{"id":267,"date":"2018-08-09T18:19:38","date_gmt":"2018-08-09T18:19:38","guid":{"rendered":"https:\/\/pressbooks.ccconline.org\/bus3060\/part\/chapter-16-disruptive-technologies\/"},"modified":"2018-08-09T18:19:38","modified_gmt":"2018-08-09T18:19:38","slug":"chapter-16-disruptive-technologies","status":"publish","type":"part","link":"https:\/\/pressbooks.ccconline.org\/bus3060\/part\/chapter-16-disruptive-technologies\/","title":{"raw":"Chapter 13 Information Security: Barbarians at the Gateway (and Just About Everywhere Else)","rendered":"Chapter 13 Information Security: Barbarians at the Gateway (and Just About Everywhere Else)"},"content":{"raw":"<div class=\"part-title-wrap\">\n<p class=\"part-title\">13.1 Introduction\n<span style=\"text-align: initial;font-size: 1em\">13.2 Why Is This Happening? Who Is Doing It? And What\u2019s Their Motivation?\n<\/span><span style=\"text-align: initial;font-size: 1em\">13.3 Where Are Vulnerabilities? Understanding the Weaknesses\n<\/span><span style=\"text-align: initial;font-size: 1em\">13.4 Taking Action<\/span><\/p>\n\n<\/div>\n&nbsp;","rendered":"<div class=\"part-title-wrap\">\n<p class=\"part-title\">13.1 Introduction<br \/>\n<span style=\"text-align: initial;font-size: 1em\">13.2 Why Is This Happening? Who Is Doing It? And What\u2019s Their Motivation?<br \/>\n<\/span><span style=\"text-align: initial;font-size: 1em\">13.3 Where Are Vulnerabilities? Understanding the Weaknesses<br \/>\n<\/span><span style=\"text-align: initial;font-size: 1em\">13.4 Taking Action<\/span><\/p>\n<\/div>\n<p>&nbsp;<\/p>\n","protected":false},"parent":0,"menu_order":15,"template":"","meta":{"pb_part_invisible":false,"pb_part_invisible_string":""},"contributor":[],"license":[],"class_list":["post-267","part","type-part","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/pressbooks.ccconline.org\/bus3060\/wp-json\/pressbooks\/v2\/parts\/267","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pressbooks.ccconline.org\/bus3060\/wp-json\/pressbooks\/v2\/parts"}],"about":[{"href":"https:\/\/pressbooks.ccconline.org\/bus3060\/wp-json\/wp\/v2\/types\/part"}],"version-history":[{"count":0,"href":"https:\/\/pressbooks.ccconline.org\/bus3060\/wp-json\/pressbooks\/v2\/parts\/267\/revisions"}],"wp:attachment":[{"href":"https:\/\/pressbooks.ccconline.org\/bus3060\/wp-json\/wp\/v2\/media?parent=267"}],"wp:term":[{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/pressbooks.ccconline.org\/bus3060\/wp-json\/wp\/v2\/contributor?post=267"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/pressbooks.ccconline.org\/bus3060\/wp-json\/wp\/v2\/license?post=267"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}