<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
<url>
<loc>https://www.cybershelf.org/en</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>1</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/films</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/films" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/films" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/series</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/series" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/series" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/podcasts</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/podcasts" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/podcasts" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/youtube-channels</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/youtube-channels" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/youtube-channels" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/youtube-channels/the-cyber-mentor</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/youtube-channels/the-cyber-mentor" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/youtube-channels/the-cyber-mentor" />
<lastmod>2026-05-04T19:27:19.944Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/cryptography-engineering</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cryptography-engineering" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cryptography-engineering" />
<lastmod>2026-05-05T08:12:34.401Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/sandworm</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/sandworm" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/sandworm" />
<lastmod>2026-05-05T08:12:34.539Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/practical-reverse-engineering</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-reverse-engineering" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-reverse-engineering" />
<lastmod>2026-05-05T08:12:35.086Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/the-tangled-web</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-tangled-web" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-tangled-web" />
<lastmod>2026-05-05T08:12:34.471Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/security-engineering-3e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/security-engineering-3e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/security-engineering-3e" />
<lastmod>2026-05-05T08:12:34.607Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/ida-pro-book-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/ida-pro-book-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/ida-pro-book-2e" />
<lastmod>2026-05-05T08:12:35.151Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/real-world-cryptography</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/real-world-cryptography" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/real-world-cryptography" />
<lastmod>2026-05-05T08:12:35.429Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/serious-cryptography-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/serious-cryptography-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/serious-cryptography-2e" />
<lastmod>2026-05-05T08:12:35.496Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/network-security-through-data-analysis-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/network-security-through-data-analysis-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/network-security-through-data-analysis-2e" />
<lastmod>2026-05-05T08:12:35.627Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/real-world-bug-hunting</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/real-world-bug-hunting" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/real-world-bug-hunting" />
<lastmod>2026-05-05T08:12:35.218Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/countdown-to-zero-day</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/countdown-to-zero-day" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/countdown-to-zero-day" />
<lastmod>2026-05-05T08:12:34.891Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/rootkits-and-bootkits</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/rootkits-and-bootkits" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/rootkits-and-bootkits" />
<lastmod>2026-05-05T08:12:35.280Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/dark-territory</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/dark-territory" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/dark-territory" />
<lastmod>2026-05-05T08:12:35.761Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/at-war-rise-of-military-internet-complex</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/at-war-rise-of-military-internet-complex" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/at-war-rise-of-military-internet-complex" />
<lastmod>2026-05-05T08:12:35.826Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/penetration-testing-weidman</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/penetration-testing-weidman" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/penetration-testing-weidman" />
<lastmod>2026-05-05T08:12:36.254Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/threat-modeling-designing-for-security</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/threat-modeling-designing-for-security" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/threat-modeling-designing-for-security" />
<lastmod>2026-05-05T08:12:34.680Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/shellcoders-handbook-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/shellcoders-handbook-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/shellcoders-handbook-2e" />
<lastmod>2026-05-05T08:12:34.955Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/black-hat-python-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-python-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-python-2e" />
<lastmod>2026-05-05T08:12:35.018Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/windows-internals-part-1-7e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/windows-internals-part-1-7e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/windows-internals-part-1-7e" />
<lastmod>2026-05-05T08:12:35.695Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/tribe-of-hackers</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/tribe-of-hackers" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/tribe-of-hackers" />
<lastmod>2026-05-05T08:12:36.042Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/ghost-in-the-wires</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/ghost-in-the-wires" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/ghost-in-the-wires" />
<lastmod>2026-05-05T08:12:36.113Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/metasploit-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/metasploit-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/metasploit-2e" />
<lastmod>2026-05-05T08:12:36.190Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/black-hat-go</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-go" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-go" />
<lastmod>2026-05-05T08:12:36.331Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/the-cuckoos-egg</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-cuckoos-egg" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-cuckoos-egg" />
<lastmod>2026-05-05T08:12:34.740Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/linux-basics-for-hackers-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/linux-basics-for-hackers-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/linux-basics-for-hackers-2e" />
<lastmod>2026-05-05T08:12:36.478Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/car-hackers-handbook</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/car-hackers-handbook" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/car-hackers-handbook" />
<lastmod>2026-05-05T08:12:36.545Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/attacking-network-protocols</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/attacking-network-protocols" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/attacking-network-protocols" />
<lastmod>2026-05-05T08:12:36.611Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/series/halt-and-catch-fire</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/series/halt-and-catch-fire" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/series/halt-and-catch-fire" />
<lastmod>2026-05-05T08:12:43.583Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/films/zero-days</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/films/zero-days" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/films/zero-days" />
<lastmod>2026-05-05T08:12:42.489Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/series/black-mirror</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/series/black-mirror" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/series/black-mirror" />
<lastmod>2026-05-05T08:12:43.650Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/podcasts/darknet-diaries</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/podcasts/darknet-diaries" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/podcasts/darknet-diaries" />
<lastmod>2026-05-05T08:12:44.867Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/podcasts/risky-business</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/podcasts/risky-business" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/podcasts/risky-business" />
<lastmod>2026-05-05T08:12:44.934Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/practical-malware-analysis</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-malware-analysis" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-malware-analysis" />
<lastmod>2026-05-05T08:12:34.241Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/series/mr-robot</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/series/mr-robot" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/series/mr-robot" />
<lastmod>2026-05-05T08:12:43.516Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/films/we-are-legion</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/films/we-are-legion" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/films/we-are-legion" />
<lastmod>2026-05-05T08:12:42.628Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/practice-of-network-security-monitoring</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practice-of-network-security-monitoring" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practice-of-network-security-monitoring" />
<lastmod>2026-05-05T08:12:37.871Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/locksport</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/locksport" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/locksport" />
<lastmod>2026-05-05T08:12:38.086Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/android-security-internals</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/android-security-internals" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/android-security-internals" />
<lastmod>2026-05-05T08:12:38.592Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/bug-bounty-bootcamp</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/bug-bounty-bootcamp" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/bug-bounty-bootcamp" />
<lastmod>2026-05-05T08:12:36.869Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/youtube-channels/liveoverflow</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/youtube-channels/liveoverflow" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/youtube-channels/liveoverflow" />
<lastmod>2026-05-04T19:27:20.062Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/foundations-of-information-security</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/foundations-of-information-security" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/foundations-of-information-security" />
<lastmod>2026-05-05T08:12:37.238Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/cyberjutsu</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cyberjutsu" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cyberjutsu" />
<lastmod>2026-05-05T08:12:37.307Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/evasive-malware</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/evasive-malware" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/evasive-malware" />
<lastmod>2026-05-05T08:12:37.375Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/designing-secure-software</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/designing-secure-software" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/designing-secure-software" />
<lastmod>2026-05-05T08:12:37.530Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/malware-data-science</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/malware-data-science" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/malware-data-science" />
<lastmod>2026-05-05T08:12:37.600Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/crypto-dictionary</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/crypto-dictionary" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/crypto-dictionary" />
<lastmod>2026-05-05T08:12:37.667Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/pentesting-azure-applications</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/pentesting-azure-applications" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/pentesting-azure-applications" />
<lastmod>2026-05-05T08:12:37.735Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/practical-packet-analysis-3e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-packet-analysis-3e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-packet-analysis-3e" />
<lastmod>2026-05-05T08:12:37.804Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/hacks-leaks-and-revelations</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacks-leaks-and-revelations" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacks-leaks-and-revelations" />
<lastmod>2026-05-05T08:12:37.941Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/how-cybersecurity-really-works</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/how-cybersecurity-really-works" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/how-cybersecurity-really-works" />
<lastmod>2026-05-05T08:12:38.165Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/black-hat-bash</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-bash" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-bash" />
<lastmod>2026-05-05T08:12:38.237Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/black-hat-graphql</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-graphql" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-graphql" />
<lastmod>2026-05-05T08:12:38.311Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/bug-hunters-diary</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/bug-hunters-diary" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/bug-hunters-diary" />
<lastmod>2026-05-05T08:12:38.378Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/silence-on-the-wire</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/silence-on-the-wire" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/silence-on-the-wire" />
<lastmod>2026-05-05T08:12:38.444Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/ios-application-security</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/ios-application-security" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/ios-application-security" />
<lastmod>2026-05-05T08:12:38.671Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/hacking-the-xbox</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacking-the-xbox" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacking-the-xbox" />
<lastmod>2026-05-05T08:12:38.738Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/linux-firewalls-rash</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/linux-firewalls-rash" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/linux-firewalls-rash" />
<lastmod>2026-05-05T08:12:38.809Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/practical-binary-analysis</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-binary-analysis" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-binary-analysis" />
<lastmod>2026-05-05T08:12:37.021Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/web-security-for-developers</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/web-security-for-developers" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/web-security-for-developers" />
<lastmod>2026-05-05T08:12:37.095Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/practical-linux-forensics</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-linux-forensics" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-linux-forensics" />
<lastmod>2026-05-05T08:12:37.164Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/films/snowden</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/films/snowden" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/films/snowden" />
<lastmod>2026-05-05T08:12:42.282Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/films/the-great-hack</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/films/the-great-hack" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/films/the-great-hack" />
<lastmod>2026-05-05T08:12:42.354Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/films/deep-web</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/films/deep-web" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/films/deep-web" />
<lastmod>2026-05-05T08:12:42.419Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/films/the-social-dilemma</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/films/the-social-dilemma" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/films/the-social-dilemma" />
<lastmod>2026-05-05T08:12:42.560Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/films/wargames</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/films/wargames" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/films/wargames" />
<lastmod>2026-05-05T08:12:41.928Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/films/sneakers</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/films/sneakers" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/films/sneakers" />
<lastmod>2026-05-05T08:12:42.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/films/hackers</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/films/hackers" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/films/hackers" />
<lastmod>2026-05-05T08:12:42.067Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/films/the-imitation-game</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/films/the-imitation-game" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/films/the-imitation-game" />
<lastmod>2026-05-05T08:12:42.136Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/series/person-of-interest</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/series/person-of-interest" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/series/person-of-interest" />
<lastmod>2026-05-05T08:12:43.870Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/series/silicon-valley</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/series/silicon-valley" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/series/silicon-valley" />
<lastmod>2026-05-05T08:12:43.936Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/hacking-apis</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacking-apis" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacking-apis" />
<lastmod>2026-05-05T08:12:36.803Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/films/citizenfour</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/films/citizenfour" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/films/citizenfour" />
<lastmod>2026-05-05T08:12:41.861Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/series/devs</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/series/devs" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/series/devs" />
<lastmod>2026-05-05T08:12:43.804Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/youtube-channels/john-hammond</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/youtube-channels/john-hammond" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/youtube-channels/john-hammond" />
<lastmod>2026-05-04T19:27:20.259Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/youtube-channels/ippsec</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/youtube-channels/ippsec" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/youtube-channels/ippsec" />
<lastmod>2026-05-04T19:27:20.552Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/youtube-channels/computerphile</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/youtube-channels/computerphile" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/youtube-channels/computerphile" />
<lastmod>2026-05-04T19:27:20.791Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/osint-techniques-11e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/osint-techniques-11e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/osint-techniques-11e" />
<lastmod>2026-05-05T08:12:39.102Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/art-of-mac-malware-v1</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/art-of-mac-malware-v1" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/art-of-mac-malware-v1" />
<lastmod>2026-05-05T08:12:36.679Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/the-hacker-playbook-3</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-hacker-playbook-3" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-hacker-playbook-3" />
<lastmod>2026-05-05T08:12:38.879Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/extreme-privacy-5e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/extreme-privacy-5e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/extreme-privacy-5e" />
<lastmod>2026-05-05T08:12:39.172Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/open-source-intelligence-techniques-tools</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/open-source-intelligence-techniques-tools" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/open-source-intelligence-techniques-tools" />
<lastmod>2026-05-05T08:12:39.235Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/we-are-anonymous</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/we-are-anonymous" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/we-are-anonymous" />
<lastmod>2026-05-05T08:12:39.301Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/tracers-in-the-dark</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/tracers-in-the-dark" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/tracers-in-the-dark" />
<lastmod>2026-05-05T08:12:39.365Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/permanent-record</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/permanent-record" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/permanent-record" />
<lastmod>2026-05-05T08:12:39.434Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/click-here-to-kill-everybody</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/click-here-to-kill-everybody" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/click-here-to-kill-everybody" />
<lastmod>2026-05-05T08:12:39.499Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/the-art-of-deception</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-art-of-deception" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-art-of-deception" />
<lastmod>2026-05-05T08:12:39.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/the-art-of-intrusion</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-art-of-intrusion" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-art-of-intrusion" />
<lastmod>2026-05-05T08:12:39.726Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/gray-hat-hacking-6e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/gray-hat-hacking-6e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/gray-hat-hacking-6e" />
<lastmod>2026-05-05T08:12:39.804Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/the-art-of-memory-forensics</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-art-of-memory-forensics" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-art-of-memory-forensics" />
<lastmod>2026-05-05T08:12:39.870Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/incident-response-and-computer-forensics-3e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/incident-response-and-computer-forensics-3e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/incident-response-and-computer-forensics-3e" />
<lastmod>2026-05-05T08:12:39.942Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/the-pragmatic-programmer-20a</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-pragmatic-programmer-20a" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-pragmatic-programmer-20a" />
<lastmod>2026-05-05T08:12:40.009Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/the-cyber-effect</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-cyber-effect" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-cyber-effect" />
<lastmod>2026-05-05T08:12:40.170Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/cult-of-the-dead-cow</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cult-of-the-dead-cow" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cult-of-the-dead-cow" />
<lastmod>2026-05-05T08:12:40.239Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/kingpin</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/kingpin" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/kingpin" />
<lastmod>2026-05-05T08:12:40.309Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/spam-nation</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/spam-nation" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/spam-nation" />
<lastmod>2026-05-05T08:12:40.374Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/social-engineering-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/social-engineering-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/social-engineering-2e" />
<lastmod>2026-05-05T08:12:40.438Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/the-mac-hackers-handbook</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-mac-hackers-handbook" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-mac-hackers-handbook" />
<lastmod>2026-05-05T08:12:40.507Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/the-mobile-application-hackers-handbook</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-mobile-application-hackers-handbook" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-mobile-application-hackers-handbook" />
<lastmod>2026-05-05T08:12:40.658Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/the-database-hackers-handbook</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-database-hackers-handbook" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-database-hackers-handbook" />
<lastmod>2026-05-05T08:12:40.725Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/container-security</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/container-security" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/container-security" />
<lastmod>2026-05-05T08:12:40.792Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/kubernetes-security-and-observability</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/kubernetes-security-and-observability" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/kubernetes-security-and-observability" />
<lastmod>2026-05-05T08:12:40.858Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/podcasts/smashing-security</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/podcasts/smashing-security" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/podcasts/smashing-security" />
<lastmod>2026-05-05T08:12:45.069Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/podcasts/security-now</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/podcasts/security-now" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/podcasts/security-now" />
<lastmod>2026-05-05T08:12:45.135Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/podcasts/cyberwire-daily</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/podcasts/cyberwire-daily" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/podcasts/cyberwire-daily" />
<lastmod>2026-05-05T08:12:45.200Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/podcasts/hacking-humans</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/podcasts/hacking-humans" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/podcasts/hacking-humans" />
<lastmod>2026-05-05T08:12:45.266Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/podcasts/no-such-podcast</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/podcasts/no-such-podcast" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/podcasts/no-such-podcast" />
<lastmod>2026-05-05T08:12:45.426Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/podcasts/click-here</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/podcasts/click-here" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/podcasts/click-here" />
<lastmod>2026-05-05T08:12:45.494Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/podcasts/defensive-security</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/podcasts/defensive-security" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/podcasts/defensive-security" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/this-is-how-they-tell-me-the-world-ends</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/this-is-how-they-tell-me-the-world-ends" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/this-is-how-they-tell-me-the-world-ends" />
<lastmod>2026-05-05T08:12:35.976Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/podcasts/nolimitsecu</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/podcasts/nolimitsecu" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/podcasts/nolimitsecu" />
<lastmod>2026-05-04T21:43:26.746Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/podcasts/le-comptoir-secu</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/podcasts/le-comptoir-secu" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/podcasts/le-comptoir-secu" />
<lastmod>2026-05-04T21:43:26.874Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/podcasts/la-french-connection</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/podcasts/la-french-connection" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/podcasts/la-french-connection" />
<lastmod>2026-05-04T21:43:27.001Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/podcasts/cybersecurite-all-day</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/podcasts/cybersecurite-all-day" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/podcasts/cybersecurite-all-day" />
<lastmod>2026-05-04T21:43:27.204Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/youtube-channels/micode</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/youtube-channels/micode" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/youtube-channels/micode" />
<lastmod>2026-05-04T21:43:27.360Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/youtube-channels/underscore</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/youtube-channels/underscore" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/youtube-channels/underscore" />
<lastmod>2026-05-04T21:43:27.483Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/youtube-channels/cookie-connecte</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/youtube-channels/cookie-connecte" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/youtube-channels/cookie-connecte" />
<lastmod>2026-05-04T21:43:27.683Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/youtube-channels/processus-thief</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/youtube-channels/processus-thief" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/youtube-channels/processus-thief" />
<lastmod>2026-05-04T21:43:27.809Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/les-virus-informatiques</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/les-virus-informatiques" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/les-virus-informatiques" />
<lastmod>2026-05-04T21:43:27.949Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/techniques-virales-avancees</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/techniques-virales-avancees" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/techniques-virales-avancees" />
<lastmod>2026-05-04T21:43:28.146Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/kubernetes-security</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/kubernetes-security" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/kubernetes-security" />
<lastmod>2026-05-05T08:12:40.924Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/cybersecurite-managers</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cybersecurite-managers" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cybersecurite-managers" />
<lastmod>2026-05-04T21:43:28.271Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/la-cyberdefense-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/la-cyberdefense-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/la-cyberdefense-2e" />
<lastmod>2026-05-04T21:43:28.387Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/zero-trust-networks</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/zero-trust-networks" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/zero-trust-networks" />
<lastmod>2026-05-05T08:12:40.992Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/alice-and-bob-learn-application-security</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/alice-and-bob-learn-application-security" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/alice-and-bob-learn-application-security" />
<lastmod>2026-05-05T08:12:41.067Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/films/the-internets-own-boy</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/films/the-internets-own-boy" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/films/the-internets-own-boy" />
<lastmod>2026-05-05T08:12:42.795Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/films/kill-chain-the-cyber-war-on-americas-elections</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/films/kill-chain-the-cyber-war-on-americas-elections" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/films/kill-chain-the-cyber-war-on-americas-elections" />
<lastmod>2026-05-05T08:12:42.864Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/films/the-perfect-weapon</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/films/the-perfect-weapon" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/films/the-perfect-weapon" />
<lastmod>2026-05-05T08:12:42.934Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/films/lo-and-behold-reveries-of-the-connected-world</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/films/lo-and-behold-reveries-of-the-connected-world" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/films/lo-and-behold-reveries-of-the-connected-world" />
<lastmod>2026-05-05T08:12:43.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/films/blackhat</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/films/blackhat" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/films/blackhat" />
<lastmod>2026-05-05T08:12:43.068Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/films/the-fifth-estate</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/films/the-fifth-estate" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/films/the-fifth-estate" />
<lastmod>2026-05-05T08:12:43.136Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/films/risk</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/films/risk" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/films/risk" />
<lastmod>2026-05-05T08:12:43.280Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/films/downloaded</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/films/downloaded" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/films/downloaded" />
<lastmod>2026-05-05T08:12:43.431Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/series/the-capture</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/series/the-capture" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/series/the-capture" />
<lastmod>2026-05-05T08:12:44.005Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/series/you-are-wanted</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/series/you-are-wanted" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/series/you-are-wanted" />
<lastmod>2026-05-05T08:12:44.084Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/series/scorpion</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/series/scorpion" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/series/scorpion" />
<lastmod>2026-05-05T08:12:44.151Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/series/leverage</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/series/leverage" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/series/leverage" />
<lastmod>2026-05-05T08:12:44.217Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/series/leverage-redemption</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/series/leverage-redemption" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/series/leverage-redemption" />
<lastmod>2026-05-05T08:12:44.374Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/series/westworld</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/series/westworld" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/series/westworld" />
<lastmod>2026-05-05T08:12:44.440Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/series/the-billion-dollar-code</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/series/the-billion-dollar-code" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/series/the-billion-dollar-code" />
<lastmod>2026-05-05T08:12:44.510Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/series/the-undeclared-war</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/series/the-undeclared-war" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/series/the-undeclared-war" />
<lastmod>2026-05-05T08:12:44.573Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/series/lazarus-heist</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/series/lazarus-heist" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/series/lazarus-heist" />
<lastmod>2026-05-05T08:12:44.638Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/series/this-world-the-cyber-arms-race</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/series/this-world-the-cyber-arms-race" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/series/this-world-the-cyber-arms-race" />
<lastmod>2026-05-05T08:12:44.701Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/podcasts/malicious-life</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/podcasts/malicious-life" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/podcasts/malicious-life" />
<lastmod>2026-05-05T08:12:45.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/practical-social-engineering</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-social-engineering" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-social-engineering" />
<lastmod>2026-05-05T08:12:38.950Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/podcasts/hacker-spirit</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/podcasts/hacker-spirit" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/podcasts/hacker-spirit" />
<lastmod>2026-05-04T19:00:07.175Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/films/nothing-to-hide-2017</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/films/nothing-to-hide-2017" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/films/nothing-to-hide-2017" />
<lastmod>2026-05-04T21:43:28.534Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/podcasts/cyber-mentor</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/podcasts/cyber-mentor" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/podcasts/cyber-mentor" />
<lastmod>2026-05-05T08:12:45.567Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/podcasts/no-name-security-podcast</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/podcasts/no-name-security-podcast" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/podcasts/no-name-security-podcast" />
<lastmod>2026-05-05T08:12:45.640Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/hacking-art-of-exploitation</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacking-art-of-exploitation" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacking-art-of-exploitation" />
<lastmod>2026-05-05T08:12:34.093Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/web-application-hackers-handbook</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/web-application-hackers-handbook" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/web-application-hackers-handbook" />
<lastmod>2026-05-05T08:12:34.167Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/art-of-software-security-assessment</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/art-of-software-security-assessment" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/art-of-software-security-assessment" />
<lastmod>2026-05-05T08:12:35.561Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/practical-iot-hacking</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-iot-hacking" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-iot-hacking" />
<lastmod>2026-05-05T08:12:36.743Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/building-secure-and-reliable-systems</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/building-secure-and-reliable-systems" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/building-secure-and-reliable-systems" />
<lastmod>2026-05-05T08:12:41.217Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/hardware-hacking-handbook</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hardware-hacking-handbook" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hardware-hacking-handbook" />
<lastmod>2026-05-05T08:12:41.285Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/a-hackers-mind</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/a-hackers-mind" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/a-hackers-mind" />
<lastmod>2026-05-05T08:12:41.351Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/the-hacker-and-the-state</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-hacker-and-the-state" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-hacker-and-the-state" />
<lastmod>2026-05-05T08:12:41.416Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/security-chaos-engineering</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/security-chaos-engineering" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/security-chaos-engineering" />
<lastmod>2026-05-05T08:12:41.485Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/films/open-source</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/films/open-source" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/films/open-source" />
<lastmod>2026-05-05T08:12:43.363Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/at-war-rise-of-military-internet-complex/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/at-war-rise-of-military-internet-complex/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/at-war-rise-of-military-internet-complex/alternatives" />
<lastmod>2026-05-05T08:12:35.826Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/at-war-rise-of-military-internet-complex/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/at-war-rise-of-military-internet-complex/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/at-war-rise-of-military-internet-complex/after" />
<lastmod>2026-05-05T08:12:35.826Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/at-war-rise-of-military-internet-complex/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/at-war-rise-of-military-internet-complex/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/at-war-rise-of-military-internet-complex/before" />
<lastmod>2026-05-05T08:12:35.826Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/bug-hunters-diary/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/bug-hunters-diary/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/bug-hunters-diary/alternatives" />
<lastmod>2026-05-05T08:12:38.378Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/bug-hunters-diary/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/bug-hunters-diary/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/bug-hunters-diary/after" />
<lastmod>2026-05-05T08:12:38.378Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/bug-hunters-diary/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/bug-hunters-diary/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/bug-hunters-diary/before" />
<lastmod>2026-05-05T08:12:38.378Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/a-hackers-mind/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/a-hackers-mind/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/a-hackers-mind/alternatives" />
<lastmod>2026-05-05T08:12:41.351Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/a-hackers-mind/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/a-hackers-mind/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/a-hackers-mind/after" />
<lastmod>2026-05-05T08:12:41.351Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/a-hackers-mind/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/a-hackers-mind/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/a-hackers-mind/before" />
<lastmod>2026-05-05T08:12:41.351Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/alice-and-bob-learn-application-security/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/alice-and-bob-learn-application-security/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/alice-and-bob-learn-application-security/alternatives" />
<lastmod>2026-05-05T08:12:41.067Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/alice-and-bob-learn-application-security/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/alice-and-bob-learn-application-security/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/alice-and-bob-learn-application-security/after" />
<lastmod>2026-05-05T08:12:41.067Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/alice-and-bob-learn-application-security/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/alice-and-bob-learn-application-security/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/alice-and-bob-learn-application-security/before" />
<lastmod>2026-05-05T08:12:41.067Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/android-security-internals/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/android-security-internals/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/android-security-internals/alternatives" />
<lastmod>2026-05-05T08:12:38.592Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/android-security-internals/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/android-security-internals/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/android-security-internals/after" />
<lastmod>2026-05-05T08:12:38.592Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/android-security-internals/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/android-security-internals/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/android-security-internals/before" />
<lastmod>2026-05-05T08:12:38.592Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/attacking-network-protocols/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/attacking-network-protocols/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/attacking-network-protocols/alternatives" />
<lastmod>2026-05-05T08:12:36.611Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/attacking-network-protocols/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/attacking-network-protocols/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/attacking-network-protocols/after" />
<lastmod>2026-05-05T08:12:36.611Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/attacking-network-protocols/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/attacking-network-protocols/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/attacking-network-protocols/before" />
<lastmod>2026-05-05T08:12:36.611Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/black-hat-bash/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-bash/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-bash/alternatives" />
<lastmod>2026-05-05T08:12:38.237Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/black-hat-bash/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-bash/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-bash/after" />
<lastmod>2026-05-05T08:12:38.237Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/black-hat-bash/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-bash/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-bash/before" />
<lastmod>2026-05-05T08:12:38.237Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/black-hat-go/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-go/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-go/alternatives" />
<lastmod>2026-05-05T08:12:36.331Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/black-hat-go/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-go/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-go/after" />
<lastmod>2026-05-05T08:12:36.331Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/black-hat-go/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-go/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-go/before" />
<lastmod>2026-05-05T08:12:36.331Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/black-hat-graphql/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-graphql/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-graphql/alternatives" />
<lastmod>2026-05-05T08:12:38.311Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/black-hat-graphql/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-graphql/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-graphql/after" />
<lastmod>2026-05-05T08:12:38.311Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/black-hat-graphql/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-graphql/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-graphql/before" />
<lastmod>2026-05-05T08:12:38.311Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/black-hat-python-2e/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-python-2e/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-python-2e/alternatives" />
<lastmod>2026-05-05T08:12:35.018Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/black-hat-python-2e/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-python-2e/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-python-2e/after" />
<lastmod>2026-05-05T08:12:35.018Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/black-hat-python-2e/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-python-2e/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-python-2e/before" />
<lastmod>2026-05-05T08:12:35.018Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/bug-bounty-bootcamp/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/bug-bounty-bootcamp/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/bug-bounty-bootcamp/alternatives" />
<lastmod>2026-05-05T08:12:36.869Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/bug-bounty-bootcamp/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/bug-bounty-bootcamp/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/bug-bounty-bootcamp/after" />
<lastmod>2026-05-05T08:12:36.869Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/bug-bounty-bootcamp/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/bug-bounty-bootcamp/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/bug-bounty-bootcamp/before" />
<lastmod>2026-05-05T08:12:36.869Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/building-secure-and-reliable-systems/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/building-secure-and-reliable-systems/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/building-secure-and-reliable-systems/alternatives" />
<lastmod>2026-05-05T08:12:41.217Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/building-secure-and-reliable-systems/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/building-secure-and-reliable-systems/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/building-secure-and-reliable-systems/after" />
<lastmod>2026-05-05T08:12:41.217Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/building-secure-and-reliable-systems/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/building-secure-and-reliable-systems/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/building-secure-and-reliable-systems/before" />
<lastmod>2026-05-05T08:12:41.217Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/click-here-to-kill-everybody/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/click-here-to-kill-everybody/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/click-here-to-kill-everybody/alternatives" />
<lastmod>2026-05-05T08:12:39.499Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/click-here-to-kill-everybody/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/click-here-to-kill-everybody/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/click-here-to-kill-everybody/after" />
<lastmod>2026-05-05T08:12:39.499Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/click-here-to-kill-everybody/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/click-here-to-kill-everybody/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/click-here-to-kill-everybody/before" />
<lastmod>2026-05-05T08:12:39.499Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/container-security/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/container-security/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/container-security/alternatives" />
<lastmod>2026-05-05T08:12:40.792Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/container-security/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/container-security/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/container-security/after" />
<lastmod>2026-05-05T08:12:40.792Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/container-security/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/container-security/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/container-security/before" />
<lastmod>2026-05-05T08:12:40.792Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/countdown-to-zero-day/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/countdown-to-zero-day/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/countdown-to-zero-day/alternatives" />
<lastmod>2026-05-05T08:12:34.891Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/countdown-to-zero-day/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/countdown-to-zero-day/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/countdown-to-zero-day/after" />
<lastmod>2026-05-05T08:12:34.891Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/countdown-to-zero-day/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/countdown-to-zero-day/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/countdown-to-zero-day/before" />
<lastmod>2026-05-05T08:12:34.891Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/crypto-dictionary/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/crypto-dictionary/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/crypto-dictionary/alternatives" />
<lastmod>2026-05-05T08:12:37.667Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/crypto-dictionary/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/crypto-dictionary/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/crypto-dictionary/after" />
<lastmod>2026-05-05T08:12:37.667Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/crypto-dictionary/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/crypto-dictionary/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/crypto-dictionary/before" />
<lastmod>2026-05-05T08:12:37.667Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/cryptography-engineering/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cryptography-engineering/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cryptography-engineering/alternatives" />
<lastmod>2026-05-05T08:12:34.401Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/cryptography-engineering/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cryptography-engineering/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cryptography-engineering/after" />
<lastmod>2026-05-05T08:12:34.401Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/cryptography-engineering/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cryptography-engineering/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cryptography-engineering/before" />
<lastmod>2026-05-05T08:12:34.401Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/cult-of-the-dead-cow/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cult-of-the-dead-cow/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cult-of-the-dead-cow/alternatives" />
<lastmod>2026-05-05T08:12:40.239Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/cult-of-the-dead-cow/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cult-of-the-dead-cow/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cult-of-the-dead-cow/after" />
