<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url>
    <loc>https://notes.adamfurman.me/</loc>
    <lastmod>2026-03-28T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/100BASE-TX-Fast-Ethernet-Standards</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/14th-Amendment-%E2%80%93-Due-Process</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/14th-Amendment-%E2%80%93-Equal-Protection-of-Law</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/18-USC-1020-Fraud-and-Related-Activity-in-Connection-with-Access-Devices</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/18-USC-1030-Fraud-and-Related-Activity-in-Connection-with-Computers</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/18-USC-%C2%A7-2251-Sexual-Exploitation-of-Children</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/1st-Amendment-%E2%80%93-Free-Speech</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/3-D-Printer-Imaging-Process--and--Maintenance</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/4-Main-Functions-of-a-Computer-System</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/4-Roles-of-a-Computer-in-a-Crime</loc>
    <lastmod>2026-03-11T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/4-Ways-to-Bring-Value-at-Work</loc>
    <lastmod>2026-03-30T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/4th-Amendment-%E2%80%93-Protection-from-Illegal-Search-and-Seizure</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/802.11a---5-GHz-Frequency-Band</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/802.11b-and-g---2.4-GHz-Frequency-Band</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/802.11n-(Wi-Fi-4)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/A-Context-for-Natural-Law</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/A-and-M-Records,-Inc.-v.-Napster-(1999-2001)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/AI-and-Authorship</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/AI-and-Defamation</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/AI-and-Infringement</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/ARP-Spoofing-and-ARP-Poisoning</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Abnormal-Activity</loc>
    <lastmod>2026-03-16T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/AbuseIPDB</loc>
    <lastmod>2026-03-12T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Acceptable-Use-Policy-(AUP)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Access-Control-Lists-(ACL)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Access-Control</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Account-Attributes-and-Access-Policies</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Account-Restrictions</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Action-Plan</loc>
    <lastmod>2026-03-23T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Active-Defense</loc>
    <lastmod>2026-03-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Active-and-Passive-Reconnaissance</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Adapter-Cables</loc>
    <lastmod>2026-02-06T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Address-Resolution-Protocol-(ARP)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Address-Space-Layout-Randomization-(ASLR)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Administrative-Controls</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Admissibility-of-Evidence</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Advanced-Boot-Options</loc>
    <lastmod>2026-03-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Advanced-Data-Protection</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Advanced-Encryption-Standard-(AES)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Advanced-Persistent-Threat-(APT)</loc>
    <lastmod>2026-02-27T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/After-JFK,-Robert-Kennedy,-Nixon</loc>
    <lastmod>2026-04-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Agile-Methodology</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Air-Gapped-Isolation</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Alarm-Systems-and-Sensors</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Alternative-Modeling-Conventions</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Amplification-Attack</loc>
    <lastmod>2026-03-16T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Analyze-Indicators-of-Malicious-Activity</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Analyze-Potentially-Malicious-Activity</loc>
    <lastmod>2026-03-16T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Angry-IP-Scanner</loc>
    <lastmod>2026-03-18T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Antenna-Types</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Anti-Malware-Applications</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Anti-cybersquatting-Consumer-Protection-Act-(ACPA)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Anti-harassment-Policies</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Apache-License</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/App-Distribution-Method</loc>
    <lastmod>2026-03-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Application-Attack-Mitigation-Checklist</loc>
    <lastmod>2026-03-21T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Application-Attacks</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Application-Debugger</loc>
    <lastmod>2026-03-19T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Application-Logs</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Application-Programming-Interface-(API)</loc>
    <lastmod>2026-03-04T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Application-Protections</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Application-Security</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Application-Virtualization</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Application-Vulnerabilities</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Apply-Tools-to-Identify-Malicious-Activity</loc>
    <lastmod>2026-03-12T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Applying-Network-Security-Features</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Applying-Normal-Form</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Appropriation-of-Likeness-or-Identity</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Arachni</loc>
    <lastmod>2026-03-19T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Architecture-and-Infrastructure-Concepts</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Archiving-Data</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Assess-Endpoint-Security-Capabilities</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Assessing-Security</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Asset-Management</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Asset-Protection-Concepts</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Asymmetric-Encryption</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Attack-Surface</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Attenuation-and-Interference-Issues</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Attestation-and-Assessments</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Attribute-Based-Access-Control-(ABAC)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Attributes-of-Threat-Actors</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Auditing-and-Accountability</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Auditing</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Authentication-Attack</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Authentication-Design</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Authentication-Methods</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Authentication-Tokens</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Authentication,-Authorization,--and--Accounting-(AAA)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Authentication</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Authority-to-Collect-Evidence</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Authorization-Attack</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Authorization-and-Access-Controls</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Authorization</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Authors-Guild-v.-HathiTrust-(2011-2013)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Automatic-Private-IP-Addressing-(APIPA)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Automating-Tasks-with-Python</loc>
    <lastmod>2026-02-13T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Automation-and-Orchestration-Implementation</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Automation-and-Scripting</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Availability-Monitoring</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/B.S.-in-Business-Administration---Marketing</loc>
    <lastmod>2026-04-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/B.S.-in-Cybersecurity--and--Information-Assurance</loc>
    <lastmod>2026-04-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/BIOS-and-UEFI</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Backdoors-and-Remote-Access-Trojans</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Backup-Media-Requirements</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Backup-Methods</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Baiting</loc>
    <lastmod>2026-03-17T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Band-Steering</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Bandwidth-Management</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Baseband-Operating-System</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Bash-Shell-Variables-and-Loops</loc>
    <lastmod>2026-03-20T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Basics-of-Scripting</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Battery-Replacement</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Beaconing-Intrusion-IoCs</loc>
    <lastmod>2026-03-16T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Becoming-Disillusioned-and-Doing-Something-About-It</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Benchmarks-and-Secure-Configurations</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Benefits-to-Federally-Registering-a-Trademark</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Berkeley-Source-Definition-(BSD)-Licenses</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Best-Practice-Methodology</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Binary-Operations</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Binary-Relationships</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Binary-and-Hexadecimal</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Biometric-Authentication</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Biometrics</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Birthday-Attack</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Bit-Flipping-Attack</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Block-Cipher-Design</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Block-Cipher</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Blockchain</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Bloomberg-Market-Concepts-(BMC)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Blowfish-and-Twofish</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Bluetooth</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Boot-Passwords-and-Secure-Boot</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Boot-and-Device-Options</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Border-Gateway-Protocol-(BGP)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Boyce-Codd-Normal-Form</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Breach-Notification-Laws</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Bridge</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Bring-Your-Own-Device-Issues</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Broken-Access-Control</loc>
    <lastmod>2026-03-21T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Broken-Authentication</loc>
    <lastmod>2026-03-21T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Browsewrap-Contracts</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Brute-Force-Attack</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Buffer-Overflow</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Bug-Bounty</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Building-Power-Issues-and-Mitigations</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Building-a-Meaningful-Thesis</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Burp-Suite</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Bus-Topology</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Bush-II-Elections--and--the-Middle-East</loc>
    <lastmod>2026-04-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Business-Continuity-Plan-(BCP)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Business-Continuity-and-Disaster-Recovery</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Business-Email-Compromise</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Business-Impact-Analysis-(BIA)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Business-Partnership-Agreement-(BPA)</loc>
    <lastmod>2026-03-10T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/C841---Legal-Issues-in-Information-Security</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/C845---Information-Systems-Security-(SSCP)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/CAST-Algorithms</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/CIA-70s-and-80s,-Iran-Contra,-2016-Primaries</loc>
    <lastmod>2026-04-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/CIA-Triad</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/CIANA+PS</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/CPU-Architecture</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/CPU-Features</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/CPU-Socket-Types</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/CPU-Types-and-Motherboard-Compatibility</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/CVSS-Metrics</loc>
    <lastmod>2026-03-06T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Cable-Category-Issues</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Cable-Issues</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Cable-Map</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Cable-Modems</loc>
    <lastmod>2026-02-06T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Cable-Troubleshooting-Strategies</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/California-Consumer-Privacy-Act-(CCPA)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/California-Database-Security-Breach-Notification-Act-(2003)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/California's-Senate-Bill-1386-(SB-1386)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Capabilities</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Capability-Maturity-Model-Integration-(CMMI)</loc>
    <lastmod>2026-03-04T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Capacity-Planning</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Capacity-to-Contract</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Capture-Cards</loc>
    <lastmod>2026-02-06T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Cardholder-Data</loc>
    <lastmod>2026-03-03T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Cardinality</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Careering</loc>
    <lastmod>2026-03-30T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Cat-Standards</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Cellular-Data-Networking</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Cellular-Radio-Internet-Connections</loc>
    <lastmod>2026-02-06T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Cellular-Technologies</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Census-Confidentiality-(1952)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Center-for-Internet-Security-(CIS)-Benchmarks</loc>
    <lastmod>2026-03-04T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Centralized-and-Decentralized-Computing</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Certificate-Authority-(CA)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Certificate-Manager-console-(certmgr.msc)</loc>
    <lastmod>2026-03-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Certificate-Revocation</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Certificate-Signing-Request-(CSR)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Chain-of-Custody</loc>
    <lastmod>2026-03-11T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Challenge-Handshake-Authentication-Protocol-(CHAP)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Change-Management-Programs</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Change-Management</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Channel-Overlap-Issues</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Characteristics-of-Valuable-Data</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Chicken-Parmesan-Recipe</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Child-Protection-and-Sexual-Predator-Punishment-Act-of-1998</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Children's-Internet-Protection-Act-(CIPA)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Children's-Online-Privacy-Protection-Act-(COPPA)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Choice-Point-Data-Breach</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Civil-Procedure</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Classful-Addressing</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Classifying-Penetration-Tests</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Classless-Inter-Domain-Routing-(CIDR)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Clickjacking</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Clickstream</loc>
