{"entities":{"Q1236":{"pageid":1440,"ns":120,"title":"Item:Q1236","lastrevid":15315,"modified":"2025-07-01T07:09:17Z","type":"item","id":"Q1236","labels":{"en":{"language":"en","value":"Werkzeuge f\u00fcr Informationssicherheit"},"de":{"language":"de","value":"Werkzeuge f\u00fcr Informationssicherheit"}},"descriptions":{},"aliases":{},"claims":{"P2":[{"mainsnak":{"snaktype":"value","property":"P2","hash":"c54ab8bbcde8dcc0cf583eb85a12d05bc8cfa8fb","datavalue":{"value":{"entity-type":"item","numeric-id":233,"id":"Q233"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q1236$403FA044-0028-4E96-B0EC-A37BFC70A39F","rank":"normal"}],"P20":[{"mainsnak":{"snaktype":"value","property":"P20","hash":"9d5445e882089771d34ed7ad598744d9f2e59efb","datavalue":{"value":"https://www.bsi.bund.de/DE/Themen/Unternehmen-und-Organisationen/Standards-und-Zertifizierung/IT-Grundschutz/IT-Grundschutz-Kompendium/it-grundschutz-kompendium_node.html","type":"string"},"datatype":"url"},"type":"statement","id":"Q1236$6857B034-E4D9-4C2E-B354-4E9787C7692D","rank":"normal"}],"P38":[{"mainsnak":{"snaktype":"value","property":"P38","hash":"fd5798d84669395740b01df5e0cab3adc580da34","datavalue":{"value":"BSI","type":"string"},"datatype":"string"},"type":"statement","id":"Q1236$813B581A-A365-42C4-9451-A625D5C2677F","rank":"normal"}],"P3":[{"mainsnak":{"snaktype":"value","property":"P3","hash":"3ce8794d3912745c1b344a3a2baa2e4348e1bd60","datavalue":{"value":{"entity-type":"item","numeric-id":233,"id":"Q233"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q1236$d4dd6720-4116-878f-ef85-fb06e1107994","rank":"normal"}]},"sitelinks":{}}}}