<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://altas.onl/wp-sitemap.xsl" ?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://altas.onl/executive-order-summary-white-house/</loc><lastmod>2024-09-25T17:01:48+00:00</lastmod></url><url><loc>https://altas.onl/cnss-guideline-to-protect-space-systems/</loc><lastmod>2024-09-26T08:47:07+00:00</lastmod></url><url><loc>https://altas.onl/confidentiality-integrity-and-availability-cia-triad/</loc><lastmod>2024-10-07T22:21:26+00:00</lastmod></url><url><loc>https://altas.onl/security-information-and-event-management-siem-tools/</loc><lastmod>2024-10-07T22:23:32+00:00</lastmod></url><url><loc>https://altas.onl/how-a-security-analysts-use-siem-dashboards/</loc><lastmod>2024-10-07T22:24:28+00:00</lastmod></url><url><loc>https://altas.onl/nists-7-steps-risk-management-framework/</loc><lastmod>2024-10-08T17:44:25+00:00</lastmod></url><url><loc>https://altas.onl/confidentiality-integrity-and-availability-cia-triad-2/</loc><lastmod>2024-10-09T15:04:38+00:00</lastmod></url><url><loc>https://altas.onl/nist-sp-800-53-a-must-know-framework-for-any-us-government-security-specialists/</loc><lastmod>2024-10-09T15:44:52+00:00</lastmod></url><url><loc>https://altas.onl/owasp-security-principles/</loc><lastmod>2024-10-09T16:13:13+00:00</lastmod></url><url><loc>https://altas.onl/a-short-story-of-a-security-audit/</loc><lastmod>2024-10-09T17:08:18+00:00</lastmod></url><url><loc>https://altas.onl/a-tytpical-audit-example-with-a-report/</loc><lastmod>2024-10-09T21:09:29+00:00</lastmod></url><url><loc>https://altas.onl/splunk-vs-chronicle-a-comparision-for-siem-tools/</loc><lastmod>2024-10-10T08:37:52+00:00</lastmod></url><url><loc>https://altas.onl/incident-and-vulnerability-playbooks/</loc><lastmod>2024-10-10T13:19:26+00:00</lastmod></url><url><loc>https://altas.onl/the-tcp-ip-model-key-takeaways/</loc><lastmod>2024-10-14T13:09:57+00:00</lastmod></url><url><loc>https://altas.onl/network-osi-model-layers-and-comparision-to-tcp-ip-model/</loc><lastmod>2024-10-14T13:36:16+00:00</lastmod></url><url><loc>https://altas.onl/network-communication-types/</loc><lastmod>2024-10-14T19:09:34+00:00</lastmod></url><url><loc>https://altas.onl/in-need-of-a-vpn-service/</loc><lastmod>2024-10-16T14:34:14+00:00</lastmod></url><url><loc>https://altas.onl/a-simple-cyber-security-framework-by-loi-liang-yang/</loc><lastmod>2024-10-17T09:25:11+00:00</lastmod></url><url><loc>https://altas.onl/proxy-vs-reverse-proxy-vs-load-balancer-from-techworld-with-nana/</loc><lastmod>2024-10-17T13:11:31+00:00</lastmod></url><url><loc>https://altas.onl/wireshark-and-tcpdump/</loc><lastmod>2024-10-23T18:35:38+00:00</lastmod></url><url><loc>https://altas.onl/vue-js-music-player-app/</loc><lastmod>2024-10-26T08:36:00+00:00</lastmod></url><url><loc>https://altas.onl/css-ile-ilk-renkler/</loc><lastmod>2024-10-26T08:47:04+00:00</lastmod></url><url><loc>https://altas.onl/html-dersleri/</loc><lastmod>2024-10-26T09:18:52+00:00</lastmod></url><url><loc>https://altas.onl/software-tester-olmanin-en-kisa-yolu/</loc><lastmod>2024-10-26T09:45:22+00:00</lastmod></url><url><loc>https://altas.onl/mbr-or-gpt-bios-or-uefi/</loc><lastmod>2024-10-26T09:48:53+00:00</lastmod></url><url><loc>https://altas.onl/how-to-create-windows-installation-disk/</loc><lastmod>2024-10-26T10:24:07+00:00</lastmod></url><url><loc>https://altas.onl/statement-branch-decision-and-path-coverage/</loc><lastmod>2024-10-26T10:25:50+00:00</lastmod></url><url><loc>https://altas.onl/entry-ready-exit-done-criteria/</loc><lastmod>2024-10-26T10:26:51+00:00</lastmod></url><url><loc>https://altas.onl/test-basis/</loc><lastmod>2024-10-26T10:27:36+00:00</lastmod></url><url><loc>https://altas.onl/acceptance-testing/</loc><lastmod>2024-10-26T10:28:16+00:00</lastmod></url><url><loc>https://altas.onl/test-analysis/</loc><lastmod>2024-10-26T10:29:06+00:00</lastmod></url><url><loc>https://altas.onl/test-summary-report/</loc><lastmod>2024-10-26T10:29:53+00:00</lastmod></url><url><loc>https://altas.onl/test-analysis-for-istqb-test-process/</loc><lastmod>2024-10-26T10:30:33+00:00</lastmod></url><url><loc>https://altas.onl/component-testing-vs-system-testing/</loc><lastmod>2024-10-26T10:31:57+00:00</lastmod></url><url><loc>https://altas.onl/change-related-testing/</loc><lastmod>2024-10-26T10:32:31+00:00</lastmod></url><url><loc>