    <lastmod>2026-03-16T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Clickwrap-Contracts</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Client-side-Virtualization</loc>
    <lastmod>2026-03-03T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Client-to-Site-VPNs</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Clientless-VPNs</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Cloud-Access-Security-Broker-(CASB)</loc>
    <lastmod>2026-03-03T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Cloud-Architecture-Features</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Cloud-Characteristics</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Cloud-Computing-Impact-on-Contracts</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Cloud-Computing</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Cloud-Connectivity-Options</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Cloud-Deployment-Models</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Cloud-File-Storage</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Cloud-Firewall-Security</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Cloud-Gateway</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Cloud-Instances</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Cloud-Responsibility-Matrix</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Cloud-Responsiveness</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Cloud-Security-Alliance-(CSA)-STAR-Certification</loc>
    <lastmod>2026-03-04T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Cloud-Security-Considerations</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Cloud-Service-Models</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Cloud-Storage</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Cloud-Based-Application-Attacks</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Coaxial--and--Twinaxial-Cabling</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Code-Law</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Code-Signing</loc>
    <lastmod>2026-03-21T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Collecting,-Seizing,-and-Protecting-Evidence</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Collision-Attack</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Command-Injection-Attack</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Command-Prompt-(cmd.exe)</loc>
    <lastmod>2026-03-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Common-IPv6-Address-Prefixes</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Common-Incident-Response-Components</loc>
    <lastmod>2026-03-10T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Common-Law</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Common-Network-Performance-Issues</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Common-TCP-and-UDP-Ports</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Common-Vulnerabilities-and-Exposures-(CVE)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Common-Vulnerability-Scoring-System-(CVSS)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Communicate-Vulnerability-Information</loc>
    <lastmod>2026-03-09T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Communication-Assistance-for-Law-Enforcement-Act-(CALEA)-of-1994</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Communications-Decency-Act-of-1996</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/CompTIA-Incident-Response-Lifecycle</loc>
    <lastmod>2026-03-13T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Compare-Threats-Types</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Comparing-Local-Networking-Hardware</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Comparing-Remote-Access-Methods</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Complex-Queries</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Compliance-Monitoring</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Compliance</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Computer-Forensic-Examiner</loc>
    <lastmod>2026-03-11T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Computer-Forensics-and-Investigations</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Computer-Forensics</loc>
    <lastmod>2026-03-11T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Computer-Fraud-and-Abuse-Act-(CFAA)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Computer-Hardware-and-History</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Computer-Hardware</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Computer-Networks</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Computer-Software</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Computer-System</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Conduct-Policies</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Configuration-Files</loc>
    <lastmod>2026-03-03T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Configuration-Management</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Configuration-Monitoring</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Configuring-Interfaces-and-Switches</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Configuring-Network-Addressing-and-Internet-Connections</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Configuring-Network-Addressing</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Configuring-Routing-and-Advanced-Switching</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Configuring-Windows</loc>
    <lastmod>2026-03-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Configuring-Wireless-Networks</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Confronting-21st-Century-Problems</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Connectivity-Issues</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Consideration</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Console-Connections</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Constitution-as-a-Source-of-Privacy-Law</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Constitutional-Law</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Container-Virtualization</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Content-Delivery-Network-(CDN)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Content-Filtering</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Continuity-of-Operations-Plan-(COOP)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Continuous-Security-Monitoring</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Contract-Form</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Contract-Legality</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Contract-of-Adhesion</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Control-Objectives-for-Information-and-Related-Technology-(COBIT)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Control-Panel</loc>
    <lastmod>2026-03-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Controlling-the-Assault-of-Non-Solicited-Pornography-and-Marketing-(CAN-SPAM)-Act</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Cookie-Poisoning</loc>
    <lastmod>2026-03-21T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Cookies</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Copper-Cabling-Connectors</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Copper-Cabling-Installation-Considerations</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Copper-Cabling-Installation-Tools</loc>
    <lastmod>2026-02-06T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Copper-Cabling-Test-Tools</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Copyright-Infringement-and-Remedies</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Copyright-Ownership-and-Protections</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Copyright-Registration</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Copyright-Requirements</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Copyright</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/County-Recorder</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Cousin-Domains</loc>
    <lastmod>2026-03-31T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Covert--and--Lesser-Known-Actions-in-and-after-WWII</loc>
    <lastmod>2026-04-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Creating-Scripts</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Creating-Users-and-Groups-in-Linux</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Credential-Replay-Attacks</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Criminal-Law-and-Tort-Law-Issues-in-Cyberspace</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Criminal-Procedure</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Cross-Site-Request-Forgery-(CSRF)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Cross-Site-Scripting-(XSS)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Crosstalk-Issues</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/CrowdStrike's-Hybrid-Analysis</loc>
    <lastmod>2026-03-13T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Cryptanalysis</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Crypto-Malware</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Cryptocurrency</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Cryptographic-Attacks</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Cryptographic-Functions</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Cryptographic-Hash</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Cryptographic-Key</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Cryptographic-Module</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Cryptographic-Primitive</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Cryptographic-Protocol</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Cryptographic-System</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Cryptographic-Vulnerabilities</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Cryptography-Concepts</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Cryptography-Frameworks-and-Security-Guidelines</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Cryptography-Primitives</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Cryptography-Principles</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Cryptography-Systems</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Cryptography</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Cryptoprocessors</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Cuba,-America,-and-Russia-1945-to-1963</loc>
    <lastmod>2026-04-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Cuckoo-Sandbox</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Currencies</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Current-Events-and-Players-in-Upcoming-and-Current-Crises</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Cyber-Kill-Chain</loc>
    <lastmod>2026-03-13T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Cybersecurity-Investigation-Types</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/D281---Linux-Foundations</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/D316---IT-Foundations-(CompTIA-A+-Core-1)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/D317---IT-Applications-(CompTIA-A+-Core-2)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/D320---Managing-Cloud-Security-(CCSP)</loc>
    <lastmod>2026-04-01T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/D322---Introduction-to-IT</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/D325---Networks-(Network+)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/D329---Network-and-Security-Applications-(Security+)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/D336---Business-of-IT-Applications-(ITIL)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/D340---Cyber-Defense-and-Countermeasures-(CySA+)</loc>
    <lastmod>2026-02-27T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/D426---Data-Management-Foundations</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/D430---Fundamentals-of-Information-Security</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/D430-study-supplementals</loc>
    <lastmod>2026-03-28T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/D431---Digital-Forensics-in-Cybersecurity</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/D522---Python-for-IT-Automation</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/D830---Introduction-to-Cryptography</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/D832---Managing-Information-Security</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/DHCP-Issues</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/DHCP-Options</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/DHCP-Process</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/DHCP-Relay-and-IP-Helper</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/DHCP-Reservations-and-Exclusions</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/DHCP-Server-Configuration</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/DHCP-Snooping</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/DHCPv6-Server-Configuration</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/DISA-Security-Technical-Implementation-Guides-(STIGs)</loc>
    <lastmod>2026-03-05T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/DMCA-Title-I</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/DMCA-Title-II---Online-Copyright-Infringement-Liability-Limitation-Act</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/DMCA-Title-III---Computer-Maintenance-Competition-Assurance-Act</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/DMCA-Unintended-Consequences</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/DNS-Attacks</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/DNS-Client-Issues</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/DNS-Filtering</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/DNS-Hierarchy</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/DNS-Name-Resolution</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/DNS-Queries</loc>
    <lastmod>2026-02-06T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/DNS-Resource-Records</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/DNS-Security</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/DNS-Server-Configuration</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/DVI-and-VGA-Video-Cables</loc>
    <lastmod>2026-02-06T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Damage-Potential,-Reproducibility,-Exploitability,-Affected-Users,-and-Discoverability-(DREAD)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Data-Backup-and-Recovery</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Data-Backups</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Data-Classification</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Data-Destruction-Methods</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Data-Encapsulation-and-Decapsulation</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Data-Encryption-Standard-(DES)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Data-Exfiltration</loc>
    <lastmod>2026-03-17T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Data-Integrity-and-Preservation</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Data-Loss-Prevention-(DLP)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Data-Masking</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Data-Minimization</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Data-Obfuscation</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Data-Poisoning</loc>
    <lastmod>2026-03-21T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Data-Protection</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Data-Pyramid</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Data-Retention-and-Destruction-Policies</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Data-Security-Roles</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Data-Sovereignty-and-Geographical-Considerations</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Data-Types</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Database-Design</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Database-Discovery-Phase</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Database-Encryption</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Database-Indexes</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Database-Management</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Database-Models</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Database-Services</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Database-Systems</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Database-Vulnerabilities</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Datacenter-Network-Design</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Deception-Technologies</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Deep-and-Dark-Web</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Defamation</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Default-Gateway</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Default-Route-and-Routing-Loop-Issues</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Default-VLAN-and-Native-VLAN</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Defense-in-Depth</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Defragment-and-Optimize-Drives-(dfrgui.exe)</loc>
    <lastmod>2026-03-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Demilitarized-Zone-(DMZ)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Demonstrate-Incident-Response-Communication</loc>
    <lastmod>2026-03-12T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Denial-of-Service-(DoS)-Attack</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Deperimeterization</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Design-Patents</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Designing-Secure-Networks</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Desktop-Management-and-Remote-Monitoring-Tools</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Desktop-Virtualization</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Device-Manager-(devmgmt.msc)</loc>
