<?xml version="1.0" encoding="UTF-8"?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns="http://purl.org/rss/1.0/" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel rdf:about="http://hdl.handle.net/123456789/25746">
    <title>DSpace Collection:</title>
    <link>http://hdl.handle.net/123456789/25746</link>
    <description />
    <items>
      <rdf:Seq>
        <rdf:li rdf:resource="http://hdl.handle.net/123456789/25834" />
        <rdf:li rdf:resource="http://hdl.handle.net/123456789/25833" />
        <rdf:li rdf:resource="http://hdl.handle.net/123456789/25832" />
        <rdf:li rdf:resource="http://hdl.handle.net/123456789/25831" />
      </rdf:Seq>
    </items>
    <dc:date>2026-04-10T14:06:57Z</dc:date>
  </channel>
  <item rdf:about="http://hdl.handle.net/123456789/25834">
    <title>Network routing And Switching</title>
    <link>http://hdl.handle.net/123456789/25834</link>
    <description>Title: Network routing And Switching
Authors: MIIT</description>
    <dc:date>2022-06-21T00:00:00Z</dc:date>
  </item>
  <item rdf:about="http://hdl.handle.net/123456789/25833">
    <title>Wireless Network</title>
    <link>http://hdl.handle.net/123456789/25833</link>
    <description>Title: Wireless Network
Authors: MIIT</description>
    <dc:date>2022-06-21T00:00:00Z</dc:date>
  </item>
  <item rdf:about="http://hdl.handle.net/123456789/25832">
    <title>IT Security Audit and Assesment</title>
    <link>http://hdl.handle.net/123456789/25832</link>
    <description>Title: IT Security Audit and Assesment
Authors: MIIT</description>
    <dc:date>2022-06-21T00:00:00Z</dc:date>
  </item>
  <item rdf:about="http://hdl.handle.net/123456789/25831">
    <title>Principles of artificial Intelligence</title>
    <link>http://hdl.handle.net/123456789/25831</link>
    <description>Title: Principles of artificial Intelligence
Authors: MIIT</description>
    <dc:date>2022-06-20T00:00:00Z</dc:date>
  </item>
</rdf:RDF>

