{"id":47388,"date":"2021-09-17T13:15:13","date_gmt":"2021-09-17T11:15:13","guid":{"rendered":"https:\/\/eiposgrados.com\/?post_type=evento&#038;p=47388"},"modified":"2021-09-24T09:48:03","modified_gmt":"2021-09-24T07:48:03","slug":"social-media-intelligence-ii-hacks-tricks","status":"publish","type":"evento","link":"https:\/\/eiposgrados.com\/eng\/events\/social-media-intelligence-ii-hacks-tricks\/","title":{"rendered":"Intelligence on Social Networks (II): Hacks &amp; Tricks"},"content":{"rendered":"<p>Cross intelligence in Social Networks when there is no API. Discover the type of information that can be extracted using different tools and employing interesting tricks.<\/p>","protected":false},"excerpt":{"rendered":"<p>Cross intelligence in Social Networks when there is no API. Discover the type of information that can be extracted using different tools and employing interesting tricks.<\/p>","protected":false},"featured_media":48208,"template":"","area_evento":[1079],"class_list":["post-47388","evento","type-evento","status-publish","has-post-thumbnail","hentry","area_evento-ciberseguridad-y-programacion-python"],"acf":[],"_links":{"self":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/evento\/47388","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/evento"}],"about":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/types\/evento"}],"version-history":[{"count":0,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/evento\/47388\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/media\/48208"}],"wp:attachment":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/media?parent=47388"}],"wp:term":[{"taxonomy":"area_evento","embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/area_evento?post=47388"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}