    <lastmod>2026-03-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Device-and-Service-Hardening</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Diamond-Model-of-Intrusion-Analysis</loc>
    <lastmod>2026-03-13T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Diffie-Hellman</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Digital-Certificate</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Digital-Certificates-and-PKI</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Digital-Forensic-Reporting</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Digital-Forensics-and-Incident-Response-(DFIR)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Digital-Forensics-in-Cybersecurity-Labs</loc>
    <lastmod>2026-03-27T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Digital-Forensics</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Digital-Millennium-Copyright-Act-(DCMA)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Digital-Signature-Algorithm-(DSA)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Digital-Signature</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Digital-Subscriber-Line-Modems</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Directory-Services</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Directory-Traversal</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Directory-and-Authentication-Servers</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Disaster-Recovery-Metrics</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Disaster-Recovery-Plan-(DRP)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Disaster-Recovery-Sites</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Disaster-Recovery-Test-Types</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Discovery-Protocols</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Discretionary-Access-Control-(DAC)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Disinformation-Campaign</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Disk-Clean-up-(cleanmgr.exe)</loc>
    <lastmod>2026-03-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Disk-Configuration</loc>
    <lastmod>2026-03-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Disk-Management-(diskmgmt.msc)</loc>
    <lastmod>2026-03-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Disk-Management-Commands</loc>
    <lastmod>2026-03-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Disk-Upgrades-and-Replacements</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Disk-and-File-Encryption</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Disk-and-File-System-Use</loc>
    <lastmod>2026-03-17T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Disposal-and-Recycling-Outsourcing-Concepts</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Distraction-through-Media-and-Politics</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Distributed-DoS-(DDoS)-Attack</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Distributed-Reflection-DoS-(DRDoS)</loc>
    <lastmod>2026-03-16T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Diversity-and-Defense-in-Depth</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Domain-1---Security-Concepts-and-Practices</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Domain-2---Access-Controls</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Domain-3---Risk-Identification,-Monitoring,-and-Analysis</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Domain-4---Incident-Response-and-Recovery</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Domain-5---Cryptography</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Domain-6---Network-and-Communications-Security</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Domain-7---Systems-and-Application-Security</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Domain-Name-System-(DNS)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Domain-Based-Message-Authentication,-Reporting,-and-Conformance-(DMARC)</loc>
    <lastmod>2026-03-31T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/DomainKeys-Identified-Mail-(DKIM)</loc>
    <lastmod>2026-03-31T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Downgrade-Attack</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Driver's-Privacy-Protection-Act-(1994)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Due-Process</loc>
    <lastmod>2026-03-11T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Dumpster-Diving</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Duplicate-IP-and-MAC-Address-Issues</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Dynamic-Host-Configuration-Protocol-(DHCP)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Dynamic-Routing-Protocols</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/E-Government-Act-(2002)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/ECC-RAM</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Economic-Indicators</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Edge-Routers</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/ElGamal</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Election-Predictions</loc>
    <lastmod>2026-04-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Electrical-Safety-and-ESD</loc>
    <lastmod>2026-02-06T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Electrical-Safety</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Electromagnetic-Emission-Attack</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Electronic-Communications-Privacy-Act-(ECPA)-of-1986</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Electronic-Signatures-in-Global-and-National-Commerce-(E-SIGN)-Act</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Electrostatic-Discharge-Mitigation</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Elites,-The-Creation-of-the-CIA,-the-Mafia-and-Cuba</loc>
    <lastmod>2026-04-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Elliptic-Curve-Cryptography-(ECC)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Email-Configuration-Options</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Email-Forensics</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Email-Gateway</loc>
    <lastmod>2026-03-31T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Email-Malicious-Content-Analysis</loc>
    <lastmod>2026-03-13T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Email-Message-Internet-Header-Analysis</loc>
    <lastmod>2026-03-13T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Email-Security</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Embedded-System</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Encryption-Supporting-Confidentiality</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Encryption</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/End-User-License-Agreement-(EULA)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Endpoint-Configuration</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Endpoint-Detection-and-Response-(EDR)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Endpoint-Hardening-Techniques</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Endpoint-Logs</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Endpoint-Protection</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Enhance-Application-Security-Capabilities</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Enhanced-Interior-Gateway-Routing-Protocol-(EIGRP)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Entities,-Relationships,-and-Attributes</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Entitlement</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Envelope-Encryption</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Equities</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Essential-Shell-Scripting-Commands</loc>
    <lastmod>2026-03-20T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Ethernet-Frame-Format</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Ethernet-Standards</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Ethernet-Switch-Types</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Ethical-Principles-for-Forensic-Examination</loc>
    <lastmod>2026-03-11T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Ethics</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Evaluate-Network-Security-Capabilities</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Evaluation-Scope</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Event-Prioritization-and-Alerting</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Event-Viewer-(eventvwr.msc)</loc>
    <lastmod>2026-03-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Executable-Space-Protection</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Executive-Branch</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Expansion-Cards</loc>
    <lastmod>2026-02-06T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Explain-Cryptographic-Solutions</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Explain-Important-System-and-Network-Architecture-Concepts</loc>
    <lastmod>2026-03-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Explain-Incident-Response-Activities</loc>
    <lastmod>2026-03-10T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Explain-Incident-Response-and-Monitoring-Concepts</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Explain-Resiliency-and-Site-Security-Concepts</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Explain-Risk-Management-Processes</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Explain-Vulnerability-Management</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Explaining-Application-Services</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Explaining-Network-Security-Concepts</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Explaining-Network-Topologies</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Exploit-Frameworks</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Explore-Scripting-Tools-and-Analysis-Concepts</loc>
    <lastmod>2026-03-20T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Explore-Threat-Intelligence-and-Threat-Hunting-Concepts</loc>
    <lastmod>2026-02-27T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Extensible-Authentication-Protocol-(EAP)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Extensible-Markup-Language-(XML)-Injection</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Extensible-Markup-Language-(XML)</loc>
    <lastmod>2026-03-20T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/FTP-Over-SSL-(FTPS-and-FTPES)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Family-Educational-Rights-and-Privacy-Act-(FERPA)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Fan-Cooling-Systems</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Fault-Tolerance-and-Redundancy</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Federal-Agencies</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Federal-Government-Information-Security-and-Privacy-Regulations</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Federal-Government</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Federal-Information-Processing-Standards-(FIPS)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Federal-Information-Security-Management-Act-(FISMA)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Federal-Law-as-a-Source-of-Privacy-Law</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Federal-Risk-and-Authorization-Management-Program-(FedRAMP)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Federation</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Feistel-Function</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Fiber-Distribution-Panels</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Fiber-Ethernet-Standards</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Fiber-Optic-Cable-Components</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Fiber-Optic-Cable-Testing-Tools</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Fiber-Optic-Connector-Types</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Fiber-Optic-Installation</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Fiber-to-the-Curb-(FTTC)--and--Fiber-to-the-Premises-(FTTP)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Fibre-Channel-(FC)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/File-Inclusion</loc>
    <lastmod>2026-03-21T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/File-Management-Commands</loc>
    <lastmod>2026-03-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/File-Permissions</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/File-System-Types</loc>
    <lastmod>2026-03-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/File-Transfer-Protocol-(FTP)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/File-and-Print-Servers</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Fileless-Malware</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Finishing-Issues</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Fire-Extinguisher-Classes</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Firewall-Selection-and-Placement</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Firewall</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Firmware-Vulnerabilities</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/First,-Second,-and-Third-Normal-Form</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/First-Hop-Redundancy-Protocols-(FHRP)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Fixed-Income</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Fixed-Wireless-Internet-Access</loc>
    <lastmod>2026-02-06T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Flow-Data</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Footprinting-and-Fingerprinting-Attacks</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Foreign-Intelligence-Surveillance-Act-(FISA)-of-1978</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Forensic-Acquisition</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Forensic-Frameworks</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Forensic-Methods-and-Labs</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Forensic-Preservation</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Forgery-Attack</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Form-of-Offer</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Fragmentation</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Framework</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Free-Software-Foundation-(FSF)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Freedom-of-Information-Act-(1966)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Frequency-Analysis-Attack</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/From-WWI-to-WWII</loc>
    <lastmod>2026-04-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Functions-of-a-SOHO-Router</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Fundamentals-of-Cryptography</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Fundamentals-of-Information-Security</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Fuzzers</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/GAIT</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/GNU-Debugger</loc>
    <lastmod>2026-03-19T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/GNU's-Not-Unix-(GNU)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/GPS-Tagging</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Gap-Analysis</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Gateways-and-Locks</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/General-Data-Protection-Regulation-(GDPR)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/General-Principles-for-Privacy-Protection-in-Information-Systems</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/General-Process-for-Forensic-Investigation</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/General-Public-License-(GPL)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Generally-Accepted-Privacy-Principles-(GAPP)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Generic-Routing-Encapsulation-(GRE)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Geofence-Warrants</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Geofencing</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Gigabit-Ethernet-Standards</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Governance-and-Accountability</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Gramm%E2%80%93Leach%E2%80%93Bliley-Act-(GLBA)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Group-Policy-Editor-(gpedit.msc)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Group-Policy-Object-(GPO)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Guest-Networks-and-Captive-Portal</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Guidelines-for-Asset-Management-and-Resiliency-Controls</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Guidelines-for-Implementing-Identity-and-Access-Management</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Guidelines-for-Implementing-Secure-Enterprise-Network-Architecture</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Guidelines-for-Supporting-Print-Devices</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/HDMI-and-Display-Port-Video-Cables</loc>
    <lastmod>2026-02-06T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Hard-Authentication-Tokens</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Hard-Disk-Drives-(HDD)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Hardening-Specialized-Devices</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Hardware-Failure-Issues</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Hardware-Security-Module-(HSM)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Hardware-Tokens</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Hashcat</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Hashed-Message-Authentication-Codes-(HMAC)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Health-Information-Technology-for-Economic-and-Clinical-Health-Act-(HITECH)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Health-Insurance-Portability-and-Accountability-Act-(HIPAA)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Heap-Overflow</loc>
