[
    {
        "key": "IR68ICQN",
        "version": 1,
        "library": {
            "type": "group",
            "id": 18766,
            "name": "Computer Networking",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/computer_networking",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/18766/items/IR68ICQN",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/computer_networking/items/IR68ICQN",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 186431,
                "username": "shanevaughn",
                "name": "Shane Vaughn",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/shanevaughn",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Greengrass et al.",
            "parsedDate": "2009",
            "numChildren": 0
        },
        "data": {
            "key": "IR68ICQN",
            "version": 1,
            "itemType": "journalArticle",
            "title": "Not All Packets Are Equal, Part I: Streaming Video Coding and SLA Requirements",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "J.",
                    "lastName": "Greengrass"
                },
                {
                    "creatorType": "author",
                    "firstName": "J.",
                    "lastName": "Evans"
                },
                {
                    "creatorType": "author",
                    "firstName": "A. C",
                    "lastName": "Begen"
                }
            ],
            "abstractNote": "",
            "publicationTitle": "IEEE Internet Computing",
            "publisher": "",
            "place": "",
            "date": "2009",
            "volume": "13",
            "issue": "1",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "70–75",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "Not All Packets Are Equal, Part I",
            "language": "",
            "libraryCatalog": "Google Scholar",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2010-06-07T06:26:45Z",
            "dateModified": "2010-06-07T06:26:45Z"
        }
    },
    {
        "key": "VAJ7TF4V",
        "version": 1,
        "library": {
            "type": "group",
            "id": 18766,
            "name": "Computer Networking",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/computer_networking",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/18766/items/VAJ7TF4V",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/computer_networking/items/VAJ7TF4V",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/18766/items/WVVG2T8B",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 186431,
                "username": "shanevaughn",
                "name": "Shane Vaughn",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/shanevaughn",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "VAJ7TF4V",
            "version": 1,
            "parentItem": "WVVG2T8B",
            "itemType": "note",
            "note": "<blockquote cite=\"http://www.cisco.com/en/US/products/sw/iosswrel/ps1818/products_configuration_example09186a0080204528.shtml\">\n<p>The use of password protection to control or restrict access to the command line interface (CLI) of your router is one of the fundamental elements of an overall security plan. <br /> <br />Protecting the router from unauthorized remote access, typically Telnet, is the most common security that needs configuring, but protecting the router from unauthorized local access cannot be overlooked.</p>\n</blockquote>",
            "tags": [],
            "relations": {},
            "dateAdded": "2010-05-22T22:47:37Z",
            "dateModified": "2010-05-22T22:47:37Z"
        }
    },
    {
        "key": "WVVG2T8B",
        "version": 1,
        "library": {
            "type": "group",
            "id": 18766,
            "name": "Computer Networking",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/computer_networking",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/18766/items/WVVG2T8B",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/computer_networking/items/WVVG2T8B",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 186431,
                "username": "shanevaughn",
                "name": "Shane Vaughn",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/shanevaughn",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Cisco Systems",
            "parsedDate": "2008-12-17",
            "numChildren": 1
        },
        "data": {
            "key": "WVVG2T8B",
            "version": 1,
            "itemType": "webpage",
            "title": "Telnet, Console and AUX Port Passwords on Cisco Routers Configuration Example - Cisco Systems",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "",
                    "lastName": "Cisco Systems"
                }
            ],
            "abstractNote": "",
            "websiteTitle": "",
            "websiteType": "",
            "date": "2008/12/17",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.cisco.com/en/US/products/sw/iosswrel/ps1818/products_configuration_example09186a0080204528.shtml",
            "accessDate": "2010-03-22T04:12:36Z",
            "shortTitle": "",
            "language": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2010-05-22T22:47:37Z",
            "dateModified": "2010-05-22T22:47:37Z"
        }
    },
    {
        "key": "PWFNIU5T",
        "version": 1,
        "library": {
            "type": "group",
