<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://adriancitu.com/2024/12/23/book-review-data-oriented-programming/</loc><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2025/07/create-a-highly-detailed-and-sharp-focused-featured-image-for-a.png</image:loc><image:title>create-a-highly-detailed-and-sharp-focused-featured-image-for-a</image:title></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2025/07/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2025/07/dop.jpg</image:loc><image:title>dop</image:title></image:image><lastmod>2024-12-22T22:53:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2024/04/05/how-to-fix-classnotfoundexception-for-burp-suite-extension-using-jersey/</loc><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2024/03/burp_suite_macos-e1712268109358.png</image:loc><image:title>burp_suite_macos</image:title></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2024/03/burpclassloader.jpg</image:loc><image:title>burpclassloader</image:title></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2024/03/jerseyclassloader-1.jpg</image:loc><image:title>jerseyclassloader-1</image:title></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2024/03/jerseyclassloader.jpg</image:loc><image:title>jerseyclassloader</image:title></image:image><lastmod>2024-04-04T22:05:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2024/01/15/introduction-to-web-assembly-for-java-engineers/</loc><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2023/12/javavswebassembly3.jpg</image:loc><image:title>JavaVsWebAssembly3</image:title></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2023/11/wasmvsjavaarchitecture.jpg</image:loc><image:title>WasmVsJavaArchitecture</image:title></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2023/11/wasmvsjava.jpg</image:loc><image:title>wasmVsJava</image:title></image:image><lastmod>2024-01-15T09:25:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2023/10/01/lessons-learned-from-using-jenkins-on-containers-a-k-a-cloudbees-ci/</loc><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2023/09/lessonaslearned.jpeg</image:loc><image:title>lessonaslearned</image:title></image:image><lastmod>2023-10-02T07:12:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2023/03/21/how-to-properly-use-java-text-blocks-with-string-format/</loc><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2023/03/java-logo-e1679302750797.png</image:loc><image:title>java-logo</image:title></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2023/03/java17-image-e1679266362510.webp</image:loc><image:title>java17-image</image:title></image:image><lastmod>2023-03-20T10:34:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2023/01/18/book-review-antivirus-bypass-techniques/</loc><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2023/12/antivirbypass.jpeg</image:loc><image:title>antivirBypass</image:title></image:image><lastmod>2023-01-23T21:19:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2022/10/24/how-to-upload-big-files-to-jenkins-job-as-build-parameter/</loc><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2022/10/stay-safe.png</image:loc><image:title>stay-safe</image:title></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2022/10/jenkinslogo.png</image:loc><image:title>jenkinsLogo</image:title></image:image><lastmod>2022-10-22T22:25:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2022/10/05/book-review-secure-by-design/</loc><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2023/07/secudebydesign.jpeg</image:loc><image:title>secureByDesign</image:title></image:image><lastmod>2022-10-04T22:13:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2022/03/11/7-ways-to-build-lighter-linux-containers/</loc><lastmod>2022-03-10T21:18:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2022/02/01/book-review-container-security/</loc><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2021/12/imageattackvector.png</image:loc><image:title>imageAttackVector</image:title><image:caption>Image Attack Vectors</image:caption></image:image><lastmod>2022-02-11T09:46:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2022/01/31/how-to-fill-in-programmatically-proforma-forms-into-jira-issues/</loc><lastmod>2022-01-30T23:01:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/about/</loc><lastmod>2022-01-02T19:19:54+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://adriancitu.com/2021/12/30/containers-landscape-seen-through-oci-and-cncf-standards-lens/</loc><lastmod>2021-12-30T14:20:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2021/10/08/book-review-api-security-in-action/</loc><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2021/07/tokenbaseauthentication.png</image:loc><image:title>tokenBaseAuthentication</image:title></image:image><lastmod>2021-10-08T22:08:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2018/10/09/my-brucon-2018-notes/</loc><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2018/10/selection_027.png</image:loc><image:title>Selection