    <lastmod>2026-03-21T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Heartbleed</loc>
    <lastmod>2026-03-21T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/High-Availability-Clusters</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/High-Availability</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/History-of-Computers</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/History-of-Cryptography</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/History-of-Patent-Law</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Homomorphic-Encryption</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Honeypots</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Host-Address-Ranges</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Host-Address-and-Canonical-Name-(CNAME)-Records</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Host-Names-and-Domain-Names</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Host-Operating-System-Logs</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/How-Do-Security,-Privacy,-and-Compliance-Fit-Together</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/How-Should-an-Invention-or-Process-Be-Protected</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/How-State-Breach-Notification-Laws-Differ</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/How-is-Privacy-Different-from-Information-Security</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/How-to-Read-Philosophy</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/How-to-Reconcile-Teachings-in-Our-Constitution,-Philosophy--and--Natural-Law,-and-Spirituality</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Hub-and-Spoke-Topology</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Hubs</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Human-Element-Security</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Human-Intelligence</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Hybrid-Network-Topology</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/HyperText-Transfer-Protocol-(HTTP)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/HyperText-Transfer-Protocol-Secure-(HTTPS)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Hypervisor</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/IEEE-802.11-Wireless-Standards</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/IEEE-802.1X</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/IP-Address-Management-(IPAM)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/IP-Broadcast-Addresses</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/IP-Configuration-Issues</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/IP-Forwarding-Issues</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/IP-Interface-Configuration-in-Linux</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/IP-Interface-Configuration-in-Windows</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/IPv4-Address-Scheme-Design</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/IPv4-Address</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/IPv4-Forwarding</loc>
    <lastmod>2026-02-06T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/IPv4-Host-Address-Configuration</loc>
    <lastmod>2026-02-06T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/IPv4-and-IPv6-Transition-Mechanisms</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/IPv4-vs-IPv6</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/IPv6-Address-Format</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/IPv6-Address</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/IPv6-Interface-Autoconfiguration-and-Testing</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/IPv6-Link-Local-Addressing</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/IPv6-Multicast-and-Anycast-Addressing</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/IPv6-Network-Prefixes</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/IPv6-Unicast-Addressing</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/IR-Data-Sources,-Dashboards,-Reports</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/ISC2-Code-of-Ethics</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/ISO-31000-Risk-Management</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/ISO-IEC-27001</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/ISO-IEC-27002</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/IT-Service-Management</loc>
    <lastmod>2026-04-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/ITIL-4-Dimensions-Model</loc>
    <lastmod>2026-04-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/ITIL-Configuration-Management-Model</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/ITIL-Management-Practices</loc>
    <lastmod>2026-04-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/ITIL-Service-Value-System-(SVS)</loc>
    <lastmod>2026-04-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Identification-and-Authentication</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Identification</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Identifying-Malicious-Activity-Example</loc>
    <lastmod>2026-03-20T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Identifying-OS-Types-and-Features</loc>
    <lastmod>2026-03-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Identity-Proofing</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Identity-Theft-and-Assumption-Deterrence-Act</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Identity-and-Access-Management-(IAM)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Immunity-Debugger</loc>
    <lastmod>2026-03-19T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Impact-Printer-Maintenance</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Imperialism-and-Labor-Unrest</loc>
    <lastmod>2026-04-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Impersonation</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Implement-Identity-and-Access-Management</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Implement-Vulnerability-Scanning-Methods</loc>
    <lastmod>2026-03-04T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Implementing-Attributes</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Implementing-Entities</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Implementing-Network-Services</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Implementing-Operational-Procedures</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Implementing-Relationships</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Implicit-Deny</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Import-and-Export-Control-Laws</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Incident-Detection-and-Analysis</loc>
    <lastmod>2026-03-10T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Incident-Impact-Analysis</loc>
    <lastmod>2026-03-11T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Incident-Reporting-Requirements</loc>
    <lastmod>2026-03-12T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Incident-Response-(IR)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Incident-Response-Data-Handling</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Incident-Response-and-SOC-Metrics</loc>
    <lastmod>2026-03-12T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Indicators-of-Compromise-(IoCs)</loc>
    <lastmod>2026-03-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Industrial-Control-Systems-(ICS)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Information-Lifecycle</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Information-Security-Business-Units</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Information-Security-Competencies</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Information-Security-Governance</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Information-Security-Legal-Environment</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Information-Security-Overview</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Information-Security-Terms-in-Contracts</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Information-Security</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Information-Sharing-and-Analysis-Centers-(ISACs)</loc>
    <lastmod>2026-03-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Information-Sharing-Organizations</loc>
    <lastmod>2026-03-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Infrastructure-Network-Type</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Infrastructure-as-Code-(IaC)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Infringement-and-Remedies</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Injection-Attack</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Inkjet-Printer-Imaging-Process</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Inkjet-Printer-Maintenance</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Input-Validation-Attack</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Input-Validation</loc>
    <lastmod>2026-03-21T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Insecure-Object-Reference</loc>
    <lastmod>2026-03-21T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Installation-Types</loc>
    <lastmod>2026-03-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Installing-Motherboards-and-Connectors</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Installing-System-Devices</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Insufficient-Wireless-Coverage-Issues</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Integer-Overflow</loc>
    <lastmod>2026-03-21T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Integrated-Drive-Electronics-(IDE)-Interface</loc>
    <lastmod>2026-02-06T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Intellectual-Property-(IP)</loc>
    <lastmod>2026-03-03T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Intellectual-Property-Law</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Intentional-Infliction-of-Emotional-Distress-(IIED)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Intentional-Torts</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Interface-Statistics</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Interference-Issues</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Internal-vs-External-DNS</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/International-Data-Encryption-Algorithm-(IDEA)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/International-Organization-for-Standardization-(ISO)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/International-Patents</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Internet-Access-Types</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Internet-Architecture</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Internet-Assigned-Numbers-Authority-(IANA)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Internet-Connection-Types-and-Modems</loc>
    <lastmod>2026-02-06T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Internet-Corporation-for-Assigned-Names-and-Numbers-(ICANN)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Internet-Engineering-Task-Force-(IETF)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Internet-Key-Exchange-(IKE)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Internet-Message-Access-Protocol-(IMAP)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Internet-Protocol-(IP)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Internet-Protocol-Security-(IPSec)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Internet-Service-Provider-(ISP)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Internet-of-Things-(IoT)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Interpreting-Suspicious-Commands</loc>
    <lastmod>2026-03-16T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Intro---Trajectory-of-Justice</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Introduction-to-Databases</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Introduction-to-Forensics</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Introduction-to-Information-Technology</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Introduction-to-The-Law-of-Software</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Intrusion-Detection-Systems-(IDS)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Intrusion-Into-Seclusion</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Intrusion-Prevention-System-(IPS)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/IoT-Network-Security</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/IoT-Networks</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Irregular-Communication-Patterns</loc>
    <lastmod>2026-03-16T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Ishikawa-Diagram</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/JFK,-Cuba,-and-the-CIA</loc>
    <lastmod>2026-04-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Jailbreaking</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/JavaScript-Object-Notation-(JSON)</loc>
    <lastmod>2026-03-20T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Jimmy-Carter,-Bush--and--Oil,-Elections-and-Climate-Change</loc>
    <lastmod>2026-04-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Joe-Sandbox</loc>
    <lastmod>2026-03-13T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/John-The-Ripper</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Judicial-Branch</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Jump-Box</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Jurisdiction</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Kerberos</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Kerckhoff's-Principles</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Key-Escrow</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Key-Management</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Key-Performance-Indicators-(KPIs)</loc>
    <lastmod>2026-03-09T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Keyboard-and-Security-Component-Replacement</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Keyword-Ciphers</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/LAW-6568---Internet-Law</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/LAW-7688---Protocols</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/LAW-7688---The-Law-of-Software</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/LDAP-Injection</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/LDAP-Secure-(LDAPS)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/LLMs-and-Legal-Interpretation</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Lab---Analyzing-Cloud-Vulnerabilities</loc>
    <lastmod>2026-03-19T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Lab---Analyzing-Potentially-Malicious-Files</loc>
    <lastmod>2026-03-18T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Lab---Detecting-and-Exploiting-Security-Misconfiguration</loc>
    <lastmod>2026-03-22T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Lab---Exploiting-Weak-Cryptography</loc>
    <lastmod>2026-03-19T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Lab---Performing-IoC-Detection-and-Analysis</loc>
    <lastmod>2026-03-18T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Lab---Performing-Web-Vulnerability-Scanning</loc>
    <lastmod>2026-03-19T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Lab---Performing-and-Detecting-Cross-Site-Request-Forgery</loc>
    <lastmod>2026-03-22T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Lab---Performing-and-Detecting-Cross-Site-Scripting-(XSS)</loc>
    <lastmod>2026-03-20T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Lab---Performing-and-Detecting-Directory-Traversal-and-Command-Injection</loc>
    <lastmod>2026-03-20T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Lab---Performing-and-Detecting-LFI-and-RFI</loc>
    <lastmod>2026-03-20T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Lab---Performing-and-Detecting-Privilege-Escalation</loc>
    <lastmod>2026-03-20T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Lab---Performing-and-Detecting-SQL-Injection</loc>
    <lastmod>2026-03-22T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Lab---Researching-DNS-and-IP-Reputation</loc>
    <lastmod>2026-03-18T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Lab---Using-File-Analysis-Techniques</loc>
    <lastmod>2026-03-18T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Lab---Using-Network-Sniffers</loc>
    <lastmod>2026-03-18T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Lab---Using-Nontraditional-Vulnerability-Scanning-Tools</loc>
    <lastmod>2026-03-19T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Laptop-Disassembly-Processes</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Laser-Print-Imaging-Process</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Laser-Printer-Maintenance</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Lattice-Based-Cryptography</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Law-as-Code</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Laws-Governing-Contracts</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Laws-Limiting-SSN-Use-and-Disclosure</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Laws-and-Regulations</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Layer-2-vs-Layer-3-Addressing-and-Forwarding</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Layering</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Legacy-Systems</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Legacy-and-End-of-Life-(EOL)-Systems</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Legal-Citation</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Legal-Hold</loc>
