{"id":6220,"date":"2022-11-05T14:41:02","date_gmt":"2022-11-05T14:41:02","guid":{"rendered":"https:\/\/ebookbaylib.com\/staging\/?post_type=product&#038;p=6220"},"modified":"2022-11-06T15:05:29","modified_gmt":"2022-11-06T15:05:29","slug":"social-engineering-the-science-of-human-hacking-2nd-edition-by-christopher-hadnagy-author","status":"publish","type":"product","link":"https:\/\/ebookbaylib.com\/staging\/product\/social-engineering-the-science-of-human-hacking-2nd-edition-by-christopher-hadnagy-author\/","title":{"rendered":"Social Engineering: The Science of Human Hacking 2nd Edition by Christopher Hadnagy  (Author)"},"content":{"rendered":"<ul class=\"a-unordered-list a-nostyle a-vertical a-spacing-none detail-bullet-list\">\n<li><span class=\"a-list-item\"><span class=\"a-text-bold\">Publisher \u200f : \u200e\u00a0<\/span>Wiley; 2nd edition (July 31, 2018)<\/span><\/li>\n<li><span class=\"a-list-item\"><span class=\"a-text-bold\">Language \u200f : \u200e\u00a0<\/span>English<\/span><\/li>\n<li><span class=\"a-list-item\"><span class=\"a-text-bold\">Format: ebook\/pdf<\/span><\/span><\/li>\n<li><span class=\"a-list-item\"><span class=\"a-text-bold\">ISBN-10 \u200f : \u200e\u00a0<\/span>111943338X<\/span><\/li>\n<li><span class=\"a-list-item\"><span class=\"a-text-bold\">ISBN-13 \u200f : \u200e\u00a0<\/span>978-1119433385<\/span><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p><span class=\"a-text-bold\">Harden the human firewall against the most current threats<\/span><\/p>\n<p><span class=\"a-text-italic\">Social Engineering: The Science of Human Hacking<\/span>\u00a0reveals the craftier side of the hacker\u2019s repertoire\u2014why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly-used techniques that fool even the most robust security personnel, and shows you how these techniques have been used in the past. The way that we make decisions as humans affects everything from our emotions to our security. Hackers, since the beginning of time, have figured out ways to exploit that decision making process and get you to take an action not in your best interest. This new Second Edition has been updated with the most current methods used by sharing stories, examples, and scientific study behind how those decisions are exploited.<\/p>\n<p>Networks and systems can be hacked, but they can also be protected; when the \u201csystem\u201d in question is a human being, there is no software to fall back on, no hardware upgrade, no code that can lock information down indefinitely. Human nature and emotion is the secret weapon of the malicious social engineering, and this book shows you how to recognize, predict, and prevent this type of manipulation by taking you inside the social engineer\u2019s bag of tricks.<\/p>\n<ul class=\"a-unordered-list a-vertical\">\n<li><span class=\"a-list-item\">Examine the most common social engineering tricks used to gain access<\/span><\/li>\n<li><span class=\"a-list-item\">Discover which popular techniques generally\u00a0<span class=\"a-text-italic\">don\u2019t<\/span>\u00a0work in the real world<\/span><\/li>\n<li><span class=\"a-list-item\">Examine how our understanding of the science behind emotions and decisions can be used by social engineers<\/span><\/li>\n<li><span class=\"a-list-item\">Learn how social engineering factors into some of the biggest recent headlines<\/span><\/li>\n<li><span class=\"a-list-item\">Learn how to use these skills as a professional social engineer and secure your company<\/span><\/li>\n<li><span class=\"a-list-item\">Adopt effective counter-measures to keep hackers at bay<\/span><\/li>\n<\/ul>\n<p>By working from the social engineer\u2019s playbook, you gain the advantage of foresight that can help you protect yourself and others from even their best efforts.\u00a0<span class=\"a-text-italic\">Social Engineering<\/span>\u00a0gives you the inside information you need to mount an unshakeable defense.<\/p>\n","protected":false},"featured_media":6221,"template":"","meta":{"om_disable_all_campaigns":false,"site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}}},"product_brand":[],"product_cat":[63,61],"product_tag":[],"class_list":{"0":"post-6220","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-engineering","7":"product_cat-engineering-and-transportation","8":"desktop-align-left","9":"tablet-align-left","10":"mobile-align-left","12":"first","13":"instock","14":"featured","15":"virtual","16":"purchasable","17":"product-type-simple"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Social Engineering: The Science of Human Hacking 2nd Edition by Christopher Hadnagy (Author) - EbookBay<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ebookbaylib.com\/staging\/product\/social-engineering-the-science-of-human-hacking-2nd-edition-by-christopher-hadnagy-author\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Social Engineering: The Science of Human Hacking 2nd Edition by Christopher Hadnagy (Author) - EbookBay\" \/>\n<meta property=\"og:description\" content=\"Harden the human firewall against the most current threats  Social Engineering: The Science of Human Hacking\u00a0reveals the craftier side of the hacker\u2019s repertoire\u2014why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly-used techniques that fool even the most robust security personnel, and shows you how these techniques have been used in the past. The way that we make decisions as humans affects everything from our emotions to our security. Hackers, since the beginning of time, have figured out ways to exploit that decision making process and get you to take an action not in your best interest. This new Second Edition has been updated with the most current methods used by sharing stories, examples, and scientific study behind how those decisions are exploited.  Networks and systems can be hacked, but they can also be protected; when the \u201csystem\u201d in question is a human being, there is no software to fall back on, no hardware upgrade, no code that can lock information down indefinitely. Human nature and emotion is the secret weapon of the malicious social engineering, and this book shows you how to recognize, predict, and prevent this type of manipulation by taking you inside the social engineer\u2019s bag of tricks.   Examine the most common social engineering tricks used to gain access  Discover which popular techniques generally\u00a0don\u2019t\u00a0work in the real world  Examine how our understanding of the science behind emotions and decisions can be used by social engineers  Learn how social engineering factors into some of the biggest recent headlines  Learn how to use these skills as a professional social engineer and secure your company  Adopt effective counter-measures to keep hackers at bay  By working from the social engineer\u2019s playbook, you gain the advantage of foresight that can help you protect yourself and others from even their best efforts.\u00a0Social Engineering\u00a0gives you the inside information you need to mount an unshakeable defense.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ebookbaylib.com\/staging\/product\/social-engineering-the-science-of-human-hacking-2nd-edition-by-christopher-hadnagy-author\/\" \/>\n<meta property=\"og:site_name\" content=\"EbookBay\" \/>\n<meta property=\"article:modified_time\" content=\"2022-11-06T15:05:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/ebookbaylib.com\/staging\/wp-content\/uploads\/2022\/11\/Eng-13.webp?fit=196%2C293&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"196\" \/>\n\t<meta property=\"og:image:height\" content=\"293\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ebookbaylib.com\\\/staging\\\/product\\\/social-engineering-the-science-of-human-hacking-2nd-edition-by-christopher-hadnagy-author\\\/\",\"url\":\"https:\\\/\\\/ebookbaylib.com\\\/staging\\\/product\\\/social-engineering-the-science-of-human-hacking-2nd-edition-by-christopher-hadnagy-author\\\/\",\"name\":\"Social Engineering: The Science of Human Hacking 2nd Edition by Christopher Hadnagy (Author) - EbookBay\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ebookbaylib.com\\\/staging\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/ebookbaylib.com\\\/staging\\\/product\\\/social-engineering-the-science-of-human-hacking-2nd-edition-by-christopher-hadnagy-author\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/ebookbaylib.com\\\/staging\\\/product\\\/social-engineering-the-science-of-human-hacking-2nd-edition-by-christopher-hadnagy-author\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/ebookbaylib.com\\\/staging\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/Eng-13.webp?fit=196%2C293&ssl=1\",\"datePublished\":\"2022-11-05T14:41:02+00:00\",\"dateModified\":\"2022-11-06T15:05:29+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/ebookbaylib.com\\\/staging\\\/product\\\/social-engineering-the-science-of-human-hacking-2nd-edition-by-christopher-hadnagy-author\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ebookbaylib.com\\\/staging\\\/product\\\/social-engineering-the-science-of-human-hacking-2nd-edition-by-christopher-hadnagy-author\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/ebookbaylib.com\\\/staging\\\/product\\\/social-engineering-the-science-of-human-hacking