{"id":13,"count":16,"description":"","link":"http:\/\/sites.cardiff.ac.uk\/piracylessons\/category\/analysis\/","name":"Analysis","slug":"analysis","taxonomy":"category","parent":0,"meta":[],"meta_box":[],"_links":{"self":[{"href":"http:\/\/sites.cardiff.ac.uk\/piracylessons\/wp-json\/wp\/v2\/categories\/13","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/sites.cardiff.ac.uk\/piracylessons\/wp-json\/wp\/v2\/categories"}],"about":[{"href":"http:\/\/sites.cardiff.ac.uk\/piracylessons\/wp-json\/wp\/v2\/taxonomies\/category"}],"wp:post_type":[{"href":"http:\/\/sites.cardiff.ac.uk\/piracylessons\/wp-json\/wp\/v2\/posts?categories=13"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}