            "id": 18766,
            "name": "Computer Networking",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/computer_networking",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/18766/items/PWFNIU5T",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/computer_networking/items/PWFNIU5T",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 186431,
                "username": "shanevaughn",
                "name": "Shane Vaughn",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/shanevaughn",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Fraser and Information",
            "parsedDate": "1997-09",
            "numChildren": 0
        },
        "data": {
            "key": "PWFNIU5T",
            "version": 1,
            "itemType": "webpage",
            "title": "Site Security Handbook",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Barbara Y",
                    "lastName": "Fraser"
                },
                {
                    "creatorType": "author",
                    "firstName": "Editor",
                    "lastName": "Information"
                }
            ],
            "abstractNote": "This handbook is a guide to developing computer security policies and\\nprocedures for sites that have systems on the Internet. The purpose of\\nthis handbook is to provide practical guidance to administrators\\ntrying to secure their information and services. The subjects covered\\ninclude policy content and formation, a broad range of technical\\nsystem and network security topics, and security incident response.\\nThis memo provides information for the Internet community. It does not\\nspecify an Internet standard of any kind.",
            "websiteTitle": "",
            "websiteType": "",
            "date": "September, 1997",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://tools.ietf.org/html/rfc2196",
            "accessDate": "2010-04-02T05:34:52Z",
            "shortTitle": "",
            "language": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2010-05-22T22:46:44Z",
            "dateModified": "2010-05-22T22:46:44Z"
        }
    },
    {
        "key": "T53K9DBA",
        "version": 1,
        "library": {
            "type": "group",
            "id": 18766,
            "name": "Computer Networking",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/computer_networking",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/18766/items/T53K9DBA",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/computer_networking/items/T53K9DBA",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/18766/items/MRIFTIRJ",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 186431,
                "username": "shanevaughn",
                "name": "Shane Vaughn",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/shanevaughn",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "T53K9DBA",
            "version": 1,
            "parentItem": "MRIFTIRJ",
            "itemType": "note",
            "note": "<blockquote cite=\"https://help.ubuntu.com/community/IptablesHowTo\"><p>Iptables is a firewall, installed by default on all official Ubuntu distributions (Ubuntu, Kubuntu, Xubuntu). When you install Ubuntu, iptables is there, but it allows all traffic by default.</p></blockquote>",
            "tags": [],
            "relations": {},
            "dateAdded": "2010-05-22T22:45:39Z",
            "dateModified": "2010-05-22T22:45:39Z"
        }
    },
    {
        "key": "MRIFTIRJ",
        "version": 1,
        "library": {
            "type": "group",
            "id": 18766,
            "name": "Computer Networking",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/computer_networking",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/18766/items/MRIFTIRJ",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/computer_networking/items/MRIFTIRJ",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 186431,
                "username": "shanevaughn",
                "name": "Shane Vaughn",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/shanevaughn",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Casiano",
            "parsedDate": "2010-02-18",
            "numChildren": 1
        },
        "data": {
            "key": "MRIFTIRJ",
            "version": 1,
            "itemType": "webpage",
            "title": "IPTables HowTo - Community Ubuntu Documentation",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Jerry",
                    "lastName": "Casiano"
                }
            ],
            "abstractNote": "",
            "websiteTitle": "",
            "websiteType": "",
            "date": "2010/02/18",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "https://help.ubuntu.com/community/IptablesHowTo",
            "accessDate": "2010-03-22T04:31:58Z",
            "shortTitle": "",
            "language": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2010-05-22T22:45:39Z",
            "dateModified": "2010-05-22T22:45:39Z"
        }
    },
    {
        "key": "JTU8NH5K",
        "version": 1,
        "library": {
            "type": "group",
            "id": 18766,
            "name": "Computer Networking",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/computer_networking",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/18766/items/JTU8NH5K",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/computer_networking/items/JTU8NH5K",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 186431,
