<?xml version="1.0" encoding="utf-8" standalone="yes"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url><loc>https://vjpatel.me/notes/</loc><lastmod>2023-06-24T12:26:19+01:00</lastmod></url><url><loc>https://vjpatel.me/projects/</loc><lastmod>2020-04-01T21:17:53+01:00</lastmod></url><url><loc>https://vjpatel.me/blog/</loc><lastmod>2017-08-25T23:09:26+01:00</lastmod></url><url><loc>https://vjpatel.me/notes/study/kubernetes/cka/</loc><lastmod>2023-06-24T12:26:19+01:00</lastmod></url><url><loc>https://vjpatel.me/notes/study/</loc><lastmod>2023-06-24T12:26:19+01:00</lastmod></url><url><loc>https://vjpatel.me/</loc><lastmod>2023-06-24T12:26:19+01:00</lastmod></url><url><loc>https://vjpatel.me/notes/engineering/git/</loc><lastmod>2020-05-13T18:26:19+01:00</lastmod></url><url><loc>https://vjpatel.me/notes/engineering/capturing-flags/</loc><lastmod>2020-04-29T18:26:19+01:00</lastmod></url><url><loc>https://vjpatel.me/projects/cloud-desktops/</loc><lastmod>2020-04-01T21:17:53+01:00</lastmod></url><url><loc>https://vjpatel.me/projects/docker-registry-proxy/</loc><lastmod>2020-02-13T21:17:53+01:00</lastmod></url><url><loc>https://vjpatel.me/projects/tf2-sundays/</loc><lastmod>2020-02-13T21:17:53+01:00</lastmod></url><url><loc>https://vjpatel.me/projects/velocity-ci/</loc><lastmod>2017-10-13T21:17:53+01:00</lastmod></url><url><loc>https://vjpatel.me/projects/privacy-negotiator/</loc><lastmod>2017-09-13T21:17:53+01:00</lastmod></url><url><loc>https://vjpatel.me/blog/collective-privacy-management-in-social-media/</loc><lastmod>2017-08-25T23:09:26+01:00</lastmod></url><url><loc>https://vjpatel.me/tags/privacy/</loc><lastmod>2017-08-25T23:09:26+01:00</lastmod></url><url><loc>https://vjpatel.me/tags/social-media/</loc><lastmod>2017-08-25T23:09:26+01:00</lastmod></url><url><loc>https://vjpatel.me/tags/</loc><lastmod>2017-08-25T23:09:26+01:00</lastmod></url><url><loc>https://vjpatel.me/tags/university/</loc><lastmod>2017-08-25T23:09:26+01:00</lastmod></url><url><loc>https://vjpatel.me/notes/study/msc-computing-and-security/term-2/7ccsmsia-software-engineering-of-internet-applications/tutorials/tutorial4/</loc><lastmod>2017-05-24T14:26:19+01:00</lastmod></url><url><loc>https://vjpatel.me/projects/chit-chat/</loc><lastmod>2017-05-13T21:17:53+01:00</lastmod></url><url><loc>https://vjpatel.me/notes/study/msc-computing-and-security/term-2/7ccsmcfc-computer-forensics-and-cybercrime/2014-exam/</loc><lastmod>2017-05-08T00:26:19+01:00</lastmod></url><url><loc>https://vjpatel.me/notes/study/msc-computing-and-security/term-2/7ccsmcfc-computer-forensics-and-cybercrime/2015-exam/</loc><lastmod>2017-05-08T00:26:19+01:00</lastmod></url><url><loc>https://vjpatel.me/notes/study/msc-computing-and-security/term-2/7ccsmcfc-computer-forensics-and-cybercrime/2016-exam/</loc><lastmod>2017-05-08T00:26:19+01:00</lastmod></url><url><loc>https://vjpatel.me/notes/study/msc-computing-and-security/term-2/7ccsmcfc-computer-forensics-and-cybercrime/specimen-exam-part-questions/</loc><lastmod>2017-05-08T00:26:19+01:00</lastmod></url><url><loc>https://vjpatel.me/notes/study/msc-computing-and-security/term-2/7ccsmnse-network-security/coursework/coursework-1/</loc><lastmod>2017-04-15T00:26:19+01:00</lastmod></url><url><loc>https://vjpatel.me/notes/study/msc-computing-and-security/term-2/7ccsmnse-network-security/coursework/coursework-2/</loc><lastmod>2017-04-15T00:26:19+01:00</lastmod></url><url><loc>https://vjpatel.me/notes/study/msc-computing-and-security/term-2/7ccsmnse-network-security/coursework/coursework-3/</loc><lastmod>2017-04-15T00:26:19+01:00</lastmod></url><url><loc>https://vjpatel.me/notes/study/msc-computing-and-security/term-2/7ccsmnse-network-security/coursework/coursework-4/</loc><lastmod>2017-04-15T00:26:19+01:00