<lastmod>2026-05-05T08:12:40.239Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/cult-of-the-dead-cow/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cult-of-the-dead-cow/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cult-of-the-dead-cow/before" />
<lastmod>2026-05-05T08:12:40.239Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/cyberjutsu/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cyberjutsu/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cyberjutsu/alternatives" />
<lastmod>2026-05-05T08:12:37.307Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/cyberjutsu/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cyberjutsu/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cyberjutsu/after" />
<lastmod>2026-05-05T08:12:37.307Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/cyberjutsu/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cyberjutsu/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cyberjutsu/before" />
<lastmod>2026-05-05T08:12:37.307Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/cybersecurite-managers/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cybersecurite-managers/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cybersecurite-managers/alternatives" />
<lastmod>2026-05-04T21:43:28.271Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/cybersecurite-managers/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cybersecurite-managers/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cybersecurite-managers/after" />
<lastmod>2026-05-04T21:43:28.271Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/cybersecurite-managers/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cybersecurite-managers/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cybersecurite-managers/before" />
<lastmod>2026-05-04T21:43:28.271Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/dark-territory/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/dark-territory/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/dark-territory/alternatives" />
<lastmod>2026-05-05T08:12:35.761Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/dark-territory/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/dark-territory/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/dark-territory/after" />
<lastmod>2026-05-05T08:12:35.761Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/dark-territory/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/dark-territory/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/dark-territory/before" />
<lastmod>2026-05-05T08:12:35.761Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/designing-secure-software/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/designing-secure-software/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/designing-secure-software/alternatives" />
<lastmod>2026-05-05T08:12:37.530Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/designing-secure-software/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/designing-secure-software/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/designing-secure-software/after" />
<lastmod>2026-05-05T08:12:37.530Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/designing-secure-software/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/designing-secure-software/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/designing-secure-software/before" />
<lastmod>2026-05-05T08:12:37.530Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/evasive-malware/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/evasive-malware/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/evasive-malware/alternatives" />
<lastmod>2026-05-05T08:12:37.375Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/evasive-malware/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/evasive-malware/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/evasive-malware/after" />
<lastmod>2026-05-05T08:12:37.375Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/evasive-malware/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/evasive-malware/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/evasive-malware/before" />
<lastmod>2026-05-05T08:12:37.375Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/extreme-privacy-5e/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/extreme-privacy-5e/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/extreme-privacy-5e/alternatives" />
<lastmod>2026-05-05T08:12:39.172Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/extreme-privacy-5e/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/extreme-privacy-5e/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/extreme-privacy-5e/after" />
<lastmod>2026-05-05T08:12:39.172Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/extreme-privacy-5e/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/extreme-privacy-5e/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/extreme-privacy-5e/before" />
<lastmod>2026-05-05T08:12:39.172Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/foundations-of-information-security/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/foundations-of-information-security/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/foundations-of-information-security/alternatives" />
<lastmod>2026-05-05T08:12:37.238Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/foundations-of-information-security/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/foundations-of-information-security/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/foundations-of-information-security/after" />
<lastmod>2026-05-05T08:12:37.238Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/foundations-of-information-security/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/foundations-of-information-security/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/foundations-of-information-security/before" />
<lastmod>2026-05-05T08:12:37.238Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/ghost-in-the-wires/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/ghost-in-the-wires/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/ghost-in-the-wires/alternatives" />
<lastmod>2026-05-05T08:12:36.113Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/ghost-in-the-wires/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/ghost-in-the-wires/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/ghost-in-the-wires/after" />
<lastmod>2026-05-05T08:12:36.113Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/ghost-in-the-wires/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/ghost-in-the-wires/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/ghost-in-the-wires/before" />
<lastmod>2026-05-05T08:12:36.113Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/gray-hat-hacking-6e/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/gray-hat-hacking-6e/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/gray-hat-hacking-6e/alternatives" />
<lastmod>2026-05-05T08:12:39.804Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/gray-hat-hacking-6e/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/gray-hat-hacking-6e/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/gray-hat-hacking-6e/after" />
<lastmod>2026-05-05T08:12:39.804Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/gray-hat-hacking-6e/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/gray-hat-hacking-6e/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/gray-hat-hacking-6e/before" />
<lastmod>2026-05-05T08:12:39.804Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/hacking-apis/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacking-apis/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacking-apis/alternatives" />
<lastmod>2026-05-05T08:12:36.803Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/hacking-apis/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacking-apis/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacking-apis/after" />
<lastmod>2026-05-05T08:12:36.803Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/hacking-apis/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacking-apis/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacking-apis/before" />
<lastmod>2026-05-05T08:12:36.803Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/hacking-the-xbox/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacking-the-xbox/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacking-the-xbox/alternatives" />
<lastmod>2026-05-05T08:12:38.738Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/hacking-the-xbox/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacking-the-xbox/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacking-the-xbox/after" />
<lastmod>2026-05-05T08:12:38.738Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/hacking-the-xbox/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacking-the-xbox/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacking-the-xbox/before" />
<lastmod>2026-05-05T08:12:38.738Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/hacking-art-of-exploitation/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacking-art-of-exploitation/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacking-art-of-exploitation/alternatives" />
<lastmod>2026-05-05T08:12:34.093Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/hacking-art-of-exploitation/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacking-art-of-exploitation/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacking-art-of-exploitation/after" />
<lastmod>2026-05-05T08:12:34.093Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/hacking-art-of-exploitation/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacking-art-of-exploitation/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacking-art-of-exploitation/before" />
<lastmod>2026-05-05T08:12:34.093Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/hacks-leaks-and-revelations/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacks-leaks-and-revelations/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacks-leaks-and-revelations/alternatives" />
<lastmod>2026-05-05T08:12:37.941Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/hacks-leaks-and-revelations/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacks-leaks-and-revelations/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacks-leaks-and-revelations/after" />
<lastmod>2026-05-05T08:12:37.941Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/hacks-leaks-and-revelations/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacks-leaks-and-revelations/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacks-leaks-and-revelations/before" />
<lastmod>2026-05-05T08:12:37.941Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/how-cybersecurity-really-works/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/how-cybersecurity-really-works/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/how-cybersecurity-really-works/alternatives" />
<lastmod>2026-05-05T08:12:38.165Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/how-cybersecurity-really-works/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/how-cybersecurity-really-works/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/how-cybersecurity-really-works/after" />
<lastmod>2026-05-05T08:12:38.165Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/how-cybersecurity-really-works/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/how-cybersecurity-really-works/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/how-cybersecurity-really-works/before" />
<lastmod>2026-05-05T08:12:38.165Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/incident-response-and-computer-forensics-3e/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/incident-response-and-computer-forensics-3e/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/incident-response-and-computer-forensics-3e/alternatives" />
<lastmod>2026-05-05T08:12:39.942Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/incident-response-and-computer-forensics-3e/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/incident-response-and-computer-forensics-3e/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/incident-response-and-computer-forensics-3e/after" />
<lastmod>2026-05-05T08:12:39.942Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/incident-response-and-computer-forensics-3e/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/incident-response-and-computer-forensics-3e/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/incident-response-and-computer-forensics-3e/before" />
<lastmod>2026-05-05T08:12:39.942Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/ios-application-security/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/ios-application-security/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/ios-application-security/alternatives" />
<lastmod>2026-05-05T08:12:38.671Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/ios-application-security/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/ios-application-security/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/ios-application-security/after" />
<lastmod>2026-05-05T08:12:38.671Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/ios-application-security/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/ios-application-security/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/ios-application-security/before" />
<lastmod>2026-05-05T08:12:38.671Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/kingpin/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/kingpin/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/kingpin/alternatives" />
<lastmod>2026-05-05T08:12:40.309Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/kingpin/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/kingpin/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/kingpin/after" />
<lastmod>2026-05-05T08:12:40.309Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/kingpin/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/kingpin/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/kingpin/before" />
<lastmod>2026-05-05T08:12:40.309Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/kubernetes-security/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/kubernetes-security/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/kubernetes-security/alternatives" />
<lastmod>2026-05-05T08:12:40.924Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/kubernetes-security/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/kubernetes-security/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/kubernetes-security/after" />
<lastmod>2026-05-05T08:12:40.924Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/kubernetes-security/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/kubernetes-security/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/kubernetes-security/before" />
<lastmod>2026-05-05T08:12:40.924Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/kubernetes-security-and-observability/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/kubernetes-security-and-observability/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/kubernetes-security-and-observability/alternatives" />
<lastmod>2026-05-05T08:12:40.858Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/kubernetes-security-and-observability/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/kubernetes-security-and-observability/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/kubernetes-security-and-observability/after" />
<lastmod>2026-05-05T08:12:40.858Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/kubernetes-security-and-observability/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/kubernetes-security-and-observability/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/kubernetes-security-and-observability/before" />
<lastmod>2026-05-05T08:12:40.858Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/la-cyberdefense-2e/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/la-cyberdefense-2e/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/la-cyberdefense-2e/alternatives" />
<lastmod>2026-05-04T21:43:28.387Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/la-cyberdefense-2e/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/la-cyberdefense-2e/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/la-cyberdefense-2e/after" />
<lastmod>2026-05-04T21:43:28.387Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/la-cyberdefense-2e/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/la-cyberdefense-2e/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/la-cyberdefense-2e/before" />
<lastmod>2026-05-04T21:43:28.387Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/les-virus-informatiques/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/les-virus-informatiques/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/les-virus-informatiques/alternatives" />
<lastmod>2026-05-04T21:43:27.949Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/les-virus-informatiques/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/les-virus-informatiques/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/les-virus-informatiques/after" />
<lastmod>2026-05-04T21:43:27.949Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/les-virus-informatiques/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/les-virus-informatiques/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/les-virus-informatiques/before" />
<lastmod>2026-05-04T21:43:27.949Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/linux-basics-for-hackers-2e/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/linux-basics-for-hackers-2e/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/linux-basics-for-hackers-2e/alternatives" />
<lastmod>2026-05-05T08:12:36.478Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/linux-basics-for-hackers-2e/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/linux-basics-for-hackers-2e/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/linux-basics-for-hackers-2e/after" />
<lastmod>2026-05-05T08:12:36.478Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/linux-basics-for-hackers-2e/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/linux-basics-for-hackers-2e/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/linux-basics-for-hackers-2e/before" />
<lastmod>2026-05-05T08:12:36.478Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/linux-firewalls-rash/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/linux-firewalls-rash/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/linux-firewalls-rash/alternatives" />
<lastmod>2026-05-05T08:12:38.809Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/linux-firewalls-rash/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/linux-firewalls-rash/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/linux-firewalls-rash/after" />
<lastmod>2026-05-05T08:12:38.809Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/linux-firewalls-rash/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/linux-firewalls-rash/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/linux-firewalls-rash/before" />
<lastmod>2026-05-05T08:12:38.809Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/locksport/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/locksport/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/locksport/alternatives" />
<lastmod>2026-05-05T08:12:38.086Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/locksport/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/locksport/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/locksport/after" />
<lastmod>2026-05-05T08:12:38.086Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/locksport/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/locksport/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/locksport/before" />
<lastmod>2026-05-05T08:12:38.086Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/malware-data-science/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/malware-data-science/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/malware-data-science/alternatives" />
<lastmod>2026-05-05T08:12:37.600Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/malware-data-science/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/malware-data-science/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/malware-data-science/after" />
<lastmod>2026-05-05T08:12:37.600Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/malware-data-science/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/malware-data-science/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/malware-data-science/before" />
<lastmod>2026-05-05T08:12:37.600Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/metasploit-2e/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/metasploit-2e/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/metasploit-2e/alternatives" />
<lastmod>2026-05-05T08:12:36.190Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/metasploit-2e/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/metasploit-2e/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/metasploit-2e/after" />
<lastmod>2026-05-05T08:12:36.190Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/metasploit-2e/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/metasploit-2e/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/metasploit-2e/before" />
<lastmod>2026-05-05T08:12:36.190Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/network-security-through-data-analysis-2e/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/network-security-through-data-analysis-2e/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/network-security-through-data-analysis-2e/alternatives" />
<lastmod>2026-05-05T08:12:35.627Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/network-security-through-data-analysis-2e/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/network-security-through-data-analysis-2e/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/network-security-through-data-analysis-2e/after" />
<lastmod>2026-05-05T08:12:35.627Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/network-security-through-data-analysis-2e/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/network-security-through-data-analysis-2e/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/network-security-through-data-analysis-2e/before" />
<lastmod>2026-05-05T08:12:35.627Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/open-source-intelligence-techniques-tools/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/open-source-intelligence-techniques-tools/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/open-source-intelligence-techniques-tools/alternatives" />
<lastmod>2026-05-05T08:12:39.235Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/open-source-intelligence-techniques-tools/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/open-source-intelligence-techniques-tools/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/open-source-intelligence-techniques-tools/after" />
<lastmod>2026-05-05T08:12:39.235Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/open-source-intelligence-techniques-tools/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/open-source-intelligence-techniques-tools/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/open-source-intelligence-techniques-tools/before" />
<lastmod>2026-05-05T08:12:39.235Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/osint-techniques-11e/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/osint-techniques-11e/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/osint-techniques-11e/alternatives" />
<lastmod>2026-05-05T08:12:39.102Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/osint-techniques-11e/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/osint-techniques-11e/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/osint-techniques-11e/after" />
<lastmod>2026-05-05T08:12:39.102Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/osint-techniques-11e/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/osint-techniques-11e/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/osint-techniques-11e/before" />
<lastmod>2026-05-05T08:12:39.102Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/penetration-testing-weidman/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/penetration-testing-weidman/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/penetration-testing-weidman/alternatives" />
<lastmod>2026-05-05T08:12:36.254Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/penetration-testing-weidman/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/penetration-testing-weidman/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/penetration-testing-weidman/after" />
<lastmod>2026-05-05T08:12:36.254Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/penetration-testing-weidman/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/penetration-testing-weidman/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/penetration-testing-weidman/before" />
<lastmod>2026-05-05T08:12:36.254Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/pentesting-azure-applications/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/pentesting-azure-applications/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/pentesting-azure-applications/alternatives" />
<lastmod>2026-05-05T08:12:37.735Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/pentesting-azure-applications/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/pentesting-azure-applications/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/pentesting-azure-applications/after" />
<lastmod>2026-05-05T08:12:37.735Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/pentesting-azure-applications/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/pentesting-azure-applications/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/pentesting-azure-applications/before" />
<lastmod>2026-05-05T08:12:37.735Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/permanent-record/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/permanent-record/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/permanent-record/alternatives" />
<lastmod>2026-05-05T08:12:39.434Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/permanent-record/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/permanent-record/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/permanent-record/after" />
<lastmod>2026-05-05T08:12:39.434Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/permanent-record/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/permanent-record/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/permanent-record/before" />
<lastmod>2026-05-05T08:12:39.434Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/practical-binary-analysis/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-binary-analysis/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-binary-analysis/alternatives" />
<lastmod>2026-05-05T08:12:37.021Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/practical-binary-analysis/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-binary-analysis/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-binary-analysis/after" />
<lastmod>2026-05-05T08:12:37.021Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/practical-binary-analysis/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-binary-analysis/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-binary-analysis/before" />
<lastmod>2026-05-05T08:12:37.021Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/practical-iot-hacking/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-iot-hacking/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-iot-hacking/alternatives" />
<lastmod>2026-05-05T08:12:36.743Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/practical-iot-hacking/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-iot-hacking/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-iot-hacking/after" />
<lastmod>2026-05-05T08:12:36.743Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/practical-iot-hacking/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-iot-hacking/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-iot-hacking/before" />
<lastmod>2026-05-05T08:12:36.743Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/practical-linux-forensics/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-linux-forensics/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-linux-forensics/alternatives" />
<lastmod>2026-05-05T08:12:37.164Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/practical-linux-forensics/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-linux-forensics/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-linux-forensics/after" />
<lastmod>2026-05-05T08:12:37.164Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/practical-linux-forensics/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-linux-forensics/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-linux-forensics/before" />
<lastmod>2026-05-05T08:12:37.164Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/practical-malware-analysis/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-malware-analysis/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-malware-analysis/alternatives" />
<lastmod>2026-05-05T08:12:34.241Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/practical-malware-analysis/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-malware-analysis/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-malware-analysis/after" />
<lastmod>2026-05-05T08:12:34.241Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/practical-malware-analysis/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-malware-analysis/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-malware-analysis/before" />
<lastmod>2026-05-05T08:12:34.241Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/practical-packet-analysis-3e/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-packet-analysis-3e/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-packet-analysis-3e/alternatives" />
<lastmod>2026-05-05T08:12:37.804Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/practical-packet-analysis-3e/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-packet-analysis-3e/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-packet-analysis-3e/after" />
<lastmod>2026-05-05T08:12:37.804Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/practical-packet-analysis-3e/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-packet-analysis-3e/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-packet-analysis-3e/before" />
<lastmod>2026-05-05T08:12:37.804Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/practical-reverse-engineering/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-reverse-engineering/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-reverse-engineering/alternatives" />
<lastmod>2026-05-05T08:12:35.086Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/practical-reverse-engineering/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-reverse-engineering/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-reverse-engineering/after" />
<lastmod>2026-05-05T08:12:35.086Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/practical-reverse-engineering/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-reverse-engineering/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-reverse-engineering/before" />
<lastmod>2026-05-05T08:12:35.086Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/practical-social-engineering/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-social-engineering/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-social-engineering/alternatives" />
<lastmod>2026-05-05T08:12:38.950Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/practical-social-engineering/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-social-engineering/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-social-engineering/after" />
<lastmod>2026-05-05T08:12:38.950Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/practical-social-engineering/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-social-engineering/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-social-engineering/before" />
<lastmod>2026-05-05T08:12:38.950Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/real-world-bug-hunting/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/real-world-bug-hunting/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/real-world-bug-hunting/alternatives" />
<lastmod>2026-05-05T08:12:35.218Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/real-world-bug-hunting/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/real-world-bug-hunting/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/real-world-bug-hunting/after" />
<lastmod>2026-05-05T08:12:35.218Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/real-world-bug-hunting/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/real-world-bug-hunting/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/real-world-bug-hunting/before" />
<lastmod>2026-05-05T08:12:35.218Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/real-world-cryptography/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/real-world-cryptography/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/real-world-cryptography/alternatives" />
<lastmod>2026-05-05T08:12:35.429Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/real-world-cryptography/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/real-world-cryptography/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/real-world-cryptography/after" />
<lastmod>2026-05-05T08:12:35.429Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/real-world-cryptography/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/real-world-cryptography/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/real-world-cryptography/before" />
<lastmod>2026-05-05T08:12:35.429Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/rootkits-and-bootkits/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/rootkits-and-bootkits/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/rootkits-and-bootkits/alternatives" />
<lastmod>2026-05-05T08:12:35.280Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/rootkits-and-bootkits/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/rootkits-and-bootkits/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/rootkits-and-bootkits/after" />
<lastmod>2026-05-05T08:12:35.280Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/rootkits-and-bootkits/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/rootkits-and-bootkits/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/rootkits-and-bootkits/before" />
<lastmod>2026-05-05T08:12:35.280Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/sandworm/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/sandworm/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/sandworm/alternatives" />
<lastmod>2026-05-05T08:12:34.539Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/sandworm/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/sandworm/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/sandworm/after" />
<lastmod>2026-05-05T08:12:34.539Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/sandworm/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/sandworm/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/sandworm/before" />
<lastmod>2026-05-05T08:12:34.539Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/security-chaos-engineering/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/security-chaos-engineering/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/security-chaos-engineering/alternatives" />
<lastmod>2026-05-05T08:12:41.485Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/security-chaos-engineering/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/security-chaos-engineering/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/security-chaos-engineering/after" />
<lastmod>2026-05-05T08:12:41.485Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/security-chaos-engineering/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/security-chaos-engineering/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/security-chaos-engineering/before" />
<lastmod>2026-05-05T08:12:41.485Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/security-engineering-3e/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/security-engineering-3e/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/security-engineering-3e/alternatives" />
<lastmod>2026-05-05T08:12:34.607Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/security-engineering-3e/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/security-engineering-3e/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/security-engineering-3e/after" />
<lastmod>2026-05-05T08:12:34.607Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/security-engineering-3e/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/security-engineering-3e/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/security-engineering-3e/before" />
<lastmod>2026-05-05T08:12:34.607Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/serious-cryptography-2e/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/serious-cryptography-2e/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/serious-cryptography-2e/alternatives" />
<lastmod>2026-05-05T08:12:35.496Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/serious-cryptography-2e/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/serious-cryptography-2e/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/serious-cryptography-2e/after" />
<lastmod>2026-05-05T08:12:35.496Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/serious-cryptography-2e/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/serious-cryptography-2e/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/serious-cryptography-2e/before" />
<lastmod>2026-05-05T08:12:35.496Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/silence-on-the-wire/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/silence-on-the-wire/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/silence-on-the-wire/alternatives" />
<lastmod>2026-05-05T08:12:38.444Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/silence-on-the-wire/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/silence-on-the-wire/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/silence-on-the-wire/after" />
<lastmod>2026-05-05T08:12:38.444Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/silence-on-the-wire/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/silence-on-the-wire/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/silence-on-the-wire/before" />
<lastmod>2026-05-05T08:12:38.444Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/social-engineering-2e/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/social-engineering-2e/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/social-engineering-2e/alternatives" />
<lastmod>2026-05-05T08:12:40.438Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/social-engineering-2e/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/social-engineering-2e/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/social-engineering-2e/after" />
<lastmod>2026-05-05T08:12:40.438Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/social-engineering-2e/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/social-engineering-2e/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/social-engineering-2e/before" />
<lastmod>2026-05-05T08:12:40.438Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/spam-nation/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/spam-nation/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/spam-nation/alternatives" />
<lastmod>2026-05-05T08:12:40.374Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/spam-nation/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/spam-nation/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/spam-nation/after" />
<lastmod>2026-05-05T08:12:40.374Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/spam-nation/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/spam-nation/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/spam-nation/before" />
<lastmod>2026-05-05T08:12:40.374Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/techniques-virales-avancees/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/techniques-virales-avancees/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/techniques-virales-avancees/alternatives" />
<lastmod>2026-05-04T21:43:28.146Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/techniques-virales-avancees/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/techniques-virales-avancees/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/techniques-virales-avancees/after" />
<lastmod>2026-05-04T21:43:28.146Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/techniques-virales-avancees/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/techniques-virales-avancees/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/techniques-virales-avancees/before" />
<lastmod>2026-05-04T21:43:28.146Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/the-art-of-deception/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-art-of-deception/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-art-of-deception/alternatives" />
<lastmod>2026-05-05T08:12:39.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/the-art-of-deception/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-art-of-deception/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-art-of-deception/after" />
<lastmod>2026-05-05T08:12:39.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/the-art-of-deception/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-art-of-deception/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-art-of-deception/before" />
<lastmod>2026-05-05T08:12:39.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/the-art-of-intrusion/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-art-of-intrusion/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-art-of-intrusion/alternatives" />
<lastmod>2026-05-05T08:12:39.726Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/the-art-of-intrusion/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-art-of-intrusion/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-art-of-intrusion/after" />
<lastmod>2026-05-05T08:12:39.726Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/the-art-of-intrusion/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-art-of-intrusion/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-art-of-intrusion/before" />
<lastmod>2026-05-05T08:12:39.726Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/art-of-mac-malware-v1/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/art-of-mac-malware-v1/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/art-of-mac-malware-v1/alternatives" />
<lastmod>2026-05-05T08:12:36.679Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/art-of-mac-malware-v1/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/art-of-mac-malware-v1/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/art-of-mac-malware-v1/after" />
<lastmod>2026-05-05T08:12:36.679Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/art-of-mac-malware-v1/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/art-of-mac-malware-v1/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/art-of-mac-malware-v1/before" />
<lastmod>2026-05-05T08:12:36.679Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/the-art-of-memory-forensics/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-art-of-memory-forensics/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-art-of-memory-forensics/alternatives" />
<lastmod>2026-05-05T08:12:39.870Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/the-art-of-memory-forensics/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-art-of-memory-forensics/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-art-of-memory-forensics/after" />
<lastmod>2026-05-05T08:12:39.870Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/the-art-of-memory-forensics/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-art-of-memory-forensics/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-art-of-memory-forensics/before" />
<lastmod>2026-05-05T08:12:39.870Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/art-of-software-security-assessment/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/art-of-software-security-assessment/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/art-of-software-security-assessment/alternatives" />
<lastmod>2026-05-05T08:12:35.561Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/art-of-software-security-assessment/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/art-of-software-security-assessment/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/art-of-software-security-assessment/after" />
<lastmod>2026-05-05T08:12:35.561Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/art-of-software-security-assessment/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/art-of-software-security-assessment/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/art-of-software-security-assessment/before" />
<lastmod>2026-05-05T08:12:35.561Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/car-hackers-handbook/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/car-hackers-handbook/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/car-hackers-handbook/alternatives" />
<lastmod>2026-05-05T08:12:36.545Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/car-hackers-handbook/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/car-hackers-handbook/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/car-hackers-handbook/after" />
<lastmod>2026-05-05T08:12:36.545Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/car-hackers-handbook/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/car-hackers-handbook/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/car-hackers-handbook/before" />
<lastmod>2026-05-05T08:12:36.545Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/the-cuckoos-egg/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-cuckoos-egg/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-cuckoos-egg/alternatives" />
<lastmod>2026-05-05T08:12:34.740Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/the-cuckoos-egg/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-cuckoos-egg/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-cuckoos-egg/after" />
<lastmod>2026-05-05T08:12:34.740Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/the-cuckoos-egg/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-cuckoos-egg/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-cuckoos-egg/before" />
<lastmod>2026-05-05T08:12:34.740Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/the-cyber-effect/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-cyber-effect/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-cyber-effect/alternatives" />
<lastmod>2026-05-05T08:12:40.170Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/the-cyber-effect/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-cyber-effect/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-cyber-effect/after" />
<lastmod>2026-05-05T08:12:40.170Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/the-cyber-effect/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-cyber-effect/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-cyber-effect/before" />
<lastmod>2026-05-05T08:12:40.170Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/the-database-hackers-handbook/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-database-hackers-handbook/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-database-hackers-handbook/alternatives" />
<lastmod>2026-05-05T08:12:40.725Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/the-database-hackers-handbook/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-database-hackers-handbook/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-database-hackers-handbook/after" />
<lastmod>2026-05-05T08:12:40.725Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/the-database-hackers-handbook/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-database-hackers-handbook/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-database-hackers-handbook/before" />
<lastmod>2026-05-05T08:12:40.725Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/the-hacker-and-the-state/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-hacker-and-the-state/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-hacker-and-the-state/alternatives" />
<lastmod>2026-05-05T08:12:41.416Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/the-hacker-and-the-state/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-hacker-and-the-state/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-hacker-and-the-state/after" />
<lastmod>2026-05-05T08:12:41.416Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/the-hacker-and-the-state/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-hacker-and-the-state/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-hacker-and-the-state/before" />
<lastmod>2026-05-05T08:12:41.416Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/the-hacker-playbook-3/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-hacker-playbook-3/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-hacker-playbook-3/alternatives" />
<lastmod>2026-05-05T08:12:38.879Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/the-hacker-playbook-3/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-hacker-playbook-3/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-hacker-playbook-3/after" />
<lastmod>2026-05-05T08:12:38.879Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/the-hacker-playbook-3/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-hacker-playbook-3/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-hacker-playbook-3/before" />
<lastmod>2026-05-05T08:12:38.879Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/hardware-hacking-handbook/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hardware-hacking-handbook/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hardware-hacking-handbook/alternatives" />
<lastmod>2026-05-05T08:12:41.285Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/hardware-hacking-handbook/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hardware-hacking-handbook/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hardware-hacking-handbook/after" />
<lastmod>2026-05-05T08:12:41.285Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/hardware-hacking-handbook/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hardware-hacking-handbook/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hardware-hacking-handbook/before" />
<lastmod>2026-05-05T08:12:41.285Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/ida-pro-book-2e/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/ida-pro-book-2e/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/ida-pro-book-2e/alternatives" />
<lastmod>2026-05-05T08:12:35.151Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/ida-pro-book-2e/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/ida-pro-book-2e/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/ida-pro-book-2e/after" />
<lastmod>2026-05-05T08:12:35.151Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/ida-pro-book-2e/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/ida-pro-book-2e/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/ida-pro-book-2e/before" />
<lastmod>2026-05-05T08:12:35.151Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/the-mac-hackers-handbook/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-mac-hackers-handbook/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-mac-hackers-handbook/alternatives" />
<lastmod>2026-05-05T08:12:40.507Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/the-mac-hackers-handbook/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-mac-hackers-handbook/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-mac-hackers-handbook/after" />
<lastmod>2026-05-05T08:12:40.507Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/the-mac-hackers-handbook/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-mac-hackers-handbook/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-mac-hackers-handbook/before" />
<lastmod>2026-05-05T08:12:40.507Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/the-mobile-application-hackers-handbook/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-mobile-application-hackers-handbook/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-mobile-application-hackers-handbook/alternatives" />
<lastmod>2026-05-05T08:12:40.658Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/the-mobile-application-hackers-handbook/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-mobile-application-hackers-handbook/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-mobile-application-hackers-handbook/after" />
<lastmod>2026-05-05T08:12:40.658Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/the-mobile-application-hackers-handbook/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-mobile-application-hackers-handbook/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-mobile-application-hackers-handbook/before" />
<lastmod>2026-05-05T08:12:40.658Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/practice-of-network-security-monitoring/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practice-of-network-security-monitoring/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practice-of-network-security-monitoring/alternatives" />
<lastmod>2026-05-05T08:12:37.871Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/practice-of-network-security-monitoring/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practice-of-network-security-monitoring/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practice-of-network-security-monitoring/after" />
<lastmod>2026-05-05T08:12:37.871Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/practice-of-network-security-monitoring/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practice-of-network-security-monitoring/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practice-of-network-security-monitoring/before" />
<lastmod>2026-05-05T08:12:37.871Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/the-pragmatic-programmer-20a/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-pragmatic-programmer-20a/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-pragmatic-programmer-20a/alternatives" />
<lastmod>2026-05-05T08:12:40.009Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/the-pragmatic-programmer-20a/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-pragmatic-programmer-20a/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-pragmatic-programmer-20a/after" />
<lastmod>2026-05-05T08:12:40.009Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/the-pragmatic-programmer-20a/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-pragmatic-programmer-20a/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-pragmatic-programmer-20a/before" />
<lastmod>2026-05-05T08:12:40.009Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/shellcoders-handbook-2e/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/shellcoders-handbook-2e/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/shellcoders-handbook-2e/alternatives" />
<lastmod>2026-05-05T08:12:34.955Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/shellcoders-handbook-2e/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/shellcoders-handbook-2e/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/shellcoders-handbook-2e/after" />
<lastmod>2026-05-05T08:12:34.955Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/shellcoders-handbook-2e/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/shellcoders-handbook-2e/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/shellcoders-handbook-2e/before" />
<lastmod>2026-05-05T08:12:34.955Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/the-tangled-web/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-tangled-web/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-tangled-web/alternatives" />
<lastmod>2026-05-05T08:12:34.471Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/the-tangled-web/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-tangled-web/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-tangled-web/after" />
<lastmod>2026-05-05T08:12:34.471Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/the-tangled-web/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-tangled-web/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-tangled-web/before" />
<lastmod>2026-05-05T08:12:34.471Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/web-application-hackers-handbook/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/web-application-hackers-handbook/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/web-application-hackers-handbook/alternatives" />
<lastmod>2026-05-05T08:12:34.167Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/web-application-hackers-handbook/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/web-application-hackers-handbook/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/web-application-hackers-handbook/after" />
<lastmod>2026-05-05T08:12:34.167Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/web-application-hackers-handbook/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/web-application-hackers-handbook/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/web-application-hackers-handbook/before" />
