{"ad_unit_id":"App_Resource_Sidebar_Upper","resource":{"id":1236690,"author_id":638961,"title":"Controles de Acceso y Principios de la Seguridad de la Información","created_at":"2014-09-04T01:13:11Z","updated_at":"2016-02-19T07:20:24Z","sample":false,"description":"http://www.alapsi.net/images/Capsula_1_de_4_ca.pdf","alerts_enabled":true,"cached_tag_list":"http://www.sunai.gob.ve/images/stories/pdf/ponencias/ef/3_daniel_sandoval.pdf, http://web.mit.edu/rhel-doc/4/rh-docs/rhel-sg-es-4/s1-sgs-ov-controls.html, http://www.alapsi.net/images/capsula_1_de_4_ca.pdf","deleted_at":null,"hidden":false,"average_rating":null,"demote":false,"private":false,"copyable":true,"score":16,"artificial_base_score":0,"recalculate_score":false,"profane":false,"hide_summary":false,"tag_list":["http://www.sunai.gob.ve/images/stories/pdf/ponencias/ef/3_daniel_sandoval.pdf","http://web.mit.edu/rhel-doc/4/rh-docs/rhel-sg-es-4/s1-sgs-ov-controls.html","http://www.alapsi.net/images/capsula_1_de_4_ca.pdf"],"admin_tag_list":[],"study_aid_type":"MindMap","show_path":"/mind_maps/1236690","folder_id":1141747,"public_author":{"id":638961,"profile":{"name":"siri.ereb","about":null,"avatar_service":"gravatar","locale":"es-ES","google_author_link":null,"user_type_id":null,"escaped_name":"siri.ereb","full_name":"siri.ereb","badge_classes":""}}},"width":300,"height":250,"rtype":"MindMap","rmode":"canonical","sizes":"[[[0, 0], [[300, 250]]]]","custom":[{"key":"env","value":"production"},{"key":"rtype","value":"MindMap"},{"key":"rmode","value":"canonical"},{"key":"sequence","value":1},{"key":"uauth","value":"f"},{"key":"uadmin","value":"f"},{"key":"ulang","value":"en_us"},{"key":"ucurrency","value":"usd"}]}
{"ad_unit_id":"App_Resource_Sidebar_Lower","resource":{"id":1236690,"author_id":638961,"title":"Controles de Acceso y Principios de la Seguridad de la Información","created_at":"2014-09-04T01:13:11Z","updated_at":"2016-02-19T07:20:24Z","sample":false,"description":"http://www.alapsi.net/images/Capsula_1_de_4_ca.pdf","alerts_enabled":true,"cached_tag_list":"http://www.sunai.gob.ve/images/stories/pdf/ponencias/ef/3_daniel_sandoval.pdf, http://web.mit.edu/rhel-doc/4/rh-docs/rhel-sg-es-4/s1-sgs-ov-controls.html, http://www.alapsi.net/images/capsula_1_de_4_ca.pdf","deleted_at":null,"hidden":false,"average_rating":null,"demote":false,"private":false,"copyable":true,"score":16,"artificial_base_score":0,"recalculate_score":false,"profane":false,"hide_summary":false,"tag_list":["http://www.sunai.gob.ve/images/stories/pdf/ponencias/ef/3_daniel_sandoval.pdf","http://web.mit.edu/rhel-doc/4/rh-docs/rhel-sg-es-4/s1-sgs-ov-controls.html","http://www.alapsi.net/images/capsula_1_de_4_ca.pdf"],"admin_tag_list":[],"study_aid_type":"MindMap","show_path":"/mind_maps/1236690","folder_id":1141747,"public_author":{"id":638961,"profile":{"name":"siri.ereb","about":null,"avatar_service":"gravatar","locale":"es-ES","google_author_link":null,"user_type_id":null,"escaped_name":"siri.ereb","full_name":"siri.ereb","badge_classes":""}}},"width":300,"height":250,"rtype":"MindMap","rmode":"canonical","sizes":"[[[0, 0], [[300, 250]]]]","custom":[{"key":"env","value":"production"},{"key":"rtype","value":"MindMap"},{"key":"rmode","value":"canonical"},{"key":"sequence","value":1},{"key":"uauth","value":"f"},{"key":"uadmin","value":"f"},{"key":"ulang","value":"en_us"},{"key":"ucurrency","value":"usd"}]}