_027</image:title></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2018/10/brucon2018_prez.png</image:loc><image:title>brucon2018_prez</image:title></image:image><lastmod>2018-10-09T21:13:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2018/10/04/my-brucon-2018-notes-retro-day/</loc><lastmod>2018-10-04T19:14:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2018/09/24/my-owasp-belgium-chapter-meeting-notes-5/</loc><lastmod>2018-09-23T22:13:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2018/08/19/osgi-how-to-handle-the-wrong-bundles-startup-order/</loc><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2018/08/osgi_logo.png</image:loc><image:title>OSGi_Logo</image:title></image:image><lastmod>2018-08-18T23:38:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2018/05/07/tabnabbing-burp-extension/</loc><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2018/05/scannerchecksequencediagram.png</image:loc><image:title>ScannerCheckSequenceDiagram</image:title></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2020/04/observerclassdiagram.png</image:loc><image:title>ObserverClassDiagram</image:title></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2018/04/burplogo.jpg</image:loc><image:title>burpLogo</image:title></image:image><lastmod>2018-05-07T21:56:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2018/03/27/how-to-programmatically-set-up-a-http-proxy-for-a-selenium-test/</loc><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2018/03/selenium.jpeg</image:loc><image:title>selenium</image:title></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2018/03/firefoxproxy.jpg</image:loc><image:title>firefoxProxy</image:title></image:image><lastmod>2018-03-28T09:10:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2018/03/21/my-owasp-belgium-chapter-meeting-notes-4/</loc><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2018/03/selection_020.png</image:loc><image:title>Selection_020</image:title></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2018/03/selection_018.png</image:loc><image:title>Selection_018</image:title></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2018/03/wpa2-4wayhandshake.png</image:loc><image:title>wpa2-4wayHandShake</image:title></image:image><lastmod>2018-03-20T22:36:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2017/10/04/how-to-create-and-customize-a-docker-image-for-burp-suite-professional-edition/</loc><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2017/10/burpondocker.jpg</image:loc><image:title>burpOnDocker</image:title></image:image><lastmod>2018-02-01T17:53:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2015/03/03/book-review-basics-of-web-hacking-tools-and-techniques-to-attack-the-web/</loc><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2013/12/basicsofwebhacking.jpg</image:loc><image:title>basicsOfWebHacking</image:title></image:image><lastmod>2018-01-20T20:57:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2018/01/12/book-review-clean-architecture/</loc><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2018/01/cleanarchitectureimg1.png</image:loc><image:title>cleanArchitectureImg</image:title></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2017/12/sapprinciple1.png</image:loc><image:title>sapPrinciple</image:title></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2017/11/componetcohesion.jpg</image:loc><image:title>componetCohesion</image:title></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2017/11/cleanarchitecture.jpg</image:loc><image:title>cleanArchitecture</image:title></image:image><lastmod>2018-01-12T12:08:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2016/09/09/my-owasp-belgium-chapter-meeting-notes/</loc><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2016/09/owasp_logo.png</image:loc><image:title>owasp_logo</image:title></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2016/09/cbsp.png</image:loc><image:title>cbsp</image:title></image:image><lastmod>2017-12-29T22:57:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2017/11/24/my-owasp-benelux-days-2017-notes-training-day/</loc><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2017/11/samm_overview.png</image:loc><image:title>SAMM_Overview</image:title></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2017/11/header-bnl-2017.png</image:loc><image:title>Header-BNL-2017</image:title></image:image><lastmod>2017-11-23T23:49:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2017/10/06/my-brucon-2017-notes-2/</loc><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2017/10/selection_007.png</image:loc><image:title>Selection_007</image:title></image:image><lastmod>2017-10-06T19:30:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2017/10/05/my-brucon-2017-notes-1/</loc><lastmod>2017-10-05T16:20:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2017/08/17/how-to-intercept-and-modify-java-stacktraces/</loc><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2017/08/javastacktrace.png</image:loc><image