-2nd-edition-by-christopher-hadnagy-author\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/ebookbaylib.com\\\/staging\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/Eng-13.webp?fit=196%2C293&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/ebookbaylib.com\\\/staging\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/Eng-13.webp?fit=196%2C293&ssl=1\",\"width\":196,\"height\":293},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/ebookbaylib.com\\\/staging\\\/product\\\/social-engineering-the-science-of-human-hacking-2nd-edition-by-christopher-hadnagy-author\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/ebookbaylib.com\\\/staging\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Categories\",\"item\":\"https:\\\/\\\/ebookbaylib.com\\\/staging\\\/categories\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Social Engineering: The Science of Human Hacking 2nd Edition by Christopher Hadnagy (Author)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ebookbaylib.com\\\/staging\\\/#website\",\"url\":\"https:\\\/\\\/ebookbaylib.com\\\/staging\\\/\",\"name\":\"EbookBay\",\"description\":\"Download eBooks\",\"publisher\":{\"@id\":\"https:\\\/\\\/ebookbaylib.com\\\/staging\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ebookbaylib.com\\\/staging\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/ebookbaylib.com\\\/staging\\\/#organization\",\"name\":\"EbookBay\",\"url\":\"https:\\\/\\\/ebookbaylib.com\\\/staging\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/ebookbaylib.com\\\/staging\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/ebookbaylib.com\\\/staging\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/graduation-cap-diploma_602006-3838-03-2.jpeg?fit=1738%2C1738&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/ebookbaylib.com\\\/staging\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/graduation-cap-diploma_602006-3838-03-2.jpeg?fit=1738%2C1738&ssl=1\",\"width\":1738,\"height\":1738,\"caption\":\"EbookBay\"},\"image\":{\"@id\":\"https:\\\/\\\/ebookbaylib.com\\\/staging\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Social Engineering: The Science of Human Hacking 2nd Edition by Christopher Hadnagy (Author) - EbookBay","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ebookbaylib.com\/staging\/product\/social-engineering-the-science-of-human-hacking-2nd-edition-by-christopher-hadnagy-author\/","og_locale":"en_US","og_type":"article","og_title":"Social Engineering: The Science of Human Hacking 2nd Edition by Christopher Hadnagy (Author) - EbookBay","og_description":"Harden the human firewall against the most current threats  Social Engineering: The Science of Human Hacking\u00a0reveals the craftier side of the hacker\u2019s repertoire\u2014why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly-used techniques that fool even the most robust security personnel, and shows you how these techniques have been used in the past. The way that we make decisions as humans affects everything from our emotions to our security. Hackers, since the beginning of time, have figured out ways to exploit that decision making process and get you to take an action not in your best interest. This new Second Edition has been updated with the most current methods used by sharing stories, examples, and scientific study behind how those decisions are exploited.  Networks and systems can be hacked, but they can also be protected; when the \u201csystem\u201d in question is a human being, there is no software to fall back on, no hardware upgrade, no code that can lock information down indefinitely. Human nature and emotion is the secret weapon of the malicious social engineering, and this book shows you how to recognize, predict, and prevent this type of manipulation by taking you inside the social engineer\u2019s bag of tricks.   Examine the most common social engineering tricks used to gain access  Discover which popular techniques generally\u00a0don\u2019t\u00a0work in the real world  Examine how our understanding of the science behind emotions and decisions can be used by social engineers  Learn how social engineering factors into some of the biggest recent headlines  Learn how to use these skills as a professional social engineer and secure your company  Adopt effective counter-measures to keep hackers at bay  By working from the social engineer\u2019s playbook, you gain the advantage of foresight that can help you protect yourself and others from even their best efforts.