{"id":233,"date":"2025-09-16T08:01:41","date_gmt":"2025-09-16T06:01:41","guid":{"rendered":"http:\/\/www.cyber-artifacts.com\/AdmiN\/?page_id=233"},"modified":"2026-03-06T09:22:46","modified_gmt":"2026-03-06T08:22:46","slug":"shops","status":"publish","type":"page","link":"http:\/\/www.cyber-artifacts.com\/AdmiN\/shops\/","title":{"rendered":"Shops"},"content":{"rendered":"\n<p>Hier ist deinem Zugang zu allen relevanten Cyber Artifakten wie eigene praxisnahe Lernmaterialien, Microcontroller-Projekten und Cyberpunk-Gadgets zum nachbauen.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Meine B\u00fccher auf <a href=\"https:\/\/www.amazon.de\/dp\/3758475341?ref_=cm_sw_r_ffobk_cp_ud_dp_Z6B54390JE0A5MPGXANW&amp;bestFormat=true\">Amazon<\/a><\/strong><\/h3>\n\n\n\n<p>Alle Lernb\u00fccher wurden von mir pers\u00f6nlich geschrieben \u2013 verst\u00e4ndlich, technisch fundiert und speziell f\u00fcr Sch\u00fcler, Nerds und IT-Sicherheitsinteressierte konzipiert.<\/p>\n\n\n\n<p>Du findest dort Inhalte zu:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Microcontroller-Programmierung (ESP32)<\/strong><\/li>\n\n\n\n<li><strong>IT-Security &amp; Hacking-Grundlagen<\/strong><\/li>\n\n\n\n<li><strong>Technik zum Anfassen und Verstehen<\/strong><\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n","protected":false},"excerpt":{"rendered":"<p>Hier ist deinem Zugang zu allen relevanten Cyber Artifakten wie eigene praxisnahe Lernmaterialien, Microcontroller-Projekten und Cyberpunk-Gadgets zum nachbauen. Meine B\u00fccher auf Amazon Alle Lernb\u00fccher wurden von mir pers\u00f6nlich geschrieben \u2013 verst\u00e4ndlich, technisch fundiert und speziell f\u00fcr Sch\u00fcler, Nerds und IT-Sicherheitsinteressierte konzipiert. Du findest dort Inhalte zu:<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_kadence_starter_templates_imported_post":false,"footnotes":""},"class_list":["post-233","page","type-page","status-publish","hentry"],"blocksy_meta":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"http:\/\/www.cyber-artifacts.com\/AdmiN\/wp-json\/wp\/v2\/pages\/233","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.cyber-artifacts.com\/AdmiN\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/www.cyber-artifacts.com\/AdmiN\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/www.cyber-artifacts.com\/AdmiN\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.cyber-artifacts.com\/AdmiN\/wp-json\/wp\/v2\/comments?post=233"}],"version-history":[{"count":7,"href":"http:\/\/www.cyber-artifacts.com\/AdmiN\/wp-json\/wp\/v2\/pages\/233\/revisions"}],"predecessor-version":[{"id":961,"href":"http:\/\/www.cyber-artifacts.com\/AdmiN\/wp-json\/wp\/v2\/pages\/233\/revisions\/961"}],"wp:attachment":[{"href":"http:\/\/www.cyber-artifacts.com\/AdmiN\/wp-json\/wp\/v2\/media?parent=233"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}