                "username": "shanevaughn",
                "name": "Shane Vaughn",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/shanevaughn",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "R. Pethia et al.",
            "parsedDate": "1991-11",
            "numChildren": 0
        },
        "data": {
            "key": "JTU8NH5K",
            "version": 1,
            "itemType": "webpage",
            "title": "Guidelines for the Secure Operation of the Internet",
            "creators": [
                {
                    "creatorType": "author",
                    "name": "R. Pethia"
                },
                {
                    "creatorType": "author",
                    "firstName": "",
                    "lastName": "S. Crocker"
                },
                {
                    "creatorType": "author",
                    "firstName": "",
                    "lastName": "B. Fraser"
                }
            ],
            "abstractNote": "The purpose of this document is to provide a set of guidelines to aid\\nin the secure operation of the Internet. This memo provides\\ninformation for the Internet community. It does not specify an\\nInternet standard.",
            "websiteTitle": "",
            "websiteType": "",
            "date": "November, 1991",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "https://tools.ietf.org/html/rfc1281",
            "accessDate": "2010-04-04T03:38:57Z",
            "shortTitle": "",
            "language": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2010-05-22T22:43:44Z",
            "dateModified": "2010-05-22T22:43:44Z"
        }
    },
    {
        "key": "EGGSZJWT",
        "version": 1,
        "library": {
            "type": "group",
            "id": 18766,
            "name": "Computer Networking",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/computer_networking",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/18766/items/EGGSZJWT",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/computer_networking/items/EGGSZJWT",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/18766/items/HCPJTWJB",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 186431,
                "username": "shanevaughn",
                "name": "Shane Vaughn",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/shanevaughn",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "EGGSZJWT",
            "version": 1,
            "parentItem": "HCPJTWJB",
            "itemType": "note",
            "note": "<blockquote cite=\"http://www.cisco.com/en/US/tech/tk389/tk689/technologies_configuration_example09186a008009478e.shtml\"><p>A misconfiguration on a switch can cause the configuration updates of the VTP to fail. In most cases, the problem is that the new VLAN created in the VTP server switch does not propagate to the VTP client switches, which creates host connectivity issues.</p></blockquote>",
            "tags": [],
            "relations": {},
            "dateAdded": "2010-05-22T22:43:20Z",
            "dateModified": "2010-05-22T22:43:20Z"
        }
    },
    {
        "key": "HCPJTWJB",
        "version": 1,
        "library": {
            "type": "group",
            "id": 18766,
            "name": "Computer Networking",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/computer_networking",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/18766/items/HCPJTWJB",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/computer_networking/items/HCPJTWJB",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 186431,
                "username": "shanevaughn",
                "name": "Shane Vaughn",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/shanevaughn",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 1
        },
        "data": {
            "key": "HCPJTWJB",
            "version": 1,
            "itemType": "webpage",
            "title": "Creating Ethernet VLANs on Catalyst Switches - Cisco Systems",
            "creators": [],
            "abstractNote": "",
            "websiteTitle": "",
            "websiteType": "",
            "date": "",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.cisco.com/en/US/tech/tk389/tk689/technologies_configuration_example09186a008009478e.shtml",
            "accessDate": "2010-03-29T15:02:20Z",
            "shortTitle": "",
            "language": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2010-05-22T22:43:20Z",
            "dateModified": "2010-05-22T22:43:20Z"
        }
    },
    {
        "key": "MEVTGTK4",
        "version": 1,
        "library": {
            "type": "group",
            "id": 18766,
            "name": "Computer Networking",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/computer_networking",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/18766/items/MEVTGTK4",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/computer_networking/items/MEVTGTK4",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/18766/items/M9UKDF5M",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 186431,
                "username": "shanevaughn",
                "name": "Shane Vaughn",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/shanevaughn",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "MEVTGTK4",
