{"id":32,"date":"2022-11-15T22:49:29","date_gmt":"2022-11-15T22:49:29","guid":{"rendered":"https:\/\/blogs.uca.edu\/computerscience\/?page_id=32"},"modified":"2022-11-16T00:23:12","modified_gmt":"2022-11-16T00:23:12","slug":"resources","status":"publish","type":"page","link":"https:\/\/blogs.uca.edu\/computerscience\/resources\/","title":{"rendered":"Resources"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"158\" src=\"https:\/\/blogs.uca.edu\/computerscience\/files\/2022\/11\/CS-Banners-1950-\u00d7-300-px-1024x158.png\" alt=\"\" class=\"wp-image-256\" srcset=\"https:\/\/blogs.uca.edu\/computerscience\/files\/2022\/11\/CS-Banners-1950-\u00d7-300-px-1024x158.png 1024w, https:\/\/blogs.uca.edu\/computerscience\/files\/2022\/11\/CS-Banners-1950-\u00d7-300-px-300x46.png 300w, https:\/\/blogs.uca.edu\/computerscience\/files\/2022\/11\/CS-Banners-1950-\u00d7-300-px-768x118.png 768w, https:\/\/blogs.uca.edu\/computerscience\/files\/2022\/11\/CS-Banners-1950-\u00d7-300-px-1536x236.png 1536w, https:\/\/blogs.uca.edu\/computerscience\/files\/2022\/11\/CS-Banners-1950-\u00d7-300-px.png 1950w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><a rel=\"noreferrer noopener\" href=\"https:\/\/uca.edu\/ubulletin\/courses\/csci\/\" target=\"_blank\">Computer Science Courses<\/a><br><a rel=\"noreferrer noopener\" href=\"https:\/\/uca.edu\/ubulletin\/courses\/csec\/\" target=\"_blank\">Cybersecurity Courses<\/a><br><a rel=\"noreferrer noopener\" href=\"https:\/\/uca.edu\/cse\/internships\/\" target=\"_blank\">CS\/CSec Internships<\/a><br><a rel=\"noreferrer noopener\" href=\"https:\/\/uca.edu\/career\/careerfairs\/\" target=\"_blank\">UCA Career Fairs<\/a><br><a href=\"https:\/\/discord.gg\/ct2un5ZuGX\" target=\"_blank\" rel=\"noreferrer noopener\">Girls Who Code UCA Discord<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Computer Science CoursesCybersecurity CoursesCS\/CSec InternshipsUCA Career FairsGirls Who Code UCA Discord<\/p>\n","protected":false},"author":152,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/blogs.uca.edu\/computerscience\/wp-json\/wp\/v2\/pages\/32"}],"collection":[{"href":"https:\/\/blogs.uca.edu\/computerscience\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/blogs.uca.edu\/computerscience\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.uca.edu\/computerscience\/wp-json\/wp\/v2\/users\/152"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.uca.edu\/computerscience\/wp-json\/wp\/v2\/comments?post=32"}],"version-history":[{"count":5,"href":"https:\/\/blogs.uca.edu\/computerscience\/wp-json\/wp\/v2\/pages\/32\/revisions"}],"predecessor-version":[{"id":257,"href":"https:\/\/blogs.uca.edu\/computerscience\/wp-json\/wp\/v2\/pages\/32\/revisions\/257"}],"wp:attachment":[{"href":"https:\/\/blogs.uca.edu\/computerscience\/wp-json\/wp\/v2\/media?parent=32"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}