Unit Instance
Units API.
See the Weblate's Web API documentation for detailed description of the API.
GET /api/units/35256/?format=api
https://weblate.info.ucl.ac.be/api/translations/cnp3-ebook/principlessecurity/en/?format=api", "source": [ "When analyzing security issues in computer networks, it is useful to reason about the capabilities of the attacker who wants to exploit some breach in the security of the network. There are different types of attackers. Some have generic capabilities, others are specific to a given technology or network protocol. In this section, we discuss some important threats that a network architect must take into account." ], "previous_source": "", "target": [ "When analyzing security issues in computer networks, it is useful to reason about the capabilities of the attacker who wants to exploit some breach in the security of the network. There are different types of attackers. Some have generic capabilities, others are specific to a given technology or network protocol. In this section, we discuss some important threats that a network architect must take into account." ], "id_hash": 6515920407351884850, "content_hash": 6515920407351884850, "location": "../../principles/security.rst:64", "context": "", "note": "", "flags": "", "state": 100, "fuzzy": false, "translated": true, "approved": false, "position": 7, "has_suggestion": false, "has_comment": false, "has_failing_check": false, "num_words": 66, "source_unit": "https://weblate.info.ucl.ac.be/api/units/35256/?format=api", "priority": 100, "id": 35256, "web_url": "https://weblate.info.ucl.ac.be/translate/cnp3-ebook/principlessecurity/en/?checksum=da6d331670ed7c32", "url": "https://weblate.info.ucl.ac.be/api/units/35256/?format=api", "explanation": "", "extra_flags": "", "pending": false, "timestamp": "2021-08-27T14:43:06.637634+02:00" }{ "translation": "