    <lastmod>2026-03-11T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Legal-Ownership-And-The-Importance-of-Protecting-Intellectual-Property</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Legislative-Branch</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Lifecycle-Management</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Lightweight-Cryptography</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Lightweight-Directory-Access-Protocol-(LDAP)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Link-Aggregation-and-NIC-Teaming</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Linux-File-Ownership-and-Permissions</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Linux-Forensics</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Linux-Hardening</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Linux-User-Accounts</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Liquid-Cooling-Systems</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Load-Balancers</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Local-Area-Network-(LAN)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Local-Authentication</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Local-Users-and-Groups-(lusrmgr.msc)</loc>
    <lastmod>2026-03-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Locard's-Exchange-Principle</loc>
    <lastmod>2026-03-11T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Location-Services</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Locks</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Log-Collectors-and-Syslog</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Log-Data</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Log-Reviews</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Logging-Concepts</loc>
    <lastmod>2026-03-03T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Logic-Bomb</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Long-Range-Fixed-Wireless</loc>
    <lastmod>2026-02-06T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Lure-Based-Vectors</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/M-of-N-Control</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/MAC-Flooding-Attack</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/MAC-Spoofing-and-IP-Spoofing</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/MIT-License</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/MITRE-ATT-and-CK-Framework</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Mac-OS-Forensics</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Madison-v.-Hamilton</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Mail-Exchange-(MX)-Records</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Mail-Privacy-Statute-(1971)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Mail-Servers</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Mailbox-Servers</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Main-Principles-of-Criminal-Law</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Maintenance-Windows</loc>
    <lastmod>2026-02-27T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Malicious-Activity-Indicators</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Malicious-Code-Indicators</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Malicious-Processes</loc>
    <lastmod>2026-03-17T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Malicious-Update</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Maltego</loc>
    <lastmod>2026-03-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Malware-Issues</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Malware</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Man-in-the-Middle-Attack-(On-Path)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Manage-Files-on-Linux</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Managing-Network-Connections-on-Linux</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Managing-Windows</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Mandatory-Access-Control-(MAC)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Mass-Storage-Devices</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Massachusetts---Protecting-Personal-Information</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Massachusetts-Standards-for-the-Protection-of-Personal-Information-of-Residents-of-the-Commonwealth-(2010)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Master-Service-Agreement-(MSA)</loc>
    <lastmod>2026-03-10T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Maximum-Transmission-Unit-(MTU)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Mean-Percentage-Error-(MPE)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Mean-Squared-Deviation-(MSD)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Media-Access-Control-(MAC)-Address</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Media-Access-Control-and-Collision-Domains</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Meet-in-the-Middle-Attack</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Meeting-of-the-Minds</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Memorandum-of-Agreement-(MOA)</loc>
    <lastmod>2026-03-10T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Memorandum-of-Understanding-(MOU)</loc>
    <lastmod>2026-03-10T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Memory-Injection</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Memory-Modules</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Memory-and-Process-Consumption</loc>
    <lastmod>2026-03-17T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Mesh-Topology</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Message-Authentication-Code-(MAC)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Message-Digest-Algorithm-5-(MD5)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Message-Based-Vectors</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Metadata</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Metasploit-Framework-(MSF)</loc>
    <lastmod>2026-03-18T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Metropolitan-Area-Network-(MAN)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Microservices</loc>
    <lastmod>2026-03-03T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Microsoft-Remote-Assistant</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Minnesota's-Plastic-Card-Security-Act-(2007)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Misconfiguration-Vulnerabilities</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Misconfigured-Firewall-and-ACL-Issues</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Mobile-Apps</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Mobile-Device-Accessories</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Mobile-Device-Account-Setup</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Mobile-Device-Management-(MDM)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Mobile-Device-Wired-Connection-Methods</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Mobile-Display-Components</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Mobile-Display-Types</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Mobile-Forensics</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Mobile-Full-Device-Encryption-and-External-Media</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Mobile-Hotspots-and-Tethering</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Mobile,-Embedded,-and-IOT-Security</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Models-of-Cryptography-Security-Proof</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Modular-Arithmetic</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Modular-Transceivers</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Monitoring-Scripts-for-Errors</loc>
    <lastmod>2026-02-17T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Motherboard-Adapter-Connectors</loc>
    <lastmod>2026-02-06T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Motherboard-Form-Factors</loc>
    <lastmod>2026-02-06T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Motherboard-Functions</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Motherboard-Headers-and-Power-Connectors</loc>
    <lastmod>2026-02-06T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Motherboard-Installation</loc>
    <lastmod>2026-02-06T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Motherboard-Storage-Connectors</loc>
    <lastmod>2026-02-06T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Motherboard-and-System-Memory-Connectors</loc>
    <lastmod>2026-02-06T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Motivations-of-Threat-Actors</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Multi-channel-System-Memory</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Multicast-and-Anycast-Addressing</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Multilevel-Access-Control</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Multiuser-MIMO-(MU-MIMO)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/NFPA-1600</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/NIST-Computer-Security-Incident-Handling-Guide-SP-800-61</loc>
    <lastmod>2026-03-13T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/NIST-Cybersecurity-Framework-(CSF)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/NIST-SP-800-34</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/NIST-SP-800-37</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/NIST-SP-800-88</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Name-Resolution-Issues</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/National-Institute-of-Standards-and-Technology-(NIST)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Navigation-Commands</loc>
    <lastmod>2026-03-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Near-Field-Communication-(NFC)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Need-to-Know</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Negligence-Torts</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Nessus</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Network-Access-Control-(NAC)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Network-Address-Translation-(NAT)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Network-Architecture-Considerations</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Network-Attached-Storage-(NAS)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Network-Attack-Surface</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Network-Attacks</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Network-Data-Sources</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Network-Data-Transmission</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Network-Device-Backup-Management</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Network-Device-Logs</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Network-Discovery</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Network-Documentation</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Network-Forensics</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Network-Hardware</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Network-Interface-Card-(NIC)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Network-Loop-and-Broadcast-Storm-Issues</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Network-Masks</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Network-Monitoring-Servers</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Network-Monitoring</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Network-Prefixes</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Network-Protocols</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Network-Security-Guidelines-and-Best-Practices</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Network-Security-Zones</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Network-Security-and-Business-Implications</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Network-Security</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Network-Taps</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Network-Time-Protocol-(NTP)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Network-Topology</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Network-Troubleshooting-Methodology</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Network-Types</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Network-Vectors</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Networking-Concepts</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Networking-Fire-Suppression</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Networking-Humidity-and-Temperature</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Networking-Power-Management</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Nevada-Law---Standards-Based-Encryption</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/New-York---Disposal-of-Records-Containing-PII</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Next-Generation-Firewall-(NGFW)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Nikto</loc>
    <lastmod>2026-03-19T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Nmap</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Nondisclosure-Agreement-(NDA)</loc>
    <lastmod>2026-03-10T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Nonrepudiation</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/OECD-Guidelines-on-the-Protection-of-Privacy-and-Transborder-Flows-of-Personal-Data</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/OMB-Breach-Notification-Policy</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/OODA-Loop</loc>
    <lastmod>2026-03-25T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/OS-Requirements-for-Apps</loc>
    <lastmod>2026-03-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/OS-Vendor-Lifecycle</loc>
    <lastmod>2026-03-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/OSI-Layer-1-%E2%80%93-Physical</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/OSI-Layer-2-%E2%80%93-Data-Link</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/OSI-Layer-3-%E2%80%93-Network</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/OSI-Layer-4-%E2%80%93-Transport</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/OSI-Layer-5-%E2%80%93-Session</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/OSI-Layer-6-%E2%80%93-Presentation</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/OSI-Layer-7-%E2%80%93-Application</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/OWASP-Zed-Attack-Proxy-(ZAP)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/One-Time-Pad</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/One-Way-Function</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Online-Contracts</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Open-Authorization-(OAuth)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Open-Shortest-Path-First-(OSPF)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Open-Source-Business-Models</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Open-Source-Initiative-(OSI)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Open-Source-Security-Testing-Methodology-Manual-(OSSTMM)</loc>
    <lastmod>2026-03-13T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Open-Systems-Interconnection-(OSI)-Model</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Open-Worldwide-Application-Security-Project-(OWASP)</loc>
    <lastmod>2026-03-04T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Open-source-Intelligence-(OSINT)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/OpenID-Connect-(OIDC)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/OpenVAS</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Operating-System-(OS)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Operating-System-Hardening</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Operating-System-Security</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Operating-Systems-and-You---Becoming-a-Power-User-MOC</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Operational-Technology-(OT)</loc>
    <lastmod>2026-03-05T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Operations-Security</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Operations,-Applications,-and-Solutions</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Optical-Cabling</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Optical-Drives</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Order-of-Volatility</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Organizational-Governance</loc>
    <lastmod>2026-03-10T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Other-Remote-Access-Tools</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Other-Reserved-Address-Ranges</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Other-Types-of-Intelligence</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Other-Wireless-Network-Types</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Out-of-Band-Management</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Outline-of-Final-Thesis-Structure</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Output-Encoding</loc>
    <lastmod>2026-03-21T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Overlay-Network</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Overview-of-Computer-Crime</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/PKI-Trust-Model</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/PSYC-201---Intro-to-Social-Psychology</loc>
    <lastmod>2026-02-07T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Packet-Capture</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Packet-Filtering-Firewalls</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Packet-Forwarding</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Packet-Sniffers</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Pacu</loc>
