<?xml version="1.0" encoding="UTF-8"?>
<rdf:RDF xmlns="http://purl.org/rss/1.0/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel rdf:about="http://196.191.116.215/handle/1235678/182">
<title>Electrical Engineering</title>
<link>http://196.191.116.215/handle/1235678/182</link>
<description/>
<items>
<rdf:Seq>
<rdf:li rdf:resource="http://196.191.116.215/handle/1234578/90014"/>
<rdf:li rdf:resource="http://196.191.116.215/handle/1234578/90013"/>
<rdf:li rdf:resource="http://196.191.116.215/handle/1234578/90011"/>
<rdf:li rdf:resource="http://196.191.116.215/handle/1234578/90009"/>
</rdf:Seq>
</items>
<dc:date>2026-05-17T01:14:26Z</dc:date>
</channel>
<item rdf:about="http://196.191.116.215/handle/1234578/90014">
<title>Year IV Advanced IT Security, Linux</title>
<link>http://196.191.116.215/handle/1234578/90014</link>
<description>Year IV Advanced IT Security, Linux
</description>
<dc:date>2020-08-13T00:00:00Z</dc:date>
</item>
<item rdf:about="http://196.191.116.215/handle/1234578/90013">
<title>Year IV Advanced IT Security, Introduction</title>
<link>http://196.191.116.215/handle/1234578/90013</link>
<description>Year IV Advanced IT Security, Introduction
</description>
<dc:date>2020-08-13T00:00:00Z</dc:date>
</item>
<item rdf:about="http://196.191.116.215/handle/1234578/90011">
<title>Year IV Advanced IT Security, Explotation</title>
<link>http://196.191.116.215/handle/1234578/90011</link>
<description>Year IV Advanced IT Security, Explotation
</description>
<dc:date>2020-08-13T00:00:00Z</dc:date>
</item>
<item rdf:about="http://196.191.116.215/handle/1234578/90009">
<title>Year IV Advanced IT Security, Ethical Hacking and Penetration Test</title>
<link>http://196.191.116.215/handle/1234578/90009</link>
<description>Year IV Advanced IT Security, Ethical Hacking and Penetration Test
</description>
<dc:date>2020-08-13T00:00:00Z</dc:date>
</item>
</rdf:RDF>