            "version": 1,
            "parentItem": "M9UKDF5M",
            "itemType": "note",
            "note": "<blockquote cite=\"http://www.cisco.com/en/US/products/sw/secursw/ps1018/products_tech_note09186a00800a5b9a.shtml\">\n<p>This document explains how IP access control lists (ACLs) can filter network traffic. It also contains brief descriptions of the IP ACL types, feature availability, and an example of use in a network.</p>\n</blockquote>",
            "tags": [],
            "relations": {},
            "dateAdded": "2010-05-22T22:43:14Z",
            "dateModified": "2010-05-22T22:43:14Z"
        }
    },
    {
        "key": "M9UKDF5M",
        "version": 1,
        "library": {
            "type": "group",
            "id": 18766,
            "name": "Computer Networking",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/computer_networking",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/18766/items/M9UKDF5M",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/computer_networking/items/M9UKDF5M",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 186431,
                "username": "shanevaughn",
                "name": "Shane Vaughn",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/shanevaughn",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Cisco Systems",
            "parsedDate": "2007-12-27",
            "numChildren": 1
        },
        "data": {
            "key": "M9UKDF5M",
            "version": 1,
            "itemType": "webpage",
            "title": "Configuring IP Access Lists - Cisco Systems",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "",
                    "lastName": "Cisco Systems"
                }
            ],
            "abstractNote": "",
            "websiteTitle": "",
            "websiteType": "",
            "date": "2007/12/27",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.cisco.com/en/US/products/sw/secursw/ps1018/products_tech_note09186a00800a5b9a.shtml",
            "accessDate": "2010-03-22T04:15:04Z",
            "shortTitle": "",
            "language": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2010-05-22T22:43:14Z",
            "dateModified": "2010-05-22T22:43:14Z"
        }
    },
    {
        "key": "WF2DWI9T",
        "version": 1,
        "library": {
            "type": "group",
            "id": 18766,
            "name": "Computer Networking",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/computer_networking",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/18766/items/WF2DWI9T",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/computer_networking/items/WF2DWI9T",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/18766/items/NVGHA6CJ",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 186431,
                "username": "shanevaughn",
                "name": "Shane Vaughn",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/shanevaughn",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "WF2DWI9T",
            "version": 1,
            "parentItem": "NVGHA6CJ",
            "itemType": "note",
            "note": "<blockquote cite=\"http://www.cisco.com/en/US/docs/solutions/Enterprise/Security/SAFE_RG/safepref.html\"><p>This guide discusses the Cisco SAFE best practices, designs and configurations, and provides network and security engineers with the necessary information to help them succeed in designing, implementing and operating secure network infrastructures based on Cisco products and technologies.</p></blockquote>",
            "tags": [],
            "relations": {},
            "dateAdded": "2010-05-22T22:42:55Z",
            "dateModified": "2010-05-22T22:42:55Z"
        }
    },
    {
        "key": "NVGHA6CJ",
        "version": 1,
        "library": {
            "type": "group",
            "id": 18766,
            "name": "Computer Networking",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/computer_networking",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/18766/items/NVGHA6CJ",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/computer_networking/items/NVGHA6CJ",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 186431,
                "username": "shanevaughn",
                "name": "Shane Vaughn",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/shanevaughn",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 1
        },
        "data": {
            "key": "NVGHA6CJ",
            "version": 1,
            "itemType": "book",
            "title": "Cisco SAFE Reference Guide - Preface  [Design Zone for Security] - Cisco Systems",
            "creators": [],
            "abstractNote": "",
            "series": "",
            "seriesNumber": "",
            "volume": "",
            "numberOfVolumes": "",
            "edition": "",
            "date": "",
            "publisher": "",
            "place": "",
            "originalDate": "",
            "originalPublisher": "",
            "originalPlace": "",
            "format": "",
            "numPages": "",
            "ISBN": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.cisco.com/en/US/docs/solutions/Enterprise/Security/SAFE_RG/safepref.html",
            "accessDate": "2010-03-22T04:46:47Z",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2010-05-22T22:42:55Z",
            "dateModified": "2010-05-22T22:42:55Z"
        }
    }
]