    <lastmod>2026-03-19T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Parameterized-Queries</loc>
    <lastmod>2026-03-21T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Parkerian-Hexad</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Pass-the-Hash-Attack</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Password-Attacks</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Password-Authentication-Protocol-(PAP)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Password-Managers</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Password-Policy</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Passwordless-Authentication</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Passwords</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Patch-Panels</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Patent-Infringement-and-Remedies</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Patent-Requirements</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Patents</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Payment-Card-Industry-Data-Security-Standard-(PCI-DSS)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Penetration-Test-Process</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Penetration-Testing</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/People-Based-Privacy-Concerns</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Perfect-Forward-Secrecy</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Perfect-Secrecy</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Perform-Vulnerability-Analysis</loc>
    <lastmod>2026-03-06T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Performance-Monitor-(perfmon.msc)</loc>
    <lastmod>2026-03-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Performance-and-Breach-of-Contract</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Perimeter-Networks</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Peripheral-Devices</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Personal-Area-Network-(PAN)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Personal-Computer-Chassis--and--Tower</loc>
    <lastmod>2026-02-06T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Personal-Information-Protection-and-Electronic-Documents-Act-(PIPEDA)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Personally-Identifiable-Financial-Information-(PIFI)</loc>
    <lastmod>2026-03-03T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Personally-Identifiable-Information-(PII)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Personnel-Policy</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Philosophy</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Phishing</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Physical-Attacks</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Physical-Controls</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Physical-Security-Controls</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Physical-Security-Threats</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Physical-Security</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Ping-Flood-Attack</loc>
    <lastmod>2026-03-16T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Ping-of-Death</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Plant-Patents</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Point-to-Point-Protocol-(PPP)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Pointer-(PTR)-Records</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Policies</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Policy-and-Governance</loc>
    <lastmod>2026-02-27T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Port-Address-Translation-(PAT)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Port-Guards</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Port-Mirroring</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Port-Replicators-and-Docking-Stations</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Port-Scanner</loc>
    <lastmod>2026-03-05T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Port-Security</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Portrayal-in-a-False-Light</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Post-Incident-Activities</loc>
    <lastmod>2026-03-10T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Power-Analysis-Attack</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Power-Over-Ethernet-(PoE)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Power-Over-Ethernet-Issues</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Power-Supply-Connectors</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Power-Supply-Units</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Power-and-Battery-Issues</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Power-over-Ethernet</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Pre-Socratic-Philosophy</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Precedent</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Precision-Time-Protocol-(PTP)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Preemption</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Pretexting</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Pretty-Good-Privacy-(PGP)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Principle-of-Least-Privilege</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Print-Device-Connectivity</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Print-Feed-Issues</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Print-Job-Issues</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Print-Quality-Issues</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Printer-Connectivity-Issues</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Printer-Drivers-and-Page-Description-Languages</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Printer-Properties</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Printer-Security</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Printer-Sharing</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Printer-Unboxing-and-Setup-Location</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Printing-Preferences</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Privacy-Act-of-1974</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Privacy-Breaches-and-Data-Breaches</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Privacy-Concerns-of-GPS-Technology</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Privacy-Concerns-of-Security-Breaches</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Privacy-Concerns-of-Spyware</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Privacy-Concerns-of-Wireless-Technologies</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Privacy-Data</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Privacy-Impact-Assessment-(PIA)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Privacy-Overview</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Privacy-Policy</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Privacy-Protection-Act-(PPA)-of-1980</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Privacy-Technology</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Private-Right-of-Action</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Privilege-Escalation</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Privileged-Access-Management-(PAM)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Procedural-Law</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Procedures</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Programming-Paradigm</loc>
    <lastmod>2026-02-09T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Programming-and-Scripting</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Prohibited-Content-and-Licensing-Issues</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Project-Management</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Prompt-Injection</loc>
    <lastmod>2026-03-21T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Proprietary-Systems</loc>
    <lastmod>2026-03-10T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Protected-Health-Information-(PHI)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Protecting-Copyright-Internationally</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Protecting-Data</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Protecting-Equipment</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Protecting-People</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Protocol-Analyzer</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Protocol-and-Port-Use-Scenarios</loc>
    <lastmod>2026-03-16T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Protocols-and-Ports</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Prowler</loc>
    <lastmod>2026-03-19T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Proxy-Server</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Pseudorandom-and-Determinism</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Public-Disclosure-of-Private-Facts</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Public-Key-Infrastructure-(PKI)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Public-Key-Notation</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Public-and-Private-Addressing</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Purpose-of-an-IT-department</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Python-Cheat-Sheet</loc>
    <lastmod>2026-02-20T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Python-Collections</loc>
    <lastmod>2026-02-12T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Python-Data-Types</loc>
    <lastmod>2026-02-10T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Python-Dictionaries</loc>
    <lastmod>2026-02-12T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Python-Functions</loc>
    <lastmod>2026-02-13T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Python-If-Else-Statements</loc>
    <lastmod>2026-02-13T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Python-Lists</loc>
    <lastmod>2026-02-20T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Python-Loops-and-Logic</loc>
    <lastmod>2026-02-13T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Python-Modules,-Libraries,-and-Packages</loc>
    <lastmod>2026-02-18T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Python-Operators</loc>
    <lastmod>2026-02-11T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Python-Sets</loc>
    <lastmod>2026-02-20T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Python-Tuples</loc>
    <lastmod>2026-02-20T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Python-Variables</loc>
    <lastmod>2026-02-09T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Python</loc>
    <lastmod>2026-02-09T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Quality-Assurance-(QA)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Qualys</loc>
    <lastmod>2026-03-17T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Quantum-Computing-and-Public-Key-Cryptography</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Quantum-Cryptography</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Questionnaire</loc>
    <lastmod>2026-03-10T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Quick-Assist</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/RAM-Types</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/RAM-and-Adapter-Placement</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/RSA</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Race-Conditions</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Rack-Diagram</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Rack-Systems</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Radio-Frequency-Identification-(RFID)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Rainbow-Table</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Range-and-Signal-Strength</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Ransomware</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Real-Time-Operating-System-(RTOS)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Recon-ng</loc>
    <lastmod>2026-03-18T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Recovering-Data</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Redirecting-Input-and-Output</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Redundant-Array-of-Independent-Disks-(RAID)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Registry-Editor-(regedit.exe)</loc>
    <lastmod>2026-03-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Regression-Testing</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Regular-Expressions-(Regex)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Regulated-Data</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Regulatory-Compliance</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Reidentification</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Reimaging</loc>
    <lastmod>2026-03-11T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Relationships-of-Trademarks-on-Domain-Names</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Remediation</loc>
    <lastmod>2026-03-11T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Remote-Access</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Remote-Authentication-Dial-In-User-Service-(RADIUS)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Remote-Authentication</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Remote-Desktop-Protocol-(RDP)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Remote-Desktop</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Remote-Host-Access</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Remote-Management-Via-API</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Remote-Network-Monitoring-(RMON)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Remote-Terminal-Access-Servers</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Removable-Storage-Drives</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Repair-Installation</loc>
    <lastmod>2026-03-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Replay-Attack</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Requirement-to-Comply-with-PCI-Standards</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Requirements-Analysis</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Resilient-Architecture-Concepts</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Resource-Monitor-(resmon.exe)</loc>
    <lastmod>2026-03-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Ring-Topology</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Risk-Identification-and-Assessment</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Risk-Management-Process</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Risk-Management-Strategies</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Risk-Management</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Rivest-Cipher-4-(RC4)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Roaming-and-Client-Disassociation-Issues</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Rogue-Access-Point</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Rogue-DHCP</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Rogue-Devices-and-Services</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Role-of-The-Public-Intellectual-(2014)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Role-Based-Access-Control-(RBAC)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Root-Cause-Analysis</loc>
    <lastmod>2026-03-12T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Root-of-Trust</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Rootkit</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Route-Selection</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Router-Configuration</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Routers</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Routing-Information-Protocol-(RIP)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Routing-Table-Example</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Routing-Table-Issues</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Routing-Table-Tools</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Routing-Tables-and-Path-Selection</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Rule-Based-Access-Control-(RuBAC)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Rulers-of-The-Realm-(2016)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Rules-of-Engagement-(ROE)</loc>
    <lastmod>2026-03-10T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Rules-of-Statutory-Construction</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/SATA-Hard-Drive-Cables</loc>
    <lastmod>2026-02-06T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/SCAP-Compliance-Checker-(SCC)</loc>
    <lastmod>2026-03-05T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/SD+3</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/SOHO-Backups</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/SOHO-Router-Configuration</loc>
    <lastmod>2026-02-06T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/SOHO-and-Enterprise-Networks</loc>
    <lastmod>2026-02-06T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/SQL-Injection</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/SSL-Inspection</loc>
    <lastmod>2026-03-03T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/STRIDE</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/SYN-Flood-Attack</loc>
    <lastmod>2026-03-16T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Safe-Harbor</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Salsa20--and--ChaCha20</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Salting-and-Key-Stretching</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Sandbox</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Sarbanes%E2%80%93Oxley-Act-(SOX)-of-2002</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Satellite-Technologies</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Scanner-Configuration</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Scanners</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/ScoutSuite</loc>