<lastmod>2026-05-05T08:12:34.167Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/this-is-how-they-tell-me-the-world-ends/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/this-is-how-they-tell-me-the-world-ends/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/this-is-how-they-tell-me-the-world-ends/alternatives" />
<lastmod>2026-05-05T08:12:35.976Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/this-is-how-they-tell-me-the-world-ends/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/this-is-how-they-tell-me-the-world-ends/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/this-is-how-they-tell-me-the-world-ends/after" />
<lastmod>2026-05-05T08:12:35.976Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/this-is-how-they-tell-me-the-world-ends/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/this-is-how-they-tell-me-the-world-ends/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/this-is-how-they-tell-me-the-world-ends/before" />
<lastmod>2026-05-05T08:12:35.976Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/threat-modeling-designing-for-security/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/threat-modeling-designing-for-security/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/threat-modeling-designing-for-security/alternatives" />
<lastmod>2026-05-05T08:12:34.680Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/threat-modeling-designing-for-security/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/threat-modeling-designing-for-security/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/threat-modeling-designing-for-security/after" />
<lastmod>2026-05-05T08:12:34.680Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/threat-modeling-designing-for-security/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/threat-modeling-designing-for-security/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/threat-modeling-designing-for-security/before" />
<lastmod>2026-05-05T08:12:34.680Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/tracers-in-the-dark/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/tracers-in-the-dark/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/tracers-in-the-dark/alternatives" />
<lastmod>2026-05-05T08:12:39.365Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/tracers-in-the-dark/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/tracers-in-the-dark/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/tracers-in-the-dark/after" />
<lastmod>2026-05-05T08:12:39.365Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/tracers-in-the-dark/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/tracers-in-the-dark/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/tracers-in-the-dark/before" />
<lastmod>2026-05-05T08:12:39.365Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/tribe-of-hackers/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/tribe-of-hackers/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/tribe-of-hackers/alternatives" />
<lastmod>2026-05-05T08:12:36.042Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/tribe-of-hackers/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/tribe-of-hackers/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/tribe-of-hackers/after" />
<lastmod>2026-05-05T08:12:36.042Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/tribe-of-hackers/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/tribe-of-hackers/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/tribe-of-hackers/before" />
<lastmod>2026-05-05T08:12:36.042Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/we-are-anonymous/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/we-are-anonymous/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/we-are-anonymous/alternatives" />
<lastmod>2026-05-05T08:12:39.301Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/we-are-anonymous/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/we-are-anonymous/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/we-are-anonymous/after" />
<lastmod>2026-05-05T08:12:39.301Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/we-are-anonymous/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/we-are-anonymous/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/we-are-anonymous/before" />
<lastmod>2026-05-05T08:12:39.301Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/web-security-for-developers/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/web-security-for-developers/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/web-security-for-developers/alternatives" />
<lastmod>2026-05-05T08:12:37.095Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/web-security-for-developers/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/web-security-for-developers/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/web-security-for-developers/after" />
<lastmod>2026-05-05T08:12:37.095Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/web-security-for-developers/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/web-security-for-developers/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/web-security-for-developers/before" />
<lastmod>2026-05-05T08:12:37.095Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/windows-internals-part-1-7e/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/windows-internals-part-1-7e/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/windows-internals-part-1-7e/alternatives" />
<lastmod>2026-05-05T08:12:35.695Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/windows-internals-part-1-7e/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/windows-internals-part-1-7e/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/windows-internals-part-1-7e/after" />
<lastmod>2026-05-05T08:12:35.695Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/windows-internals-part-1-7e/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/windows-internals-part-1-7e/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/windows-internals-part-1-7e/before" />
<lastmod>2026-05-05T08:12:35.695Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/zero-trust-networks/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/zero-trust-networks/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/zero-trust-networks/alternatives" />
<lastmod>2026-05-05T08:12:40.992Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/zero-trust-networks/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/zero-trust-networks/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/zero-trust-networks/after" />
<lastmod>2026-05-05T08:12:40.992Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/zero-trust-networks/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/zero-trust-networks/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/zero-trust-networks/before" />
<lastmod>2026-05-05T08:12:40.992Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/at-war-rise-of-military-internet-complex/vs/dark-territory</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/at-war-rise-of-military-internet-complex/vs/dark-territory" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/at-war-rise-of-military-internet-complex/vs/dark-territory" />
<lastmod>2026-05-05T08:12:35.826Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/at-war-rise-of-military-internet-complex/vs/kingpin</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/at-war-rise-of-military-internet-complex/vs/kingpin" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/at-war-rise-of-military-internet-complex/vs/kingpin" />
<lastmod>2026-05-05T08:12:40.309Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/at-war-rise-of-military-internet-complex/vs/sandworm</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/at-war-rise-of-military-internet-complex/vs/sandworm" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/at-war-rise-of-military-internet-complex/vs/sandworm" />
<lastmod>2026-05-05T08:12:35.826Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/at-war-rise-of-military-internet-complex/vs/the-cuckoos-egg</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/at-war-rise-of-military-internet-complex/vs/the-cuckoos-egg" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/at-war-rise-of-military-internet-complex/vs/the-cuckoos-egg" />
<lastmod>2026-05-05T08:12:35.826Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/at-war-rise-of-military-internet-complex/vs/the-hacker-and-the-state</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/at-war-rise-of-military-internet-complex/vs/the-hacker-and-the-state" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/at-war-rise-of-military-internet-complex/vs/the-hacker-and-the-state" />
<lastmod>2026-05-05T08:12:41.416Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/bug-hunters-diary/vs/this-is-how-they-tell-me-the-world-ends</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/bug-hunters-diary/vs/this-is-how-they-tell-me-the-world-ends" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/bug-hunters-diary/vs/this-is-how-they-tell-me-the-world-ends" />
<lastmod>2026-05-05T08:12:38.378Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/bug-hunters-diary/vs/hacking-art-of-exploitation</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/bug-hunters-diary/vs/hacking-art-of-exploitation" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/bug-hunters-diary/vs/hacking-art-of-exploitation" />
<lastmod>2026-05-05T08:12:38.378Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/black-hat-bash/vs/bug-hunters-diary</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-bash/vs/bug-hunters-diary" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-bash/vs/bug-hunters-diary" />
<lastmod>2026-05-05T08:12:38.378Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/black-hat-go/vs/bug-hunters-diary</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-go/vs/bug-hunters-diary" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-go/vs/bug-hunters-diary" />
<lastmod>2026-05-05T08:12:38.378Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/black-hat-graphql/vs/bug-hunters-diary</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-graphql/vs/bug-hunters-diary" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-graphql/vs/bug-hunters-diary" />
<lastmod>2026-05-05T08:12:38.378Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/a-hackers-mind/vs/the-hacker-and-the-state</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/a-hackers-mind/vs/the-hacker-and-the-state" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/a-hackers-mind/vs/the-hacker-and-the-state" />
<lastmod>2026-05-05T08:12:41.416Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/a-hackers-mind/vs/cyberjutsu</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/a-hackers-mind/vs/cyberjutsu" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/a-hackers-mind/vs/cyberjutsu" />
<lastmod>2026-05-05T08:12:41.351Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/a-hackers-mind/vs/kingpin</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/a-hackers-mind/vs/kingpin" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/a-hackers-mind/vs/kingpin" />
<lastmod>2026-05-05T08:12:41.351Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/a-hackers-mind/vs/sandworm</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/a-hackers-mind/vs/sandworm" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/a-hackers-mind/vs/sandworm" />
<lastmod>2026-05-05T08:12:41.351Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/a-hackers-mind/vs/the-cuckoos-egg</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/a-hackers-mind/vs/the-cuckoos-egg" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/a-hackers-mind/vs/the-cuckoos-egg" />
<lastmod>2026-05-05T08:12:41.351Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/alice-and-bob-learn-application-security/vs/foundations-of-information-security</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/alice-and-bob-learn-application-security/vs/foundations-of-information-security" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/alice-and-bob-learn-application-security/vs/foundations-of-information-security" />
<lastmod>2026-05-05T08:12:41.067Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/alice-and-bob-learn-application-security/vs/how-cybersecurity-really-works</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/alice-and-bob-learn-application-security/vs/how-cybersecurity-really-works" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/alice-and-bob-learn-application-security/vs/how-cybersecurity-really-works" />
<lastmod>2026-05-05T08:12:41.067Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/alice-and-bob-learn-application-security/vs/the-pragmatic-programmer-20a</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/alice-and-bob-learn-application-security/vs/the-pragmatic-programmer-20a" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/alice-and-bob-learn-application-security/vs/the-pragmatic-programmer-20a" />
<lastmod>2026-05-05T08:12:41.067Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/alice-and-bob-learn-application-security/vs/real-world-cryptography</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/alice-and-bob-learn-application-security/vs/real-world-cryptography" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/alice-and-bob-learn-application-security/vs/real-world-cryptography" />
<lastmod>2026-05-05T08:12:41.067Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/alice-and-bob-learn-application-security/vs/click-here-to-kill-everybody</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/alice-and-bob-learn-application-security/vs/click-here-to-kill-everybody" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/alice-and-bob-learn-application-security/vs/click-here-to-kill-everybody" />
<lastmod>2026-05-05T08:12:41.067Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/android-security-internals/vs/windows-internals-part-1-7e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/android-security-internals/vs/windows-internals-part-1-7e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/android-security-internals/vs/windows-internals-part-1-7e" />
<lastmod>2026-05-05T08:12:38.592Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/android-security-internals/vs/ios-application-security</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/android-security-internals/vs/ios-application-security" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/android-security-internals/vs/ios-application-security" />
<lastmod>2026-05-05T08:12:38.671Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/android-security-internals/vs/the-mobile-application-hackers-handbook</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/android-security-internals/vs/the-mobile-application-hackers-handbook" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/android-security-internals/vs/the-mobile-application-hackers-handbook" />
<lastmod>2026-05-05T08:12:40.658Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/attacking-network-protocols/vs/hacking-art-of-exploitation</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/attacking-network-protocols/vs/hacking-art-of-exploitation" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/attacking-network-protocols/vs/hacking-art-of-exploitation" />
<lastmod>2026-05-05T08:12:36.611Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/attacking-network-protocols/vs/black-hat-go</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/attacking-network-protocols/vs/black-hat-go" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/attacking-network-protocols/vs/black-hat-go" />
<lastmod>2026-05-05T08:12:36.611Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/attacking-network-protocols/vs/black-hat-python-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/attacking-network-protocols/vs/black-hat-python-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/attacking-network-protocols/vs/black-hat-python-2e" />
<lastmod>2026-05-05T08:12:36.611Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/attacking-network-protocols/vs/silence-on-the-wire</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/attacking-network-protocols/vs/silence-on-the-wire" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/attacking-network-protocols/vs/silence-on-the-wire" />
<lastmod>2026-05-05T08:12:38.444Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/attacking-network-protocols/vs/shellcoders-handbook-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/attacking-network-protocols/vs/shellcoders-handbook-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/attacking-network-protocols/vs/shellcoders-handbook-2e" />
<lastmod>2026-05-05T08:12:36.611Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/black-hat-bash/vs/black-hat-go</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-bash/vs/black-hat-go" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-bash/vs/black-hat-go" />
<lastmod>2026-05-05T08:12:38.237Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/black-hat-bash/vs/black-hat-python-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-bash/vs/black-hat-python-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-bash/vs/black-hat-python-2e" />
<lastmod>2026-05-05T08:12:38.237Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/black-hat-bash/vs/metasploit-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-bash/vs/metasploit-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-bash/vs/metasploit-2e" />
<lastmod>2026-05-05T08:12:38.237Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/black-hat-bash/vs/ida-pro-book-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-bash/vs/ida-pro-book-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-bash/vs/ida-pro-book-2e" />
<lastmod>2026-05-05T08:12:38.237Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/black-hat-bash/vs/penetration-testing-weidman</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-bash/vs/penetration-testing-weidman" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-bash/vs/penetration-testing-weidman" />
<lastmod>2026-05-05T08:12:38.237Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/black-hat-go/vs/black-hat-python-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-go/vs/black-hat-python-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-go/vs/black-hat-python-2e" />
<lastmod>2026-05-05T08:12:36.331Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/black-hat-go/vs/hacking-art-of-exploitation</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-go/vs/hacking-art-of-exploitation" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-go/vs/hacking-art-of-exploitation" />
<lastmod>2026-05-05T08:12:36.331Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/black-hat-go/vs/metasploit-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-go/vs/metasploit-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-go/vs/metasploit-2e" />
<lastmod>2026-05-05T08:12:36.331Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/black-hat-graphql/vs/hacking-apis</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-graphql/vs/hacking-apis" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-graphql/vs/hacking-apis" />
<lastmod>2026-05-05T08:12:38.311Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/black-hat-graphql/vs/web-application-hackers-handbook</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-graphql/vs/web-application-hackers-handbook" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-graphql/vs/web-application-hackers-handbook" />
<lastmod>2026-05-05T08:12:38.311Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/black-hat-graphql/vs/real-world-cryptography</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-graphql/vs/real-world-cryptography" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-graphql/vs/real-world-cryptography" />
<lastmod>2026-05-05T08:12:38.311Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/black-hat-graphql/vs/the-tangled-web</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-graphql/vs/the-tangled-web" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-graphql/vs/the-tangled-web" />
<lastmod>2026-05-05T08:12:38.311Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/black-hat-graphql/vs/bug-bounty-bootcamp</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-graphql/vs/bug-bounty-bootcamp" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-graphql/vs/bug-bounty-bootcamp" />
<lastmod>2026-05-05T08:12:38.311Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/black-hat-python-2e/vs/hacking-art-of-exploitation</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-python-2e/vs/hacking-art-of-exploitation" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-python-2e/vs/hacking-art-of-exploitation" />
<lastmod>2026-05-05T08:12:35.018Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/black-hat-python-2e/vs/metasploit-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-python-2e/vs/metasploit-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-python-2e/vs/metasploit-2e" />
<lastmod>2026-05-05T08:12:36.190Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/bug-bounty-bootcamp/vs/real-world-bug-hunting</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/bug-bounty-bootcamp/vs/real-world-bug-hunting" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/bug-bounty-bootcamp/vs/real-world-bug-hunting" />
<lastmod>2026-05-05T08:12:36.869Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/bug-bounty-bootcamp/vs/hacking-apis</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/bug-bounty-bootcamp/vs/hacking-apis" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/bug-bounty-bootcamp/vs/hacking-apis" />
<lastmod>2026-05-05T08:12:36.869Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/bug-bounty-bootcamp/vs/web-application-hackers-handbook</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/bug-bounty-bootcamp/vs/web-application-hackers-handbook" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/bug-bounty-bootcamp/vs/web-application-hackers-handbook" />
<lastmod>2026-05-05T08:12:36.869Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/bug-bounty-bootcamp/vs/penetration-testing-weidman</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/bug-bounty-bootcamp/vs/penetration-testing-weidman" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/bug-bounty-bootcamp/vs/penetration-testing-weidman" />
<lastmod>2026-05-05T08:12:36.869Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/building-secure-and-reliable-systems/vs/security-chaos-engineering</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/building-secure-and-reliable-systems/vs/security-chaos-engineering" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/building-secure-and-reliable-systems/vs/security-chaos-engineering" />
<lastmod>2026-05-05T08:12:41.485Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/building-secure-and-reliable-systems/vs/security-engineering-3e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/building-secure-and-reliable-systems/vs/security-engineering-3e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/building-secure-and-reliable-systems/vs/security-engineering-3e" />
<lastmod>2026-05-05T08:12:41.217Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/building-secure-and-reliable-systems/vs/evasive-malware</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/building-secure-and-reliable-systems/vs/evasive-malware" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/building-secure-and-reliable-systems/vs/evasive-malware" />
<lastmod>2026-05-05T08:12:41.217Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/building-secure-and-reliable-systems/vs/techniques-virales-avancees</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/building-secure-and-reliable-systems/vs/techniques-virales-avancees" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/building-secure-and-reliable-systems/vs/techniques-virales-avancees" />
<lastmod>2026-05-05T08:12:41.217Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/building-secure-and-reliable-systems/vs/designing-secure-software</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/building-secure-and-reliable-systems/vs/designing-secure-software" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/building-secure-and-reliable-systems/vs/designing-secure-software" />
<lastmod>2026-05-05T08:12:41.217Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/click-here-to-kill-everybody/vs/cybersecurite-managers</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/click-here-to-kill-everybody/vs/cybersecurite-managers" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/click-here-to-kill-everybody/vs/cybersecurite-managers" />
<lastmod>2026-05-05T08:12:39.499Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/click-here-to-kill-everybody/vs/foundations-of-information-security</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/click-here-to-kill-everybody/vs/foundations-of-information-security" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/click-here-to-kill-everybody/vs/foundations-of-information-security" />
<lastmod>2026-05-05T08:12:39.499Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/click-here-to-kill-everybody/vs/how-cybersecurity-really-works</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/click-here-to-kill-everybody/vs/how-cybersecurity-really-works" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/click-here-to-kill-everybody/vs/how-cybersecurity-really-works" />
<lastmod>2026-05-05T08:12:39.499Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/click-here-to-kill-everybody/vs/the-pragmatic-programmer-20a</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/click-here-to-kill-everybody/vs/the-pragmatic-programmer-20a" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/click-here-to-kill-everybody/vs/the-pragmatic-programmer-20a" />
<lastmod>2026-05-05T08:12:40.009Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/a-hackers-mind/vs/click-here-to-kill-everybody</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/a-hackers-mind/vs/click-here-to-kill-everybody" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/a-hackers-mind/vs/click-here-to-kill-everybody" />
<lastmod>2026-05-05T08:12:41.351Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/container-security/vs/kubernetes-security</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/container-security/vs/kubernetes-security" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/container-security/vs/kubernetes-security" />
<lastmod>2026-05-05T08:12:40.924Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/container-security/vs/kubernetes-security-and-observability</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/container-security/vs/kubernetes-security-and-observability" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/container-security/vs/kubernetes-security-and-observability" />
<lastmod>2026-05-05T08:12:40.858Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/container-security/vs/pentesting-azure-applications</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/container-security/vs/pentesting-azure-applications" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/container-security/vs/pentesting-azure-applications" />
<lastmod>2026-05-05T08:12:40.792Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/building-secure-and-reliable-systems/vs/container-security</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/building-secure-and-reliable-systems/vs/container-security" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/building-secure-and-reliable-systems/vs/container-security" />
<lastmod>2026-05-05T08:12:41.217Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/container-security/vs/security-chaos-engineering</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/container-security/vs/security-chaos-engineering" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/container-security/vs/security-chaos-engineering" />
<lastmod>2026-05-05T08:12:41.485Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/countdown-to-zero-day/vs/sandworm</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/countdown-to-zero-day/vs/sandworm" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/countdown-to-zero-day/vs/sandworm" />
<lastmod>2026-05-05T08:12:34.891Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/countdown-to-zero-day/vs/the-hacker-and-the-state</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/countdown-to-zero-day/vs/the-hacker-and-the-state" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/countdown-to-zero-day/vs/the-hacker-and-the-state" />
<lastmod>2026-05-05T08:12:41.416Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/at-war-rise-of-military-internet-complex/vs/countdown-to-zero-day</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/at-war-rise-of-military-internet-complex/vs/countdown-to-zero-day" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/at-war-rise-of-military-internet-complex/vs/countdown-to-zero-day" />
<lastmod>2026-05-05T08:12:35.826Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/countdown-to-zero-day/vs/dark-territory</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/countdown-to-zero-day/vs/dark-territory" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/countdown-to-zero-day/vs/dark-territory" />
<lastmod>2026-05-05T08:12:35.761Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/countdown-to-zero-day/vs/this-is-how-they-tell-me-the-world-ends</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/countdown-to-zero-day/vs/this-is-how-they-tell-me-the-world-ends" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/countdown-to-zero-day/vs/this-is-how-they-tell-me-the-world-ends" />
<lastmod>2026-05-05T08:12:35.976Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/crypto-dictionary/vs/serious-cryptography-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/crypto-dictionary/vs/serious-cryptography-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/crypto-dictionary/vs/serious-cryptography-2e" />
<lastmod>2026-05-05T08:12:37.667Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/crypto-dictionary/vs/real-world-cryptography</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/crypto-dictionary/vs/real-world-cryptography" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/crypto-dictionary/vs/real-world-cryptography" />
<lastmod>2026-05-05T08:12:37.667Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/crypto-dictionary/vs/cryptography-engineering</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/crypto-dictionary/vs/cryptography-engineering" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/crypto-dictionary/vs/cryptography-engineering" />
<lastmod>2026-05-05T08:12:37.667Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/cryptography-engineering/vs/real-world-cryptography</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cryptography-engineering/vs/real-world-cryptography" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cryptography-engineering/vs/real-world-cryptography" />
<lastmod>2026-05-05T08:12:35.429Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/cryptography-engineering/vs/serious-cryptography-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cryptography-engineering/vs/serious-cryptography-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cryptography-engineering/vs/serious-cryptography-2e" />
<lastmod>2026-05-05T08:12:35.496Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/cryptography-engineering/vs/designing-secure-software</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cryptography-engineering/vs/designing-secure-software" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cryptography-engineering/vs/designing-secure-software" />
<lastmod>2026-05-05T08:12:37.530Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/cryptography-engineering/vs/threat-modeling-designing-for-security</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cryptography-engineering/vs/threat-modeling-designing-for-security" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cryptography-engineering/vs/threat-modeling-designing-for-security" />
<lastmod>2026-05-05T08:12:34.680Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/cryptography-engineering/vs/security-engineering-3e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cryptography-engineering/vs/security-engineering-3e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cryptography-engineering/vs/security-engineering-3e" />
<lastmod>2026-05-05T08:12:34.607Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/cult-of-the-dead-cow/vs/we-are-anonymous</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cult-of-the-dead-cow/vs/we-are-anonymous" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cult-of-the-dead-cow/vs/we-are-anonymous" />
<lastmod>2026-05-05T08:12:40.239Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/cult-of-the-dead-cow/vs/kingpin</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cult-of-the-dead-cow/vs/kingpin" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cult-of-the-dead-cow/vs/kingpin" />
<lastmod>2026-05-05T08:12:40.309Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/cult-of-the-dead-cow/vs/the-cuckoos-egg</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cult-of-the-dead-cow/vs/the-cuckoos-egg" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cult-of-the-dead-cow/vs/the-cuckoos-egg" />
<lastmod>2026-05-05T08:12:40.239Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/at-war-rise-of-military-internet-complex/vs/cult-of-the-dead-cow</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/at-war-rise-of-military-internet-complex/vs/cult-of-the-dead-cow" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/at-war-rise-of-military-internet-complex/vs/cult-of-the-dead-cow" />
<lastmod>2026-05-05T08:12:40.239Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/cult-of-the-dead-cow/vs/dark-territory</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cult-of-the-dead-cow/vs/dark-territory" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cult-of-the-dead-cow/vs/dark-territory" />
<lastmod>2026-05-05T08:12:40.239Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/cyberjutsu/vs/the-hacker-and-the-state</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cyberjutsu/vs/the-hacker-and-the-state" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cyberjutsu/vs/the-hacker-and-the-state" />
<lastmod>2026-05-05T08:12:41.416Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/cyberjutsu/vs/foundations-of-information-security</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cyberjutsu/vs/foundations-of-information-security" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cyberjutsu/vs/foundations-of-information-security" />
<lastmod>2026-05-05T08:12:37.307Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/cyberjutsu/vs/how-cybersecurity-really-works</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cyberjutsu/vs/how-cybersecurity-really-works" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cyberjutsu/vs/how-cybersecurity-really-works" />
<lastmod>2026-05-05T08:12:38.165Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/cyberjutsu/vs/kingpin</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cyberjutsu/vs/kingpin" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cyberjutsu/vs/kingpin" />
<lastmod>2026-05-05T08:12:40.309Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/cybersecurite-managers/vs/foundations-of-information-security</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cybersecurite-managers/vs/foundations-of-information-security" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cybersecurite-managers/vs/foundations-of-information-security" />
<lastmod>2026-05-05T08:12:37.238Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/cybersecurite-managers/vs/how-cybersecurity-really-works</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cybersecurite-managers/vs/how-cybersecurity-really-works" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cybersecurite-managers/vs/how-cybersecurity-really-works" />
<lastmod>2026-05-05T08:12:38.165Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/cybersecurite-managers/vs/la-cyberdefense-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cybersecurite-managers/vs/la-cyberdefense-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cybersecurite-managers/vs/la-cyberdefense-2e" />
<lastmod>2026-05-04T21:43:28.387Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/cybersecurite-managers/vs/the-pragmatic-programmer-20a</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cybersecurite-managers/vs/the-pragmatic-programmer-20a" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cybersecurite-managers/vs/the-pragmatic-programmer-20a" />
<lastmod>2026-05-05T08:12:40.009Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/dark-territory/vs/kingpin</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/dark-territory/vs/kingpin" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/dark-territory/vs/kingpin" />
<lastmod>2026-05-05T08:12:40.309Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/dark-territory/vs/sandworm</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/dark-territory/vs/sandworm" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/dark-territory/vs/sandworm" />
<lastmod>2026-05-05T08:12:35.761Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/dark-territory/vs/the-cuckoos-egg</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/dark-territory/vs/the-cuckoos-egg" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/dark-territory/vs/the-cuckoos-egg" />
<lastmod>2026-05-05T08:12:35.761Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/dark-territory/vs/the-hacker-and-the-state</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/dark-territory/vs/the-hacker-and-the-state" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/dark-territory/vs/the-hacker-and-the-state" />
<lastmod>2026-05-05T08:12:41.416Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/designing-secure-software/vs/threat-modeling-designing-for-security</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/designing-secure-software/vs/threat-modeling-designing-for-security" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/designing-secure-software/vs/threat-modeling-designing-for-security" />
<lastmod>2026-05-05T08:12:37.530Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/designing-secure-software/vs/real-world-cryptography</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/designing-secure-software/vs/real-world-cryptography" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/designing-secure-software/vs/real-world-cryptography" />
<lastmod>2026-05-05T08:12:37.530Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/designing-secure-software/vs/web-security-for-developers</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/designing-secure-software/vs/web-security-for-developers" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/designing-secure-software/vs/web-security-for-developers" />
<lastmod>2026-05-05T08:12:37.530Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/designing-secure-software/vs/practical-malware-analysis</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/designing-secure-software/vs/practical-malware-analysis" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/designing-secure-software/vs/practical-malware-analysis" />
<lastmod>2026-05-05T08:12:37.530Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/evasive-malware/vs/techniques-virales-avancees</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/evasive-malware/vs/techniques-virales-avancees" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/evasive-malware/vs/techniques-virales-avancees" />
<lastmod>2026-05-05T08:12:37.375Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/evasive-malware/vs/practical-malware-analysis</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/evasive-malware/vs/practical-malware-analysis" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/evasive-malware/vs/practical-malware-analysis" />
<lastmod>2026-05-05T08:12:37.375Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/evasive-malware/vs/les-virus-informatiques</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/evasive-malware/vs/les-virus-informatiques" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/evasive-malware/vs/les-virus-informatiques" />
<lastmod>2026-05-05T08:12:37.375Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/evasive-malware/vs/practical-reverse-engineering</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/evasive-malware/vs/practical-reverse-engineering" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/evasive-malware/vs/practical-reverse-engineering" />
<lastmod>2026-05-05T08:12:37.375Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/evasive-malware/vs/rootkits-and-bootkits</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/evasive-malware/vs/rootkits-and-bootkits" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/evasive-malware/vs/rootkits-and-bootkits" />
<lastmod>2026-05-05T08:12:37.375Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/extreme-privacy-5e/vs/osint-techniques-11e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/extreme-privacy-5e/vs/osint-techniques-11e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/extreme-privacy-5e/vs/osint-techniques-11e" />
<lastmod>2026-05-05T08:12:39.172Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/extreme-privacy-5e/vs/hacks-leaks-and-revelations</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/extreme-privacy-5e/vs/hacks-leaks-and-revelations" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/extreme-privacy-5e/vs/hacks-leaks-and-revelations" />
<lastmod>2026-05-05T08:12:39.172Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/extreme-privacy-5e/vs/practical-social-engineering</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/extreme-privacy-5e/vs/practical-social-engineering" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/extreme-privacy-5e/vs/practical-social-engineering" />
<lastmod>2026-05-05T08:12:39.172Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/extreme-privacy-5e/vs/open-source-intelligence-techniques-tools</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/extreme-privacy-5e/vs/open-source-intelligence-techniques-tools" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/extreme-privacy-5e/vs/open-source-intelligence-techniques-tools" />
<lastmod>2026-05-05T08:12:39.235Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/extreme-privacy-5e/vs/permanent-record</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/extreme-privacy-5e/vs/permanent-record" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/extreme-privacy-5e/vs/permanent-record" />
<lastmod>2026-05-05T08:12:39.434Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/foundations-of-information-security/vs/how-cybersecurity-really-works</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/foundations-of-information-security/vs/how-cybersecurity-really-works" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/foundations-of-information-security/vs/how-cybersecurity-really-works" />
<lastmod>2026-05-05T08:12:38.165Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/foundations-of-information-security/vs/the-pragmatic-programmer-20a</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/foundations-of-information-security/vs/the-pragmatic-programmer-20a" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/foundations-of-information-security/vs/the-pragmatic-programmer-20a" />
<lastmod>2026-05-05T08:12:40.009Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/foundations-of-information-security/vs/linux-basics-for-hackers-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/foundations-of-information-security/vs/linux-basics-for-hackers-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/foundations-of-information-security/vs/linux-basics-for-hackers-2e" />
<lastmod>2026-05-05T08:12:37.238Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/ghost-in-the-wires/vs/kingpin</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/ghost-in-the-wires/vs/kingpin" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/ghost-in-the-wires/vs/kingpin" />
<lastmod>2026-05-05T08:12:40.309Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/ghost-in-the-wires/vs/the-cuckoos-egg</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/ghost-in-the-wires/vs/the-cuckoos-egg" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/ghost-in-the-wires/vs/the-cuckoos-egg" />
<lastmod>2026-05-05T08:12:36.113Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/at-war-rise-of-military-internet-complex/vs/ghost-in-the-wires</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/at-war-rise-of-military-internet-complex/vs/ghost-in-the-wires" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/at-war-rise-of-military-internet-complex/vs/ghost-in-the-wires" />
<lastmod>2026-05-05T08:12:36.113Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/cult-of-the-dead-cow/vs/ghost-in-the-wires</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cult-of-the-dead-cow/vs/ghost-in-the-wires" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cult-of-the-dead-cow/vs/ghost-in-the-wires" />
<lastmod>2026-05-05T08:12:40.239Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/dark-territory/vs/ghost-in-the-wires</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/dark-territory/vs/ghost-in-the-wires" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/dark-territory/vs/ghost-in-the-wires" />
<lastmod>2026-05-05T08:12:36.113Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/gray-hat-hacking-6e/vs/the-mac-hackers-handbook</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/gray-hat-hacking-6e/vs/the-mac-hackers-handbook" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/gray-hat-hacking-6e/vs/the-mac-hackers-handbook" />
<lastmod>2026-05-05T08:12:40.507Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/gray-hat-hacking-6e/vs/les-virus-informatiques</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/gray-hat-hacking-6e/vs/les-virus-informatiques" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/gray-hat-hacking-6e/vs/les-virus-informatiques" />
<lastmod>2026-05-05T08:12:39.804Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/gray-hat-hacking-6e/vs/practical-binary-analysis</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/gray-hat-hacking-6e/vs/practical-binary-analysis" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/gray-hat-hacking-6e/vs/practical-binary-analysis" />
<lastmod>2026-05-05T08:12:39.804Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/gray-hat-hacking-6e/vs/hardware-hacking-handbook</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/gray-hat-hacking-6e/vs/hardware-hacking-handbook" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/gray-hat-hacking-6e/vs/hardware-hacking-handbook" />
<lastmod>2026-05-05T08:12:41.285Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/evasive-malware/vs/gray-hat-hacking-6e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/evasive-malware/vs/gray-hat-hacking-6e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/evasive-malware/vs/gray-hat-hacking-6e" />
<lastmod>2026-05-05T08:12:39.804Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/hacking-apis/vs/web-application-hackers-handbook</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacking-apis/vs/web-application-hackers-handbook" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacking-apis/vs/web-application-hackers-handbook" />
<lastmod>2026-05-05T08:12:36.803Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/hacking-apis/vs/real-world-cryptography</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacking-apis/vs/real-world-cryptography" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacking-apis/vs/real-world-cryptography" />
<lastmod>2026-05-05T08:12:36.803Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/hacking-apis/vs/the-tangled-web</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacking-apis/vs/the-tangled-web" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacking-apis/vs/the-tangled-web" />
<lastmod>2026-05-05T08:12:36.803Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/hacking-the-xbox/vs/hardware-hacking-handbook</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacking-the-xbox/vs/hardware-hacking-handbook" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacking-the-xbox/vs/hardware-hacking-handbook" />
<lastmod>2026-05-05T08:12:41.285Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/hacking-the-xbox/vs/ida-pro-book-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacking-the-xbox/vs/ida-pro-book-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacking-the-xbox/vs/ida-pro-book-2e" />
<lastmod>2026-05-05T08:12:38.738Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/hacking-the-xbox/vs/practical-malware-analysis</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacking-the-xbox/vs/practical-malware-analysis" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacking-the-xbox/vs/practical-malware-analysis" />
<lastmod>2026-05-05T08:12:38.738Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/hacking-the-xbox/vs/practical-iot-hacking</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacking-the-xbox/vs/practical-iot-hacking" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacking-the-xbox/vs/practical-iot-hacking" />
<lastmod>2026-05-05T08:12:38.738Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/car-hackers-handbook/vs/hacking-the-xbox</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/car-hackers-handbook/vs/hacking-the-xbox" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/car-hackers-handbook/vs/hacking-the-xbox" />
<lastmod>2026-05-05T08:12:38.738Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/hacking-art-of-exploitation/vs/shellcoders-handbook-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacking-art-of-exploitation/vs/shellcoders-handbook-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacking-art-of-exploitation/vs/shellcoders-handbook-2e" />
<lastmod>2026-05-05T08:12:34.955Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/hacking-art-of-exploitation/vs/practice-of-network-security-monitoring</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacking-art-of-exploitation/vs/practice-of-network-security-monitoring" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacking-art-of-exploitation/vs/practice-of-network-security-monitoring" />
<lastmod>2026-05-05T08:12:37.871Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/hacks-leaks-and-revelations/vs/osint-techniques-11e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacks-leaks-and-revelations/vs/osint-techniques-11e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacks-leaks-and-revelations/vs/osint-techniques-11e" />
<lastmod>2026-05-05T08:12:39.102Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/hacks-leaks-and-revelations/vs/open-source-intelligence-techniques-tools</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacks-leaks-and-revelations/vs/open-source-intelligence-techniques-tools" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacks-leaks-and-revelations/vs/open-source-intelligence-techniques-tools" />
<lastmod>2026-05-05T08:12:39.235Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/hacks-leaks-and-revelations/vs/permanent-record</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacks-leaks-and-revelations/vs/permanent-record" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacks-leaks-and-revelations/vs/permanent-record" />
<lastmod>2026-05-05T08:12:39.434Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/hacks-leaks-and-revelations/vs/practical-social-engineering</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacks-leaks-and-revelations/vs/practical-social-engineering" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacks-leaks-and-revelations/vs/practical-social-engineering" />
<lastmod>2026-05-05T08:12:38.950Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/how-cybersecurity-really-works/vs/the-pragmatic-programmer-20a</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/how-cybersecurity-really-works/vs/the-pragmatic-programmer-20a" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/how-cybersecurity-really-works/vs/the-pragmatic-programmer-20a" />
<lastmod>2026-05-05T08:12:40.009Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/how-cybersecurity-really-works/vs/linux-basics-for-hackers-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/how-cybersecurity-really-works/vs/linux-basics-for-hackers-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/how-cybersecurity-really-works/vs/linux-basics-for-hackers-2e" />
<lastmod>2026-05-05T08:12:38.165Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/incident-response-and-computer-forensics-3e/vs/practical-linux-forensics</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/incident-response-and-computer-forensics-3e/vs/practical-linux-forensics" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/incident-response-and-computer-forensics-3e/vs/practical-linux-forensics" />
<lastmod>2026-05-05T08:12:39.942Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/incident-response-and-computer-forensics-3e/vs/the-art-of-memory-forensics</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/incident-response-and-computer-forensics-3e/vs/the-art-of-memory-forensics" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/incident-response-and-computer-forensics-3e/vs/the-art-of-memory-forensics" />
<lastmod>2026-05-05T08:12:39.942Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/designing-secure-software/vs/incident-response-and-computer-forensics-3e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/designing-secure-software/vs/incident-response-and-computer-forensics-3e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/designing-secure-software/vs/incident-response-and-computer-forensics-3e" />
<lastmod>2026-05-05T08:12:39.942Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/incident-response-and-computer-forensics-3e/vs/practical-malware-analysis</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/incident-response-and-computer-forensics-3e/vs/practical-malware-analysis" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/incident-response-and-computer-forensics-3e/vs/practical-malware-analysis" />
<lastmod>2026-05-05T08:12:39.942Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/incident-response-and-computer-forensics-3e/vs/practice-of-network-security-monitoring</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/incident-response-and-computer-forensics-3e/vs/practice-of-network-security-monitoring" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/incident-response-and-computer-forensics-3e/vs/practice-of-network-security-monitoring" />
<lastmod>2026-05-05T08:12:39.942Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/ios-application-security/vs/the-mobile-application-hackers-handbook</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/ios-application-security/vs/the-mobile-application-hackers-handbook" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/ios-application-security/vs/the-mobile-application-hackers-handbook" />
<lastmod>2026-05-05T08:12:40.658Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/ios-application-security/vs/real-world-cryptography</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/ios-application-security/vs/real-world-cryptography" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/ios-application-security/vs/real-world-cryptography" />
<lastmod>2026-05-05T08:12:38.671Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/designing-secure-software/vs/ios-application-security</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/designing-secure-software/vs/ios-application-security" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/designing-secure-software/vs/ios-application-security" />
<lastmod>2026-05-05T08:12:38.671Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/ios-application-security/vs/threat-modeling-designing-for-security</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/ios-application-security/vs/threat-modeling-designing-for-security" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/ios-application-security/vs/threat-modeling-designing-for-security" />
<lastmod>2026-05-05T08:12:38.671Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/black-hat-graphql/vs/ios-application-security</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-graphql/vs/ios-application-security" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-graphql/vs/ios-application-security" />
<lastmod>2026-05-05T08:12:38.671Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/kingpin/vs/spam-nation</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/kingpin/vs/spam-nation" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/kingpin/vs/spam-nation" />
<lastmod>2026-05-05T08:12:40.374Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/kingpin/vs/the-cuckoos-egg</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/kingpin/vs/the-cuckoos-egg" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/kingpin/vs/the-cuckoos-egg" />
<lastmod>2026-05-05T08:12:40.309Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/kubernetes-security/vs/kubernetes-security-and-observability</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/kubernetes-security/vs/kubernetes-security-and-observability" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/kubernetes-security/vs/kubernetes-security-and-observability" />