:title>javaStackTrace</image:title></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2017/08/javalogo.jpg</image:loc><image:title>javaLogo</image:title></image:image><lastmod>2017-08-17T03:51:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2017/06/21/my-owasp-belgium-chapter-meeting-notes-3/</loc><lastmod>2017-06-20T22:32:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2017/05/30/my-owasp-belgium-chapter-meeting-notes-2/</loc><lastmod>2017-05-31T21:39:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2017/06/01/5-software-security-books-that-every-software-developer-should-read/</loc><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2017/04/threatmodelingbook.jpeg</image:loc><image:title>threatModelingBook</image:title></image:image><lastmod>2017-05-19T10:09:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2017/12/01/my-csslp-notes-software-deployment-operations-maintenance-and-disposal/</loc><lastmod>2017-05-19T10:05:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2017/11/01/my-csslp-notes-software-acceptance/</loc><lastmod>2017-05-19T10:04:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2017/10/02/my-csslp-notes-secure-software-testing/</loc><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2016/03/bb_vs_wb.png</image:loc><image:title>black-box versus white-box testing</image:title><image:caption>black-box versus white-box testing</image:caption></image:image><lastmod>2017-05-19T10:02:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2017/09/01/my-csslp-notes-secure-software-implementation/</loc><lastmod>2017-05-19T09:59:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2017/08/01/my-csslp-notes-secure-software-design/</loc><lastmod>2017-05-19T09:55:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2017/07/03/my-csslp-notes-secure-software-requrements/</loc><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2016/10/policydecomposition2.png</image:loc><image:title>policy decomposition</image:title><image:caption>policy decomposition</image:caption></image:image><lastmod>2017-05-19T09:53:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2017/05/02/book-review-the-tangled-web-a-guide-to-securing-modern-web-applications/</loc><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2017/03/tangledwebbook.jpg</image:loc><image:title>tangledwebbook</image:title></image:image><lastmod>2017-04-24T21:34:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2017/04/03/my-csslp-notes-secure-software-concepts/</loc><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2016/03/csslp-logo.png</image:loc><image:title>CSSLP-logo</image:title></image:image><lastmod>2017-03-28T10:21:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2017/03/01/how-to-remotely-connect-to-an-in-memory-hsqldb-database/</loc><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2017/03/hsqldb.jpeg</image:loc><image:title>hsqldb</image:title></image:image><lastmod>2017-03-01T11:49:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2017/02/21/how-to-find-buggy-calls-of-java-lang-object-equals-with-incompatible-types/</loc><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2017/02/javabug.jpeg</image:loc><image:title>javabug</image:title></image:image><lastmod>2017-02-20T22:31:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2017/01/16/a-java-implementation-of-csrf-mitigation-using-double-submit-cookie-pattern/</loc><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2017/12/initmethod.png</image:loc><image:title>initmethod</image:title></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2017/12/dofiltermethod3.png</image:loc><image:title>doFilter method</image:title><image:caption>doFilter method sequence diagram</image:caption></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2017/12/csrfserver.png</image:loc><image:title>csrfserver</image:title></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2017/12/csrfclient.png</image:loc><image:title>csrfclient</image:title></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2016/12/csrf.jpg</image:loc><image:title>csrf</image:title></image:image><lastmod>2017-01-14T14:05:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2016/12/05/book-review-practical-anonymity/</loc><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2016/10/practicalaninymity.jpeg</image:loc><image:caption>practical aninymity book</image:caption></image:image><lastmod>2016-11-20T22:56:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2016/10/28/my-brucon-2016-notes-3/</loc><lastmod>2016-10-28T13:24:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2016/10/27/my-brucon-2016-notes-1/</loc><lastmod>2016-10-28T13:11:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2016/10/28/my-brucon-2016-notes-2/</loc><lastmod>2016-10-28T13:10:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2016/09/05/book-review-iron-clad-java-building-secure-web-applications/</loc><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2016/09/sessionmanagement.png</image:loc><image:title>login and