{"id":196588,"date":"2025-06-11T17:25:47","date_gmt":"2025-06-11T08:25:47","guid":{"rendered":"http:\/\/ee.presscat.kr\/?post_type=node02&#038;p=196588"},"modified":"2026-04-05T09:58:48","modified_gmt":"2026-04-05T00:58:48","slug":"software-hacking-theory-and-practice","status":"publish","type":"node02","link":"http:\/\/ee.presscat.kr\/en\/node02\/software-hacking-theory-and-practice\/","title":{"rendered":"Software Hacking Theory and Practice"},"excerpt":{"rendered":"<p>940<\/p>\n","protected":false},"template":"","class_list":["post-196588","node02","type-node02","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"http:\/\/ee.presscat.kr\/en\/wp-json\/wp\/v2\/node02\/196588","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/ee.presscat.kr\/en\/wp-json\/wp\/v2\/node02"}],"about":[{"href":"http:\/\/ee.presscat.kr\/en\/wp-json\/wp\/v2\/types\/node02"}],"wp:attachment":[{"href":"http:\/\/ee.presscat.kr\/en\/wp-json\/wp\/v2\/media?parent=196588"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}