<lastmod>2026-05-05T08:12:40.924Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/kubernetes-security/vs/pentesting-azure-applications</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/kubernetes-security/vs/pentesting-azure-applications" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/kubernetes-security/vs/pentesting-azure-applications" />
<lastmod>2026-05-05T08:12:40.924Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/building-secure-and-reliable-systems/vs/kubernetes-security</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/building-secure-and-reliable-systems/vs/kubernetes-security" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/building-secure-and-reliable-systems/vs/kubernetes-security" />
<lastmod>2026-05-05T08:12:41.217Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/kubernetes-security/vs/security-chaos-engineering</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/kubernetes-security/vs/security-chaos-engineering" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/kubernetes-security/vs/security-chaos-engineering" />
<lastmod>2026-05-05T08:12:41.485Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/kubernetes-security-and-observability/vs/pentesting-azure-applications</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/kubernetes-security-and-observability/vs/pentesting-azure-applications" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/kubernetes-security-and-observability/vs/pentesting-azure-applications" />
<lastmod>2026-05-05T08:12:40.858Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/countdown-to-zero-day/vs/la-cyberdefense-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/countdown-to-zero-day/vs/la-cyberdefense-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/countdown-to-zero-day/vs/la-cyberdefense-2e" />
<lastmod>2026-05-05T08:12:34.891Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/la-cyberdefense-2e/vs/sandworm</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/la-cyberdefense-2e/vs/sandworm" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/la-cyberdefense-2e/vs/sandworm" />
<lastmod>2026-05-05T08:12:34.539Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/la-cyberdefense-2e/vs/the-hacker-and-the-state</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/la-cyberdefense-2e/vs/the-hacker-and-the-state" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/la-cyberdefense-2e/vs/the-hacker-and-the-state" />
<lastmod>2026-05-05T08:12:41.416Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/at-war-rise-of-military-internet-complex/vs/la-cyberdefense-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/at-war-rise-of-military-internet-complex/vs/la-cyberdefense-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/at-war-rise-of-military-internet-complex/vs/la-cyberdefense-2e" />
<lastmod>2026-05-05T08:12:35.826Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/les-virus-informatiques/vs/practical-reverse-engineering</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/les-virus-informatiques/vs/practical-reverse-engineering" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/les-virus-informatiques/vs/practical-reverse-engineering" />
<lastmod>2026-05-05T08:12:35.086Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/les-virus-informatiques/vs/rootkits-and-bootkits</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/les-virus-informatiques/vs/rootkits-and-bootkits" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/les-virus-informatiques/vs/rootkits-and-bootkits" />
<lastmod>2026-05-05T08:12:35.280Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/les-virus-informatiques/vs/techniques-virales-avancees</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/les-virus-informatiques/vs/techniques-virales-avancees" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/les-virus-informatiques/vs/techniques-virales-avancees" />
<lastmod>2026-05-04T21:43:28.146Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/art-of-mac-malware-v1/vs/les-virus-informatiques</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/art-of-mac-malware-v1/vs/les-virus-informatiques" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/art-of-mac-malware-v1/vs/les-virus-informatiques" />
<lastmod>2026-05-05T08:12:36.679Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/linux-basics-for-hackers-2e/vs/the-pragmatic-programmer-20a</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/linux-basics-for-hackers-2e/vs/the-pragmatic-programmer-20a" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/linux-basics-for-hackers-2e/vs/the-pragmatic-programmer-20a" />
<lastmod>2026-05-05T08:12:40.009Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/alice-and-bob-learn-application-security/vs/linux-basics-for-hackers-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/alice-and-bob-learn-application-security/vs/linux-basics-for-hackers-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/alice-and-bob-learn-application-security/vs/linux-basics-for-hackers-2e" />
<lastmod>2026-05-05T08:12:41.067Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/click-here-to-kill-everybody/vs/linux-basics-for-hackers-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/click-here-to-kill-everybody/vs/linux-basics-for-hackers-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/click-here-to-kill-everybody/vs/linux-basics-for-hackers-2e" />
<lastmod>2026-05-05T08:12:39.499Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/linux-firewalls-rash/vs/practice-of-network-security-monitoring</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/linux-firewalls-rash/vs/practice-of-network-security-monitoring" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/linux-firewalls-rash/vs/practice-of-network-security-monitoring" />
<lastmod>2026-05-05T08:12:38.809Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/linux-firewalls-rash/vs/network-security-through-data-analysis-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/linux-firewalls-rash/vs/network-security-through-data-analysis-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/linux-firewalls-rash/vs/network-security-through-data-analysis-2e" />
<lastmod>2026-05-05T08:12:38.809Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/linux-firewalls-rash/vs/practical-linux-forensics</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/linux-firewalls-rash/vs/practical-linux-forensics" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/linux-firewalls-rash/vs/practical-linux-forensics" />
<lastmod>2026-05-05T08:12:38.809Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/linux-firewalls-rash/vs/zero-trust-networks</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/linux-firewalls-rash/vs/zero-trust-networks" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/linux-firewalls-rash/vs/zero-trust-networks" />
<lastmod>2026-05-05T08:12:40.992Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/linux-firewalls-rash/vs/practical-packet-analysis-3e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/linux-firewalls-rash/vs/practical-packet-analysis-3e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/linux-firewalls-rash/vs/practical-packet-analysis-3e" />
<lastmod>2026-05-05T08:12:38.809Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/malware-data-science/vs/practical-malware-analysis</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/malware-data-science/vs/practical-malware-analysis" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/malware-data-science/vs/practical-malware-analysis" />
<lastmod>2026-05-05T08:12:37.600Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/malware-data-science/vs/practice-of-network-security-monitoring</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/malware-data-science/vs/practice-of-network-security-monitoring" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/malware-data-science/vs/practice-of-network-security-monitoring" />
<lastmod>2026-05-05T08:12:37.871Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/malware-data-science/vs/network-security-through-data-analysis-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/malware-data-science/vs/network-security-through-data-analysis-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/malware-data-science/vs/network-security-through-data-analysis-2e" />
<lastmod>2026-05-05T08:12:37.600Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/countdown-to-zero-day/vs/malware-data-science</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/countdown-to-zero-day/vs/malware-data-science" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/countdown-to-zero-day/vs/malware-data-science" />
<lastmod>2026-05-05T08:12:37.600Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/les-virus-informatiques/vs/malware-data-science</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/les-virus-informatiques/vs/malware-data-science" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/les-virus-informatiques/vs/malware-data-science" />
<lastmod>2026-05-05T08:12:37.600Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/metasploit-2e/vs/penetration-testing-weidman</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/metasploit-2e/vs/penetration-testing-weidman" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/metasploit-2e/vs/penetration-testing-weidman" />
<lastmod>2026-05-05T08:12:36.254Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/metasploit-2e/vs/the-hacker-playbook-3</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/metasploit-2e/vs/the-hacker-playbook-3" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/metasploit-2e/vs/the-hacker-playbook-3" />
<lastmod>2026-05-05T08:12:38.879Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/network-security-through-data-analysis-2e/vs/practice-of-network-security-monitoring</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/network-security-through-data-analysis-2e/vs/practice-of-network-security-monitoring" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/network-security-through-data-analysis-2e/vs/practice-of-network-security-monitoring" />
<lastmod>2026-05-05T08:12:37.871Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/network-security-through-data-analysis-2e/vs/zero-trust-networks</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/network-security-through-data-analysis-2e/vs/zero-trust-networks" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/network-security-through-data-analysis-2e/vs/zero-trust-networks" />
<lastmod>2026-05-05T08:12:40.992Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/network-security-through-data-analysis-2e/vs/practical-packet-analysis-3e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/network-security-through-data-analysis-2e/vs/practical-packet-analysis-3e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/network-security-through-data-analysis-2e/vs/practical-packet-analysis-3e" />
<lastmod>2026-05-05T08:12:37.804Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/designing-secure-software/vs/network-security-through-data-analysis-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/designing-secure-software/vs/network-security-through-data-analysis-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/designing-secure-software/vs/network-security-through-data-analysis-2e" />
<lastmod>2026-05-05T08:12:37.530Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/open-source-intelligence-techniques-tools/vs/osint-techniques-11e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/open-source-intelligence-techniques-tools/vs/osint-techniques-11e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/open-source-intelligence-techniques-tools/vs/osint-techniques-11e" />
<lastmod>2026-05-05T08:12:39.235Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/open-source-intelligence-techniques-tools/vs/tracers-in-the-dark</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/open-source-intelligence-techniques-tools/vs/tracers-in-the-dark" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/open-source-intelligence-techniques-tools/vs/tracers-in-the-dark" />
<lastmod>2026-05-05T08:12:39.365Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/open-source-intelligence-techniques-tools/vs/practical-social-engineering</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/open-source-intelligence-techniques-tools/vs/practical-social-engineering" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/open-source-intelligence-techniques-tools/vs/practical-social-engineering" />
<lastmod>2026-05-05T08:12:39.235Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/osint-techniques-11e/vs/practical-social-engineering</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/osint-techniques-11e/vs/practical-social-engineering" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/osint-techniques-11e/vs/practical-social-engineering" />
<lastmod>2026-05-05T08:12:39.102Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/osint-techniques-11e/vs/tracers-in-the-dark</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/osint-techniques-11e/vs/tracers-in-the-dark" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/osint-techniques-11e/vs/tracers-in-the-dark" />
<lastmod>2026-05-05T08:12:39.365Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/black-hat-go/vs/penetration-testing-weidman</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-go/vs/penetration-testing-weidman" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-go/vs/penetration-testing-weidman" />
<lastmod>2026-05-05T08:12:36.331Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/black-hat-python-2e/vs/penetration-testing-weidman</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-python-2e/vs/penetration-testing-weidman" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-python-2e/vs/penetration-testing-weidman" />
<lastmod>2026-05-05T08:12:36.254Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/penetration-testing-weidman/vs/the-hacker-playbook-3</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/penetration-testing-weidman/vs/the-hacker-playbook-3" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/penetration-testing-weidman/vs/the-hacker-playbook-3" />
<lastmod>2026-05-05T08:12:38.879Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/metasploit-2e/vs/pentesting-azure-applications</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/metasploit-2e/vs/pentesting-azure-applications" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/metasploit-2e/vs/pentesting-azure-applications" />
<lastmod>2026-05-05T08:12:37.735Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/pentesting-azure-applications/vs/the-hacker-playbook-3</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/pentesting-azure-applications/vs/the-hacker-playbook-3" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/pentesting-azure-applications/vs/the-hacker-playbook-3" />
<lastmod>2026-05-05T08:12:38.879Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/penetration-testing-weidman/vs/pentesting-azure-applications</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/penetration-testing-weidman/vs/pentesting-azure-applications" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/penetration-testing-weidman/vs/pentesting-azure-applications" />
<lastmod>2026-05-05T08:12:37.735Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/hacking-art-of-exploitation/vs/pentesting-azure-applications</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacking-art-of-exploitation/vs/pentesting-azure-applications" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacking-art-of-exploitation/vs/pentesting-azure-applications" />
<lastmod>2026-05-05T08:12:37.735Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/bug-hunters-diary/vs/pentesting-azure-applications</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/bug-hunters-diary/vs/pentesting-azure-applications" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/bug-hunters-diary/vs/pentesting-azure-applications" />
<lastmod>2026-05-05T08:12:38.378Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/kingpin/vs/permanent-record</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/kingpin/vs/permanent-record" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/kingpin/vs/permanent-record" />
<lastmod>2026-05-05T08:12:40.309Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/permanent-record/vs/sandworm</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/permanent-record/vs/sandworm" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/permanent-record/vs/sandworm" />
<lastmod>2026-05-05T08:12:39.434Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/permanent-record/vs/the-cuckoos-egg</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/permanent-record/vs/the-cuckoos-egg" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/permanent-record/vs/the-cuckoos-egg" />
<lastmod>2026-05-05T08:12:39.434Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/permanent-record/vs/the-hacker-and-the-state</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/permanent-record/vs/the-hacker-and-the-state" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/permanent-record/vs/the-hacker-and-the-state" />
<lastmod>2026-05-05T08:12:41.416Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/at-war-rise-of-military-internet-complex/vs/permanent-record</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/at-war-rise-of-military-internet-complex/vs/permanent-record" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/at-war-rise-of-military-internet-complex/vs/permanent-record" />
<lastmod>2026-05-05T08:12:39.434Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/ida-pro-book-2e/vs/practical-binary-analysis</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/ida-pro-book-2e/vs/practical-binary-analysis" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/ida-pro-book-2e/vs/practical-binary-analysis" />
<lastmod>2026-05-05T08:12:37.021Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/les-virus-informatiques/vs/practical-binary-analysis</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/les-virus-informatiques/vs/practical-binary-analysis" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/les-virus-informatiques/vs/practical-binary-analysis" />
<lastmod>2026-05-05T08:12:37.021Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/hardware-hacking-handbook/vs/practical-binary-analysis</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hardware-hacking-handbook/vs/practical-binary-analysis" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hardware-hacking-handbook/vs/practical-binary-analysis" />
<lastmod>2026-05-05T08:12:41.285Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/evasive-malware/vs/practical-binary-analysis</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/evasive-malware/vs/practical-binary-analysis" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/evasive-malware/vs/practical-binary-analysis" />
<lastmod>2026-05-05T08:12:37.375Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/hardware-hacking-handbook/vs/practical-iot-hacking</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hardware-hacking-handbook/vs/practical-iot-hacking" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hardware-hacking-handbook/vs/practical-iot-hacking" />
<lastmod>2026-05-05T08:12:41.285Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/car-hackers-handbook/vs/practical-iot-hacking</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/car-hackers-handbook/vs/practical-iot-hacking" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/car-hackers-handbook/vs/practical-iot-hacking" />
<lastmod>2026-05-05T08:12:36.743Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/click-here-to-kill-everybody/vs/practical-iot-hacking</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/click-here-to-kill-everybody/vs/practical-iot-hacking" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/click-here-to-kill-everybody/vs/practical-iot-hacking" />
<lastmod>2026-05-05T08:12:39.499Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/designing-secure-software/vs/practical-linux-forensics</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/designing-secure-software/vs/practical-linux-forensics" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/designing-secure-software/vs/practical-linux-forensics" />
<lastmod>2026-05-05T08:12:37.530Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/practical-linux-forensics/vs/practical-malware-analysis</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-linux-forensics/vs/practical-malware-analysis" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-linux-forensics/vs/practical-malware-analysis" />
<lastmod>2026-05-05T08:12:37.164Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/practical-linux-forensics/vs/practice-of-network-security-monitoring</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-linux-forensics/vs/practice-of-network-security-monitoring" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-linux-forensics/vs/practice-of-network-security-monitoring" />
<lastmod>2026-05-05T08:12:37.871Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/practical-malware-analysis/vs/techniques-virales-avancees</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-malware-analysis/vs/techniques-virales-avancees" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-malware-analysis/vs/techniques-virales-avancees" />
<lastmod>2026-05-05T08:12:34.241Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/les-virus-informatiques/vs/practical-malware-analysis</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/les-virus-informatiques/vs/practical-malware-analysis" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/les-virus-informatiques/vs/practical-malware-analysis" />
<lastmod>2026-05-05T08:12:34.241Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/ida-pro-book-2e/vs/practical-malware-analysis</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/ida-pro-book-2e/vs/practical-malware-analysis" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/ida-pro-book-2e/vs/practical-malware-analysis" />
<lastmod>2026-05-05T08:12:35.151Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/practical-malware-analysis/vs/practical-reverse-engineering</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-malware-analysis/vs/practical-reverse-engineering" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-malware-analysis/vs/practical-reverse-engineering" />
<lastmod>2026-05-05T08:12:35.086Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/practical-packet-analysis-3e/vs/practice-of-network-security-monitoring</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-packet-analysis-3e/vs/practice-of-network-security-monitoring" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-packet-analysis-3e/vs/practice-of-network-security-monitoring" />
<lastmod>2026-05-05T08:12:37.871Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/foundations-of-information-security/vs/practical-packet-analysis-3e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/foundations-of-information-security/vs/practical-packet-analysis-3e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/foundations-of-information-security/vs/practical-packet-analysis-3e" />
<lastmod>2026-05-05T08:12:37.804Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/how-cybersecurity-really-works/vs/practical-packet-analysis-3e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/how-cybersecurity-really-works/vs/practical-packet-analysis-3e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/how-cybersecurity-really-works/vs/practical-packet-analysis-3e" />
<lastmod>2026-05-05T08:12:38.165Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/practical-reverse-engineering/vs/rootkits-and-bootkits</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-reverse-engineering/vs/rootkits-and-bootkits" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-reverse-engineering/vs/rootkits-and-bootkits" />
<lastmod>2026-05-05T08:12:35.280Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/practical-reverse-engineering/vs/techniques-virales-avancees</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-reverse-engineering/vs/techniques-virales-avancees" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-reverse-engineering/vs/techniques-virales-avancees" />
<lastmod>2026-05-05T08:12:35.086Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/art-of-mac-malware-v1/vs/practical-reverse-engineering</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/art-of-mac-malware-v1/vs/practical-reverse-engineering" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/art-of-mac-malware-v1/vs/practical-reverse-engineering" />
<lastmod>2026-05-05T08:12:36.679Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/practical-social-engineering/vs/social-engineering-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-social-engineering/vs/social-engineering-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-social-engineering/vs/social-engineering-2e" />
<lastmod>2026-05-05T08:12:40.438Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/metasploit-2e/vs/practical-social-engineering</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/metasploit-2e/vs/practical-social-engineering" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/metasploit-2e/vs/practical-social-engineering" />
<lastmod>2026-05-05T08:12:38.950Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/practical-social-engineering/vs/the-hacker-playbook-3</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-social-engineering/vs/the-hacker-playbook-3" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-social-engineering/vs/the-hacker-playbook-3" />
<lastmod>2026-05-05T08:12:38.950Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/black-hat-graphql/vs/real-world-bug-hunting</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-graphql/vs/real-world-bug-hunting" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-graphql/vs/real-world-bug-hunting" />
<lastmod>2026-05-05T08:12:38.311Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/hacking-apis/vs/real-world-bug-hunting</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacking-apis/vs/real-world-bug-hunting" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacking-apis/vs/real-world-bug-hunting" />
<lastmod>2026-05-05T08:12:36.803Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/real-world-bug-hunting/vs/web-application-hackers-handbook</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/real-world-bug-hunting/vs/web-application-hackers-handbook" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/real-world-bug-hunting/vs/web-application-hackers-handbook" />
<lastmod>2026-05-05T08:12:35.218Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/penetration-testing-weidman/vs/real-world-bug-hunting</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/penetration-testing-weidman/vs/real-world-bug-hunting" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/penetration-testing-weidman/vs/real-world-bug-hunting" />
<lastmod>2026-05-05T08:12:36.254Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/real-world-cryptography/vs/serious-cryptography-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/real-world-cryptography/vs/serious-cryptography-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/real-world-cryptography/vs/serious-cryptography-2e" />
<lastmod>2026-05-05T08:12:35.496Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/real-world-cryptography/vs/threat-modeling-designing-for-security</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/real-world-cryptography/vs/threat-modeling-designing-for-security" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/real-world-cryptography/vs/threat-modeling-designing-for-security" />
<lastmod>2026-05-05T08:12:35.429Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/rootkits-and-bootkits/vs/techniques-virales-avancees</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/rootkits-and-bootkits/vs/techniques-virales-avancees" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/rootkits-and-bootkits/vs/techniques-virales-avancees" />
<lastmod>2026-05-05T08:12:35.280Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/art-of-mac-malware-v1/vs/rootkits-and-bootkits</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/art-of-mac-malware-v1/vs/rootkits-and-bootkits" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/art-of-mac-malware-v1/vs/rootkits-and-bootkits" />
<lastmod>2026-05-05T08:12:36.679Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/sandworm/vs/the-cuckoos-egg</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/sandworm/vs/the-cuckoos-egg" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/sandworm/vs/the-cuckoos-egg" />
<lastmod>2026-05-05T08:12:34.740Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/sandworm/vs/the-hacker-and-the-state</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/sandworm/vs/the-hacker-and-the-state" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/sandworm/vs/the-hacker-and-the-state" />
<lastmod>2026-05-05T08:12:41.416Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/sandworm/vs/this-is-how-they-tell-me-the-world-ends</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/sandworm/vs/this-is-how-they-tell-me-the-world-ends" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/sandworm/vs/this-is-how-they-tell-me-the-world-ends" />
<lastmod>2026-05-05T08:12:35.976Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/security-chaos-engineering/vs/security-engineering-3e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/security-chaos-engineering/vs/security-engineering-3e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/security-chaos-engineering/vs/security-engineering-3e" />
<lastmod>2026-05-05T08:12:41.485Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/evasive-malware/vs/security-chaos-engineering</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/evasive-malware/vs/security-chaos-engineering" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/evasive-malware/vs/security-chaos-engineering" />
<lastmod>2026-05-05T08:12:41.485Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/security-chaos-engineering/vs/techniques-virales-avancees</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/security-chaos-engineering/vs/techniques-virales-avancees" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/security-chaos-engineering/vs/techniques-virales-avancees" />
<lastmod>2026-05-05T08:12:41.485Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/designing-secure-software/vs/security-chaos-engineering</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/designing-secure-software/vs/security-chaos-engineering" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/designing-secure-software/vs/security-chaos-engineering" />
<lastmod>2026-05-05T08:12:41.485Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/security-engineering-3e/vs/serious-cryptography-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/security-engineering-3e/vs/serious-cryptography-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/security-engineering-3e/vs/serious-cryptography-2e" />
<lastmod>2026-05-05T08:12:35.496Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/real-world-cryptography/vs/security-engineering-3e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/real-world-cryptography/vs/security-engineering-3e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/real-world-cryptography/vs/security-engineering-3e" />
<lastmod>2026-05-05T08:12:35.429Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/les-virus-informatiques/vs/silence-on-the-wire</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/les-virus-informatiques/vs/silence-on-the-wire" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/les-virus-informatiques/vs/silence-on-the-wire" />
<lastmod>2026-05-05T08:12:38.444Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/silence-on-the-wire/vs/social-engineering-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/silence-on-the-wire/vs/social-engineering-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/silence-on-the-wire/vs/social-engineering-2e" />
<lastmod>2026-05-05T08:12:40.438Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/hacking-art-of-exploitation/vs/silence-on-the-wire</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacking-art-of-exploitation/vs/silence-on-the-wire" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacking-art-of-exploitation/vs/silence-on-the-wire" />
<lastmod>2026-05-05T08:12:38.444Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/practice-of-network-security-monitoring/vs/silence-on-the-wire</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practice-of-network-security-monitoring/vs/silence-on-the-wire" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practice-of-network-security-monitoring/vs/silence-on-the-wire" />
<lastmod>2026-05-05T08:12:38.444Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/social-engineering-2e/vs/the-art-of-deception</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/social-engineering-2e/vs/the-art-of-deception" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/social-engineering-2e/vs/the-art-of-deception" />
<lastmod>2026-05-05T08:12:40.438Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/les-virus-informatiques/vs/social-engineering-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/les-virus-informatiques/vs/social-engineering-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/les-virus-informatiques/vs/social-engineering-2e" />
<lastmod>2026-05-05T08:12:40.438Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/social-engineering-2e/vs/the-pragmatic-programmer-20a</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/social-engineering-2e/vs/the-pragmatic-programmer-20a" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/social-engineering-2e/vs/the-pragmatic-programmer-20a" />
<lastmod>2026-05-05T08:12:40.438Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/spam-nation/vs/the-cuckoos-egg</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/spam-nation/vs/the-cuckoos-egg" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/spam-nation/vs/the-cuckoos-egg" />
<lastmod>2026-05-05T08:12:40.374Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/at-war-rise-of-military-internet-complex/vs/spam-nation</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/at-war-rise-of-military-internet-complex/vs/spam-nation" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/at-war-rise-of-military-internet-complex/vs/spam-nation" />
<lastmod>2026-05-05T08:12:40.374Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/cult-of-the-dead-cow/vs/spam-nation</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cult-of-the-dead-cow/vs/spam-nation" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cult-of-the-dead-cow/vs/spam-nation" />
<lastmod>2026-05-05T08:12:40.374Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/dark-territory/vs/spam-nation</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/dark-territory/vs/spam-nation" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/dark-territory/vs/spam-nation" />
<lastmod>2026-05-05T08:12:40.374Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/ghost-in-the-wires/vs/the-art-of-deception</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/ghost-in-the-wires/vs/the-art-of-deception" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/ghost-in-the-wires/vs/the-art-of-deception" />
<lastmod>2026-05-05T08:12:39.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/foundations-of-information-security/vs/the-art-of-deception</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/foundations-of-information-security/vs/the-art-of-deception" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/foundations-of-information-security/vs/the-art-of-deception" />
<lastmod>2026-05-05T08:12:39.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/how-cybersecurity-really-works/vs/the-art-of-deception</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/how-cybersecurity-really-works/vs/the-art-of-deception" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/how-cybersecurity-really-works/vs/the-art-of-deception" />
<lastmod>2026-05-05T08:12:39.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/kingpin/vs/the-art-of-deception</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/kingpin/vs/the-art-of-deception" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/kingpin/vs/the-art-of-deception" />
<lastmod>2026-05-05T08:12:40.309Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/kingpin/vs/the-art-of-intrusion</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/kingpin/vs/the-art-of-intrusion" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/kingpin/vs/the-art-of-intrusion" />
<lastmod>2026-05-05T08:12:40.309Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/the-art-of-intrusion/vs/the-cuckoos-egg</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-art-of-intrusion/vs/the-cuckoos-egg" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-art-of-intrusion/vs/the-cuckoos-egg" />
<lastmod>2026-05-05T08:12:39.726Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/at-war-rise-of-military-internet-complex/vs/the-art-of-intrusion</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/at-war-rise-of-military-internet-complex/vs/the-art-of-intrusion" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/at-war-rise-of-military-internet-complex/vs/the-art-of-intrusion" />
<lastmod>2026-05-05T08:12:39.726Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/cult-of-the-dead-cow/vs/the-art-of-intrusion</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cult-of-the-dead-cow/vs/the-art-of-intrusion" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cult-of-the-dead-cow/vs/the-art-of-intrusion" />
<lastmod>2026-05-05T08:12:40.239Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/dark-territory/vs/the-art-of-intrusion</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/dark-territory/vs/the-art-of-intrusion" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/dark-territory/vs/the-art-of-intrusion" />
<lastmod>2026-05-05T08:12:39.726Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/art-of-mac-malware-v1/vs/evasive-malware</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/art-of-mac-malware-v1/vs/evasive-malware" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/art-of-mac-malware-v1/vs/evasive-malware" />
<lastmod>2026-05-05T08:12:37.375Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/art-of-mac-malware-v1/vs/techniques-virales-avancees</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/art-of-mac-malware-v1/vs/techniques-virales-avancees" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/art-of-mac-malware-v1/vs/techniques-virales-avancees" />
<lastmod>2026-05-05T08:12:36.679Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/les-virus-informatiques/vs/the-art-of-memory-forensics</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/les-virus-informatiques/vs/the-art-of-memory-forensics" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/les-virus-informatiques/vs/the-art-of-memory-forensics" />
<lastmod>2026-05-05T08:12:39.870Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/evasive-malware/vs/the-art-of-memory-forensics</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/evasive-malware/vs/the-art-of-memory-forensics" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/evasive-malware/vs/the-art-of-memory-forensics" />
<lastmod>2026-05-05T08:12:39.870Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/practical-reverse-engineering/vs/the-art-of-memory-forensics</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-reverse-engineering/vs/the-art-of-memory-forensics" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-reverse-engineering/vs/the-art-of-memory-forensics" />
<lastmod>2026-05-05T08:12:39.870Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/rootkits-and-bootkits/vs/the-art-of-memory-forensics</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/rootkits-and-bootkits/vs/the-art-of-memory-forensics" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/rootkits-and-bootkits/vs/the-art-of-memory-forensics" />
<lastmod>2026-05-05T08:12:39.870Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/art-of-software-security-assessment/vs/the-tangled-web</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/art-of-software-security-assessment/vs/the-tangled-web" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/art-of-software-security-assessment/vs/the-tangled-web" />
<lastmod>2026-05-05T08:12:35.561Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/art-of-software-security-assessment/vs/real-world-cryptography</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/art-of-software-security-assessment/vs/real-world-cryptography" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/art-of-software-security-assessment/vs/real-world-cryptography" />
<lastmod>2026-05-05T08:12:35.561Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/art-of-software-security-assessment/vs/the-database-hackers-handbook</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/art-of-software-security-assessment/vs/the-database-hackers-handbook" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/art-of-software-security-assessment/vs/the-database-hackers-handbook" />
<lastmod>2026-05-05T08:12:40.725Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/art-of-software-security-assessment/vs/designing-secure-software</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/art-of-software-security-assessment/vs/designing-secure-software" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/art-of-software-security-assessment/vs/designing-secure-software" />
<lastmod>2026-05-05T08:12:37.530Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/art-of-software-security-assessment/vs/threat-modeling-designing-for-security</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/art-of-software-security-assessment/vs/threat-modeling-designing-for-security" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/art-of-software-security-assessment/vs/threat-modeling-designing-for-security" />
<lastmod>2026-05-05T08:12:35.561Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/car-hackers-handbook/vs/hardware-hacking-handbook</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/car-hackers-handbook/vs/hardware-hacking-handbook" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/car-hackers-handbook/vs/hardware-hacking-handbook" />
<lastmod>2026-05-05T08:12:41.285Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/car-hackers-handbook/vs/ida-pro-book-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/car-hackers-handbook/vs/ida-pro-book-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/car-hackers-handbook/vs/ida-pro-book-2e" />
<lastmod>2026-05-05T08:12:36.545Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/car-hackers-handbook/vs/practical-malware-analysis</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/car-hackers-handbook/vs/practical-malware-analysis" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/car-hackers-handbook/vs/practical-malware-analysis" />
<lastmod>2026-05-05T08:12:36.545Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/kingpin/vs/the-cyber-effect</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/kingpin/vs/the-cyber-effect" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/kingpin/vs/the-cyber-effect" />
<lastmod>2026-05-05T08:12:40.309Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/sandworm/vs/the-cyber-effect</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/sandworm/vs/the-cyber-effect" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/sandworm/vs/the-cyber-effect" />
<lastmod>2026-05-05T08:12:40.170Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/the-cuckoos-egg/vs/the-cyber-effect</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-cuckoos-egg/vs/the-cyber-effect" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-cuckoos-egg/vs/the-cyber-effect" />
<lastmod>2026-05-05T08:12:40.170Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/the-cyber-effect/vs/the-hacker-and-the-state</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-cyber-effect/vs/the-hacker-and-the-state" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-cyber-effect/vs/the-hacker-and-the-state" />
<lastmod>2026-05-05T08:12:41.416Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/at-war-rise-of-military-internet-complex/vs/the-cyber-effect</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/at-war-rise-of-military-internet-complex/vs/the-cyber-effect" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/at-war-rise-of-military-internet-complex/vs/the-cyber-effect" />
<lastmod>2026-05-05T08:12:40.170Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/the-database-hackers-handbook/vs/the-tangled-web</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-database-hackers-handbook/vs/the-tangled-web" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-database-hackers-handbook/vs/the-tangled-web" />
<lastmod>2026-05-05T08:12:40.725Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/real-world-cryptography/vs/the-database-hackers-handbook</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/real-world-cryptography/vs/the-database-hackers-handbook" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/real-world-cryptography/vs/the-database-hackers-handbook" />
<lastmod>2026-05-05T08:12:40.725Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/gray-hat-hacking-6e/vs/the-database-hackers-handbook</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/gray-hat-hacking-6e/vs/the-database-hackers-handbook" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/gray-hat-hacking-6e/vs/the-database-hackers-handbook" />
<lastmod>2026-05-05T08:12:40.725Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/the-database-hackers-handbook/vs/the-mac-hackers-handbook</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-database-hackers-handbook/vs/the-mac-hackers-handbook" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-database-hackers-handbook/vs/the-mac-hackers-handbook" />
<lastmod>2026-05-05T08:12:40.725Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/the-hacker-and-the-state/vs/this-is-how-they-tell-me-the-world-ends</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-hacker-and-the-state/vs/this-is-how-they-tell-me-the-world-ends" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-hacker-and-the-state/vs/this-is-how-they-tell-me-the-world-ends" />
<lastmod>2026-05-05T08:12:41.416Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/hacking-art-of-exploitation/vs/the-hacker-playbook-3</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacking-art-of-exploitation/vs/the-hacker-playbook-3" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacking-art-of-exploitation/vs/the-hacker-playbook-3" />
<lastmod>2026-05-05T08:12:38.879Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/bug-hunters-diary/vs/the-hacker-playbook-3</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/bug-hunters-diary/vs/the-hacker-playbook-3" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/bug-hunters-diary/vs/the-hacker-playbook-3" />
<lastmod>2026-05-05T08:12:38.879Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/hardware-hacking-handbook/vs/les-virus-informatiques</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hardware-hacking-handbook/vs/les-virus-informatiques" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hardware-hacking-handbook/vs/les-virus-informatiques" />
<lastmod>2026-05-05T08:12:41.285Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/black-hat-go/vs/ida-pro-book-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-go/vs/ida-pro-book-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-go/vs/ida-pro-book-2e" />
<lastmod>2026-05-05T08:12:36.331Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/black-hat-python-2e/vs/ida-pro-book-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-python-2e/vs/ida-pro-book-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-python-2e/vs/ida-pro-book-2e" />
<lastmod>2026-05-05T08:12:35.151Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/art-of-mac-malware-v1/vs/the-mac-hackers-handbook</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/art-of-mac-malware-v1/vs/the-mac-hackers-handbook" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/art-of-mac-malware-v1/vs/the-mac-hackers-handbook" />
<lastmod>2026-05-05T08:12:40.507Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/les-virus-informatiques/vs/the-mac-hackers-handbook</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/les-virus-informatiques/vs/the-mac-hackers-handbook" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/les-virus-informatiques/vs/the-mac-hackers-handbook" />
<lastmod>2026-05-05T08:12:40.507Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/practical-binary-analysis/vs/the-mac-hackers-handbook</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-binary-analysis/vs/the-mac-hackers-handbook" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-binary-analysis/vs/the-mac-hackers-handbook" />
<lastmod>2026-05-05T08:12:40.507Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/hardware-hacking-handbook/vs/the-mac-hackers-handbook</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hardware-hacking-handbook/vs/the-mac-hackers-handbook" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hardware-hacking-handbook/vs/the-mac-hackers-handbook" />
<lastmod>2026-05-05T08:12:41.285Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/real-world-cryptography/vs/the-mobile-application-hackers-handbook</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/real-world-cryptography/vs/the-mobile-application-hackers-handbook" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/real-world-cryptography/vs/the-mobile-application-hackers-handbook" />
<lastmod>2026-05-05T08:12:40.658Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/designing-secure-software/vs/the-mobile-application-hackers-handbook</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/designing-secure-software/vs/the-mobile-application-hackers-handbook" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/designing-secure-software/vs/the-mobile-application-hackers-handbook" />
<lastmod>2026-05-05T08:12:40.658Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/the-mobile-application-hackers-handbook/vs/threat-modeling-designing-for-security</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-mobile-application-hackers-handbook/vs/threat-modeling-designing-for-security" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-mobile-application-hackers-handbook/vs/threat-modeling-designing-for-security" />
<lastmod>2026-05-05T08:12:40.658Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/black-hat-graphql/vs/the-mobile-application-hackers-handbook</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-graphql/vs/the-mobile-application-hackers-handbook" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-graphql/vs/the-mobile-application-hackers-handbook" />
<lastmod>2026-05-05T08:12:40.658Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/practice-of-network-security-monitoring/vs/zero-trust-networks</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practice-of-network-security-monitoring/vs/zero-trust-networks" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practice-of-network-security-monitoring/vs/zero-trust-networks" />
<lastmod>2026-05-05T08:12:40.992Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/designing-secure-software/vs/practice-of-network-security-monitoring</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/designing-secure-software/vs/practice-of-network-security-monitoring" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/designing-secure-software/vs/practice-of-network-security-monitoring" />
<lastmod>2026-05-05T08:12:37.871Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/les-virus-informatiques/vs/shellcoders-handbook-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/les-virus-informatiques/vs/shellcoders-handbook-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/les-virus-informatiques/vs/shellcoders-handbook-2e" />
<lastmod>2026-05-05T08:12:34.955Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/practical-binary-analysis/vs/shellcoders-handbook-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-binary-analysis/vs/shellcoders-handbook-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-binary-analysis/vs/shellcoders-handbook-2e" />
<lastmod>2026-05-05T08:12:37.021Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/hardware-hacking-handbook/vs/shellcoders-handbook-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hardware-hacking-handbook/vs/shellcoders-handbook-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hardware-hacking-handbook/vs/shellcoders-handbook-2e" />
<lastmod>2026-05-05T08:12:41.285Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/the-tangled-web/vs/web-application-hackers-handbook</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-tangled-web/vs/web-application-hackers-handbook" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-tangled-web/vs/web-application-hackers-handbook" />
<lastmod>2026-05-05T08:12:34.471Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/real-world-cryptography/vs/the-tangled-web</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/real-world-cryptography/vs/the-tangled-web" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/real-world-cryptography/vs/the-tangled-web" />
<lastmod>2026-05-05T08:12:35.429Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/real-world-cryptography/vs/web-application-hackers-handbook</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/real-world-cryptography/vs/web-application-hackers-handbook" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/real-world-cryptography/vs/web-application-hackers-handbook" />
<lastmod>2026-05-05T08:12:35.429Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/at-war-rise-of-military-internet-complex/vs/this-is-how-they-tell-me-the-world-ends</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/at-war-rise-of-military-internet-complex/vs/this-is-how-they-tell-me-the-world-ends" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/at-war-rise-of-military-internet-complex/vs/this-is-how-they-tell-me-the-world-ends" />
<lastmod>2026-05-05T08:12:35.976Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/dark-territory/vs/this-is-how-they-tell-me-the-world-ends</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/dark-territory/vs/this-is-how-they-tell-me-the-world-ends" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/dark-territory/vs/this-is-how-they-tell-me-the-world-ends" />
<lastmod>2026-05-05T08:12:35.976Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/threat-modeling-designing-for-security/vs/web-security-for-developers</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/threat-modeling-designing-for-security/vs/web-security-for-developers" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/threat-modeling-designing-for-security/vs/web-security-for-developers" />
<lastmod>2026-05-05T08:12:37.095Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/practical-malware-analysis/vs/threat-modeling-designing-for-security</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-malware-analysis/vs/threat-modeling-designing-for-security" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-malware-analysis/vs/threat-modeling-designing-for-security" />
<lastmod>2026-05-05T08:12:34.680Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/kingpin/vs/tracers-in-the-dark</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/kingpin/vs/tracers-in-the-dark" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/kingpin/vs/tracers-in-the-dark" />
<lastmod>2026-05-05T08:12:40.309Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/spam-nation/vs/tracers-in-the-dark</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/spam-nation/vs/tracers-in-the-dark" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/spam-nation/vs/tracers-in-the-dark" />
<lastmod>2026-05-05T08:12:40.374Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/the-pragmatic-programmer-20a/vs/tribe-of-hackers</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-pragmatic-programmer-20a/vs/tribe-of-hackers" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-pragmatic-programmer-20a/vs/tribe-of-hackers" />
<lastmod>2026-05-05T08:12:40.009Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/kingpin/vs/we-are-anonymous</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/kingpin/vs/we-are-anonymous" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/kingpin/vs/we-are-anonymous" />
<lastmod>2026-05-05T08:12:40.309Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/the-cuckoos-egg/vs/we-are-anonymous</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-cuckoos-egg/vs/we-are-anonymous" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-cuckoos-egg/vs/we-are-anonymous" />
<lastmod>2026-05-05T08:12:39.301Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/at-war-rise-of-military-internet-complex/vs/we-are-anonymous</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/at-war-rise-of-military-internet-complex/vs/we-are-anonymous" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/at-war-rise-of-military-internet-complex/vs/we-are-anonymous" />
<lastmod>2026-05-05T08:12:39.301Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/dark-territory/vs/we-are-anonymous</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/dark-territory/vs/we-are-anonymous" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/dark-territory/vs/we-are-anonymous" />