session management workflow</image:title><image:caption>login and session management workflow</image:caption></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2016/09/ironcladjavabook.jpg</image:loc><image:title>ironCladJavaBook</image:title></image:image><lastmod>2016-10-26T19:37:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2016/10/03/elasticsearchhow-to-enable-scripting-on-the-embedded-server/</loc><lastmod>2016-09-20T10:30:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2016/08/29/elasticsearchhow-to-programmatically-update-settings-of-an-existing-index/</loc><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2016/08/elastic.png</image:loc><image:title>elastic</image:title></image:image><lastmod>2016-08-29T10:09:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2016/08/01/owasp-security-knowledge-framework-the-missing-tutorial/</loc><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2016/05/skf.png</image:loc><image:title>skf</image:title></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2016/05/skf-mini.png</image:loc><image:title>skf-mini</image:title></image:image><lastmod>2016-07-19T10:37:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2016/07/04/book-review-building-microservices-part-1/</loc><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2015/12/testingpyramid.jpg</image:loc><image:title>testing pyramid</image:title><image:caption>testing pyramid</image:caption></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2015/10/microservices.jpg</image:loc><image:title>microservices</image:title></image:image><lastmod>2016-07-01T09:22:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2016/04/26/apache-hadoop-technology-stack-for-dummies/</loc><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2016/04/hadoop.png</image:loc><image:title>hadoop</image:title></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2016/04/hadoop-logo.jpg</image:loc><image:title>hadoop-logo</image:title></image:image><lastmod>2016-04-26T12:05:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2016/04/03/book-review-software-security-building-security-in-part-ii-seven-touchpoints-for-software-security/</loc><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2015/10/abusecasedev.jpg</image:loc><image:title>Diagram for building abuse cases</image:title><image:caption>Diagram for building abuse cases</image:caption></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2015/10/05fig04.gif</image:loc><image:title>05fig04</image:title><image:caption>Process diagram for architectural risk analysis</image:caption></image:image><lastmod>2016-03-23T09:11:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2016/05/02/book-review-software-security-building-security-in-part-iii-software-security-grows-up/</loc><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2015/10/ssuka.jpg</image:loc><image:title>Software Security Unified Knowledge Architecture</image:title><image:caption>Software Security Unified Knowledge Architecture</image:caption></image:image><lastmod>2016-03-23T09:06:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2016/03/21/my-owasp-benelux-days-2016-owaspbnl16-notes-conference-day/</loc><lastmod>2016-03-21T21:40:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2016/03/20/my-owasp-benelux-days-2016-notes-training-day/</loc><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2016/03/atrideexample.jpg</image:loc><image:title>DFD with Stride Example</image:title><image:caption>DFD with Stride Example</image:caption></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2016/03/stride_on_dfd.jpg</image:loc><image:title>STRIDE_on_DFD</image:title></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2016/03/owasp_benelux_2016_logo.jpeg</image:loc><image:title>OWASP_BeNeLux_2016_logo</image:title></image:image><lastmod>2016-03-19T22:48:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2012/12/10/my-cissp-notes-criptography/</loc><lastmod>2016-03-03T23:52:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2016/01/18/threat-modeling-for-mere-mortals/</loc><lastmod>2016-01-07T09:48:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2015/12/30/2015-in-review/</loc><lastmod>2015-12-30T09:43:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2015/12/03/how-to-fix-elasticsearch-client-exception-a-binding-to-org-elasticsearch-shield-transport-was-already-configured-at-_unknown_-at-_unknown_/</loc><lastmod>2015-12-03T17:23:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2015/11/12/appdynamics-pro-basics/</loc><lastmod>2015-11-11T23:37:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2008/09/28/book-review-my-job-went-to-india-52-ways-to-save-your-job/</loc><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2008/09/mjwti1.jpg</image:loc><image:title>mjwti1</image:title></image:image><lastmod>2015-11-04T22:21:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2009/06/01/book-reviewrestful-web-services-chapters-1-5/</loc><lastmod>2015-11-04T22:21:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