    <lastmod>2026-03-19T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Screen-and-Calibration-Issues</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Screened-Subnet</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Searching-For-and-Extracting-Data</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Section-230</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Secure-Access-Service-Edge-(SASE)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Secure-Cloud-Architecture</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Secure-Coding</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Secure-Cookies</loc>
    <lastmod>2026-03-21T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Secure-Data-Destruction</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Secure-Enclave</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Secure-Enterprise-Network-Architecture</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Secure-Erase</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Secure-File-Transfer-Protocol-(SFTP)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Secure-Hash-Algorithm-(SHA)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Secure-Multipurpose-Internet-Mail-Extensions-(S-MIME)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Secure-Real-Time-Transport-Protocol-(SRTP)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Secure-Shell-(SSH)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Secure-Software-Development-Life-Cycle-(SSDLC)</loc>
    <lastmod>2026-03-21T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Security-Acceptance-Testing</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Security-Appliance-Attributes</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Security-Appliance-Placement</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Security-Assertion-Markup-Language-(SAML)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Security-Audits-and-Assessments</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Security-Awareness-Training-Lifecycle</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Security-Content-Automation-Protocol-(SCAP)</loc>
    <lastmod>2026-03-06T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Security-Control</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Security-Groups-and-Security-Lists</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Security-Guards-and-Cameras</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Security-Information-and-Event-Management-(SIEM)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Security-Orchestration,-Automation,-and-Response-(SOAR)</loc>
    <lastmod>2026-03-04T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Security-Policy-Framework</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Security-Rules-and-ACL-Configuration</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Security-Services</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Security-Strength-of-Cryptographic-Algorithms</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Security-Terms-and-Definitions</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Security-Zones</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Security,-Awareness,-Training,-and-Education-(SATE)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Sender-Policy-Framework-(SPF)</loc>
    <lastmod>2026-03-31T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Separation-of-duties</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Serial-Cables</loc>
    <lastmod>2026-02-06T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Server-Message-Block-(SMB)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Server-Side-Request-Forgery-(SSRF)</loc>
    <lastmod>2026-03-21T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Server-side-Virtualization</loc>
    <lastmod>2026-03-03T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Serverless-Computing</loc>
    <lastmod>2026-03-03T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Service-(SRV)-Records</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Service-Level-Agreement-(SLA)</loc>
    <lastmod>2026-03-10T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Session-Hijacking</loc>
    <lastmod>2026-03-21T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Session-Management</loc>
    <lastmod>2026-03-21T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Session-Prediction-Attack</loc>
    <lastmod>2026-03-21T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Sherwood-Applied-Business-Security-Architecture-(SABSA)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Shibboleth</loc>
    <lastmod>2026-03-03T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Shielded-Twisted-Pair-(STP)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Shodan</loc>
    <lastmod>2026-03-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Shoulder-Surfing</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Shrinkwrap-Contracts</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Sideloading,-Rooting,-and-Jailbreaking</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Simple-Mail-Transfer-Protocol-(SMTP)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Simple-Network-Management-Protocol-(SNMP)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Simulating-Social-Engineering-Attacks</loc>
    <lastmod>2026-03-17T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Single-Mode-Fiber-and-Multimode-Fiber</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Single-Pane-of-Glass-Orchestration</loc>
    <lastmod>2026-03-04T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Single-Sign-On-(SSO)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Site-Layout,-Fencing,-and-Lighting</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Site-to-Site-VPNs</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Small-Computer-System-Interface-(SCSI)</loc>
    <lastmod>2026-02-06T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Smart-Contracts-II</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Smart-Contracts</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Smurfing</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Snort</loc>
    <lastmod>2026-03-18T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Social-Engineering</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Social-Psychology-Research</loc>
    <lastmod>2026-02-07T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Social-Psychology</loc>
    <lastmod>2026-02-07T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Soft-Authentication-Tokens</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Software-Classification</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Software-Copyright</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Software-Development-Life-Cycle-(SDLC)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Software-Development-Vulnerabilities</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Software-Firewalls</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Software-Liability-II</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Software-Liability</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Software-Licenses</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Software-Patching-and-Host-Protections</loc>
    <lastmod>2026-02-27T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Software-Patents</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Software-Defined-Networking-(SDN)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Software-Defined-WAN-(SD-WAN)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Solid-State-Drives-(SSD)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Sound-Cards</loc>
    <lastmod>2026-02-06T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Source-Control</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Spam-Gateways-and-Unified-Threat-Management</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Spanning-Tree-Protocol-(STP)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Special-Considerations-for-Vulnerability-Scanning</loc>
    <lastmod>2026-03-05T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Specifications-and-Limits</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Spine-and-Leaf-Topology</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Spoofing-Attack</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Spyware-and-Keyloggers</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Stack-Overflow</loc>
    <lastmod>2026-03-21T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Standards</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Star-Topology</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/State-Government</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/State-Law-as-a-Source-of-Privacy-Law</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/State-Laws-Protecting-Citizen-Information-and-Breach-Notification-Laws</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Stateful-Packet-Inspection-Firewalls</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Statement-of-Work-(SOW)</loc>
    <lastmod>2026-03-10T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/States-of-Data</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Static-Code-Analysis</loc>
    <lastmod>2026-03-21T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Static-and-Default-Routes</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Static-vs-Dynamic-Host-Address-Configuration</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Steganography</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Storage-Area-Network-(SAN)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Stream-Cipher</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Strict-Liability-Torts</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Strings-Command</loc>
    <lastmod>2026-03-12T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Strong-Versus-Weak-Trademarks</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Strong-and-Weak-Entities</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Structured-Cable-Installation</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Structured-Cabling-System</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Structured-Query-Language-(SQL)-Operations</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Subnet-Masks</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Subnetting-Guide</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Subnetting</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Substitution-Cipher</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Summarize-Data-Protection-and-Compliance-Concepts</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Summarize-Fundamental-Security-Concepts</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Summarize-Security-Governance-Concepts</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Summarizing-Cloud-Concepts</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Summarizing-Virtualization-and-Cloud-Concepts</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Supertype-and-Subtype-Entities</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Supply-Chain-Attack-Surface</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Supply-Chain-Vulnerabilities</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Supporting-Cabling-and-Physical-Installations</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Supporting-Mobile-Devices</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Supporting-Network-Management</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Supporting-Network-Security-Design</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Supporting-Network-Services</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Supporting-Print-Devices</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Supporting-Windows</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Switch-Hardware-Failure-Issues</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Switch-Interface-Error-Counts</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Switch-Port-Status-Indicators</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Switch-and-Router-Hardening</loc>
    <lastmod>2026-03-06T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Switches</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Symmetric-Encryption</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Synchronization-Methods</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/System-Configuration-Utility-(msconfig.exe)</loc>
    <lastmod>2026-03-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/System-Development-Life-Cycle</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/System-Engineering-Methodologies</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/System-Information-(msinfo32.exe)</loc>
    <lastmod>2026-03-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/System-Management-Commands</loc>
    <lastmod>2026-03-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/System-Organization-Control-(SOC)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/System-Processes</loc>
    <lastmod>2026-03-03T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/System-RAM-and-Virtual-Memory</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/System-Repair,-Reinstall,-and-Reimage</loc>
    <lastmod>2026-03-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/System-Requirements-for-Apps</loc>
    <lastmod>2026-03-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/System-Restore</loc>
    <lastmod>2026-03-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/T568A-and-T568B-Termination-Standards</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/TCP-Handshake-and-Teardown</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/TCP-IP</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/TLS-1.3-Protocols</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Tactics,-Techniques,-and-Procedures-(TTPs)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Tagged-and-Untagged-Ports</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Tailgating-and-Piggybacking</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Targets-of-Penetration-Tests</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Task-Manager-(taskmgr.exe)</loc>
    <lastmod>2026-03-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Task-Scheduler-(taskschd.msc)</loc>
    <lastmod>2026-03-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Teardrop-Attack</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Technical-Controls</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Telecommunications-Act-of-1996</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Telnet</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Temperature-Attack</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Terminal-Access-Controller-Access-Control-System-(TACACS+)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Terminating-Tools-and-Techniques</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Terms-To-Look-For-in-EULAs</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Terms-of-Agreement</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Ternary-Relationships</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Testing-Resiliency</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Text-(TXT)-Records</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/The-1963-Flow-Chart</loc>
    <lastmod>2026-04-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/The-2016-Election-%E2%80%93-%E2%80%9CThe-%E2%80%98Logistical-Moment%E2%80%99-In-Which-We-Americans-Find-Ourselves%22</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/The-5-disciplines-of-computing</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/The-5-key-IT-job-role-categories</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/The-American-Legal-System</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/The-Bill-of-Rights-and-Worldviews</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/The-Bill-of-Rights-in-Relation-to-Natural-Law</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/The-Business-of-IT</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/The-Challenges-of-the-Coming-Century</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/The-Computer-Security-Act-of-1987</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/The-Constitution-Under-Fire-(2015)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/The-Difference-Between-Compliance-and-Audit</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/The-Difference-Between-Patents-and-Trade-Secrets</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/The-End-of-the-Cold-War</loc>
    <lastmod>2026-04-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/The-Fifth-Amendment</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/The-Internet</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/The-Interstate-Communications-Act</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/The-Interstate-Stalking-and-Prevention-Act</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/The-JFK-Assassination</loc>
    <lastmod>2026-04-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/The-Patent-Application-Process</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/The-Pen-Register-and-Trap-and-Trace-Statute</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/The-Robber-Baron-Era</loc>
    <lastmod>2026-04-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/The-Role-of-Contracts</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/The-Shadow-Government-Part-1</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/The-Shadow-Government-Part-2</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/The-Social-Self</loc>