https://altas.onl/functional-testing/</loc><lastmod>2024-10-26T10:33:27+00:00</lastmod></url><url><loc>https://altas.onl/software-test-types/</loc><lastmod>2024-10-26T10:34:16+00:00</lastmod></url><url><loc>https://altas.onl/setting-your-java-environment-eclipse-java-ide-installation-and-first-run/</loc><lastmod>2024-10-26T10:36:39+00:00</lastmod></url><url><loc>https://altas.onl/appium-environment-set-up/</loc><lastmod>2024-10-26T10:37:40+00:00</lastmod></url><url><loc>https://altas.onl/robot-framework/</loc><lastmod>2024-10-26T10:42:50+00:00</lastmod></url><url><loc>https://altas.onl/factors-for-defining-the-strategy/</loc><lastmod>2024-10-26T10:48:13+00:00</lastmod></url><url><loc>https://altas.onl/metrics-vs-expert-based-approach/</loc><lastmod>2024-10-26T11:07:47+00:00</lastmod></url><url><loc>https://altas.onl/possible-stansart-tasks-for-a-software-tester/</loc><lastmod>2024-10-26T11:30:53+00:00</lastmod></url><url><loc>https://altas.onl/use-case-testing/</loc><lastmod>2024-10-26T11:43:00+00:00</lastmod></url><url><loc>https://altas.onl/test-tools/</loc><lastmod>2024-10-26T11:48:30+00:00</lastmod></url><url><loc>https://altas.onl/istqb-foundation-study-content-for-a-tester/</loc><lastmod>2024-10-26T11:51:32+00:00</lastmod></url><url><loc>https://altas.onl/major-cyber-attack-types-explained/</loc><lastmod>2024-10-27T12:35:08+00:00</lastmod></url><url><loc>https://altas.onl/common-types-of-denial-of-service-dos-attacks/</loc><lastmod>2024-10-27T12:52:40+00:00</lastmod></url><url><loc>https://altas.onl/ip-spoofing-attack-types/</loc><lastmod>2024-10-27T13:19:05+00:00</lastmod></url><url><loc>https://altas.onl/lessons-to-take-from-thousands-years-old-wisdom/</loc><lastmod>2024-10-31T15:30:01+00:00</lastmod></url><url><loc>https://altas.onl/importance-of-software-testing/</loc><lastmod>2024-11-01T23:43:11+00:00</lastmod></url><url><loc>https://altas.onl/statefull-and-stateless-firewalls-in-a-nutshell/</loc><lastmod>2024-11-02T13:29:51+00:00</lastmod></url><url><loc>https://altas.onl/file-permissions-in-linux/</loc><lastmod>2024-11-17T19:20:00+00:00</lastmod></url><url><loc>https://altas.onl/apply-filters-to-sql-queries/</loc><lastmod>2024-11-18T23:14:24+00:00</lastmod></url><url><loc>https://altas.onl/principle-of-least-privilege/</loc><lastmod>2024-11-29T00:04:28+00:00</lastmod></url><url><loc>https://altas.onl/how-to-protect-a-castle/</loc><lastmod>2024-12-03T18:06:46+00:00</lastmod></url><url><loc>https://altas.onl/calculate-risks-in-cyber-space/</loc><lastmod>2024-12-05T20:48:27+00:00</lastmod></url><url><loc>https://altas.onl/threats-for-software-systems-and-wordpress/</loc><lastmod>2024-12-05T21:28:04+00:00</lastmod></url><url><loc>https://altas.onl/potential-but-rare-threat-factors-for-2025/</loc><lastmod>2024-12-05T21:51:42+00:00</lastmod></url><url><loc>https://altas.onl/attack-surfaces-and-attack-vectors/</loc><lastmod>2024-12-06T14:16:29+00:00</lastmod></url><url><loc>https://altas.onl/brute-force-attacks/</loc><lastmod>2024-12-06T15:14:26+00:00</lastmod></url><url><loc>https://altas.onl/hashing-security/</loc><lastmod>2024-12-06T20:26:48+00:00</lastmod></url><url><loc>https://altas.onl/sql-injections/</loc><lastmod>2024-12-08T11:13:41+00:00</lastmod></url><url><loc>https://altas.onl/the-pasta-journey-of-techguard/</loc><lastmod>2024-12-08T16:15:29+00:00</lastmod></url><url><loc>https://altas.onl/how-a-hackers-target-blocked-by-pasta/</loc><lastmod>2024-12-10T22:29:13+00:00</lastmod></url><url><loc>https://altas.onl/your-wifi-history-is-a-vulnerability/</loc><lastmod>2024-12-13T06:05:57+00:00</lastmod></url><url><loc>https://altas.onl/wireshark-vs-tcpdump/</loc><lastmod>2024-12-13T08:07:43+00:00</lastmod></url><url><loc>https://altas.onl/regex-regular-expressions/</loc><lastmod>2024-12-23T18:36:30+00:00</lastmod></url><url><loc>https://altas.onl/play-with-files-using-pyhton/</loc><lastmod>2024-12-23T19:13:43+00:00</lastmod></url><url><loc>https://altas.onl/recognize-roles-and-responsibilities-during-escalation/</loc><lastmod>2024-12-28T07:27:19+00:00</lastmod></url><url><loc>https://altas.onl/network-packet-investigation-with-wireshark/</loc><lastmod>2024-12-28T15:03:20+00:00</lastmod></url><url><loc>https://altas.onl/a-guide-to-phishing-and-malware-awareness-in-your-company/</loc><lastmod>2025-01-04T20:33:45+00:00</lastmod></url></urlset>