2009/08/09/book-review-foundations-of-security-part-2/</loc><lastmod>2015-11-04T22:21:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2009/10/18/foundations-of-security-part-3/</loc><lastmod>2015-11-04T22:20:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2013/05/15/book-review-hacking-the-art-of-exploitation-2-end-edition/</loc><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2013/03/hck2ed.jpg</image:loc><image:title>hck2ed</image:title></image:image><lastmod>2015-11-04T22:19:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2015/11/02/how-to-run-cisco-asdm-as-a-java-web-start-application-on-ubuntu/</loc><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2015/11/ciscoasdmok.png</image:loc><image:title>CiscoAsdmOk</image:title></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2015/11/ciscoasdmhtml.png</image:loc><image:title>ciscoAsdmHtml</image:title></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2015/11/ciscoasdmerror.png</image:loc><image:title>ciscoAsdmError</image:title></image:image><lastmod>2015-11-01T06:22:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2016/02/01/book-review-continuous-enterprise-development-in-java/</loc><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2015/09/javaarguillian.jpg</image:loc><image:title>javaArguillian</image:title></image:image><lastmod>2015-10-29T21:33:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2016/03/01/book-review-software-security-building-security-in-part-i-software-security-fundamentals/</loc><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2015/09/rmf.png</image:loc><image:title>rmf</image:title></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2015/09/09mcgraw1.gif</image:loc><image:title>09mcgraw1</image:title></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2015/09/securitysoftwarebookcover.jpeg</image:loc><image:title>SecuritySoftwareBookCover</image:title></image:image><lastmod>2015-10-29T21:30:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2015/10/09/my-brucon-2015-notes-2/</loc><lastmod>2015-10-27T21:40:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2015/10/09/my-brucon-2015-notes-1/</loc><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2015/10/brucon.jpeg</image:loc><image:title>bruCon</image:title></image:image><lastmod>2015-10-27T21:39:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2015/10/10/my-brucon-2015-notes-4/</loc><lastmod>2015-10-19T10:49:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2015/10/19/my-brucon-2015-notes-5/</loc><lastmod>2015-10-19T10:48:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2016/01/04/how-to-write-custom-encoded-shellcode/</loc><lastmod>2015-10-18T20:09:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2015/10/09/my-brucon-2015-notes-3/</loc><lastmod>2015-10-10T21:11:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2015/10/05/how-to-write-an-egg-hunter-shellcode/</loc><lastmod>2015-09-29T10:53:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2015/09/28/how-to-write-a-reverse-connection-shellcode/</loc><lastmod>2015-09-29T10:53:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2015/09/14/how-to-write-a-port-biding-shellcode/</loc><lastmod>2015-09-29T10:53:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2015/08/31/introduction-to-linux-shellcode-writing-part-1/</loc><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2015/08/screenshot-from-2015-08-19-23-33-15.png</image:loc><image:title>Screenshot from 2015-08-19 23-33-15</image:title></image:image><lastmod>2015-08-25T21:00:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2015/09/07/introduction-to-linux-shellcode-writing-part-2-2/</loc><lastmod>2015-08-22T22:48:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2015/07/28/how-to-use-an-external-javascript-file-in-a-birt-report/</loc><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2015/07/birtexpressionbuilder.png</image:loc><image:title>BIRTExpressionBuilder</image:title></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2015/07/birtreportpropertyeditor.png</image:loc><image:title>BIRTReportPropertyEditor</image:title></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2015/07/birtprojectresourcesetting.png</image:loc><image:title>BIRTProjectResourceSetting</image:title></image:image><lastmod>2015-07-28T20:09:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2015/07/22/my-ceh-cheat-sheet/</loc><lastmod>2015-07-22T17:29:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2014/08/27/lessons-learned-using-apache-curator/</loc><lastmod>2014-08-27T20:28:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2014/01/30/how-to-set-an-apache-kafka-multi-node-multi-broker-cluster/</loc><lastmod>2014-01-30T10:28:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2013/12/31/my-year-2013-in-review/</loc><lastmod>2013-12-31T09:26:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2013/12/08/how-to-install-damn-vulnerable-web-application-dvwa-v-1-0-8-under-backtrack-5-r3/</loc><lastmod>2013-12-08T19:45:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2013/04/01/generating-excel-files-with-apache-poi/</loc><lastmod>2013-04-03T18:22:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2013/07/01/introduction-a-la-plateforme-digital-forensic-framework-dff-3-liste-complete-des-modules/</loc><lastmod>2013-04-01T12:07:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2013/06/01/introduction-a-la-plateforme-digital-forensic-framework-dff-2/</loc><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2013/03/dff24.png</image:loc><image:title>dff24</image:title><image:caption>L'interface