<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns="http://www.w3.org/2005/Atom">
<title>2022</title>
<link href="http://hdl.handle.net/123456789/25745" rel="alternate"/>
<subtitle/>
<id>http://hdl.handle.net/123456789/25745</id>
<updated>2026-04-10T05:25:14Z</updated>
<dc:date>2026-04-10T05:25:14Z</dc:date>
<entry>
<title>Network routing And Switching</title>
<link href="http://hdl.handle.net/123456789/25834" rel="alternate"/>
<author>
<name>MIIT</name>
</author>
<id>http://hdl.handle.net/123456789/25834</id>
<updated>2022-09-28T05:34:52Z</updated>
<published>2022-06-21T00:00:00Z</published>
<summary type="text">Network routing And Switching
MIIT
</summary>
<dc:date>2022-06-21T00:00:00Z</dc:date>
</entry>
<entry>
<title>Wireless Network</title>
<link href="http://hdl.handle.net/123456789/25833" rel="alternate"/>
<author>
<name>MIIT</name>
</author>
<id>http://hdl.handle.net/123456789/25833</id>
<updated>2022-09-28T05:34:52Z</updated>
<published>2022-06-21T00:00:00Z</published>
<summary type="text">Wireless Network
MIIT
</summary>
<dc:date>2022-06-21T00:00:00Z</dc:date>
</entry>
<entry>
<title>IT Security Audit and Assesment</title>
<link href="http://hdl.handle.net/123456789/25832" rel="alternate"/>
<author>
<name>MIIT</name>
</author>
<id>http://hdl.handle.net/123456789/25832</id>
<updated>2022-09-28T05:34:52Z</updated>
<published>2022-06-21T00:00:00Z</published>
<summary type="text">IT Security Audit and Assesment
MIIT
</summary>
<dc:date>2022-06-21T00:00:00Z</dc:date>
</entry>
<entry>
<title>Principles of artificial Intelligence</title>
<link href="http://hdl.handle.net/123456789/25831" rel="alternate"/>
<author>
<name>MIIT</name>
</author>
<id>http://hdl.handle.net/123456789/25831</id>
<updated>2022-09-28T05:34:52Z</updated>
<published>2022-06-20T00:00:00Z</published>
<summary type="text">Principles of artificial Intelligence
MIIT
</summary>
<dc:date>2022-06-20T00:00:00Z</dc:date>
</entry>
</feed>