</lastmod></url><url><loc>https://vjpatel.me/notes/study/msc-computing-and-security/term-2/7ccsmnse-network-security/coursework/coursework-5/</loc><lastmod>2017-04-15T00:26:19+01:00</lastmod></url><url><loc>https://vjpatel.me/notes/study/msc-computing-and-security/term-2/7ccsmcfc-computer-forensics-and-cybercrime/notes/</loc><lastmod>2017-04-15T00:26:19+01:00</lastmod></url><url><loc>https://vjpatel.me/notes/study/msc-computing-and-security/term-2/7ccsmsia-software-engineering-of-internet-applications/notes/</loc><lastmod>2017-04-15T00:26:19+01:00</lastmod></url><url><loc>https://vjpatel.me/notes/study/msc-computing-and-security/term-2/7ccsmnse-network-security/labs/lab1/</loc><lastmod>2017-01-30T14:26:19+01:00</lastmod></url><url><loc>https://vjpatel.me/notes/study/msc-computing-and-security/term-2/7ccsmnse-network-security/notes/</loc><lastmod>2017-01-29T14:26:19+01:00</lastmod></url><url><loc>https://vjpatel.me/notes/study/msc-computing-and-security/term-1/7ccsmcis-cryptography-and-information-security/coursework/coursework-5/</loc><lastmod>2016-12-05T11:26:19+01:00</lastmod></url><url><loc>https://vjpatel.me/notes/study/msc-computing-and-security/term-1/7ccsmsen-security-engineering/homework/week-9/</loc><lastmod>2016-12-03T01:35:19+00:00</lastmod></url><url><loc>https://vjpatel.me/notes/study/msc-computing-and-security/term-1/7ccsmcis-cryptography-and-information-security/coursework/coursework-4/</loc><lastmod>2016-11-25T14:26:19+01:00</lastmod></url><url><loc>https://vjpatel.me/notes/study/msc-computing-and-security/term-1/7ccsmase-advanced-software-engineering/tutorials/tutorial-9/</loc><lastmod>2016-11-22T17:00:19+00:00</lastmod></url><url><loc>https://vjpatel.me/notes/study/msc-computing-and-security/term-1/7ccsmcis-cryptography-and-information-security/coursework/coursework-3/</loc><lastmod>2016-11-21T14:26:19+01:00</lastmod></url><url><loc>https://vjpatel.me/notes/study/msc-computing-and-security/term-1/7ccsmase-advanced-software-engineering/tutorials/tutorial-8/</loc><lastmod>2016-11-20T01:03:19+00:00</lastmod></url><url><loc>https://vjpatel.me/notes/study/msc-computing-and-security/term-1/7ccsmsen-security-engineering/homework/week-8/</loc><lastmod>2016-11-19T01:35:19+00:00</lastmod></url><url><loc>https://vjpatel.me/notes/study/msc-computing-and-security/term-1/7ccsmsen-security-engineering/homework/week-7/</loc><lastmod>2016-11-17T14:25:19+00:00</lastmod></url><url><loc>https://vjpatel.me/notes/study/msc-computing-and-security/term-1/7ccsmase-advanced-software-engineering/tutorials/tutorial-4/</loc><lastmod>2016-11-03T23:26:19+01:00</lastmod></url><url><loc>https://vjpatel.me/notes/study/msc-computing-and-security/term-1/7ccsmase-advanced-software-engineering/tutorials/tutorial-7/</loc><lastmod>2016-11-03T23:26:19+01:00</lastmod></url><url><loc>https://vjpatel.me/notes/study/msc-computing-and-security/term-1/7ccsmsen-security-engineering/homework/week-5/</loc><lastmod>2016-10-26T23:26:19+01:00</lastmod></url><url><loc>https://vjpatel.me/notes/study/msc-computing-and-security/term-1/7ccsmsen-security-engineering/homework/week-6/</loc><lastmod>2016-10-26T23:26:19+01:00</lastmod></url><url><loc>https://vjpatel.me/notes/study/msc-computing-and-security/term-1/7ccsmsen-security-engineering/homework/week-3/</loc><lastmod>2016-10-18T23:26:19+01:00</lastmod></url><url><loc>https://vjpatel.me/notes/study/msc-computing-and-security/term-1/7ccsmsen-security-engineering/homework/week-4/</loc><lastmod>2016-10-18T23:26:19+01:00</lastmod></url><url><loc>https://vjpatel.me/notes/study/isc2/ccsp/1.cloud-concepts-architecture-and-design/</loc><lastmod>2016-10-13T23:26:19+01:00</lastmod></url><url><loc>https://vjpatel.me/notes/study/isc2/ccsp/2.cloud-data-security/</loc><lastmod>2016-10