en ligne de commande de DFF</image:caption></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2013/03/dff23.png</image:loc><image:title>dff23</image:title></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2013/03/dff22.png</image:loc><image:title>dff22</image:title><image:caption>L'utilisation du module "extract"      </image:caption></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2013/03/dff211.png</image:loc><image:title>dff21</image:title><image:caption>Le résultats de l'exécution du module "find"</image:caption></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2013/03/dff20.png</image:loc><image:title>dff20</image:title><image:caption>Les paramètres du module "find"</image:caption></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2013/03/dff19.png</image:loc><image:title>dff19</image:title><image:caption>L'utilisation du module "find" sur un noeud NTFS</image:caption></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2013/03/dff18.png</image:loc><image:title>dff18</image:title><image:caption>Chargement d’un système de fichiers NTFS dans l’IHM de DFF </image:caption></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2013/03/dff17.png</image:loc><image:title>dff17</image:title><image:caption>Chargement d’un container de données dans l'IHM de DFF</image:caption></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2013/03/dff16.png</image:loc><image:title>dff16</image:title></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2013/03/dff15.png</image:loc><image:title>dff15</image:title><image:caption>L'interface graphique de DFF</image:caption></image:image><lastmod>2013-04-01T12:06:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2013/05/01/introduction-a-la-plateforme-digital-forensic-framework-dff-1/</loc><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2013/03/dff14.png</image:loc><image:title>dff14</image:title></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2013/03/dff13.png</image:loc><image:title>dff13</image:title></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2013/03/dff12.png</image:loc><image:title>dff12</image:title></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2013/03/untitled1.png</image:loc><image:title>Untitled1</image:title></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2013/03/dff10.png</image:loc><image:title>dff10</image:title></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2013/03/dff9.png</image:loc><image:title>dff9</image:title></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2013/03/dff8.png</image:loc><image:title>dff8</image:title></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2013/03/dff7.png</image:loc><image:title>dff7</image:title></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2013/03/dff6.png</image:loc><image:title>dff6</image:title></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2013/03/dff5.png</image:loc><image:title>dff5</image:title></image:image><lastmod>2013-04-01T12:05:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2013/02/21/gdb-debugger-for-the-dummies-faq/</loc><lastmod>2013-02-21T12:41:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2009/01/18/aoplib4j-version-001-is-out/</loc><lastmod>2012-12-30T22:13:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2009/05/31/aoplib4j-version-0-0-3-is-out/</loc><lastmod>2012-12-30T22:11:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2009/12/02/aoplib4j_0_0_4/</loc><lastmod>2012-12-30T22:10:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2012/12/30/2012-in-review/</loc><lastmod>2012-12-30T22:06:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2013/01/05/my-cissp-notes-bibliography/</loc><lastmod>2012-12-30T22:03:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2012/12/25/my-cissp-notes-security-operations/</loc><lastmod>2012-12-25T17:38:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2012/12/15/my-cissp-notes-physical-security/</loc><lastmod>2012-12-15T21:00:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2012/02/04/how-to-deploy-from-ant-to-tomcat-through-ssl/</loc><lastmod>2012-12-12T19:51:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2012/12/01/my-cissp-notes-legal-regulations-investigations-and-compliance/</loc><lastmod>2012-12-01T18:03:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2012/11/15/my-cissp-notes-application-development-security/</loc><lastmod>2012-11-15T18:14:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2012/11/10/my-cissp-notes-telecommunications-and-network-security-ii/</loc><lastmod>2012-11-10T20:38:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2012/11/09/genericsignatureformaterror-while-deploying-soap-web-services/</loc><lastmod>2012-11-09T09:28:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2009/09/15/a-strange-nullpointerexception-inside-beehive/</loc><lastmod>2012-11-08T22:04:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2012/11/05/my-cissp-notes-telecommunications-and-network-security-i/</loc><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2012/10/osivstcp.jpg</image:loc><image:title>osiVsTcp</image:title><image:caption>ISO/OSI