2024-02-28T19:18:32","slug":"performing-a-ransomware-attack","status":"publish","type":"product","link":"https:\/\/wilkietech.com\/index.php\/product\/performing-a-ransomware-attack\/","title":{"rendered":"Performing a Ransomware Attack"},"content":{"rendered":"<p>Cyberwarfare: Information Operations In A Connected World, Second Edition<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Pdf Step by Step to performing ransomware attacks.<\/p>\n","protected":false},"featured_media":1891,"comment_status":"open","ping_status":"closed","template":"","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set"},"product_cat":[31],"product_tag":[],"aioseo_notices":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/wilkietech.com\/index.php\/wp-json\/wp\/v2\/product\/1875"}],"collection":[{"href":"https:\/\/wilkietech.com\/index.php\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/wilkietech.com\/index.php\/wp-json\/wp\/v2\/types\/product"}],"replies":[{"embeddable":true,"href":"https:\/\/wilkietech.com\/index.php\/wp-json\/wp\/v2\/comments?post=1875"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wilkietech.com\/index.php\/wp-json\/wp\/v2\/media\/1891"}],"wp:attachment":[{"href":"https:\/\/wilkietech.com\/index.php\/wp-json\/wp\/v2\/media?parent=1875"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/wilkietech.com\/index.php\/wp-json\/wp\/v2\/product_cat?post=1875"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/wilkietech.com\/index.php\/wp-json\/wp\/v2\/product_tag?post=1875"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}