<lastmod>2026-05-05T08:12:39.301Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/foundations-of-information-security/vs/web-security-for-developers</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/foundations-of-information-security/vs/web-security-for-developers" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/foundations-of-information-security/vs/web-security-for-developers" />
<lastmod>2026-05-05T08:12:37.238Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/how-cybersecurity-really-works/vs/web-security-for-developers</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/how-cybersecurity-really-works/vs/web-security-for-developers" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/how-cybersecurity-really-works/vs/web-security-for-developers" />
<lastmod>2026-05-05T08:12:38.165Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/black-hat-graphql/vs/web-security-for-developers</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-graphql/vs/web-security-for-developers" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-graphql/vs/web-security-for-developers" />
<lastmod>2026-05-05T08:12:38.311Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/practical-reverse-engineering/vs/windows-internals-part-1-7e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-reverse-engineering/vs/windows-internals-part-1-7e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-reverse-engineering/vs/windows-internals-part-1-7e" />
<lastmod>2026-05-05T08:12:35.695Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/rootkits-and-bootkits/vs/windows-internals-part-1-7e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/rootkits-and-bootkits/vs/windows-internals-part-1-7e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/rootkits-and-bootkits/vs/windows-internals-part-1-7e" />
<lastmod>2026-05-05T08:12:35.695Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/practical-packet-analysis-3e/vs/zero-trust-networks</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-packet-analysis-3e/vs/zero-trust-networks" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-packet-analysis-3e/vs/zero-trust-networks" />
<lastmod>2026-05-05T08:12:40.992Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/books/designing-secure-software/vs/zero-trust-networks</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/designing-secure-software/vs/zero-trust-networks" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/designing-secure-software/vs/zero-trust-networks" />
<lastmod>2026-05-05T08:12:40.992Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/levels/beginner</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/levels/beginner" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/levels/beginner" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/levels/intermediate</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/levels/intermediate" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/levels/intermediate" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/levels/advanced</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/levels/advanced" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/levels/advanced" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/guides</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/guides" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/guides" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/years</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/years" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/years" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/aaron-rinehart</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/aaron-rinehart" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/aaron-rinehart" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/aaron-walters</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/aaron-walters" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/aaron-walters" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/adam-shostack</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/adam-shostack" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/adam-shostack" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/adam-stubblefield</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/adam-stubblefield" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/adam-stubblefield" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/alex-ionescu</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/alex-ionescu" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/alex-ionescu" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/alex-matrosov</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/alex-matrosov" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/alex-matrosov" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/alexandre-gazet</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/alexandre-gazet" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/alexandre-gazet" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/allen-harper</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/allen-harper" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/allen-harper" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/amael-cattaruzza</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/amael-cattaruzza" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/amael-cattaruzza" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/amit-gupta</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/amit-gupta" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/amit-gupta" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/ana-oprea</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/ana-oprea" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/ana-oprea" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/andrew-bunnie-huang</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/andrew-bunnie-huang" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/andrew-bunnie-huang" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/andrew-case</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/andrew-case" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/andrew-case" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/andrew-honig</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/andrew-honig" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/andrew-honig" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/andrew-hunt</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/andrew-hunt" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/andrew-hunt" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/andy-greenberg</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/andy-greenberg" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/andy-greenberg" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/anissa-makhlouf</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/anissa-makhlouf" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/anissa-makhlouf" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/bandeatoz</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/bandeatoz" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/bandeatoz" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/beau-woods</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/beau-woods" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/beau-woods" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/ben-buchanan</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/ben-buchanan" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/ben-buchanan" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/ben-mccarty</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/ben-mccarty" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/ben-mccarty" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/betsy-beyer</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/betsy-beyer" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/betsy-beyer" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/bill-grindlay</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/bill-grindlay" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/bill-grindlay" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/brendan-creane</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/brendan-creane" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/brendan-creane" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/brian-krebs</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/brian-krebs" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/brian-krebs" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/bruce-dang</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/bruce-dang" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/bruce-dang" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/bruce-nikkel</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/bruce-nikkel" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/bruce-nikkel" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/bruce-schneier</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/bruce-schneier" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/bruce-schneier" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/charlie-miller</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/charlie-miller" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/charlie-miller" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/chris-anley</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/chris-anley" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/chris-anley" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/chris-eagle</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/chris-eagle" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/chris-eagle" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/chris-patten</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/chris-patten" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/chris-patten" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/chris-sanders</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/chris-sanders" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/chris-sanders" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/christopher-hadnagy</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/christopher-hadnagy" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/christopher-hadnagy" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/clifford-stoll</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/clifford-stoll" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/clifford-stoll" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/colin-o-flynn</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/colin-o-flynn" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/colin-o-flynn" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/corey-j-ball</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/corey-j-ball" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/corey-j-ball" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/craig-smith</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/craig-smith" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/craig-smith" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/dafydd-stuttard</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/dafydd-stuttard" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/dafydd-stuttard" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/dan-kottmann</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/dan-kottmann" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/dan-kottmann" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/daniel-fernandez</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/daniel-fernandez" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/daniel-fernandez" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/daniel-g-graham</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/daniel-g-graham" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/daniel-g-graham" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/david-kennedy</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/david-kennedy" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/david-kennedy" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/david-litchfield</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/david-litchfield" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/david-litchfield" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/david-solomon</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/david-solomon" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/david-solomon" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/david-thiel</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/david-thiel" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/david-thiel" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/david-thomas</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/david-thomas" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/david-thomas" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/david-wong</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/david-wong" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/david-wong" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/dennis-andriesse</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/dennis-andriesse" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/dennis-andriesse" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/devon-kearns</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/devon-kearns" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/devon-kearns" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/didier-danet</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/didier-danet" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/didier-danet" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/dino-dai-zovi</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/dino-dai-zovi" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/dino-dai-zovi" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/dolev-farhi</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/dolev-farhi" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/dolev-farhi" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/dominic-chell</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/dominic-chell" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/dominic-chell" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/doug-barth</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/doug-barth" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/doug-barth" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/edward-snowden</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/edward-snowden" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/edward-snowden" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/elias-bachaalany</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/elias-bachaalany" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/elias-bachaalany" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/eric-filiol</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/eric-filiol" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/eric-filiol" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/eugene-rodionov</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/eugene-rodionov" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/eugene-rodionov" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/evan-gilman</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/evan-gilman" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/evan-gilman" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/evangelos-deirmentzoglou</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/evangelos-deirmentzoglou" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/evangelos-deirmentzoglou" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/felix-lindner</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/felix-lindner" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/felix-lindner" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/fotios-chantzis</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/fotios-chantzis" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/fotios-chantzis" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/fred-kaplan</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/fred-kaplan" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/fred-kaplan" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/georgia-weidman</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/georgia-weidman" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/georgia-weidman" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/gerardo-richarte</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/gerardo-richarte" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/gerardo-richarte" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/heather-adkins</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/heather-adkins" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/heather-adkins" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/hillary-sanders</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/hillary-sanders" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/hillary-sanders" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/huascar-tejeda</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/huascar-tejeda" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/huascar-tejeda" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/ioannis-stais</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/ioannis-stais" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/ioannis-stais" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/james-forshaw</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/james-forshaw" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/james-forshaw" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/jamie-levy</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/jamie-levy" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/jamie-levy" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/jason-andress</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/jason-andress" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/jason-andress" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/jason-t-luttgens</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/jason-t-luttgens" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/jason-t-luttgens" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/jasper-van-woudenberg</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/jasper-van-woudenberg" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/jasper-van-woudenberg" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/jean-philippe-aumasson</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/jean-philippe-aumasson" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/jean-philippe-aumasson" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/jennifer-jin</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/jennifer-jin" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/jennifer-jin" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/jim-o-gorman</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/jim-o-gorman" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/jim-o-gorman" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/joe-gray</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/joe-gray" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/joe-gray" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/john-heasman</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/john-heasman" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/john-heasman" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/john-mcdonald</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/john-mcdonald" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/john-mcdonald" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/jon-erickson</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/jon-erickson" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/jon-erickson" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/jos-weyers</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/jos-weyers" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/jos-weyers" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/joseph-menn</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/joseph-menn" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/joseph-menn" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/joshua-saxe</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/joshua-saxe" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/joshua-saxe" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/justin-schuh</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/justin-schuh" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/justin-schuh" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/justin-seitz</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/justin-seitz" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/justin-seitz" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/kelly-shortridge</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/kelly-shortridge" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/kelly-shortridge" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/kevin-mandia</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/kevin-mandia" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/kevin-mandia" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/kevin-mitnick</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/kevin-mitnick" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/kevin-mitnick" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/kevin-poulsen</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/kevin-poulsen" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/kevin-poulsen" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/kim-zetter</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/kim-zetter" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/kim-zetter" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/kyle-cucci</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/kyle-cucci" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/kyle-cucci" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/liz-rice</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/liz-rice" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/liz-rice" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/loren-kohnfelder</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/loren-kohnfelder" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/loren-kohnfelder" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/malcolm-mcdonald</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/malcolm-mcdonald" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/malcolm-mcdonald" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/marcus-j-carey</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/marcus-j-carey" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/marcus-j-carey" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/marcus-pinto</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/marcus-pinto" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/marcus-pinto" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/mark-dowd</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/mark-dowd" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/mark-dowd" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/mark-russinovich</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/mark-russinovich" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/mark-russinovich" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/mary-aiken</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/mary-aiken" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/mary-aiken" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/mati-aharoni</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/mati-aharoni" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/mati-aharoni" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/matt-burrough</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/matt-burrough" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/matt-burrough" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/matthew-pepe</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/matthew-pepe" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/matthew-pepe" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/micah-lee</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/micah-lee" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/micah-lee" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/michael-baucom</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/michael-baucom" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/michael-baucom" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/michael-bazzell</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/michael-bazzell" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/michael-bazzell" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/michael-collins</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/michael-collins" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/michael-collins" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/michael-hale-ligh</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/michael-hale-ligh" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/michael-hale-ligh" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/michael-hausenblas</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/michael-hausenblas" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/michael-hausenblas" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/michael-rash</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/michael-rash" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/michael-rash" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/michael-sikorski</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/michael-sikorski" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/michael-sikorski" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/michal-zalewski</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/michal-zalewski" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/michal-zalewski" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/moses-frost</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/moses-frost" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/moses-frost" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/nick-aleks</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/nick-aleks" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/nick-aleks" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/nicole-perlroth</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/nicole-perlroth" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/nicole-perlroth" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/niels-ferguson</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/niels-ferguson" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/niels-ferguson" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/nigel-k-tolley</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/nigel-k-tolley" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/nigel-k-tolley" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/nihad-a-hassan</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/nihad-a-hassan" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/nihad-a-hassan" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/nikolay-elenkov</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/nikolay-elenkov" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/nikolay-elenkov" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/occupytheweb</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/occupytheweb" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/occupytheweb" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/ollie-whitehouse</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/ollie-whitehouse" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/ollie-whitehouse" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/parmy-olson</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/parmy-olson" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/parmy-olson" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/patrick-wardle</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/patrick-wardle" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/patrick-wardle" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/paul-blankinship</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/paul-blankinship" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/paul-blankinship" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/paulino-calderon</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/paulino-calderon" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/paulino-calderon" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/pavel-yosifovich</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/pavel-yosifovich" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/pavel-yosifovich" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/peter-kim</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/peter-kim" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/peter-kim" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/peter-yaworski</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/peter-yaworski" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/peter-yaworski" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/piotr-lewandowski</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/piotr-lewandowski" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/piotr-lewandowski" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/rami-hijazi</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/rami-hijazi" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/rami-hijazi" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/richard-bejtlich</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/richard-bejtlich" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/richard-bejtlich" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/romain-hennion</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/romain-hennion" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/romain-hennion" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/ross-anderson</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/ross-anderson" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/ross-anderson" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/ryan-linn</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/ryan-linn" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/ryan-linn" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/sam-grubb</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/sam-grubb" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/sam-grubb" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/sergey-bratus</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/sergey-bratus" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/sergey-bratus" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/shane-harris</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/shane-harris" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/shane-harris" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/shaun-colley</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/shaun-colley" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/shaun-colley" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/stephane-taillat</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/stephane-taillat" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/stephane-taillat" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/stephen-sims</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/stephen-sims" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/stephen-sims" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/tadayoshi-kohno</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/tadayoshi-kohno" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/tadayoshi-kohno" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/tanya-janca</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/tanya-janca" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/tanya-janca" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/tim-arnold</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/tim-arnold" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/tim-arnold" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/tobias-klein</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/tobias-klein" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/tobias-klein" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/tom-steele</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/tom-steele" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/tom-steele" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/tyrone-erasmus</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/tyrone-erasmus" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/tyrone-erasmus" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/vickie-li</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/vickie-li" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/vickie-li" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/walter-belgers</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/walter-belgers" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/walter-belgers" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/authors/william-l-simon</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/william-l-simon" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/william-l-simon" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/years/2025</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/years/2025" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/years/2025" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/years/2024</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/years/2024" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/years/2024" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/years/2023</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/years/2023" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/years/2023" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/years/2022</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/years/2022" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/years/2022" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/years/2021</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/years/2021" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/years/2021" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/years/2020</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/years/2020" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/years/2020" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/years/2019</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/years/2019" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/years/2019" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/years/2018</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/years/2018" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/years/2018" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/years/2017</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/years/2017" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/years/2017" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/years/2016</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/years/2016" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/years/2016" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/years/2015</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/years/2015" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/years/2015" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/years/2014</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/years/2014" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/years/2014" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/years/2013</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/years/2013" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/years/2013" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/years/2012</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/years/2012" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/years/2012" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/years/2011</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/years/2011" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/years/2011" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/years/2010</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/years/2010" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/years/2010" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/years/2009</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/years/2009" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/years/2009" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/years/2008</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/years/2008" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/years/2008" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/years/2007</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/years/2007" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/years/2007" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/years/2006</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/years/2006" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/years/2006" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/years/2005</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/years/2005" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/years/2005" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/years/2003</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/years/2003" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/years/2003" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/years/2002</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/years/2002" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/years/2002" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/years/1989</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/years/1989" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/years/1989" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/geopolitics</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/geopolitics" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/geopolitics" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/history</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/history" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/history" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/narrative</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/narrative" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/narrative" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/vulnerability-research</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/vulnerability-research" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/vulnerability-research" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/offensive</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/offensive" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/offensive" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/strategy</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/strategy" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/strategy" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/policy</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/policy" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/policy" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/appsec</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/appsec" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/appsec" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/foundations</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/foundations" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/foundations" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/devsecops</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/devsecops" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/devsecops" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/mobile</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/mobile" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/mobile" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/android</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/android" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/android" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/operating-systems</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/operating-systems" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/operating-systems" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/networking</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/networking" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/networking" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/protocol-analysis</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/protocol-analysis" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/protocol-analysis" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/tooling</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/tooling" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/tooling" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/linux</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/linux" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/linux" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/web-security</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/web-security" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/web-security" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/bug-bounty</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/bug-bounty" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/bug-bounty" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/security-architecture</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/security-architecture" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/security-architecture" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/defensive</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/defensive" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/defensive" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/iot</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/iot" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/iot" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/cloud</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/cloud" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/cloud" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/containers</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/containers" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/containers" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/nation-state</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/nation-state" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/nation-state" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/malware</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/malware" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/malware" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/cryptography</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/cryptography" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/cryptography" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/reference</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/reference" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/reference" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/hacktivism</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/hacktivism" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/hacktivism" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/industry</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/industry" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/industry" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/threat-modeling</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/threat-modeling" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/threat-modeling" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/reverse-engineering</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/reverse-engineering" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/reverse-engineering" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/privacy</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/privacy" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/privacy" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/operational-security</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/operational-security" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/operational-security" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/osint</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/osint" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/osint" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/social-engineering</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/social-engineering" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/social-engineering" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/pentesting</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/pentesting" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/pentesting" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/exploitation</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/exploitation" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/exploitation" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/hardware</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/hardware" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/hardware" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/binary-exploitation</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/binary-exploitation" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/binary-exploitation" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/journalism</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/journalism" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/journalism" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/incident-response</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/incident-response" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/incident-response" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/forensics</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/forensics" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/forensics" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/ios</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/ios" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/ios" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/cybercrime</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/cybercrime" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/cybercrime" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/observability</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/observability" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/observability" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/physical-security</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/physical-security" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/physical-security" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/lockpicking</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/lockpicking" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/lockpicking" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/machine-learning</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/machine-learning" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/machine-learning" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/detection</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/detection" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/detection" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/investigations</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/investigations" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/investigations" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/surveillance</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/surveillance" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/surveillance" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/binary-analysis</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/binary-analysis" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/binary-analysis" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/embedded</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/embedded" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/embedded" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/windows-internals</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/windows-internals" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/windows-internals" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/threat-intelligence</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/threat-intelligence" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/threat-intelligence" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/reconnaissance</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/reconnaissance" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/reconnaissance" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/macos</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/macos" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/macos" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/code-auditing</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/code-auditing" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/code-auditing" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/automotive</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/automotive" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/automotive" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/behavioral</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/behavioral" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/behavioral" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/cyberpsychology</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/cyberpsychology" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/cyberpsychology" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/databases</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/databases" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/databases" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/red-team</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/red-team" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/red-team" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/software-engineering</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/software-engineering" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/software-engineering" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/career</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/career" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/career" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/browser-internals</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/browser-internals" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/browser-internals" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/cryptocurrency</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/cryptocurrency" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/cryptocurrency" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/culture</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/culture" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/culture" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/interviews</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/interviews" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/interviews" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/topics/architecture</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/architecture" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/architecture" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/blog</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/blog" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/blog" />
<lastmod>2026-05-04T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/blog/best-osint-books-2026</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/blog/best-osint-books-2026" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/blog/best-osint-books-2026" />
<lastmod>2026-05-04T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/blog/best-blue-team-books-soc-analysts-2026</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/blog/best-blue-team-books-soc-analysts-2026" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/blog/best-blue-team-books-soc-analysts-2026" />
<lastmod>2026-04-30T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/blog/best-books-for-bug-bounty-hunters-2026</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/blog/best-books-for-bug-bounty-hunters-2026" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/blog/best-books-for-bug-bounty-hunters-2026" />
<lastmod>2026-04-30T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/blog/best-books-for-oscp-2026</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/blog/best-books-for-oscp-2026" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/blog/best-books-for-oscp-2026" />
<lastmod>2026-04-30T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/blog/best-books-for-secure-software-developers-2026</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/blog/best-books-for-secure-software-developers-2026" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/blog/best-books-for-secure-software-developers-2026" />
<lastmod>2026-04-30T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/blog/best-cryptography-books-2026</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/blog/best-cryptography-books-2026" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/blog/best-cryptography-books-2026" />
<lastmod>2026-04-30T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/blog/best-cyber-warfare-books-2026</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/blog/best-cyber-warfare-books-2026" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/blog/best-cyber-warfare-books-2026" />
<lastmod>2026-04-30T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/blog/best-cybersecurity-books-2026</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/blog/best-cybersecurity-books-2026" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/blog/best-cybersecurity-books-2026" />
<lastmod>2026-04-30T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/blog/best-cybersecurity-books-for-beginners-2026</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/blog/best-cybersecurity-books-for-beginners-2026" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/blog/best-cybersecurity-books-for-beginners-2026" />
<lastmod>2026-04-30T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/blog/best-malware-analysis-books-2026</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/blog/best-malware-analysis-books-2026" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/blog/best-malware-analysis-books-2026" />
<lastmod>2026-04-30T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/blog/best-reverse-engineering-books-2026</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/blog/best-reverse-engineering-books-2026" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/blog/best-reverse-engineering-books-2026" />
<lastmod>2026-04-30T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/blog/best-web-application-security-books-2026</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/blog/best-web-application-security-books-2026" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/blog/best-web-application-security-books-2026" />
<lastmod>2026-04-30T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/blog/what-to-read-after-hacking-art-of-exploitation</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/blog/what-to-read-after-hacking-art-of-exploitation" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/blog/what-to-read-after-hacking-art-of-exploitation" />
<lastmod>2026-04-30T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/en/privacy</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/privacy" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/privacy" />