vs TCP/IP</image:caption></image:image><lastmod>2012-11-05T20:38:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2012/11/01/introduction-a-linvestigation-numerique-4/</loc><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2012/10/xiraf.png</image:loc><image:title>xiraf</image:title><image:caption>L'architecture de Xiraf</image:caption></image:image><lastmod>2012-11-01T21:51:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2012/09/15/introduction-a-linvestigation-numerique-2/</loc><lastmod>2012-11-01T15:24:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2012/06/03/une-radiographie-de-la-cybercriminalite-roumaine/</loc><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2012/06/pearltree2.png</image:loc><image:title>Figure 6. L'arbre PearlTree pour notre veille</image:title><image:caption>Figure 6. L'arbre PearlTree pour notre veille</image:caption></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2012/06/cifre2.png</image:loc><image:title>Figure 9. La Roumanie dans le classement américain des états voyous</image:title><image:caption>Figure 9. La Roumanie dans le classement américain des états voyous</image:caption></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2012/06/cifre1.png</image:loc><image:title>Figure 8. Chiffres de la cybercriminalité roumaine</image:title></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2012/06/pearltree1.png</image:loc><image:title>Figure 6. L'arbre PearlTree pour notre veille</image:title><image:caption>Figure 6. L'arbre PearlTree pour notre veille</image:caption></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2012/06/pearltree.png</image:loc><image:title>Figure 6. L'arbre PearlTree pour notre veille</image:title><image:caption>Figure 6. L'arbre PearlTree pour notre veille</image:caption></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2012/06/cyberrom5.png</image:loc><image:title>cyberRom5</image:title></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2012/06/cyberrom4.png</image:loc><image:title>cyberRom4</image:title><image:caption>Figure 4. Le page de Google Alerts pour notre veille </image:caption></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2012/06/cyberrom3.png</image:loc><image:title>cyberRom3</image:title><image:caption>Figure 3. L’aperçu des pages dans le moteur Google.</image:caption></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2012/06/cyberrom21.png</image:loc><image:title>cyberRom2</image:title><image:caption>Figure 2. Recherches associées a des mots clés calculés par Touchgraph</image:caption></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2012/06/cyberrom2.png</image:loc><image:title>cyberRom2</image:title><image:caption>Figure 2. Recherches associées a des mots clés calculés par Touchgraph</image:caption></image:image><lastmod>2012-11-01T15:22:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2008/11/04/how-to-set-and-retrieve-hibernate-statistics-by-jmx/</loc><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2008/11/hibernatejmx.jpg</image:loc><image:title>hibernatejmx</image:title></image:image><lastmod>2012-11-01T15:21:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2009/09/10/book-review-aspectj-in-action-second-edition-part-1/</loc><lastmod>2012-10-29T20:36:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2012/01/22/how-to-mount-vmware-shared-folders-on-ubuntu-11/</loc><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2012/01/screen-shot-2012-01-21-at-23-54-17.png</image:loc><image:title>turnOn the shared folders</image:title></image:image><lastmod>2012-10-29T20:34:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2012/10/01/introduction-a-linvestigation-numerique-3/</loc><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2012/08/edip.png</image:loc><image:title>edip</image:title><image:caption>Les phases de la formalisation EDIP</image:caption></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2012/08/ctose2.png</image:loc><image:title>Les phases du processus du modèle CTOSE</image:title><image:caption>Les phases du processus du modèle CTOSE</image:caption></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2012/08/ctose.png</image:loc><image:title> Les éléments du projet CTOSE</image:title><image:caption> Les éléments du projet