{"id":547,"count":14,"description":"Nuestras gu\u00edas son nuestros recursos m\u00e1s exhaustivos, ya que permiten a los lectores disponer de una introducci\u00f3n accesible a un tema relacionado con la ciberseguridad.","link":"https:\/\/knowledgeflow.org\/es\/resource-type\/guides\/","name":"Gu\u00edas","slug":"guides","taxonomy":"resource-type","parent":0,"meta":[],"acf":[],"_links":{"self":[{"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/resource-type\/547","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/resource-type"}],"about":[{"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/taxonomies\/resource-type"}],"wp:post_type":[{"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/resource?resource-type=547"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}