{"ad_unit_id":"App_Resource_Sidebar_Upper","resource":{"id":2435349,"author_id":1282361,"title":"ARQUITECTURAS DE SEGURIDAD","created_at":"2015-04-05T02:49:47Z","updated_at":"2016-06-01T00:31:18Z","sample":false,"description":"ARQUITECTURAS DE SEGURIDAD Y CLASIFICACIÓN DE ATAQUES","alerts_enabled":true,"cached_tag_list":"arquitectura de seguirdad basica, redes, seguridad, seguridad informatca","deleted_at":null,"hidden":false,"average_rating":null,"demote":false,"private":false,"copyable":true,"score":18,"artificial_base_score":0,"recalculate_score":false,"profane":false,"hide_summary":false,"tag_list":["arquitectura de seguirdad basica","redes","seguridad","seguridad informatca"],"admin_tag_list":[],"study_aid_type":"MindMap","show_path":"/mind_maps/2435349","folder_id":1960870,"public_author":{"id":1282361,"profile":{"name":"Sergio Esteban M","about":null,"avatar_service":"google","locale":"es-ES","google_author_link":"https://plus.google.com/100011887355303738373","user_type_id":null,"escaped_name":"Sergio Esteban M","full_name":"Sergio Esteban M","badge_classes":""}}},"width":300,"height":250,"rtype":"MindMap","rmode":"canonical","sizes":"[[[0, 0], [[300, 250]]]]","custom":[{"key":"env","value":"production"},{"key":"rtype","value":"MindMap"},{"key":"rmode","value":"canonical"},{"key":"sequence","value":1},{"key":"uauth","value":"f"},{"key":"uadmin","value":"f"},{"key":"ulang","value":"en_us"},{"key":"ucurrency","value":"usd"}]}
{"ad_unit_id":"App_Resource_Sidebar_Lower","resource":{"id":2435349,"author_id":1282361,"title":"ARQUITECTURAS DE SEGURIDAD","created_at":"2015-04-05T02:49:47Z","updated_at":"2016-06-01T00:31:18Z","sample":false,"description":"ARQUITECTURAS DE SEGURIDAD Y CLASIFICACIÓN DE ATAQUES","alerts_enabled":true,"cached_tag_list":"arquitectura de seguirdad basica, redes, seguridad, seguridad informatca","deleted_at":null,"hidden":false,"average_rating":null,"demote":false,"private":false,"copyable":true,"score":18,"artificial_base_score":0,"recalculate_score":false,"profane":false,"hide_summary":false,"tag_list":["arquitectura de seguirdad basica","redes","seguridad","seguridad informatca"],"admin_tag_list":[],"study_aid_type":"MindMap","show_path":"/mind_maps/2435349","folder_id":1960870,"public_author":{"id":1282361,"profile":{"name":"Sergio Esteban M","about":null,"avatar_service":"google","locale":"es-ES","google_author_link":"https://plus.google.com/100011887355303738373","user_type_id":null,"escaped_name":"Sergio Esteban M","full_name":"Sergio Esteban M","badge_classes":""}}},"width":300,"height":250,"rtype":"MindMap","rmode":"canonical","sizes":"[[[0, 0], [[300, 250]]]]","custom":[{"key":"env","value":"production"},{"key":"rtype","value":"MindMap"},{"key":"rmode","value":"canonical"},{"key":"sequence","value":1},{"key":"uauth","value":"f"},{"key":"uadmin","value":"f"},{"key":"ulang","value":"en_us"},{"key":"ucurrency","value":"usd"}]}