CTOSE</image:caption></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2012/08/incidentresponse1.png</image:loc><image:title>Les sept composants de la réponse a un incident</image:title><image:caption>Les sept composants de la réponse a un incident</image:caption></image:image><lastmod>2012-10-29T20:30:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2012/10/04/my-cissp-notes-information-security-governance-and-risk-management/</loc><lastmod>2012-10-29T20:29:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2012/10/07/my-cissp-notes-security-architecture-and-design/</loc><lastmod>2012-10-29T20:28:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2012/10/16/my-cissp-notes-business-continuity-and-disaster-recovery-planning/</loc><lastmod>2012-10-29T20:27:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2012/10/22/my-cissp-notes/</loc><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2012/10/cer.jpg</image:loc><image:title>cer</image:title><image:caption>Use CER to compare FAR and FRR</image:caption></image:image><lastmod>2012-10-29T20:22:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2012/09/01/introduction-a-linvestigation-numerique/</loc><lastmod>2012-09-01T20:51:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2012/07/07/waf1/</loc><lastmod>2012-07-07T10:42:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2012/07/15/waf2/</loc><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2012/07/wafin2.png</image:loc><image:title>wafIn2</image:title><image:caption>Le mode de fonctionnement embarqué</image:caption></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2012/07/wafin1.png</image:loc><image:title>wafIn1</image:title></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2012/07/wafreverse2.png</image:loc><image:title>wafReverse2</image:title><image:caption>Le mode de fonctionnement reverse-proxy</image:caption></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2012/07/wafreverse1.png</image:loc><image:title>wafReverse1</image:title></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2012/07/wafrouter2.png</image:loc><image:title>wafRouter2</image:title><image:caption>Le mode de fonctionnement router</image:caption></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2012/07/wafrouter1.png</image:loc><image:title>wafRouter1</image:title></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2012/07/wafbridge2.png</image:loc><image:title>wafBridge2</image:title><image:caption>Le mode de fonctionnement bridge</image:caption></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2012/07/wafbridge1.png</image:loc><image:title>wafBridge1</image:title></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2012/07/wafparif2.png</image:loc><image:title>wafParif2</image:title><image:caption>Le mode de fonctionnement passif</image:caption></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2012/07/wafparif1.png</image:loc><image:title>wafParif1</image:title></image:image><lastmod>2012-07-07T10:42:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2012/08/15/waf4/</loc><lastmod>2012-07-07T10:26:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2012/08/01/wa3/</loc><lastmod>2012-07-07T10:26:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2009/06/07/book-review-foundations-of-security-part-1/</loc><lastmod>2009-10-18T14:58:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2008/07/26/passing-the-scea5-i/</loc><lastmod>2009-09-20T18:06:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2009/06/04/security-certifications-for-programmers/</loc><lastmod>2009-06-04T17:26:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2008/08/03/passing-the-scea-5-iii-section-41/</loc><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2008/08/ejbcon-messagedrivenbeanlifecycle.gif</image:loc><image:title>ejbcon-messagedrivenbeanlifecycle</image:title></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2008/08/ejbcon-statefulsessionbeanlifecycle.gif</image:loc><image:title>ejbcon-statefulsessionbeanlifecycle</image:title></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2008/08/ejbcon-statelesssessionbeanlifecycle.gif</image:loc><image:title>ejbcon-statelesssessionbeanlifecycle</image:title></image:image><lastmod>2008-08-03T19:42:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com/2008/07/29/passing-the-scea-5-ii-section-81/</loc><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2008/07/untitled4.png</image:loc><image:title>SCEA_8_1_2_4</image:title></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2008/07/untitled3.png</image:loc><image:title>SCEA_8_1_3</image:title></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2008/07/untitled2.png</image:loc><image:title>SCEA_2_8_2</image:title></image:image><image:image><image:loc>https://adriancitu.com/wp-content/uploads/2008/07/untitled1.png</image:loc><image:title>SCEA_2_8_1</image:title></image:image><lastmod>2008-07-28T22:39:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://adriancitu.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2024-12-22T22:53:26+00:00</lastmod></url></urlset>