\u00a0Social Engineering\u00a0gives you the inside information you need to mount an unshakeable defense.","og_url":"https:\/\/ebookbaylib.com\/staging\/product\/social-engineering-the-science-of-human-hacking-2nd-edition-by-christopher-hadnagy-author\/","og_site_name":"EbookBay","article_modified_time":"2022-11-06T15:05:29+00:00","og_image":[{"width":196,"height":293,"url":"https:\/\/i0.wp.com\/ebookbaylib.com\/staging\/wp-content\/uploads\/2022\/11\/Eng-13.webp?fit=196%2C293&ssl=1","type":"image\/webp"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ebookbaylib.com\/staging\/product\/social-engineering-the-science-of-human-hacking-2nd-edition-by-christopher-hadnagy-author\/","url":"https:\/\/ebookbaylib.com\/staging\/product\/social-engineering-the-science-of-human-hacking-2nd-edition-by-christopher-hadnagy-author\/","name":"Social Engineering: The Science of Human Hacking 2nd Edition by Christopher Hadnagy (Author) - EbookBay","isPartOf":{"@id":"https:\/\/ebookbaylib.com\/staging\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ebookbaylib.com\/staging\/product\/social-engineering-the-science-of-human-hacking-2nd-edition-by-christopher-hadnagy-author\/#primaryimage"},"image":{"@id":"https:\/\/ebookbaylib.com\/staging\/product\/social-engineering-the-science-of-human-hacking-2nd-edition-by-christopher-hadnagy-author\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/ebookbaylib.com\/staging\/wp-content\/uploads\/2022\/11\/Eng-13.webp?fit=196%2C293&ssl=1","datePublished":"2022-11-05T14:41:02+00:00","dateModified":"2022-11-06T15:05:29+00:00","breadcrumb":{"@id":"https:\/\/ebookbaylib.com\/staging\/product\/social-engineering-the-science-of-human-hacking-2nd-edition-by-christopher-hadnagy-author\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ebookbaylib.com\/staging\/product\/social-engineering-the-science-of-human-hacking-2nd-edition-by-christopher-hadnagy-author\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ebookbaylib.com\/staging\/product\/social-engineering-the-science-of-human-hacking-2nd-edition-by-christopher-hadnagy-author\/#primaryimage","url":"https:\/\/i0.wp.com\/ebookbaylib.com\/staging\/wp-content\/uploads\/2022\/11\/Eng-13.webp?fit=196%2C293&ssl=1","contentUrl":"https:\/\/i0.wp.com\/ebookbaylib.com\/staging\/wp-content\/uploads\/2022\/11\/Eng-13.webp?fit=196%2C293&ssl=1","width":196,"height":293},{"@type":"BreadcrumbList","@id":"https:\/\/ebookbaylib.com\/staging\/product\/social-engineering-the-science-of-human-hacking-2nd-edition-by-christopher-hadnagy-author\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ebookbaylib.com\/staging\/"},{"@type":"ListItem","position":2,"name":"Categories","item":"https:\/\/ebookbaylib.com\/staging\/categories\/"},{"@type":"ListItem","position":3,"name":"Social Engineering: The Science of Human Hacking 2nd Edition by Christopher Hadnagy (Author)"}]},{"@type":"WebSite","@id":"https:\/\/ebookbaylib.com\/staging\/#website","url":"https:\/\/ebookbaylib.com\/staging\/","name":"EbookBay","description":"Download eBooks","publisher":{"@id":"https:\/\/ebookbaylib.com\/staging\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ebookbaylib.com\/staging\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ebookbaylib.com\/staging\/#organization","name":"EbookBay","url":"https:\/\/ebookbaylib.com\/staging\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ebookbaylib.com\/staging\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/ebookbaylib.com\/staging\/wp-content\/uploads\/2022\/10\/graduation-cap-diploma_602006-3838-03-2.jpeg?fit=1738%2C1738&ssl=1","contentUrl":"https:\/\/i0.wp.com\/ebookbaylib.com\/staging\/wp-content\/uploads\/2022\/10\/graduation-cap-diploma_602006-3838-03-2.jpeg?fit=1738%2C1738&ssl=1","width":1738,"height":1738,"caption":"EbookBay"},"image":{"@id":"https:\/\/ebookbaylib.com\/staging\/#\/schema\/logo\/image\/"}}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/ebookbaylib.com\/staging\/wp-json\/wp\/v2\/product\/6220","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ebookbaylib.com\/staging\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/ebookbaylib.com\/staging\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ebookbaylib.com\/staging\/wp-json\/wp\/v2\/media\/6221"}],"wp:attachment":[{"href":"https:\/\/ebookbaylib.com\/staging\/wp-json\/wp\/v2\/media?parent=6220"}],"wp:term":[{"taxonomy":"product_brand","embeddable":true,"href":"https:\/\/ebookbaylib.com\/staging\/wp-json\/wp\/v2\/product_brand?post=6220"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/ebookbaylib.com\/staging\/wp-json\/wp\/v2\/product_cat?post=6220"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/ebookbaylib.com\/staging\/wp-json\/wp\/v2\/product_tag?post=6220"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}