<lastmod>2026-01-01T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>1</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/films</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/films" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/films" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/series</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/series" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/series" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/podcasts</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/podcasts" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/podcasts" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/youtube-channels</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/youtube-channels" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/youtube-channels" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/youtube-channels/the-cyber-mentor</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/youtube-channels/the-cyber-mentor" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/youtube-channels/the-cyber-mentor" />
<lastmod>2026-05-04T19:27:19.944Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/cryptography-engineering</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cryptography-engineering" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cryptography-engineering" />
<lastmod>2026-05-05T08:12:34.401Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/sandworm</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/sandworm" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/sandworm" />
<lastmod>2026-05-05T08:12:34.539Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/practical-reverse-engineering</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-reverse-engineering" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-reverse-engineering" />
<lastmod>2026-05-05T08:12:35.086Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/the-tangled-web</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-tangled-web" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-tangled-web" />
<lastmod>2026-05-05T08:12:34.471Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/security-engineering-3e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/security-engineering-3e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/security-engineering-3e" />
<lastmod>2026-05-05T08:12:34.607Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/ida-pro-book-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/ida-pro-book-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/ida-pro-book-2e" />
<lastmod>2026-05-05T08:12:35.151Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/real-world-cryptography</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/real-world-cryptography" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/real-world-cryptography" />
<lastmod>2026-05-05T08:12:35.429Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/serious-cryptography-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/serious-cryptography-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/serious-cryptography-2e" />
<lastmod>2026-05-05T08:12:35.496Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/network-security-through-data-analysis-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/network-security-through-data-analysis-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/network-security-through-data-analysis-2e" />
<lastmod>2026-05-05T08:12:35.627Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/real-world-bug-hunting</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/real-world-bug-hunting" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/real-world-bug-hunting" />
<lastmod>2026-05-05T08:12:35.218Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/countdown-to-zero-day</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/countdown-to-zero-day" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/countdown-to-zero-day" />
<lastmod>2026-05-05T08:12:34.891Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/rootkits-and-bootkits</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/rootkits-and-bootkits" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/rootkits-and-bootkits" />
<lastmod>2026-05-05T08:12:35.280Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/dark-territory</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/dark-territory" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/dark-territory" />
<lastmod>2026-05-05T08:12:35.761Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/at-war-rise-of-military-internet-complex</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/at-war-rise-of-military-internet-complex" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/at-war-rise-of-military-internet-complex" />
<lastmod>2026-05-05T08:12:35.826Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/penetration-testing-weidman</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/penetration-testing-weidman" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/penetration-testing-weidman" />
<lastmod>2026-05-05T08:12:36.254Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/threat-modeling-designing-for-security</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/threat-modeling-designing-for-security" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/threat-modeling-designing-for-security" />
<lastmod>2026-05-05T08:12:34.680Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/shellcoders-handbook-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/shellcoders-handbook-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/shellcoders-handbook-2e" />
<lastmod>2026-05-05T08:12:34.955Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/black-hat-python-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-python-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-python-2e" />
<lastmod>2026-05-05T08:12:35.018Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/windows-internals-part-1-7e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/windows-internals-part-1-7e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/windows-internals-part-1-7e" />
<lastmod>2026-05-05T08:12:35.695Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/tribe-of-hackers</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/tribe-of-hackers" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/tribe-of-hackers" />
<lastmod>2026-05-05T08:12:36.042Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/ghost-in-the-wires</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/ghost-in-the-wires" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/ghost-in-the-wires" />
<lastmod>2026-05-05T08:12:36.113Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/metasploit-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/metasploit-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/metasploit-2e" />
<lastmod>2026-05-05T08:12:36.190Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/black-hat-go</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-go" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-go" />
<lastmod>2026-05-05T08:12:36.331Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/the-cuckoos-egg</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-cuckoos-egg" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-cuckoos-egg" />
<lastmod>2026-05-05T08:12:34.740Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/linux-basics-for-hackers-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/linux-basics-for-hackers-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/linux-basics-for-hackers-2e" />
<lastmod>2026-05-05T08:12:36.478Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/car-hackers-handbook</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/car-hackers-handbook" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/car-hackers-handbook" />
<lastmod>2026-05-05T08:12:36.545Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/attacking-network-protocols</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/attacking-network-protocols" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/attacking-network-protocols" />
<lastmod>2026-05-05T08:12:36.611Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/series/halt-and-catch-fire</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/series/halt-and-catch-fire" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/series/halt-and-catch-fire" />
<lastmod>2026-05-05T08:12:43.583Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/films/zero-days</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/films/zero-days" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/films/zero-days" />
<lastmod>2026-05-05T08:12:42.489Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/series/black-mirror</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/series/black-mirror" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/series/black-mirror" />
<lastmod>2026-05-05T08:12:43.650Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/podcasts/darknet-diaries</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/podcasts/darknet-diaries" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/podcasts/darknet-diaries" />
<lastmod>2026-05-05T08:12:44.867Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/podcasts/risky-business</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/podcasts/risky-business" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/podcasts/risky-business" />
<lastmod>2026-05-05T08:12:44.934Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/practical-malware-analysis</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-malware-analysis" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-malware-analysis" />
<lastmod>2026-05-05T08:12:34.241Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/series/mr-robot</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/series/mr-robot" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/series/mr-robot" />
<lastmod>2026-05-05T08:12:43.516Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/films/we-are-legion</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/films/we-are-legion" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/films/we-are-legion" />
<lastmod>2026-05-05T08:12:42.628Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/practice-of-network-security-monitoring</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practice-of-network-security-monitoring" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practice-of-network-security-monitoring" />
<lastmod>2026-05-05T08:12:37.871Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/locksport</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/locksport" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/locksport" />
<lastmod>2026-05-05T08:12:38.086Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/android-security-internals</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/android-security-internals" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/android-security-internals" />
<lastmod>2026-05-05T08:12:38.592Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/bug-bounty-bootcamp</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/bug-bounty-bootcamp" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/bug-bounty-bootcamp" />
<lastmod>2026-05-05T08:12:36.869Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/youtube-channels/liveoverflow</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/youtube-channels/liveoverflow" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/youtube-channels/liveoverflow" />
<lastmod>2026-05-04T19:27:20.062Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/foundations-of-information-security</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/foundations-of-information-security" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/foundations-of-information-security" />
<lastmod>2026-05-05T08:12:37.238Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/cyberjutsu</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cyberjutsu" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cyberjutsu" />
<lastmod>2026-05-05T08:12:37.307Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/evasive-malware</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/evasive-malware" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/evasive-malware" />
<lastmod>2026-05-05T08:12:37.375Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/designing-secure-software</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/designing-secure-software" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/designing-secure-software" />
<lastmod>2026-05-05T08:12:37.530Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/malware-data-science</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/malware-data-science" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/malware-data-science" />
<lastmod>2026-05-05T08:12:37.600Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/crypto-dictionary</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/crypto-dictionary" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/crypto-dictionary" />
<lastmod>2026-05-05T08:12:37.667Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/pentesting-azure-applications</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/pentesting-azure-applications" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/pentesting-azure-applications" />
<lastmod>2026-05-05T08:12:37.735Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/practical-packet-analysis-3e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-packet-analysis-3e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-packet-analysis-3e" />
<lastmod>2026-05-05T08:12:37.804Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/hacks-leaks-and-revelations</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacks-leaks-and-revelations" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacks-leaks-and-revelations" />
<lastmod>2026-05-05T08:12:37.941Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/how-cybersecurity-really-works</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/how-cybersecurity-really-works" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/how-cybersecurity-really-works" />
<lastmod>2026-05-05T08:12:38.165Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/black-hat-bash</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-bash" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-bash" />
<lastmod>2026-05-05T08:12:38.237Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/black-hat-graphql</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-graphql" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-graphql" />
<lastmod>2026-05-05T08:12:38.311Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/bug-hunters-diary</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/bug-hunters-diary" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/bug-hunters-diary" />
<lastmod>2026-05-05T08:12:38.378Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/silence-on-the-wire</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/silence-on-the-wire" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/silence-on-the-wire" />
<lastmod>2026-05-05T08:12:38.444Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/ios-application-security</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/ios-application-security" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/ios-application-security" />
<lastmod>2026-05-05T08:12:38.671Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/hacking-the-xbox</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacking-the-xbox" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacking-the-xbox" />
<lastmod>2026-05-05T08:12:38.738Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/linux-firewalls-rash</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/linux-firewalls-rash" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/linux-firewalls-rash" />
<lastmod>2026-05-05T08:12:38.809Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/practical-binary-analysis</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-binary-analysis" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-binary-analysis" />
<lastmod>2026-05-05T08:12:37.021Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/web-security-for-developers</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/web-security-for-developers" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/web-security-for-developers" />
<lastmod>2026-05-05T08:12:37.095Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/practical-linux-forensics</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-linux-forensics" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-linux-forensics" />
<lastmod>2026-05-05T08:12:37.164Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/films/snowden</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/films/snowden" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/films/snowden" />
<lastmod>2026-05-05T08:12:42.282Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/films/the-great-hack</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/films/the-great-hack" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/films/the-great-hack" />
<lastmod>2026-05-05T08:12:42.354Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/films/deep-web</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/films/deep-web" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/films/deep-web" />
<lastmod>2026-05-05T08:12:42.419Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/films/the-social-dilemma</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/films/the-social-dilemma" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/films/the-social-dilemma" />
<lastmod>2026-05-05T08:12:42.560Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/films/wargames</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/films/wargames" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/films/wargames" />
<lastmod>2026-05-05T08:12:41.928Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/films/sneakers</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/films/sneakers" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/films/sneakers" />
<lastmod>2026-05-05T08:12:42.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/films/hackers</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/films/hackers" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/films/hackers" />
<lastmod>2026-05-05T08:12:42.067Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/films/the-imitation-game</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/films/the-imitation-game" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/films/the-imitation-game" />
<lastmod>2026-05-05T08:12:42.136Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/series/person-of-interest</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/series/person-of-interest" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/series/person-of-interest" />
<lastmod>2026-05-05T08:12:43.870Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/series/silicon-valley</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/series/silicon-valley" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/series/silicon-valley" />
<lastmod>2026-05-05T08:12:43.936Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/hacking-apis</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacking-apis" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacking-apis" />
<lastmod>2026-05-05T08:12:36.803Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/films/citizenfour</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/films/citizenfour" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/films/citizenfour" />
<lastmod>2026-05-05T08:12:41.861Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/series/devs</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/series/devs" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/series/devs" />
<lastmod>2026-05-05T08:12:43.804Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/youtube-channels/john-hammond</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/youtube-channels/john-hammond" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/youtube-channels/john-hammond" />
<lastmod>2026-05-04T19:27:20.259Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/youtube-channels/ippsec</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/youtube-channels/ippsec" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/youtube-channels/ippsec" />
<lastmod>2026-05-04T19:27:20.552Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/youtube-channels/computerphile</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/youtube-channels/computerphile" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/youtube-channels/computerphile" />
<lastmod>2026-05-04T19:27:20.791Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/osint-techniques-11e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/osint-techniques-11e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/osint-techniques-11e" />
<lastmod>2026-05-05T08:12:39.102Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/art-of-mac-malware-v1</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/art-of-mac-malware-v1" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/art-of-mac-malware-v1" />
<lastmod>2026-05-05T08:12:36.679Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/the-hacker-playbook-3</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-hacker-playbook-3" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-hacker-playbook-3" />
<lastmod>2026-05-05T08:12:38.879Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/extreme-privacy-5e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/extreme-privacy-5e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/extreme-privacy-5e" />
<lastmod>2026-05-05T08:12:39.172Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/open-source-intelligence-techniques-tools</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/open-source-intelligence-techniques-tools" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/open-source-intelligence-techniques-tools" />
<lastmod>2026-05-05T08:12:39.235Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/we-are-anonymous</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/we-are-anonymous" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/we-are-anonymous" />
<lastmod>2026-05-05T08:12:39.301Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/tracers-in-the-dark</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/tracers-in-the-dark" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/tracers-in-the-dark" />
<lastmod>2026-05-05T08:12:39.365Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/permanent-record</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/permanent-record" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/permanent-record" />
<lastmod>2026-05-05T08:12:39.434Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/click-here-to-kill-everybody</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/click-here-to-kill-everybody" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/click-here-to-kill-everybody" />
<lastmod>2026-05-05T08:12:39.499Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/the-art-of-deception</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-art-of-deception" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-art-of-deception" />
<lastmod>2026-05-05T08:12:39.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/the-art-of-intrusion</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-art-of-intrusion" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-art-of-intrusion" />
<lastmod>2026-05-05T08:12:39.726Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/gray-hat-hacking-6e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/gray-hat-hacking-6e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/gray-hat-hacking-6e" />
<lastmod>2026-05-05T08:12:39.804Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/the-art-of-memory-forensics</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-art-of-memory-forensics" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-art-of-memory-forensics" />
<lastmod>2026-05-05T08:12:39.870Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/incident-response-and-computer-forensics-3e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/incident-response-and-computer-forensics-3e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/incident-response-and-computer-forensics-3e" />
<lastmod>2026-05-05T08:12:39.942Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/the-pragmatic-programmer-20a</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-pragmatic-programmer-20a" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-pragmatic-programmer-20a" />
<lastmod>2026-05-05T08:12:40.009Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/the-cyber-effect</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-cyber-effect" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-cyber-effect" />
<lastmod>2026-05-05T08:12:40.170Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/cult-of-the-dead-cow</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cult-of-the-dead-cow" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cult-of-the-dead-cow" />
<lastmod>2026-05-05T08:12:40.239Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/kingpin</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/kingpin" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/kingpin" />
<lastmod>2026-05-05T08:12:40.309Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/spam-nation</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/spam-nation" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/spam-nation" />
<lastmod>2026-05-05T08:12:40.374Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/social-engineering-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/social-engineering-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/social-engineering-2e" />
<lastmod>2026-05-05T08:12:40.438Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/the-mac-hackers-handbook</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-mac-hackers-handbook" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-mac-hackers-handbook" />
<lastmod>2026-05-05T08:12:40.507Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/the-mobile-application-hackers-handbook</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-mobile-application-hackers-handbook" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-mobile-application-hackers-handbook" />
<lastmod>2026-05-05T08:12:40.658Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/the-database-hackers-handbook</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-database-hackers-handbook" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-database-hackers-handbook" />
<lastmod>2026-05-05T08:12:40.725Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/container-security</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/container-security" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/container-security" />
<lastmod>2026-05-05T08:12:40.792Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/kubernetes-security-and-observability</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/kubernetes-security-and-observability" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/kubernetes-security-and-observability" />
<lastmod>2026-05-05T08:12:40.858Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/podcasts/smashing-security</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/podcasts/smashing-security" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/podcasts/smashing-security" />
<lastmod>2026-05-05T08:12:45.069Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/podcasts/security-now</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/podcasts/security-now" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/podcasts/security-now" />
<lastmod>2026-05-05T08:12:45.135Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/podcasts/cyberwire-daily</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/podcasts/cyberwire-daily" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/podcasts/cyberwire-daily" />
<lastmod>2026-05-05T08:12:45.200Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/podcasts/hacking-humans</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/podcasts/hacking-humans" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/podcasts/hacking-humans" />
<lastmod>2026-05-05T08:12:45.266Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/podcasts/no-such-podcast</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/podcasts/no-such-podcast" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/podcasts/no-such-podcast" />
<lastmod>2026-05-05T08:12:45.426Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/podcasts/click-here</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/podcasts/click-here" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/podcasts/click-here" />
<lastmod>2026-05-05T08:12:45.494Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/podcasts/defensive-security</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/podcasts/defensive-security" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/podcasts/defensive-security" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/this-is-how-they-tell-me-the-world-ends</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/this-is-how-they-tell-me-the-world-ends" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/this-is-how-they-tell-me-the-world-ends" />
<lastmod>2026-05-05T08:12:35.976Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/podcasts/nolimitsecu</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/podcasts/nolimitsecu" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/podcasts/nolimitsecu" />
<lastmod>2026-05-04T21:43:26.746Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/podcasts/le-comptoir-secu</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/podcasts/le-comptoir-secu" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/podcasts/le-comptoir-secu" />
<lastmod>2026-05-04T21:43:26.874Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/podcasts/la-french-connection</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/podcasts/la-french-connection" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/podcasts/la-french-connection" />
<lastmod>2026-05-04T21:43:27.001Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/podcasts/cybersecurite-all-day</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/podcasts/cybersecurite-all-day" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/podcasts/cybersecurite-all-day" />
<lastmod>2026-05-04T21:43:27.204Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/youtube-channels/micode</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/youtube-channels/micode" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/youtube-channels/micode" />
<lastmod>2026-05-04T21:43:27.360Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/youtube-channels/underscore</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/youtube-channels/underscore" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/youtube-channels/underscore" />
<lastmod>2026-05-04T21:43:27.483Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/youtube-channels/cookie-connecte</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/youtube-channels/cookie-connecte" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/youtube-channels/cookie-connecte" />
<lastmod>2026-05-04T21:43:27.683Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/youtube-channels/processus-thief</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/youtube-channels/processus-thief" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/youtube-channels/processus-thief" />
<lastmod>2026-05-04T21:43:27.809Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/les-virus-informatiques</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/les-virus-informatiques" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/les-virus-informatiques" />
<lastmod>2026-05-04T21:43:27.949Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/techniques-virales-avancees</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/techniques-virales-avancees" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/techniques-virales-avancees" />
<lastmod>2026-05-04T21:43:28.146Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/kubernetes-security</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/kubernetes-security" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/kubernetes-security" />
<lastmod>2026-05-05T08:12:40.924Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/cybersecurite-managers</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cybersecurite-managers" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cybersecurite-managers" />
<lastmod>2026-05-04T21:43:28.271Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/la-cyberdefense-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/la-cyberdefense-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/la-cyberdefense-2e" />
<lastmod>2026-05-04T21:43:28.387Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/zero-trust-networks</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/zero-trust-networks" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/zero-trust-networks" />
<lastmod>2026-05-05T08:12:40.992Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/alice-and-bob-learn-application-security</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/alice-and-bob-learn-application-security" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/alice-and-bob-learn-application-security" />
<lastmod>2026-05-05T08:12:41.067Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/films/the-internets-own-boy</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/films/the-internets-own-boy" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/films/the-internets-own-boy" />
<lastmod>2026-05-05T08:12:42.795Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/films/kill-chain-the-cyber-war-on-americas-elections</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/films/kill-chain-the-cyber-war-on-americas-elections" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/films/kill-chain-the-cyber-war-on-americas-elections" />
<lastmod>2026-05-05T08:12:42.864Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/films/the-perfect-weapon</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/films/the-perfect-weapon" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/films/the-perfect-weapon" />
<lastmod>2026-05-05T08:12:42.934Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/films/lo-and-behold-reveries-of-the-connected-world</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/films/lo-and-behold-reveries-of-the-connected-world" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/films/lo-and-behold-reveries-of-the-connected-world" />
<lastmod>2026-05-05T08:12:43.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/films/blackhat</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/films/blackhat" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/films/blackhat" />
<lastmod>2026-05-05T08:12:43.068Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/films/the-fifth-estate</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/films/the-fifth-estate" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/films/the-fifth-estate" />
<lastmod>2026-05-05T08:12:43.136Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/films/risk</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/films/risk" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/films/risk" />
<lastmod>2026-05-05T08:12:43.280Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/films/downloaded</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/films/downloaded" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/films/downloaded" />
<lastmod>2026-05-05T08:12:43.431Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/series/the-capture</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/series/the-capture" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/series/the-capture" />
<lastmod>2026-05-05T08:12:44.005Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/series/you-are-wanted</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/series/you-are-wanted" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/series/you-are-wanted" />
<lastmod>2026-05-05T08:12:44.084Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/series/scorpion</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/series/scorpion" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/series/scorpion" />
<lastmod>2026-05-05T08:12:44.151Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/series/leverage</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/series/leverage" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/series/leverage" />
<lastmod>2026-05-05T08:12:44.217Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/series/leverage-redemption</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/series/leverage-redemption" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/series/leverage-redemption" />
<lastmod>2026-05-05T08:12:44.374Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/series/westworld</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/series/westworld" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/series/westworld" />
<lastmod>2026-05-05T08:12:44.440Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/series/the-billion-dollar-code</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/series/the-billion-dollar-code" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/series/the-billion-dollar-code" />
<lastmod>2026-05-05T08:12:44.510Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/series/the-undeclared-war</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/series/the-undeclared-war" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/series/the-undeclared-war" />
<lastmod>2026-05-05T08:12:44.573Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/series/lazarus-heist</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/series/lazarus-heist" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/series/lazarus-heist" />
<lastmod>2026-05-05T08:12:44.638Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/series/this-world-the-cyber-arms-race</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/series/this-world-the-cyber-arms-race" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/series/this-world-the-cyber-arms-race" />
<lastmod>2026-05-05T08:12:44.701Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/podcasts/malicious-life</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/podcasts/malicious-life" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/podcasts/malicious-life" />
<lastmod>2026-05-05T08:12:45.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/practical-social-engineering</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-social-engineering" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-social-engineering" />
<lastmod>2026-05-05T08:12:38.950Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/podcasts/hacker-spirit</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/podcasts/hacker-spirit" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/podcasts/hacker-spirit" />
<lastmod>2026-05-04T19:00:07.175Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/films/nothing-to-hide-2017</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/films/nothing-to-hide-2017" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/films/nothing-to-hide-2017" />
<lastmod>2026-05-04T21:43:28.534Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/podcasts/cyber-mentor</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/podcasts/cyber-mentor" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/podcasts/cyber-mentor" />
<lastmod>2026-05-05T08:12:45.567Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/podcasts/no-name-security-podcast</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/podcasts/no-name-security-podcast" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/podcasts/no-name-security-podcast" />
<lastmod>2026-05-05T08:12:45.640Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/hacking-art-of-exploitation</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacking-art-of-exploitation" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacking-art-of-exploitation" />
<lastmod>2026-05-05T08:12:34.093Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/web-application-hackers-handbook</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/web-application-hackers-handbook" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/web-application-hackers-handbook" />
<lastmod>2026-05-05T08:12:34.167Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/art-of-software-security-assessment</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/art-of-software-security-assessment" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/art-of-software-security-assessment" />
<lastmod>2026-05-05T08:12:35.561Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/practical-iot-hacking</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-iot-hacking" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-iot-hacking" />
<lastmod>2026-05-05T08:12:36.743Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/building-secure-and-reliable-systems</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/building-secure-and-reliable-systems" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/building-secure-and-reliable-systems" />
<lastmod>2026-05-05T08:12:41.217Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/hardware-hacking-handbook</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hardware-hacking-handbook" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hardware-hacking-handbook" />
<lastmod>2026-05-05T08:12:41.285Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/a-hackers-mind</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/a-hackers-mind" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/a-hackers-mind" />
<lastmod>2026-05-05T08:12:41.351Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/the-hacker-and-the-state</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-hacker-and-the-state" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-hacker-and-the-state" />
<lastmod>2026-05-05T08:12:41.416Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/security-chaos-engineering</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/security-chaos-engineering" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/security-chaos-engineering" />
<lastmod>2026-05-05T08:12:41.485Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/films/open-source</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/films/open-source" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/films/open-source" />
<lastmod>2026-05-05T08:12:43.363Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/at-war-rise-of-military-internet-complex/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/at-war-rise-of-military-internet-complex/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/at-war-rise-of-military-internet-complex/alternatives" />
<lastmod>2026-05-05T08:12:35.826Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/at-war-rise-of-military-internet-complex/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/at-war-rise-of-military-internet-complex/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/at-war-rise-of-military-internet-complex/after" />
<lastmod>2026-05-05T08:12:35.826Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/at-war-rise-of-military-internet-complex/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/at-war-rise-of-military-internet-complex/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/at-war-rise-of-military-internet-complex/before" />
<lastmod>2026-05-05T08:12:35.826Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/bug-hunters-diary/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/bug-hunters-diary/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/bug-hunters-diary/alternatives" />
<lastmod>2026-05-05T08:12:38.378Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/bug-hunters-diary/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/bug-hunters-diary/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/bug-hunters-diary/after" />
<lastmod>2026-05-05T08:12:38.378Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/bug-hunters-diary/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/bug-hunters-diary/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/bug-hunters-diary/before" />
<lastmod>2026-05-05T08:12:38.378Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/a-hackers-mind/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/a-hackers-mind/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/a-hackers-mind/alternatives" />
<lastmod>2026-05-05T08:12:41.351Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/a-hackers-mind/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/a-hackers-mind/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/a-hackers-mind/after" />
<lastmod>2026-05-05T08:12:41.351Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/a-hackers-mind/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/a-hackers-mind/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/a-hackers-mind/before" />
<lastmod>2026-05-05T08:12:41.351Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/alice-and-bob-learn-application-security/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/alice-and-bob-learn-application-security/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/alice-and-bob-learn-application-security/alternatives" />
<lastmod>2026-05-05T08:12:41.067Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/alice-and-bob-learn-application-security/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/alice-and-bob-learn-application-security/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/alice-and-bob-learn-application-security/after" />
<lastmod>2026-05-05T08:12:41.067Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/alice-and-bob-learn-application-security/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/alice-and-bob-learn-application-security/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/alice-and-bob-learn-application-security/before" />
<lastmod>2026-05-05T08:12:41.067Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/android-security-internals/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/android-security-internals/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/android-security-internals/alternatives" />
<lastmod>2026-05-05T08:12:38.592Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/android-security-internals/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/android-security-internals/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/android-security-internals/after" />
<lastmod>2026-05-05T08:12:38.592Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/android-security-internals/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/android-security-internals/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/android-security-internals/before" />
<lastmod>2026-05-05T08:12:38.592Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/attacking-network-protocols/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/attacking-network-protocols/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/attacking-network-protocols/alternatives" />
<lastmod>2026-05-05T08:12:36.611Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/attacking-network-protocols/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/attacking-network-protocols/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/attacking-network-protocols/after" />
<lastmod>2026-05-05T08:12:36.611Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/attacking-network-protocols/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/attacking-network-protocols/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/attacking-network-protocols/before" />
<lastmod>2026-05-05T08:12:36.611Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/black-hat-bash/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-bash/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-bash/alternatives" />
<lastmod>2026-05-05T08:12:38.237Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/black-hat-bash/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-bash/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-bash/after" />
<lastmod>2026-05-05T08:12:38.237Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/black-hat-bash/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-bash/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-bash/before" />
<lastmod>2026-05-05T08:12:38.237Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/black-hat-go/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-go/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-go/alternatives" />
<lastmod>2026-05-05T08:12:36.331Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/black-hat-go/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-go/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-go/after" />
<lastmod>2026-05-05T08:12:36.331Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/black-hat-go/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-go/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-go/before" />
<lastmod>2026-05-05T08:12:36.331Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/black-hat-graphql/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-graphql/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-graphql/alternatives" />
<lastmod>2026-05-05T08:12:38.311Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/black-hat-graphql/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-graphql/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-graphql/after" />
<lastmod>2026-05-05T08:12:38.311Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/black-hat-graphql/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-graphql/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-graphql/before" />
<lastmod>2026-05-05T08:12:38.311Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/black-hat-python-2e/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-python-2e/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-python-2e/alternatives" />
<lastmod>2026-05-05T08:12:35.018Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/black-hat-python-2e/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-python-2e/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-python-2e/after" />
<lastmod>2026-05-05T08:12:35.018Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/black-hat-python-2e/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-python-2e/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-python-2e/before" />
<lastmod>2026-05-05T08:12:35.018Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/bug-bounty-bootcamp/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/bug-bounty-bootcamp/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/bug-bounty-bootcamp/alternatives" />
<lastmod>2026-05-05T08:12:36.869Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/bug-bounty-bootcamp/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/bug-bounty-bootcamp/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/bug-bounty-bootcamp/after" />
<lastmod>2026-05-05T08:12:36.869Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/bug-bounty-bootcamp/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/bug-bounty-bootcamp/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/bug-bounty-bootcamp/before" />
<lastmod>2026-05-05T08:12:36.869Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/building-secure-and-reliable-systems/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/building-secure-and-reliable-systems/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/building-secure-and-reliable-systems/alternatives" />
<lastmod>2026-05-05T08:12:41.217Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/building-secure-and-reliable-systems/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/building-secure-and-reliable-systems/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/building-secure-and-reliable-systems/after" />
<lastmod>2026-05-05T08:12:41.217Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/building-secure-and-reliable-systems/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/building-secure-and-reliable-systems/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/building-secure-and-reliable-systems/before" />
<lastmod>2026-05-05T08:12:41.217Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/click-here-to-kill-everybody/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/click-here-to-kill-everybody/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/click-here-to-kill-everybody/alternatives" />
<lastmod>2026-05-05T08:12:39.499Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/click-here-to-kill-everybody/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/click-here-to-kill-everybody/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/click-here-to-kill-everybody/after" />
<lastmod>2026-05-05T08:12:39.499Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/click-here-to-kill-everybody/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/click-here-to-kill-everybody/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/click-here-to-kill-everybody/before" />
<lastmod>2026-05-05T08:12:39.499Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/container-security/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/container-security/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/container-security/alternatives" />
<lastmod>2026-05-05T08:12:40.792Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/container-security/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/container-security/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/container-security/after" />
<lastmod>2026-05-05T08:12:40.792Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/container-security/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/container-security/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/container-security/before" />
<lastmod>2026-05-05T08:12:40.792Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/countdown-to-zero-day/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/countdown-to-zero-day/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/countdown-to-zero-day/alternatives" />
<lastmod>2026-05-05T08:12:34.891Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/countdown-to-zero-day/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/countdown-to-zero-day/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/countdown-to-zero-day/after" />
<lastmod>2026-05-05T08:12:34.891Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/countdown-to-zero-day/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/countdown-to-zero-day/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/countdown-to-zero-day/before" />
<lastmod>2026-05-05T08:12:34.891Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/crypto-dictionary/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/crypto-dictionary/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/crypto-dictionary/alternatives" />
<lastmod>2026-05-05T08:12:37.667Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/crypto-dictionary/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/crypto-dictionary/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/crypto-dictionary/after" />
<lastmod>2026-05-05T08:12:37.667Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/crypto-dictionary/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/crypto-dictionary/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/crypto-dictionary/before" />
<lastmod>2026-05-05T08:12:37.667Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/cryptography-engineering/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cryptography-engineering/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cryptography-engineering/alternatives" />
<lastmod>2026-05-05T08:12:34.401Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/cryptography-engineering/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cryptography-engineering/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cryptography-engineering/after" />
<lastmod>2026-05-05T08:12:34.401Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/cryptography-engineering/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cryptography-engineering/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cryptography-engineering/before" />
<lastmod>2026-05-05T08:12:34.401Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/cult-of-the-dead-cow/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cult-of-the-dead-cow/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cult-of-the-dead-cow/alternatives" />
<lastmod>2026-05-05T08:12:40.239Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/cult-of-the-dead-cow/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cult-of-the-dead-cow/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cult-of-the-dead-cow/after" />
<lastmod>2026-05-05T08:12:40.239Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/cult-of-the-dead-cow/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cult-of-the-dead-cow/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cult-of-the-dead-cow/before" />
<lastmod>2026-05-05T08:12:40.239Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/cyberjutsu/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cyberjutsu/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cyberjutsu/alternatives" />
<lastmod>2026-05-05T08:12:37.307Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/cyberjutsu/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cyberjutsu/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cyberjutsu/after" />