    <lastmod>2026-02-07T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/The-Telephone-Harassment-Act</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/The-Wiretap-Act-(1968,-amended)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Thermal-Printer-Imaging-Process--and--Maintenance</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Threat-Assessment</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Threat-Feeds</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Threat-Hunting</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Threat-Information-Sharing</loc>
    <lastmod>2026-03-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Threat-Intelligence-Research</loc>
    <lastmod>2026-03-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Threat-Intelligence</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Threat-Modeling</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Threat-Vectors</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Threats,-Vulnerabilities,-Risk,-and-Impact</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Three-Tiered-Network-Hierarchy-Topology</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Thunderbolt-and-Lightning-Cables</loc>
    <lastmod>2026-02-06T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Timing-Attack</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Tiny-Encryption-Algorithm-(TEA)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Tokenization</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Torts</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Trademark-Registration</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Trademark-Requirements</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Trademarks</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Traffic-Shaping</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Traffic-Testing-Tools</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Training-Topics-and-Techniques</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Transceiver-Mismatch-Issues</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Transceiver-Signal-Strength-Issues</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Transmission-Control-Protocol-(TCP)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Transport-Encryption-and-Key-Exchange</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Transport-Layer-Ports-and-Connections</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Transport-Layer-Security-(TLS)-Tunneling</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Transport-Layer-Security-(TLS)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Transposition-Cipher</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Trespass-Torts</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Triage-and-Incident-Response-Concepts</loc>
    <lastmod>2026-03-10T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Triple-DES-(3DES)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Trivial-File-Transfer-Protocol-(TFTP)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Troubleshoot-Boot-Issues</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Troubleshoot-Component-Issues</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Troubleshoot-Drive-Availability</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Troubleshoot-Drive-Reliability-and-Performance</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Troubleshoot-Inaccurate-System-Date--and--Time</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Troubleshoot-Limited-Connectivity</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Troubleshoot-Missing-Video-Issues</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Troubleshoot-Network-Speed-Issues</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Troubleshoot-POST-Issues</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Troubleshoot-Performance-Issues</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Troubleshoot-Power-Issues</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Troubleshoot-RAID-Failure</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Troubleshoot-Video-Quality-Issues</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Troubleshoot-VoIP-Issues</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Troubleshoot-Wired-Connectivity</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Troubleshoot-Wireless-Issues</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Troubleshooting-Application-and-Service-Fault-Issues</loc>
    <lastmod>2026-03-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Troubleshooting-Boot-Issues</loc>
    <lastmod>2026-03-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Troubleshooting-PC-Hardware</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Troubleshooting-Performance-Issues</loc>
    <lastmod>2026-03-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Troubleshooting-Profile-Issues</loc>
    <lastmod>2026-03-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Troubleshooting-System-Faults</loc>
    <lastmod>2026-03-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Trunking-and-IEEE--802.1Q</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Trusted-Platform-Module-(TPM)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Twelve-Steps-to-Confronting-a-Global-Crises-(and-writing-a-good-paper)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Type-of-Data-to-Synchronize</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Types-of-Attack</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Types-of-Evidence</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Types-of-OS</loc>
    <lastmod>2026-03-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Types-of-Threat-Actors</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Types-of-Vulnerability-Scans</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Typosquatting</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/URL-Analysis</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/URL-Obfuscation-Techniques</loc>
    <lastmod>2026-03-17T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/US-v.-Engineer-(2008)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/USA-PATRIOT-Act</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Unary-Relationships</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Unauthorized-Change-Indicators</loc>
    <lastmod>2026-03-17T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Unauthorized-Software</loc>
    <lastmod>2026-03-17T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Understand-Application-Security-and-Attack-Mitigation-Best-Practices</loc>
    <lastmod>2026-03-21T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Understand-Application-Vulnerability-Assessment</loc>
    <lastmod>2026-03-19T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Understand-Process-Improvement-in-Security-Operations</loc>
    <lastmod>2026-03-04T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Understand-Vulnerability-Response,-Handling,-and-Management</loc>
    <lastmod>2026-02-27T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Understanding-Techniques-for-Hiding-and-Scrambling-Information</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Unified-Threat-Management-(UTM)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Uniform-Electronic-Transactions-Act-(UETA)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Uniform-Resource-Locator-(URL)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Universal-Declaration-of-Human-Rights</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Universal-Serial-Bus-(USB)-Cables</loc>
    <lastmod>2026-02-06T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Unlawful-Access-to-Stored-Communications-(18-USC-%C2%A7-2701)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Unshielded-Twisted-Pair-(UTP)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Unusual-Traffic-Spikes-and-Bandwidth-Consumption</loc>
    <lastmod>2026-03-16T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Update-and-Driver-Roll-Back</loc>
    <lastmod>2026-03-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Upgrading-Adapter-Cards</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/User-Account-Provisioning</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/User-Datagram-Protocol-(UDP)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/User-and-Entity-Behavior-Analytics-(UEBA)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/User-and-Role-Based-Training</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Uses-for-Infrastructure-as-Code</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Using-Analysis-to-Identify-Malicious-Activity</loc>
    <lastmod>2026-03-20T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Using-Python-for-File-Management-Tasks</loc>
    <lastmod>2026-02-17T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Using-Secure-Protocols</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Using-Support-and-Scripting-Tools</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Utility-Patents</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Utilizing-APIs-in-Python</loc>
    <lastmod>2026-02-20T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/VLAN-Assignment-Issues</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/VLAN-Hopping-Attack</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/VLAN-Routing</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Variable-Length-Subnet-Mask-(VLSM)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Vendor-Assessment-Methods</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Vendor-Legal-Agreements</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Vendor-Management</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Vendor-Selection</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Version-Control</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Vi-and-Vim</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Video-Cards</loc>
    <lastmod>2026-02-06T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Video-surveillance</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Virtual-LAN-(VLAN)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Virtual-LANs</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Virtual-Network-Computing-(VNC)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Virtual-Private-Cloud-(VPC)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Virtual-Private-Network-(VPN)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Virtualization-Resource-Requirements</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Virtualization-Vulnerabilities</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Virtualization-and-Security-Requirements</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Virtualization</loc>
    <lastmod>2026-03-03T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Virus</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/VirusTotal</loc>
    <lastmod>2026-03-12T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/VoIP-Phones</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/VoIP-Protocols</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Voice-VLANs</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Voice-and-Video-Services</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Voluntary-Agreements-as-a-Source-of-Privacy-Law</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Vulnerability-Analysis-Methods</loc>
    <lastmod>2026-03-05T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Vulnerability-Analysis</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Vulnerability-Assessment</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Vulnerability-Context</loc>
    <lastmod>2026-03-06T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Vulnerability-Feed</loc>
    <lastmod>2026-03-06T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Vulnerability-Management-Reporting</loc>
    <lastmod>2026-03-09T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Vulnerability-Report-Best-Practices</loc>
    <lastmod>2026-03-09T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Vulnerability-Response-and-Remediation</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Vulnerability-Scanner</loc>
    <lastmod>2026-03-05T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Vulnerability-Score-Adjustment</loc>
    <lastmod>2026-03-06T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Vulnerability-and-Exploit-Types</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Vulnerable-Software-Vectors</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/WEP-Attack</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/War-Driving</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Washington---Disposal-of-Personal-Information-(2002)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Waterfall-Methodology</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Watering-Hole-Attack</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Wattage-Rating</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Wavelength-Division-Multiplexing</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Wazuh</loc>
    <lastmod>2026-03-18T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Web-Application-Attacks</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Web-Application-Firewall-(WAF)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Web-Application-Vulnerabilities</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Web-Beacon</loc>
    <lastmod>2026-03-16T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Web-Server-Logs</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Web-Servers</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Webhook</loc>
    <lastmod>2026-03-04T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/What-is-Legal-Scholarship</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/What-is-Privacy</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Whois</loc>
    <lastmod>2026-03-12T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Why-is-Privacy-an-Issue</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Wi-Fi-5-(802.11ac)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Wi-Fi-6-(802.11ax)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Wi-Fi-Analyzers</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Wi-Fi-Encryption-Standards</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Wi-Fi-Enterprise-Authentication</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Wi-Fi-Networking</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Wi-Fi-Overcapacity-Issues</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Wi-Fi-Personal-Authentication</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Wide-Area-Network-(WAN)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Wide-Area-Networks-and-OSI-Model</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Windows-Boot-Process</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Windows-Forensics</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Windows-Management-Instrumentation-Command-Line-(WMIC)</loc>
    <lastmod>2026-03-20T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Windows-OS-Versions</loc>
    <lastmod>2026-03-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Windows-PowerShell</loc>
    <lastmod>2026-03-20T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Windows-Registry</loc>
    <lastmod>2026-03-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Windows-Settings</loc>
    <lastmod>2026-03-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Windows-System-Settings</loc>
    <lastmod>2026-03-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Windows-User-Settings</loc>
    <lastmod>2026-03-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/WindowsRE-and-Startup-Repair</loc>
    <lastmod>2026-03-02T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Wireless-Access-Point-(WAP)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Wireless-Communications-and-Public-Safety-Act-of-1999</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Wireless-Controllers</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Wireless-Encryption</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Wireless-LAN-Installation-Considerations</loc>
    <lastmod>2026-02-06T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Wireless-Network-Attacks</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Wireless-Performance-Assessment</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Wireless-Protection-Tools</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Wireless-Roaming</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Wireless-Surveys-and-Heat-Maps</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Wireshark</loc>
    <lastmod>2026-03-12T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Wiring-Diagram</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Workplace-Privacy</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/World-Wide-Web-(WWW)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Worldviews-and-Modes-of-Ethical-Reasoning</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Worm</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Writing-a-Clear-Abstract-and-Introduction</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Zero-Trust-Architecture-(ZTA)</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/Zero-Day-Vulnerabilities</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/arp-command</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/dig</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/ifconfig-and-ip-commands</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/ipconfig-command</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/netstat</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/nslookup</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/passwdqc</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/ping-command</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/quartz-guide</loc>
    <lastmod>2026-03-29T00:00:00.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/tcpdump</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url><url>
    <loc>https://notes.adamfurman.me/notes/tracert-and-traceroute</loc>
    <lastmod>2026-04-02T21:56:22.000Z</lastmod>
  </url></urlset>