-13T23:26:19+01:00</lastmod></url><url><loc>https://vjpatel.me/notes/study/isc2/ccsp/3.cloud-platform-and-infrastructure-security/</loc><lastmod>2016-10-13T23:26:19+01:00</lastmod></url><url><loc>https://vjpatel.me/notes/study/isc2/ccsp/4.cloud-application-security/</loc><lastmod>2016-10-13T23:26:19+01:00</lastmod></url><url><loc>https://vjpatel.me/notes/study/isc2/ccsp/5.cloud-security-operations/</loc><lastmod>2016-10-13T23:26:19+01:00</lastmod></url><url><loc>https://vjpatel.me/notes/study/isc2/ccsp/6.legal-risk-and-compliance/</loc><lastmod>2016-10-13T23:26:19+01:00</lastmod></url><url><loc>https://vjpatel.me/notes/study/msc-computing-and-security/term-1/7ccsmcis-cryptography-and-information-security/coursework/coursework-1/</loc><lastmod>2016-10-13T23:26:19+01:00</lastmod></url><url><loc>https://vjpatel.me/notes/study/msc-computing-and-security/term-1/7ccsmcis-cryptography-and-information-security/coursework/coursework-2/</loc><lastmod>2016-10-13T23:26:19+01:00</lastmod></url><url><loc>https://vjpatel.me/notes/study/isc2/ccsp/exam/</loc><lastmod>2016-10-13T23:26:19+01:00</lastmod></url><url><loc>https://vjpatel.me/notes/study/msc-computing-and-security/term-1/7ccsmsen-security-engineering/homework/week-1/</loc><lastmod>2016-10-13T23:26:19+01:00</lastmod></url><url><loc>https://vjpatel.me/notes/study/msc-computing-and-security/term-1/7ccsmsen-security-engineering/homework/week-2/</loc><lastmod>2016-10-13T23:26:19+01:00</lastmod></url><url><loc>https://vjpatel.me/notes/study/msc-computing-and-security/term-1/7ccsmase-advanced-software-engineering/notes/</loc><lastmod>2016-10-13T23:26:19+01:00</lastmod></url><url><loc>https://vjpatel.me/notes/study/msc-computing-and-security/term-1/7ccsmwin-web-infrastructure/notes/</loc><lastmod>2016-10-13T23:26:19+01:00</lastmod></url><url><loc>https://vjpatel.me/notes/study/msc-computing-and-security/term-1/7ccsmase-advanced-software-engineering/tutorials/tutorial-1/</loc><lastmod>2016-10-13T23:26:19+01:00</lastmod></url><url><loc>https://vjpatel.me/notes/study/msc-computing-and-security/term-1/7ccsmase-advanced-software-engineering/tutorials/tutorial-2/</loc><lastmod>2016-10-13T23:26:19+01:00</lastmod></url><url><loc>https://vjpatel.me/projects/invoke-tools/</loc><lastmod>2016-10-13T21:38:34+01:00</lastmod></url><url><loc>https://vjpatel.me/projects/raspberry-pi-hud/</loc><lastmod>2016-10-13T21:38:23+01:00</lastmod></url><url><loc>https://vjpatel.me/projects/homomorphic-encryption/</loc><lastmod>2016-10-13T21:17:53+01:00</lastmod></url><url><loc>https://vjpatel.me/notes/study/msc-computing-and-security/term-1/7ccsmcis-cryptography-and-information-security/notes/</loc><lastmod>2016-10-12T23:26:19+01:00</lastmod></url><url><loc>https://vjpatel.me/notes/study/msc-computing-and-security/term-1/7ccsmsen-security-engineering/notes/</loc><lastmod>2016-10-12T23:26:19+01:00</lastmod></url><url><loc>https://vjpatel.me/blog/implementations-of-homomorphic-encryption/</loc><lastmod>2016-04-24T23:09:26+01:00</lastmod></url><url><loc>https://vjpatel.me/tags/security/</loc><lastmod>2016-04-24T23:09:26+01:00</lastmod></url><url><loc>https://vjpatel.me/blog/a-short-essay-on-the-java-virtual-machine/</loc><lastmod>2013-09-11T23:06:35+01:00</lastmod></url><url><loc>https://vjpatel.me/tags/infrastructure/</loc><lastmod>2013-09-11T23:06:35+01:00</lastmod></url><url><loc>https://vjpatel.me/blog/a-perspective-on-objects/</loc><lastmod>2012-08-15T22:32:09+01:00</lastmod></url><url><loc>https://vjpatel.me/tags/development/</loc><lastmod>2012-08-15T22:32:09+01:00</lastmod></url><url><loc>https://vjpatel.me/about/</loc></url><url><loc>https://vjpatel.me/categories/</loc></url><url><loc>https://vjpatel.me/notes/study/aws/certified-security-specialty/</loc></url></urlset>