<lastmod>2026-05-05T08:12:37.307Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/cyberjutsu/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cyberjutsu/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cyberjutsu/before" />
<lastmod>2026-05-05T08:12:37.307Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/cybersecurite-managers/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cybersecurite-managers/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cybersecurite-managers/alternatives" />
<lastmod>2026-05-04T21:43:28.271Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/cybersecurite-managers/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cybersecurite-managers/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cybersecurite-managers/after" />
<lastmod>2026-05-04T21:43:28.271Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/cybersecurite-managers/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cybersecurite-managers/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cybersecurite-managers/before" />
<lastmod>2026-05-04T21:43:28.271Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/dark-territory/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/dark-territory/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/dark-territory/alternatives" />
<lastmod>2026-05-05T08:12:35.761Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/dark-territory/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/dark-territory/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/dark-territory/after" />
<lastmod>2026-05-05T08:12:35.761Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/dark-territory/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/dark-territory/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/dark-territory/before" />
<lastmod>2026-05-05T08:12:35.761Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/designing-secure-software/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/designing-secure-software/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/designing-secure-software/alternatives" />
<lastmod>2026-05-05T08:12:37.530Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/designing-secure-software/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/designing-secure-software/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/designing-secure-software/after" />
<lastmod>2026-05-05T08:12:37.530Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/designing-secure-software/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/designing-secure-software/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/designing-secure-software/before" />
<lastmod>2026-05-05T08:12:37.530Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/evasive-malware/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/evasive-malware/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/evasive-malware/alternatives" />
<lastmod>2026-05-05T08:12:37.375Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/evasive-malware/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/evasive-malware/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/evasive-malware/after" />
<lastmod>2026-05-05T08:12:37.375Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/evasive-malware/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/evasive-malware/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/evasive-malware/before" />
<lastmod>2026-05-05T08:12:37.375Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/extreme-privacy-5e/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/extreme-privacy-5e/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/extreme-privacy-5e/alternatives" />
<lastmod>2026-05-05T08:12:39.172Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/extreme-privacy-5e/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/extreme-privacy-5e/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/extreme-privacy-5e/after" />
<lastmod>2026-05-05T08:12:39.172Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/extreme-privacy-5e/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/extreme-privacy-5e/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/extreme-privacy-5e/before" />
<lastmod>2026-05-05T08:12:39.172Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/foundations-of-information-security/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/foundations-of-information-security/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/foundations-of-information-security/alternatives" />
<lastmod>2026-05-05T08:12:37.238Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/foundations-of-information-security/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/foundations-of-information-security/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/foundations-of-information-security/after" />
<lastmod>2026-05-05T08:12:37.238Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/foundations-of-information-security/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/foundations-of-information-security/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/foundations-of-information-security/before" />
<lastmod>2026-05-05T08:12:37.238Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/ghost-in-the-wires/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/ghost-in-the-wires/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/ghost-in-the-wires/alternatives" />
<lastmod>2026-05-05T08:12:36.113Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/ghost-in-the-wires/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/ghost-in-the-wires/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/ghost-in-the-wires/after" />
<lastmod>2026-05-05T08:12:36.113Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/ghost-in-the-wires/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/ghost-in-the-wires/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/ghost-in-the-wires/before" />
<lastmod>2026-05-05T08:12:36.113Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/gray-hat-hacking-6e/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/gray-hat-hacking-6e/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/gray-hat-hacking-6e/alternatives" />
<lastmod>2026-05-05T08:12:39.804Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/gray-hat-hacking-6e/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/gray-hat-hacking-6e/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/gray-hat-hacking-6e/after" />
<lastmod>2026-05-05T08:12:39.804Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/gray-hat-hacking-6e/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/gray-hat-hacking-6e/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/gray-hat-hacking-6e/before" />
<lastmod>2026-05-05T08:12:39.804Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/hacking-apis/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacking-apis/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacking-apis/alternatives" />
<lastmod>2026-05-05T08:12:36.803Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/hacking-apis/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacking-apis/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacking-apis/after" />
<lastmod>2026-05-05T08:12:36.803Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/hacking-apis/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacking-apis/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacking-apis/before" />
<lastmod>2026-05-05T08:12:36.803Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/hacking-the-xbox/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacking-the-xbox/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacking-the-xbox/alternatives" />
<lastmod>2026-05-05T08:12:38.738Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/hacking-the-xbox/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacking-the-xbox/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacking-the-xbox/after" />
<lastmod>2026-05-05T08:12:38.738Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/hacking-the-xbox/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacking-the-xbox/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacking-the-xbox/before" />
<lastmod>2026-05-05T08:12:38.738Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/hacking-art-of-exploitation/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacking-art-of-exploitation/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacking-art-of-exploitation/alternatives" />
<lastmod>2026-05-05T08:12:34.093Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/hacking-art-of-exploitation/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacking-art-of-exploitation/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacking-art-of-exploitation/after" />
<lastmod>2026-05-05T08:12:34.093Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/hacking-art-of-exploitation/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacking-art-of-exploitation/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacking-art-of-exploitation/before" />
<lastmod>2026-05-05T08:12:34.093Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/hacks-leaks-and-revelations/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacks-leaks-and-revelations/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacks-leaks-and-revelations/alternatives" />
<lastmod>2026-05-05T08:12:37.941Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/hacks-leaks-and-revelations/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacks-leaks-and-revelations/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacks-leaks-and-revelations/after" />
<lastmod>2026-05-05T08:12:37.941Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/hacks-leaks-and-revelations/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacks-leaks-and-revelations/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacks-leaks-and-revelations/before" />
<lastmod>2026-05-05T08:12:37.941Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/how-cybersecurity-really-works/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/how-cybersecurity-really-works/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/how-cybersecurity-really-works/alternatives" />
<lastmod>2026-05-05T08:12:38.165Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/how-cybersecurity-really-works/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/how-cybersecurity-really-works/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/how-cybersecurity-really-works/after" />
<lastmod>2026-05-05T08:12:38.165Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/how-cybersecurity-really-works/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/how-cybersecurity-really-works/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/how-cybersecurity-really-works/before" />
<lastmod>2026-05-05T08:12:38.165Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/incident-response-and-computer-forensics-3e/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/incident-response-and-computer-forensics-3e/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/incident-response-and-computer-forensics-3e/alternatives" />
<lastmod>2026-05-05T08:12:39.942Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/incident-response-and-computer-forensics-3e/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/incident-response-and-computer-forensics-3e/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/incident-response-and-computer-forensics-3e/after" />
<lastmod>2026-05-05T08:12:39.942Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/incident-response-and-computer-forensics-3e/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/incident-response-and-computer-forensics-3e/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/incident-response-and-computer-forensics-3e/before" />
<lastmod>2026-05-05T08:12:39.942Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/ios-application-security/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/ios-application-security/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/ios-application-security/alternatives" />
<lastmod>2026-05-05T08:12:38.671Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/ios-application-security/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/ios-application-security/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/ios-application-security/after" />
<lastmod>2026-05-05T08:12:38.671Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/ios-application-security/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/ios-application-security/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/ios-application-security/before" />
<lastmod>2026-05-05T08:12:38.671Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/kingpin/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/kingpin/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/kingpin/alternatives" />
<lastmod>2026-05-05T08:12:40.309Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/kingpin/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/kingpin/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/kingpin/after" />
<lastmod>2026-05-05T08:12:40.309Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/kingpin/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/kingpin/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/kingpin/before" />
<lastmod>2026-05-05T08:12:40.309Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/kubernetes-security/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/kubernetes-security/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/kubernetes-security/alternatives" />
<lastmod>2026-05-05T08:12:40.924Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/kubernetes-security/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/kubernetes-security/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/kubernetes-security/after" />
<lastmod>2026-05-05T08:12:40.924Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/kubernetes-security/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/kubernetes-security/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/kubernetes-security/before" />
<lastmod>2026-05-05T08:12:40.924Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/kubernetes-security-and-observability/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/kubernetes-security-and-observability/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/kubernetes-security-and-observability/alternatives" />
<lastmod>2026-05-05T08:12:40.858Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/kubernetes-security-and-observability/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/kubernetes-security-and-observability/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/kubernetes-security-and-observability/after" />
<lastmod>2026-05-05T08:12:40.858Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/kubernetes-security-and-observability/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/kubernetes-security-and-observability/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/kubernetes-security-and-observability/before" />
<lastmod>2026-05-05T08:12:40.858Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/la-cyberdefense-2e/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/la-cyberdefense-2e/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/la-cyberdefense-2e/alternatives" />
<lastmod>2026-05-04T21:43:28.387Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/la-cyberdefense-2e/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/la-cyberdefense-2e/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/la-cyberdefense-2e/after" />
<lastmod>2026-05-04T21:43:28.387Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/la-cyberdefense-2e/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/la-cyberdefense-2e/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/la-cyberdefense-2e/before" />
<lastmod>2026-05-04T21:43:28.387Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/les-virus-informatiques/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/les-virus-informatiques/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/les-virus-informatiques/alternatives" />
<lastmod>2026-05-04T21:43:27.949Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/les-virus-informatiques/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/les-virus-informatiques/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/les-virus-informatiques/after" />
<lastmod>2026-05-04T21:43:27.949Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/les-virus-informatiques/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/les-virus-informatiques/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/les-virus-informatiques/before" />
<lastmod>2026-05-04T21:43:27.949Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/linux-basics-for-hackers-2e/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/linux-basics-for-hackers-2e/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/linux-basics-for-hackers-2e/alternatives" />
<lastmod>2026-05-05T08:12:36.478Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/linux-basics-for-hackers-2e/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/linux-basics-for-hackers-2e/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/linux-basics-for-hackers-2e/after" />
<lastmod>2026-05-05T08:12:36.478Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/linux-basics-for-hackers-2e/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/linux-basics-for-hackers-2e/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/linux-basics-for-hackers-2e/before" />
<lastmod>2026-05-05T08:12:36.478Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/linux-firewalls-rash/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/linux-firewalls-rash/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/linux-firewalls-rash/alternatives" />
<lastmod>2026-05-05T08:12:38.809Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/linux-firewalls-rash/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/linux-firewalls-rash/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/linux-firewalls-rash/after" />
<lastmod>2026-05-05T08:12:38.809Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/linux-firewalls-rash/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/linux-firewalls-rash/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/linux-firewalls-rash/before" />
<lastmod>2026-05-05T08:12:38.809Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/locksport/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/locksport/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/locksport/alternatives" />
<lastmod>2026-05-05T08:12:38.086Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/locksport/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/locksport/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/locksport/after" />
<lastmod>2026-05-05T08:12:38.086Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/locksport/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/locksport/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/locksport/before" />
<lastmod>2026-05-05T08:12:38.086Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/malware-data-science/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/malware-data-science/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/malware-data-science/alternatives" />
<lastmod>2026-05-05T08:12:37.600Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/malware-data-science/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/malware-data-science/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/malware-data-science/after" />
<lastmod>2026-05-05T08:12:37.600Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/malware-data-science/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/malware-data-science/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/malware-data-science/before" />
<lastmod>2026-05-05T08:12:37.600Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/metasploit-2e/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/metasploit-2e/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/metasploit-2e/alternatives" />
<lastmod>2026-05-05T08:12:36.190Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/metasploit-2e/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/metasploit-2e/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/metasploit-2e/after" />
<lastmod>2026-05-05T08:12:36.190Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/metasploit-2e/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/metasploit-2e/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/metasploit-2e/before" />
<lastmod>2026-05-05T08:12:36.190Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/network-security-through-data-analysis-2e/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/network-security-through-data-analysis-2e/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/network-security-through-data-analysis-2e/alternatives" />
<lastmod>2026-05-05T08:12:35.627Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/network-security-through-data-analysis-2e/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/network-security-through-data-analysis-2e/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/network-security-through-data-analysis-2e/after" />
<lastmod>2026-05-05T08:12:35.627Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/network-security-through-data-analysis-2e/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/network-security-through-data-analysis-2e/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/network-security-through-data-analysis-2e/before" />
<lastmod>2026-05-05T08:12:35.627Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/open-source-intelligence-techniques-tools/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/open-source-intelligence-techniques-tools/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/open-source-intelligence-techniques-tools/alternatives" />
<lastmod>2026-05-05T08:12:39.235Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/open-source-intelligence-techniques-tools/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/open-source-intelligence-techniques-tools/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/open-source-intelligence-techniques-tools/after" />
<lastmod>2026-05-05T08:12:39.235Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/open-source-intelligence-techniques-tools/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/open-source-intelligence-techniques-tools/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/open-source-intelligence-techniques-tools/before" />
<lastmod>2026-05-05T08:12:39.235Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/osint-techniques-11e/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/osint-techniques-11e/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/osint-techniques-11e/alternatives" />
<lastmod>2026-05-05T08:12:39.102Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/osint-techniques-11e/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/osint-techniques-11e/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/osint-techniques-11e/after" />
<lastmod>2026-05-05T08:12:39.102Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/osint-techniques-11e/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/osint-techniques-11e/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/osint-techniques-11e/before" />
<lastmod>2026-05-05T08:12:39.102Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/penetration-testing-weidman/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/penetration-testing-weidman/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/penetration-testing-weidman/alternatives" />
<lastmod>2026-05-05T08:12:36.254Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/penetration-testing-weidman/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/penetration-testing-weidman/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/penetration-testing-weidman/after" />
<lastmod>2026-05-05T08:12:36.254Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/penetration-testing-weidman/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/penetration-testing-weidman/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/penetration-testing-weidman/before" />
<lastmod>2026-05-05T08:12:36.254Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/pentesting-azure-applications/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/pentesting-azure-applications/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/pentesting-azure-applications/alternatives" />
<lastmod>2026-05-05T08:12:37.735Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/pentesting-azure-applications/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/pentesting-azure-applications/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/pentesting-azure-applications/after" />
<lastmod>2026-05-05T08:12:37.735Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/pentesting-azure-applications/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/pentesting-azure-applications/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/pentesting-azure-applications/before" />
<lastmod>2026-05-05T08:12:37.735Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/permanent-record/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/permanent-record/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/permanent-record/alternatives" />
<lastmod>2026-05-05T08:12:39.434Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/permanent-record/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/permanent-record/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/permanent-record/after" />
<lastmod>2026-05-05T08:12:39.434Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/permanent-record/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/permanent-record/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/permanent-record/before" />
<lastmod>2026-05-05T08:12:39.434Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/practical-binary-analysis/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-binary-analysis/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-binary-analysis/alternatives" />
<lastmod>2026-05-05T08:12:37.021Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/practical-binary-analysis/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-binary-analysis/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-binary-analysis/after" />
<lastmod>2026-05-05T08:12:37.021Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/practical-binary-analysis/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-binary-analysis/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-binary-analysis/before" />
<lastmod>2026-05-05T08:12:37.021Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/practical-iot-hacking/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-iot-hacking/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-iot-hacking/alternatives" />
<lastmod>2026-05-05T08:12:36.743Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/practical-iot-hacking/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-iot-hacking/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-iot-hacking/after" />
<lastmod>2026-05-05T08:12:36.743Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/practical-iot-hacking/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-iot-hacking/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-iot-hacking/before" />
<lastmod>2026-05-05T08:12:36.743Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/practical-linux-forensics/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-linux-forensics/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-linux-forensics/alternatives" />
<lastmod>2026-05-05T08:12:37.164Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/practical-linux-forensics/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-linux-forensics/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-linux-forensics/after" />
<lastmod>2026-05-05T08:12:37.164Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/practical-linux-forensics/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-linux-forensics/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-linux-forensics/before" />
<lastmod>2026-05-05T08:12:37.164Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/practical-malware-analysis/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-malware-analysis/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-malware-analysis/alternatives" />
<lastmod>2026-05-05T08:12:34.241Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/practical-malware-analysis/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-malware-analysis/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-malware-analysis/after" />
<lastmod>2026-05-05T08:12:34.241Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/practical-malware-analysis/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-malware-analysis/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-malware-analysis/before" />
<lastmod>2026-05-05T08:12:34.241Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/practical-packet-analysis-3e/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-packet-analysis-3e/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-packet-analysis-3e/alternatives" />
<lastmod>2026-05-05T08:12:37.804Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/practical-packet-analysis-3e/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-packet-analysis-3e/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-packet-analysis-3e/after" />
<lastmod>2026-05-05T08:12:37.804Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/practical-packet-analysis-3e/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-packet-analysis-3e/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-packet-analysis-3e/before" />
<lastmod>2026-05-05T08:12:37.804Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/practical-reverse-engineering/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-reverse-engineering/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-reverse-engineering/alternatives" />
<lastmod>2026-05-05T08:12:35.086Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/practical-reverse-engineering/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-reverse-engineering/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-reverse-engineering/after" />
<lastmod>2026-05-05T08:12:35.086Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/practical-reverse-engineering/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-reverse-engineering/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-reverse-engineering/before" />
<lastmod>2026-05-05T08:12:35.086Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/practical-social-engineering/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-social-engineering/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-social-engineering/alternatives" />
<lastmod>2026-05-05T08:12:38.950Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/practical-social-engineering/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-social-engineering/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-social-engineering/after" />
<lastmod>2026-05-05T08:12:38.950Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/practical-social-engineering/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-social-engineering/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-social-engineering/before" />
<lastmod>2026-05-05T08:12:38.950Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/real-world-bug-hunting/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/real-world-bug-hunting/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/real-world-bug-hunting/alternatives" />
<lastmod>2026-05-05T08:12:35.218Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/real-world-bug-hunting/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/real-world-bug-hunting/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/real-world-bug-hunting/after" />
<lastmod>2026-05-05T08:12:35.218Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/real-world-bug-hunting/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/real-world-bug-hunting/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/real-world-bug-hunting/before" />
<lastmod>2026-05-05T08:12:35.218Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/real-world-cryptography/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/real-world-cryptography/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/real-world-cryptography/alternatives" />
<lastmod>2026-05-05T08:12:35.429Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/real-world-cryptography/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/real-world-cryptography/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/real-world-cryptography/after" />
<lastmod>2026-05-05T08:12:35.429Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/real-world-cryptography/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/real-world-cryptography/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/real-world-cryptography/before" />
<lastmod>2026-05-05T08:12:35.429Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/rootkits-and-bootkits/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/rootkits-and-bootkits/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/rootkits-and-bootkits/alternatives" />
<lastmod>2026-05-05T08:12:35.280Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/rootkits-and-bootkits/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/rootkits-and-bootkits/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/rootkits-and-bootkits/after" />
<lastmod>2026-05-05T08:12:35.280Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/rootkits-and-bootkits/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/rootkits-and-bootkits/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/rootkits-and-bootkits/before" />
<lastmod>2026-05-05T08:12:35.280Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/sandworm/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/sandworm/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/sandworm/alternatives" />
<lastmod>2026-05-05T08:12:34.539Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/sandworm/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/sandworm/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/sandworm/after" />
<lastmod>2026-05-05T08:12:34.539Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/sandworm/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/sandworm/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/sandworm/before" />
<lastmod>2026-05-05T08:12:34.539Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/security-chaos-engineering/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/security-chaos-engineering/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/security-chaos-engineering/alternatives" />
<lastmod>2026-05-05T08:12:41.485Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/security-chaos-engineering/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/security-chaos-engineering/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/security-chaos-engineering/after" />
<lastmod>2026-05-05T08:12:41.485Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/security-chaos-engineering/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/security-chaos-engineering/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/security-chaos-engineering/before" />
<lastmod>2026-05-05T08:12:41.485Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/security-engineering-3e/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/security-engineering-3e/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/security-engineering-3e/alternatives" />
<lastmod>2026-05-05T08:12:34.607Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/security-engineering-3e/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/security-engineering-3e/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/security-engineering-3e/after" />
<lastmod>2026-05-05T08:12:34.607Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/security-engineering-3e/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/security-engineering-3e/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/security-engineering-3e/before" />
<lastmod>2026-05-05T08:12:34.607Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/serious-cryptography-2e/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/serious-cryptography-2e/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/serious-cryptography-2e/alternatives" />
<lastmod>2026-05-05T08:12:35.496Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/serious-cryptography-2e/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/serious-cryptography-2e/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/serious-cryptography-2e/after" />
<lastmod>2026-05-05T08:12:35.496Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/serious-cryptography-2e/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/serious-cryptography-2e/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/serious-cryptography-2e/before" />
<lastmod>2026-05-05T08:12:35.496Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/silence-on-the-wire/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/silence-on-the-wire/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/silence-on-the-wire/alternatives" />
<lastmod>2026-05-05T08:12:38.444Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/silence-on-the-wire/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/silence-on-the-wire/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/silence-on-the-wire/after" />
<lastmod>2026-05-05T08:12:38.444Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/silence-on-the-wire/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/silence-on-the-wire/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/silence-on-the-wire/before" />
<lastmod>2026-05-05T08:12:38.444Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/social-engineering-2e/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/social-engineering-2e/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/social-engineering-2e/alternatives" />
<lastmod>2026-05-05T08:12:40.438Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/social-engineering-2e/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/social-engineering-2e/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/social-engineering-2e/after" />
<lastmod>2026-05-05T08:12:40.438Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/social-engineering-2e/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/social-engineering-2e/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/social-engineering-2e/before" />
<lastmod>2026-05-05T08:12:40.438Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/spam-nation/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/spam-nation/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/spam-nation/alternatives" />
<lastmod>2026-05-05T08:12:40.374Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/spam-nation/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/spam-nation/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/spam-nation/after" />
<lastmod>2026-05-05T08:12:40.374Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/spam-nation/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/spam-nation/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/spam-nation/before" />
<lastmod>2026-05-05T08:12:40.374Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/techniques-virales-avancees/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/techniques-virales-avancees/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/techniques-virales-avancees/alternatives" />
<lastmod>2026-05-04T21:43:28.146Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/techniques-virales-avancees/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/techniques-virales-avancees/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/techniques-virales-avancees/after" />
<lastmod>2026-05-04T21:43:28.146Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/techniques-virales-avancees/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/techniques-virales-avancees/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/techniques-virales-avancees/before" />
<lastmod>2026-05-04T21:43:28.146Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/the-art-of-deception/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-art-of-deception/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-art-of-deception/alternatives" />
<lastmod>2026-05-05T08:12:39.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/the-art-of-deception/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-art-of-deception/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-art-of-deception/after" />
<lastmod>2026-05-05T08:12:39.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/the-art-of-deception/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-art-of-deception/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-art-of-deception/before" />
<lastmod>2026-05-05T08:12:39.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/the-art-of-intrusion/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-art-of-intrusion/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-art-of-intrusion/alternatives" />
<lastmod>2026-05-05T08:12:39.726Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/the-art-of-intrusion/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-art-of-intrusion/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-art-of-intrusion/after" />
<lastmod>2026-05-05T08:12:39.726Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/the-art-of-intrusion/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-art-of-intrusion/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-art-of-intrusion/before" />
<lastmod>2026-05-05T08:12:39.726Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/art-of-mac-malware-v1/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/art-of-mac-malware-v1/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/art-of-mac-malware-v1/alternatives" />
<lastmod>2026-05-05T08:12:36.679Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/art-of-mac-malware-v1/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/art-of-mac-malware-v1/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/art-of-mac-malware-v1/after" />
<lastmod>2026-05-05T08:12:36.679Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/art-of-mac-malware-v1/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/art-of-mac-malware-v1/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/art-of-mac-malware-v1/before" />
<lastmod>2026-05-05T08:12:36.679Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/the-art-of-memory-forensics/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-art-of-memory-forensics/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-art-of-memory-forensics/alternatives" />
<lastmod>2026-05-05T08:12:39.870Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/the-art-of-memory-forensics/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-art-of-memory-forensics/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-art-of-memory-forensics/after" />
<lastmod>2026-05-05T08:12:39.870Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/the-art-of-memory-forensics/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-art-of-memory-forensics/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-art-of-memory-forensics/before" />
<lastmod>2026-05-05T08:12:39.870Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/art-of-software-security-assessment/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/art-of-software-security-assessment/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/art-of-software-security-assessment/alternatives" />
<lastmod>2026-05-05T08:12:35.561Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/art-of-software-security-assessment/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/art-of-software-security-assessment/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/art-of-software-security-assessment/after" />
<lastmod>2026-05-05T08:12:35.561Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/art-of-software-security-assessment/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/art-of-software-security-assessment/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/art-of-software-security-assessment/before" />
<lastmod>2026-05-05T08:12:35.561Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/car-hackers-handbook/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/car-hackers-handbook/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/car-hackers-handbook/alternatives" />
<lastmod>2026-05-05T08:12:36.545Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/car-hackers-handbook/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/car-hackers-handbook/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/car-hackers-handbook/after" />
<lastmod>2026-05-05T08:12:36.545Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/car-hackers-handbook/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/car-hackers-handbook/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/car-hackers-handbook/before" />
<lastmod>2026-05-05T08:12:36.545Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/the-cuckoos-egg/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-cuckoos-egg/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-cuckoos-egg/alternatives" />
<lastmod>2026-05-05T08:12:34.740Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/the-cuckoos-egg/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-cuckoos-egg/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-cuckoos-egg/after" />
<lastmod>2026-05-05T08:12:34.740Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/the-cuckoos-egg/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-cuckoos-egg/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-cuckoos-egg/before" />
<lastmod>2026-05-05T08:12:34.740Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/the-cyber-effect/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-cyber-effect/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-cyber-effect/alternatives" />
<lastmod>2026-05-05T08:12:40.170Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/the-cyber-effect/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-cyber-effect/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-cyber-effect/after" />
<lastmod>2026-05-05T08:12:40.170Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/the-cyber-effect/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-cyber-effect/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-cyber-effect/before" />
<lastmod>2026-05-05T08:12:40.170Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/the-database-hackers-handbook/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-database-hackers-handbook/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-database-hackers-handbook/alternatives" />
<lastmod>2026-05-05T08:12:40.725Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/the-database-hackers-handbook/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-database-hackers-handbook/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-database-hackers-handbook/after" />
<lastmod>2026-05-05T08:12:40.725Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/the-database-hackers-handbook/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-database-hackers-handbook/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-database-hackers-handbook/before" />
<lastmod>2026-05-05T08:12:40.725Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/the-hacker-and-the-state/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-hacker-and-the-state/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-hacker-and-the-state/alternatives" />
<lastmod>2026-05-05T08:12:41.416Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/the-hacker-and-the-state/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-hacker-and-the-state/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-hacker-and-the-state/after" />
<lastmod>2026-05-05T08:12:41.416Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/the-hacker-and-the-state/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-hacker-and-the-state/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-hacker-and-the-state/before" />
<lastmod>2026-05-05T08:12:41.416Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/the-hacker-playbook-3/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-hacker-playbook-3/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-hacker-playbook-3/alternatives" />
<lastmod>2026-05-05T08:12:38.879Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/the-hacker-playbook-3/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-hacker-playbook-3/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-hacker-playbook-3/after" />
<lastmod>2026-05-05T08:12:38.879Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/the-hacker-playbook-3/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-hacker-playbook-3/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-hacker-playbook-3/before" />
<lastmod>2026-05-05T08:12:38.879Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/hardware-hacking-handbook/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hardware-hacking-handbook/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hardware-hacking-handbook/alternatives" />
<lastmod>2026-05-05T08:12:41.285Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/hardware-hacking-handbook/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hardware-hacking-handbook/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hardware-hacking-handbook/after" />
<lastmod>2026-05-05T08:12:41.285Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/hardware-hacking-handbook/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hardware-hacking-handbook/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hardware-hacking-handbook/before" />
<lastmod>2026-05-05T08:12:41.285Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/ida-pro-book-2e/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/ida-pro-book-2e/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/ida-pro-book-2e/alternatives" />
<lastmod>2026-05-05T08:12:35.151Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/ida-pro-book-2e/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/ida-pro-book-2e/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/ida-pro-book-2e/after" />
<lastmod>2026-05-05T08:12:35.151Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/ida-pro-book-2e/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/ida-pro-book-2e/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/ida-pro-book-2e/before" />
<lastmod>2026-05-05T08:12:35.151Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/the-mac-hackers-handbook/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-mac-hackers-handbook/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-mac-hackers-handbook/alternatives" />
<lastmod>2026-05-05T08:12:40.507Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/the-mac-hackers-handbook/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-mac-hackers-handbook/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-mac-hackers-handbook/after" />
<lastmod>2026-05-05T08:12:40.507Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/the-mac-hackers-handbook/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-mac-hackers-handbook/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-mac-hackers-handbook/before" />
<lastmod>2026-05-05T08:12:40.507Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/the-mobile-application-hackers-handbook/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-mobile-application-hackers-handbook/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-mobile-application-hackers-handbook/alternatives" />
<lastmod>2026-05-05T08:12:40.658Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/the-mobile-application-hackers-handbook/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-mobile-application-hackers-handbook/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-mobile-application-hackers-handbook/after" />
<lastmod>2026-05-05T08:12:40.658Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/the-mobile-application-hackers-handbook/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-mobile-application-hackers-handbook/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-mobile-application-hackers-handbook/before" />
<lastmod>2026-05-05T08:12:40.658Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/practice-of-network-security-monitoring/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practice-of-network-security-monitoring/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practice-of-network-security-monitoring/alternatives" />
<lastmod>2026-05-05T08:12:37.871Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/practice-of-network-security-monitoring/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practice-of-network-security-monitoring/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practice-of-network-security-monitoring/after" />
<lastmod>2026-05-05T08:12:37.871Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/practice-of-network-security-monitoring/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practice-of-network-security-monitoring/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practice-of-network-security-monitoring/before" />
<lastmod>2026-05-05T08:12:37.871Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/the-pragmatic-programmer-20a/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-pragmatic-programmer-20a/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-pragmatic-programmer-20a/alternatives" />
<lastmod>2026-05-05T08:12:40.009Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/the-pragmatic-programmer-20a/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-pragmatic-programmer-20a/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-pragmatic-programmer-20a/after" />
<lastmod>2026-05-05T08:12:40.009Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/the-pragmatic-programmer-20a/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-pragmatic-programmer-20a/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-pragmatic-programmer-20a/before" />
<lastmod>2026-05-05T08:12:40.009Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/shellcoders-handbook-2e/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/shellcoders-handbook-2e/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/shellcoders-handbook-2e/alternatives" />
<lastmod>2026-05-05T08:12:34.955Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/shellcoders-handbook-2e/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/shellcoders-handbook-2e/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/shellcoders-handbook-2e/after" />
<lastmod>2026-05-05T08:12:34.955Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/shellcoders-handbook-2e/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/shellcoders-handbook-2e/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/shellcoders-handbook-2e/before" />
<lastmod>2026-05-05T08:12:34.955Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/the-tangled-web/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-tangled-web/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-tangled-web/alternatives" />
<lastmod>2026-05-05T08:12:34.471Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/the-tangled-web/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-tangled-web/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-tangled-web/after" />
<lastmod>2026-05-05T08:12:34.471Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/the-tangled-web/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-tangled-web/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-tangled-web/before" />
<lastmod>2026-05-05T08:12:34.471Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/web-application-hackers-handbook/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/web-application-hackers-handbook/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/web-application-hackers-handbook/alternatives" />
<lastmod>2026-05-05T08:12:34.167Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/web-application-hackers-handbook/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/web-application-hackers-handbook/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/web-application-hackers-handbook/after" />
<lastmod>2026-05-05T08:12:34.167Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/web-application-hackers-handbook/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/web-application-hackers-handbook/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/web-application-hackers-handbook/before" />
<lastmod>2026-05-05T08:12:34.167Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/this-is-how-they-tell-me-the-world-ends/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/this-is-how-they-tell-me-the-world-ends/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/this-is-how-they-tell-me-the-world-ends/alternatives" />
<lastmod>2026-05-05T08:12:35.976Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/this-is-how-they-tell-me-the-world-ends/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/this-is-how-they-tell-me-the-world-ends/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/this-is-how-they-tell-me-the-world-ends/after" />
<lastmod>2026-05-05T08:12:35.976Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/this-is-how-they-tell-me-the-world-ends/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/this-is-how-they-tell-me-the-world-ends/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/this-is-how-they-tell-me-the-world-ends/before" />
<lastmod>2026-05-05T08:12:35.976Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/threat-modeling-designing-for-security/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/threat-modeling-designing-for-security/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/threat-modeling-designing-for-security/alternatives" />
<lastmod>2026-05-05T08:12:34.680Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/threat-modeling-designing-for-security/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/threat-modeling-designing-for-security/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/threat-modeling-designing-for-security/after" />
<lastmod>2026-05-05T08:12:34.680Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/threat-modeling-designing-for-security/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/threat-modeling-designing-for-security/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/threat-modeling-designing-for-security/before" />
<lastmod>2026-05-05T08:12:34.680Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/tracers-in-the-dark/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/tracers-in-the-dark/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/tracers-in-the-dark/alternatives" />
<lastmod>2026-05-05T08:12:39.365Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/tracers-in-the-dark/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/tracers-in-the-dark/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/tracers-in-the-dark/after" />
<lastmod>2026-05-05T08:12:39.365Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/tracers-in-the-dark/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/tracers-in-the-dark/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/tracers-in-the-dark/before" />
<lastmod>2026-05-05T08:12:39.365Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/tribe-of-hackers/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/tribe-of-hackers/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/tribe-of-hackers/alternatives" />
<lastmod>2026-05-05T08:12:36.042Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/tribe-of-hackers/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/tribe-of-hackers/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/tribe-of-hackers/after" />
<lastmod>2026-05-05T08:12:36.042Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/tribe-of-hackers/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/tribe-of-hackers/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/tribe-of-hackers/before" />
<lastmod>2026-05-05T08:12:36.042Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/we-are-anonymous/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/we-are-anonymous/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/we-are-anonymous/alternatives" />
<lastmod>2026-05-05T08:12:39.301Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/we-are-anonymous/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/we-are-anonymous/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/we-are-anonymous/after" />
<lastmod>2026-05-05T08:12:39.301Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/we-are-anonymous/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/we-are-anonymous/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/we-are-anonymous/before" />
<lastmod>2026-05-05T08:12:39.301Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/web-security-for-developers/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/web-security-for-developers/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/web-security-for-developers/alternatives" />
<lastmod>2026-05-05T08:12:37.095Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/web-security-for-developers/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/web-security-for-developers/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/web-security-for-developers/after" />
<lastmod>2026-05-05T08:12:37.095Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/web-security-for-developers/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/web-security-for-developers/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/web-security-for-developers/before" />
<lastmod>2026-05-05T08:12:37.095Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/windows-internals-part-1-7e/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/windows-internals-part-1-7e/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/windows-internals-part-1-7e/alternatives" />
<lastmod>2026-05-05T08:12:35.695Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/windows-internals-part-1-7e/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/windows-internals-part-1-7e/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/windows-internals-part-1-7e/after" />
<lastmod>2026-05-05T08:12:35.695Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/windows-internals-part-1-7e/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/windows-internals-part-1-7e/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/windows-internals-part-1-7e/before" />
<lastmod>2026-05-05T08:12:35.695Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/zero-trust-networks/alternatives</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/zero-trust-networks/alternatives" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/zero-trust-networks/alternatives" />
<lastmod>2026-05-05T08:12:40.992Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/zero-trust-networks/after</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/zero-trust-networks/after" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/zero-trust-networks/after" />
<lastmod>2026-05-05T08:12:40.992Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/zero-trust-networks/before</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/zero-trust-networks/before" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/zero-trust-networks/before" />
<lastmod>2026-05-05T08:12:40.992Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/at-war-rise-of-military-internet-complex/vs/dark-territory</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/at-war-rise-of-military-internet-complex/vs/dark-territory" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/at-war-rise-of-military-internet-complex/vs/dark-territory" />
<lastmod>2026-05-05T08:12:35.826Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/at-war-rise-of-military-internet-complex/vs/kingpin</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/at-war-rise-of-military-internet-complex/vs/kingpin" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/at-war-rise-of-military-internet-complex/vs/kingpin" />
<lastmod>2026-05-05T08:12:40.309Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/at-war-rise-of-military-internet-complex/vs/sandworm</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/at-war-rise-of-military-internet-complex/vs/sandworm" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/at-war-rise-of-military-internet-complex/vs/sandworm" />
<lastmod>2026-05-05T08:12:35.826Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/at-war-rise-of-military-internet-complex/vs/the-cuckoos-egg</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/at-war-rise-of-military-internet-complex/vs/the-cuckoos-egg" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/at-war-rise-of-military-internet-complex/vs/the-cuckoos-egg" />
<lastmod>2026-05-05T08:12:35.826Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/at-war-rise-of-military-internet-complex/vs/the-hacker-and-the-state</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/at-war-rise-of-military-internet-complex/vs/the-hacker-and-the-state" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/at-war-rise-of-military-internet-complex/vs/the-hacker-and-the-state" />
<lastmod>2026-05-05T08:12:41.416Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/bug-hunters-diary/vs/this-is-how-they-tell-me-the-world-ends</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/bug-hunters-diary/vs/this-is-how-they-tell-me-the-world-ends" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/bug-hunters-diary/vs/this-is-how-they-tell-me-the-world-ends" />
<lastmod>2026-05-05T08:12:38.378Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/bug-hunters-diary/vs/hacking-art-of-exploitation</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/bug-hunters-diary/vs/hacking-art-of-exploitation" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/bug-hunters-diary/vs/hacking-art-of-exploitation" />
<lastmod>2026-05-05T08:12:38.378Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/black-hat-bash/vs/bug-hunters-diary</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-bash/vs/bug-hunters-diary" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-bash/vs/bug-hunters-diary" />
<lastmod>2026-05-05T08:12:38.378Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/black-hat-go/vs/bug-hunters-diary</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-go/vs/bug-hunters-diary" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-go/vs/bug-hunters-diary" />
<lastmod>2026-05-05T08:12:38.378Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/black-hat-graphql/vs/bug-hunters-diary</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-graphql/vs/bug-hunters-diary" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-graphql/vs/bug-hunters-diary" />
<lastmod>2026-05-05T08:12:38.378Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/a-hackers-mind/vs/the-hacker-and-the-state</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/a-hackers-mind/vs/the-hacker-and-the-state" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/a-hackers-mind/vs/the-hacker-and-the-state" />
<lastmod>2026-05-05T08:12:41.416Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/a-hackers-mind/vs/cyberjutsu</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/a-hackers-mind/vs/cyberjutsu" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/a-hackers-mind/vs/cyberjutsu" />
<lastmod>2026-05-05T08:12:41.351Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/a-hackers-mind/vs/kingpin</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/a-hackers-mind/vs/kingpin" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/a-hackers-mind/vs/kingpin" />
<lastmod>2026-05-05T08:12:41.351Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/a-hackers-mind/vs/sandworm</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/a-hackers-mind/vs/sandworm" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/a-hackers-mind/vs/sandworm" />
<lastmod>2026-05-05T08:12:41.351Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/a-hackers-mind/vs/the-cuckoos-egg</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/a-hackers-mind/vs/the-cuckoos-egg" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/a-hackers-mind/vs/the-cuckoos-egg" />
<lastmod>2026-05-05T08:12:41.351Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/alice-and-bob-learn-application-security/vs/foundations-of-information-security</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/alice-and-bob-learn-application-security/vs/foundations-of-information-security" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/alice-and-bob-learn-application-security/vs/foundations-of-information-security" />
<lastmod>2026-05-05T08:12:41.067Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/alice-and-bob-learn-application-security/vs/how-cybersecurity-really-works</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/alice-and-bob-learn-application-security/vs/how-cybersecurity-really-works" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/alice-and-bob-learn-application-security/vs/how-cybersecurity-really-works" />
<lastmod>2026-05-05T08:12:41.067Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/alice-and-bob-learn-application-security/vs/the-pragmatic-programmer-20a</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/alice-and-bob-learn-application-security/vs/the-pragmatic-programmer-20a" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/alice-and-bob-learn-application-security/vs/the-pragmatic-programmer-20a" />
<lastmod>2026-05-05T08:12:41.067Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/alice-and-bob-learn-application-security/vs/real-world-cryptography</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/alice-and-bob-learn-application-security/vs/real-world-cryptography" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/alice-and-bob-learn-application-security/vs/real-world-cryptography" />
<lastmod>2026-05-05T08:12:41.067Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/alice-and-bob-learn-application-security/vs/click-here-to-kill-everybody</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/alice-and-bob-learn-application-security/vs/click-here-to-kill-everybody" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/alice-and-bob-learn-application-security/vs/click-here-to-kill-everybody" />
<lastmod>2026-05-05T08:12:41.067Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/android-security-internals/vs/windows-internals-part-1-7e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/android-security-internals/vs/windows-internals-part-1-7e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/android-security-internals/vs/windows-internals-part-1-7e" />
<lastmod>2026-05-05T08:12:38.592Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/android-security-internals/vs/ios-application-security</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/android-security-internals/vs/ios-application-security" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/android-security-internals/vs/ios-application-security" />
<lastmod>2026-05-05T08:12:38.671Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/android-security-internals/vs/the-mobile-application-hackers-handbook</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/android-security-internals/vs/the-mobile-application-hackers-handbook" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/android-security-internals/vs/the-mobile-application-hackers-handbook" />
<lastmod>2026-05-05T08:12:40.658Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/attacking-network-protocols/vs/hacking-art-of-exploitation</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/attacking-network-protocols/vs/hacking-art-of-exploitation" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/attacking-network-protocols/vs/hacking-art-of-exploitation" />
<lastmod>2026-05-05T08:12:36.611Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/attacking-network-protocols/vs/black-hat-go</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/attacking-network-protocols/vs/black-hat-go" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/attacking-network-protocols/vs/black-hat-go" />
<lastmod>2026-05-05T08:12:36.611Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/attacking-network-protocols/vs/black-hat-python-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/attacking-network-protocols/vs/black-hat-python-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/attacking-network-protocols/vs/black-hat-python-2e" />
<lastmod>2026-05-05T08:12:36.611Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/attacking-network-protocols/vs/silence-on-the-wire</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/attacking-network-protocols/vs/silence-on-the-wire" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/attacking-network-protocols/vs/silence-on-the-wire" />
<lastmod>2026-05-05T08:12:38.444Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/attacking-network-protocols/vs/shellcoders-handbook-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/attacking-network-protocols/vs/shellcoders-handbook-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/attacking-network-protocols/vs/shellcoders-handbook-2e" />
<lastmod>2026-05-05T08:12:36.611Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/black-hat-bash/vs/black-hat-go</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-bash/vs/black-hat-go" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-bash/vs/black-hat-go" />
<lastmod>2026-05-05T08:12:38.237Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/black-hat-bash/vs/black-hat-python-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-bash/vs/black-hat-python-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-bash/vs/black-hat-python-2e" />
<lastmod>2026-05-05T08:12:38.237Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/black-hat-bash/vs/metasploit-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-bash/vs/metasploit-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-bash/vs/metasploit-2e" />
<lastmod>2026-05-05T08:12:38.237Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/black-hat-bash/vs/ida-pro-book-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-bash/vs/ida-pro-book-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-bash/vs/ida-pro-book-2e" />
<lastmod>2026-05-05T08:12:38.237Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/black-hat-bash/vs/penetration-testing-weidman</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-bash/vs/penetration-testing-weidman" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-bash/vs/penetration-testing-weidman" />
<lastmod>2026-05-05T08:12:38.237Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/black-hat-go/vs/black-hat-python-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-go/vs/black-hat-python-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-go/vs/black-hat-python-2e" />
<lastmod>2026-05-05T08:12:36.331Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/black-hat-go/vs/hacking-art-of-exploitation</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-go/vs/hacking-art-of-exploitation" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-go/vs/hacking-art-of-exploitation" />
<lastmod>2026-05-05T08:12:36.331Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/black-hat-go/vs/metasploit-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-go/vs/metasploit-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-go/vs/metasploit-2e" />
<lastmod>2026-05-05T08:12:36.331Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/black-hat-graphql/vs/hacking-apis</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-graphql/vs/hacking-apis" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-graphql/vs/hacking-apis" />
<lastmod>2026-05-05T08:12:38.311Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/black-hat-graphql/vs/web-application-hackers-handbook</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-graphql/vs/web-application-hackers-handbook" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-graphql/vs/web-application-hackers-handbook" />
<lastmod>2026-05-05T08:12:38.311Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/black-hat-graphql/vs/real-world-cryptography</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-graphql/vs/real-world-cryptography" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-graphql/vs/real-world-cryptography" />
<lastmod>2026-05-05T08:12:38.311Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/black-hat-graphql/vs/the-tangled-web</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-graphql/vs/the-tangled-web" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-graphql/vs/the-tangled-web" />
<lastmod>2026-05-05T08:12:38.311Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/black-hat-graphql/vs/bug-bounty-bootcamp</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-graphql/vs/bug-bounty-bootcamp" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-graphql/vs/bug-bounty-bootcamp" />
<lastmod>2026-05-05T08:12:38.311Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/black-hat-python-2e/vs/hacking-art-of-exploitation</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-python-2e/vs/hacking-art-of-exploitation" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-python-2e/vs/hacking-art-of-exploitation" />
<lastmod>2026-05-05T08:12:35.018Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/black-hat-python-2e/vs/metasploit-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-python-2e/vs/metasploit-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-python-2e/vs/metasploit-2e" />
<lastmod>2026-05-05T08:12:36.190Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/bug-bounty-bootcamp/vs/real-world-bug-hunting</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/bug-bounty-bootcamp/vs/real-world-bug-hunting" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/bug-bounty-bootcamp/vs/real-world-bug-hunting" />
<lastmod>2026-05-05T08:12:36.869Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/bug-bounty-bootcamp/vs/hacking-apis</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/bug-bounty-bootcamp/vs/hacking-apis" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/bug-bounty-bootcamp/vs/hacking-apis" />
<lastmod>2026-05-05T08:12:36.869Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/bug-bounty-bootcamp/vs/web-application-hackers-handbook</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/bug-bounty-bootcamp/vs/web-application-hackers-handbook" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/bug-bounty-bootcamp/vs/web-application-hackers-handbook" />
<lastmod>2026-05-05T08:12:36.869Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/bug-bounty-bootcamp/vs/penetration-testing-weidman</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/bug-bounty-bootcamp/vs/penetration-testing-weidman" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/bug-bounty-bootcamp/vs/penetration-testing-weidman" />
<lastmod>2026-05-05T08:12:36.869Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/building-secure-and-reliable-systems/vs/security-chaos-engineering</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/building-secure-and-reliable-systems/vs/security-chaos-engineering" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/building-secure-and-reliable-systems/vs/security-chaos-engineering" />
<lastmod>2026-05-05T08:12:41.485Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/building-secure-and-reliable-systems/vs/security-engineering-3e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/building-secure-and-reliable-systems/vs/security-engineering-3e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/building-secure-and-reliable-systems/vs/security-engineering-3e" />
<lastmod>2026-05-05T08:12:41.217Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/building-secure-and-reliable-systems/vs/evasive-malware</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/building-secure-and-reliable-systems/vs/evasive-malware" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/building-secure-and-reliable-systems/vs/evasive-malware" />
<lastmod>2026-05-05T08:12:41.217Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/building-secure-and-reliable-systems/vs/techniques-virales-avancees</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/building-secure-and-reliable-systems/vs/techniques-virales-avancees" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/building-secure-and-reliable-systems/vs/techniques-virales-avancees" />
<lastmod>2026-05-05T08:12:41.217Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/building-secure-and-reliable-systems/vs/designing-secure-software</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/building-secure-and-reliable-systems/vs/designing-secure-software" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/building-secure-and-reliable-systems/vs/designing-secure-software" />
<lastmod>2026-05-05T08:12:41.217Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/click-here-to-kill-everybody/vs/cybersecurite-managers</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/click-here-to-kill-everybody/vs/cybersecurite-managers" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/click-here-to-kill-everybody/vs/cybersecurite-managers" />
<lastmod>2026-05-05T08:12:39.499Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/click-here-to-kill-everybody/vs/foundations-of-information-security</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/click-here-to-kill-everybody/vs/foundations-of-information-security" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/click-here-to-kill-everybody/vs/foundations-of-information-security" />
<lastmod>2026-05-05T08:12:39.499Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/click-here-to-kill-everybody/vs/how-cybersecurity-really-works</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/click-here-to-kill-everybody/vs/how-cybersecurity-really-works" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/click-here-to-kill-everybody/vs/how-cybersecurity-really-works" />
<lastmod>2026-05-05T08:12:39.499Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/click-here-to-kill-everybody/vs/the-pragmatic-programmer-20a</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/click-here-to-kill-everybody/vs/the-pragmatic-programmer-20a" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/click-here-to-kill-everybody/vs/the-pragmatic-programmer-20a" />
<lastmod>2026-05-05T08:12:40.009Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/a-hackers-mind/vs/click-here-to-kill-everybody</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/a-hackers-mind/vs/click-here-to-kill-everybody" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/a-hackers-mind/vs/click-here-to-kill-everybody" />
<lastmod>2026-05-05T08:12:41.351Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/container-security/vs/kubernetes-security</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/container-security/vs/kubernetes-security" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/container-security/vs/kubernetes-security" />
<lastmod>2026-05-05T08:12:40.924Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/container-security/vs/kubernetes-security-and-observability</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/container-security/vs/kubernetes-security-and-observability" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/container-security/vs/kubernetes-security-and-observability" />
<lastmod>2026-05-05T08:12:40.858Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/container-security/vs/pentesting-azure-applications</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/container-security/vs/pentesting-azure-applications" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/container-security/vs/pentesting-azure-applications" />
<lastmod>2026-05-05T08:12:40.792Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/building-secure-and-reliable-systems/vs/container-security</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/building-secure-and-reliable-systems/vs/container-security" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/building-secure-and-reliable-systems/vs/container-security" />
<lastmod>2026-05-05T08:12:41.217Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/container-security/vs/security-chaos-engineering</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/container-security/vs/security-chaos-engineering" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/container-security/vs/security-chaos-engineering" />
<lastmod>2026-05-05T08:12:41.485Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/countdown-to-zero-day/vs/sandworm</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/countdown-to-zero-day/vs/sandworm" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/countdown-to-zero-day/vs/sandworm" />
<lastmod>2026-05-05T08:12:34.891Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/countdown-to-zero-day/vs/the-hacker-and-the-state</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/countdown-to-zero-day/vs/the-hacker-and-the-state" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/countdown-to-zero-day/vs/the-hacker-and-the-state" />
<lastmod>2026-05-05T08:12:41.416Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/at-war-rise-of-military-internet-complex/vs/countdown-to-zero-day</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/at-war-rise-of-military-internet-complex/vs/countdown-to-zero-day" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/at-war-rise-of-military-internet-complex/vs/countdown-to-zero-day" />
<lastmod>2026-05-05T08:12:35.826Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/countdown-to-zero-day/vs/dark-territory</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/countdown-to-zero-day/vs/dark-territory" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/countdown-to-zero-day/vs/dark-territory" />
<lastmod>2026-05-05T08:12:35.761Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/countdown-to-zero-day/vs/this-is-how-they-tell-me-the-world-ends</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/countdown-to-zero-day/vs/this-is-how-they-tell-me-the-world-ends" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/countdown-to-zero-day/vs/this-is-how-they-tell-me-the-world-ends" />
<lastmod>2026-05-05T08:12:35.976Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/crypto-dictionary/vs/serious-cryptography-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/crypto-dictionary/vs/serious-cryptography-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/crypto-dictionary/vs/serious-cryptography-2e" />
<lastmod>2026-05-05T08:12:37.667Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/crypto-dictionary/vs/real-world-cryptography</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/crypto-dictionary/vs/real-world-cryptography" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/crypto-dictionary/vs/real-world-cryptography" />
<lastmod>2026-05-05T08:12:37.667Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/crypto-dictionary/vs/cryptography-engineering</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/crypto-dictionary/vs/cryptography-engineering" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/crypto-dictionary/vs/cryptography-engineering" />
<lastmod>2026-05-05T08:12:37.667Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/cryptography-engineering/vs/real-world-cryptography</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cryptography-engineering/vs/real-world-cryptography" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cryptography-engineering/vs/real-world-cryptography" />
<lastmod>2026-05-05T08:12:35.429Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/cryptography-engineering/vs/serious-cryptography-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cryptography-engineering/vs/serious-cryptography-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cryptography-engineering/vs/serious-cryptography-2e" />
<lastmod>2026-05-05T08:12:35.496Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/cryptography-engineering/vs/designing-secure-software</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cryptography-engineering/vs/designing-secure-software" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cryptography-engineering/vs/designing-secure-software" />
<lastmod>2026-05-05T08:12:37.530Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/cryptography-engineering/vs/threat-modeling-designing-for-security</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cryptography-engineering/vs/threat-modeling-designing-for-security" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cryptography-engineering/vs/threat-modeling-designing-for-security" />
<lastmod>2026-05-05T08:12:34.680Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/cryptography-engineering/vs/security-engineering-3e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cryptography-engineering/vs/security-engineering-3e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cryptography-engineering/vs/security-engineering-3e" />
<lastmod>2026-05-05T08:12:34.607Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/cult-of-the-dead-cow/vs/we-are-anonymous</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cult-of-the-dead-cow/vs/we-are-anonymous" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cult-of-the-dead-cow/vs/we-are-anonymous" />
<lastmod>2026-05-05T08:12:40.239Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/cult-of-the-dead-cow/vs/kingpin</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cult-of-the-dead-cow/vs/kingpin" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cult-of-the-dead-cow/vs/kingpin" />
<lastmod>2026-05-05T08:12:40.309Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/cult-of-the-dead-cow/vs/the-cuckoos-egg</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cult-of-the-dead-cow/vs/the-cuckoos-egg" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cult-of-the-dead-cow/vs/the-cuckoos-egg" />
<lastmod>2026-05-05T08:12:40.239Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/at-war-rise-of-military-internet-complex/vs/cult-of-the-dead-cow</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/at-war-rise-of-military-internet-complex/vs/cult-of-the-dead-cow" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/at-war-rise-of-military-internet-complex/vs/cult-of-the-dead-cow" />
<lastmod>2026-05-05T08:12:40.239Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/cult-of-the-dead-cow/vs/dark-territory</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cult-of-the-dead-cow/vs/dark-territory" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cult-of-the-dead-cow/vs/dark-territory" />
<lastmod>2026-05-05T08:12:40.239Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/cyberjutsu/vs/the-hacker-and-the-state</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cyberjutsu/vs/the-hacker-and-the-state" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cyberjutsu/vs/the-hacker-and-the-state" />
<lastmod>2026-05-05T08:12:41.416Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/cyberjutsu/vs/foundations-of-information-security</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cyberjutsu/vs/foundations-of-information-security" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cyberjutsu/vs/foundations-of-information-security" />
<lastmod>2026-05-05T08:12:37.307Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/cyberjutsu/vs/how-cybersecurity-really-works</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cyberjutsu/vs/how-cybersecurity-really-works" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cyberjutsu/vs/how-cybersecurity-really-works" />
<lastmod>2026-05-05T08:12:38.165Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/cyberjutsu/vs/kingpin</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cyberjutsu/vs/kingpin" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cyberjutsu/vs/kingpin" />
<lastmod>2026-05-05T08:12:40.309Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/cybersecurite-managers/vs/foundations-of-information-security</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cybersecurite-managers/vs/foundations-of-information-security" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cybersecurite-managers/vs/foundations-of-information-security" />
<lastmod>2026-05-05T08:12:37.238Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/cybersecurite-managers/vs/how-cybersecurity-really-works</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cybersecurite-managers/vs/how-cybersecurity-really-works" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cybersecurite-managers/vs/how-cybersecurity-really-works" />
<lastmod>2026-05-05T08:12:38.165Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/cybersecurite-managers/vs/la-cyberdefense-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cybersecurite-managers/vs/la-cyberdefense-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cybersecurite-managers/vs/la-cyberdefense-2e" />
<lastmod>2026-05-04T21:43:28.387Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/cybersecurite-managers/vs/the-pragmatic-programmer-20a</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cybersecurite-managers/vs/the-pragmatic-programmer-20a" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cybersecurite-managers/vs/the-pragmatic-programmer-20a" />
<lastmod>2026-05-05T08:12:40.009Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/dark-territory/vs/kingpin</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/dark-territory/vs/kingpin" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/dark-territory/vs/kingpin" />
<lastmod>2026-05-05T08:12:40.309Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/dark-territory/vs/sandworm</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/dark-territory/vs/sandworm" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/dark-territory/vs/sandworm" />
<lastmod>2026-05-05T08:12:35.761Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/dark-territory/vs/the-cuckoos-egg</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/dark-territory/vs/the-cuckoos-egg" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/dark-territory/vs/the-cuckoos-egg" />
<lastmod>2026-05-05T08:12:35.761Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/dark-territory/vs/the-hacker-and-the-state</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/dark-territory/vs/the-hacker-and-the-state" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/dark-territory/vs/the-hacker-and-the-state" />
<lastmod>2026-05-05T08:12:41.416Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/designing-secure-software/vs/threat-modeling-designing-for-security</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/designing-secure-software/vs/threat-modeling-designing-for-security" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/designing-secure-software/vs/threat-modeling-designing-for-security" />
<lastmod>2026-05-05T08:12:37.530Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/designing-secure-software/vs/real-world-cryptography</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/designing-secure-software/vs/real-world-cryptography" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/designing-secure-software/vs/real-world-cryptography" />
<lastmod>2026-05-05T08:12:37.530Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/designing-secure-software/vs/web-security-for-developers</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/designing-secure-software/vs/web-security-for-developers" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/designing-secure-software/vs/web-security-for-developers" />
<lastmod>2026-05-05T08:12:37.530Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/designing-secure-software/vs/practical-malware-analysis</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/designing-secure-software/vs/practical-malware-analysis" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/designing-secure-software/vs/practical-malware-analysis" />
<lastmod>2026-05-05T08:12:37.530Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/evasive-malware/vs/techniques-virales-avancees</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/evasive-malware/vs/techniques-virales-avancees" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/evasive-malware/vs/techniques-virales-avancees" />
<lastmod>2026-05-05T08:12:37.375Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/evasive-malware/vs/practical-malware-analysis</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/evasive-malware/vs/practical-malware-analysis" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/evasive-malware/vs/practical-malware-analysis" />
<lastmod>2026-05-05T08:12:37.375Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/evasive-malware/vs/les-virus-informatiques</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/evasive-malware/vs/les-virus-informatiques" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/evasive-malware/vs/les-virus-informatiques" />
<lastmod>2026-05-05T08:12:37.375Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/evasive-malware/vs/practical-reverse-engineering</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/evasive-malware/vs/practical-reverse-engineering" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/evasive-malware/vs/practical-reverse-engineering" />
<lastmod>2026-05-05T08:12:37.375Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/evasive-malware/vs/rootkits-and-bootkits</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/evasive-malware/vs/rootkits-and-bootkits" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/evasive-malware/vs/rootkits-and-bootkits" />
<lastmod>2026-05-05T08:12:37.375Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/extreme-privacy-5e/vs/osint-techniques-11e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/extreme-privacy-5e/vs/osint-techniques-11e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/extreme-privacy-5e/vs/osint-techniques-11e" />
<lastmod>2026-05-05T08:12:39.172Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/extreme-privacy-5e/vs/hacks-leaks-and-revelations</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/extreme-privacy-5e/vs/hacks-leaks-and-revelations" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/extreme-privacy-5e/vs/hacks-leaks-and-revelations" />
<lastmod>2026-05-05T08:12:39.172Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/extreme-privacy-5e/vs/practical-social-engineering</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/extreme-privacy-5e/vs/practical-social-engineering" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/extreme-privacy-5e/vs/practical-social-engineering" />
<lastmod>2026-05-05T08:12:39.172Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/extreme-privacy-5e/vs/open-source-intelligence-techniques-tools</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/extreme-privacy-5e/vs/open-source-intelligence-techniques-tools" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/extreme-privacy-5e/vs/open-source-intelligence-techniques-tools" />
<lastmod>2026-05-05T08:12:39.235Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/extreme-privacy-5e/vs/permanent-record</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/extreme-privacy-5e/vs/permanent-record" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/extreme-privacy-5e/vs/permanent-record" />
<lastmod>2026-05-05T08:12:39.434Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/foundations-of-information-security/vs/how-cybersecurity-really-works</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/foundations-of-information-security/vs/how-cybersecurity-really-works" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/foundations-of-information-security/vs/how-cybersecurity-really-works" />
<lastmod>2026-05-05T08:12:38.165Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/foundations-of-information-security/vs/the-pragmatic-programmer-20a</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/foundations-of-information-security/vs/the-pragmatic-programmer-20a" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/foundations-of-information-security/vs/the-pragmatic-programmer-20a" />
<lastmod>2026-05-05T08:12:40.009Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/foundations-of-information-security/vs/linux-basics-for-hackers-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/foundations-of-information-security/vs/linux-basics-for-hackers-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/foundations-of-information-security/vs/linux-basics-for-hackers-2e" />
<lastmod>2026-05-05T08:12:37.238Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/ghost-in-the-wires/vs/kingpin</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/ghost-in-the-wires/vs/kingpin" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/ghost-in-the-wires/vs/kingpin" />
<lastmod>2026-05-05T08:12:40.309Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/ghost-in-the-wires/vs/the-cuckoos-egg</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/ghost-in-the-wires/vs/the-cuckoos-egg" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/ghost-in-the-wires/vs/the-cuckoos-egg" />
<lastmod>2026-05-05T08:12:36.113Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/at-war-rise-of-military-internet-complex/vs/ghost-in-the-wires</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/at-war-rise-of-military-internet-complex/vs/ghost-in-the-wires" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/at-war-rise-of-military-internet-complex/vs/ghost-in-the-wires" />
<lastmod>2026-05-05T08:12:36.113Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/cult-of-the-dead-cow/vs/ghost-in-the-wires</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cult-of-the-dead-cow/vs/ghost-in-the-wires" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cult-of-the-dead-cow/vs/ghost-in-the-wires" />
<lastmod>2026-05-05T08:12:40.239Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/dark-territory/vs/ghost-in-the-wires</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/dark-territory/vs/ghost-in-the-wires" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/dark-territory/vs/ghost-in-the-wires" />
<lastmod>2026-05-05T08:12:36.113Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/gray-hat-hacking-6e/vs/the-mac-hackers-handbook</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/gray-hat-hacking-6e/vs/the-mac-hackers-handbook" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/gray-hat-hacking-6e/vs/the-mac-hackers-handbook" />
<lastmod>2026-05-05T08:12:40.507Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/gray-hat-hacking-6e/vs/les-virus-informatiques</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/gray-hat-hacking-6e/vs/les-virus-informatiques" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/gray-hat-hacking-6e/vs/les-virus-informatiques" />
<lastmod>2026-05-05T08:12:39.804Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/gray-hat-hacking-6e/vs/practical-binary-analysis</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/gray-hat-hacking-6e/vs/practical-binary-analysis" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/gray-hat-hacking-6e/vs/practical-binary-analysis" />
<lastmod>2026-05-05T08:12:39.804Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/gray-hat-hacking-6e/vs/hardware-hacking-handbook</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/gray-hat-hacking-6e/vs/hardware-hacking-handbook" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/gray-hat-hacking-6e/vs/hardware-hacking-handbook" />
<lastmod>2026-05-05T08:12:41.285Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/evasive-malware/vs/gray-hat-hacking-6e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/evasive-malware/vs/gray-hat-hacking-6e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/evasive-malware/vs/gray-hat-hacking-6e" />
<lastmod>2026-05-05T08:12:39.804Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/hacking-apis/vs/web-application-hackers-handbook</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacking-apis/vs/web-application-hackers-handbook" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacking-apis/vs/web-application-hackers-handbook" />
<lastmod>2026-05-05T08:12:36.803Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/hacking-apis/vs/real-world-cryptography</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacking-apis/vs/real-world-cryptography" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacking-apis/vs/real-world-cryptography" />
<lastmod>2026-05-05T08:12:36.803Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/hacking-apis/vs/the-tangled-web</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacking-apis/vs/the-tangled-web" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacking-apis/vs/the-tangled-web" />
<lastmod>2026-05-05T08:12:36.803Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/hacking-the-xbox/vs/hardware-hacking-handbook</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacking-the-xbox/vs/hardware-hacking-handbook" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacking-the-xbox/vs/hardware-hacking-handbook" />
<lastmod>2026-05-05T08:12:41.285Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/hacking-the-xbox/vs/ida-pro-book-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacking-the-xbox/vs/ida-pro-book-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacking-the-xbox/vs/ida-pro-book-2e" />
<lastmod>2026-05-05T08:12:38.738Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/hacking-the-xbox/vs/practical-malware-analysis</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacking-the-xbox/vs/practical-malware-analysis" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacking-the-xbox/vs/practical-malware-analysis" />
<lastmod>2026-05-05T08:12:38.738Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/hacking-the-xbox/vs/practical-iot-hacking</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacking-the-xbox/vs/practical-iot-hacking" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacking-the-xbox/vs/practical-iot-hacking" />
<lastmod>2026-05-05T08:12:38.738Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/car-hackers-handbook/vs/hacking-the-xbox</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/car-hackers-handbook/vs/hacking-the-xbox" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/car-hackers-handbook/vs/hacking-the-xbox" />
<lastmod>2026-05-05T08:12:38.738Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/hacking-art-of-exploitation/vs/shellcoders-handbook-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacking-art-of-exploitation/vs/shellcoders-handbook-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacking-art-of-exploitation/vs/shellcoders-handbook-2e" />
<lastmod>2026-05-05T08:12:34.955Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/hacking-art-of-exploitation/vs/practice-of-network-security-monitoring</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacking-art-of-exploitation/vs/practice-of-network-security-monitoring" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacking-art-of-exploitation/vs/practice-of-network-security-monitoring" />
<lastmod>2026-05-05T08:12:37.871Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/hacks-leaks-and-revelations/vs/osint-techniques-11e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacks-leaks-and-revelations/vs/osint-techniques-11e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacks-leaks-and-revelations/vs/osint-techniques-11e" />
<lastmod>2026-05-05T08:12:39.102Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/hacks-leaks-and-revelations/vs/open-source-intelligence-techniques-tools</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacks-leaks-and-revelations/vs/open-source-intelligence-techniques-tools" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacks-leaks-and-revelations/vs/open-source-intelligence-techniques-tools" />
<lastmod>2026-05-05T08:12:39.235Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/hacks-leaks-and-revelations/vs/permanent-record</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacks-leaks-and-revelations/vs/permanent-record" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacks-leaks-and-revelations/vs/permanent-record" />
<lastmod>2026-05-05T08:12:39.434Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/hacks-leaks-and-revelations/vs/practical-social-engineering</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacks-leaks-and-revelations/vs/practical-social-engineering" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacks-leaks-and-revelations/vs/practical-social-engineering" />
<lastmod>2026-05-05T08:12:38.950Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/how-cybersecurity-really-works/vs/the-pragmatic-programmer-20a</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/how-cybersecurity-really-works/vs/the-pragmatic-programmer-20a" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/how-cybersecurity-really-works/vs/the-pragmatic-programmer-20a" />
<lastmod>2026-05-05T08:12:40.009Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/how-cybersecurity-really-works/vs/linux-basics-for-hackers-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/how-cybersecurity-really-works/vs/linux-basics-for-hackers-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/how-cybersecurity-really-works/vs/linux-basics-for-hackers-2e" />
<lastmod>2026-05-05T08:12:38.165Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/incident-response-and-computer-forensics-3e/vs/practical-linux-forensics</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/incident-response-and-computer-forensics-3e/vs/practical-linux-forensics" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/incident-response-and-computer-forensics-3e/vs/practical-linux-forensics" />
<lastmod>2026-05-05T08:12:39.942Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/incident-response-and-computer-forensics-3e/vs/the-art-of-memory-forensics</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/incident-response-and-computer-forensics-3e/vs/the-art-of-memory-forensics" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/incident-response-and-computer-forensics-3e/vs/the-art-of-memory-forensics" />
<lastmod>2026-05-05T08:12:39.942Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/designing-secure-software/vs/incident-response-and-computer-forensics-3e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/designing-secure-software/vs/incident-response-and-computer-forensics-3e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/designing-secure-software/vs/incident-response-and-computer-forensics-3e" />
<lastmod>2026-05-05T08:12:39.942Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/incident-response-and-computer-forensics-3e/vs/practical-malware-analysis</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/incident-response-and-computer-forensics-3e/vs/practical-malware-analysis" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/incident-response-and-computer-forensics-3e/vs/practical-malware-analysis" />
<lastmod>2026-05-05T08:12:39.942Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/incident-response-and-computer-forensics-3e/vs/practice-of-network-security-monitoring</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/incident-response-and-computer-forensics-3e/vs/practice-of-network-security-monitoring" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/incident-response-and-computer-forensics-3e/vs/practice-of-network-security-monitoring" />
<lastmod>2026-05-05T08:12:39.942Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/ios-application-security/vs/the-mobile-application-hackers-handbook</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/ios-application-security/vs/the-mobile-application-hackers-handbook" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/ios-application-security/vs/the-mobile-application-hackers-handbook" />
<lastmod>2026-05-05T08:12:40.658Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/ios-application-security/vs/real-world-cryptography</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/ios-application-security/vs/real-world-cryptography" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/ios-application-security/vs/real-world-cryptography" />
<lastmod>2026-05-05T08:12:38.671Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/designing-secure-software/vs/ios-application-security</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/designing-secure-software/vs/ios-application-security" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/designing-secure-software/vs/ios-application-security" />
<lastmod>2026-05-05T08:12:38.671Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/ios-application-security/vs/threat-modeling-designing-for-security</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/ios-application-security/vs/threat-modeling-designing-for-security" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/ios-application-security/vs/threat-modeling-designing-for-security" />
<lastmod>2026-05-05T08:12:38.671Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/black-hat-graphql/vs/ios-application-security</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-graphql/vs/ios-application-security" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-graphql/vs/ios-application-security" />
<lastmod>2026-05-05T08:12:38.671Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/kingpin/vs/spam-nation</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/kingpin/vs/spam-nation" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/kingpin/vs/spam-nation" />
<lastmod>2026-05-05T08:12:40.374Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/kingpin/vs/the-cuckoos-egg</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/kingpin/vs/the-cuckoos-egg" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/kingpin/vs/the-cuckoos-egg" />
<lastmod>2026-05-05T08:12:40.309Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/kubernetes-security/vs/kubernetes-security-and-observability</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/kubernetes-security/vs/kubernetes-security-and-observability" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/kubernetes-security/vs/kubernetes-security-and-observability" />
<lastmod>2026-05-05T08:12:40.924Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/kubernetes-security/vs/pentesting-azure-applications</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/kubernetes-security/vs/pentesting-azure-applications" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/kubernetes-security/vs/pentesting-azure-applications" />
<lastmod>2026-05-05T08:12:40.924Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/building-secure-and-reliable-systems/vs/kubernetes-security</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/building-secure-and-reliable-systems/vs/kubernetes-security" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/building-secure-and-reliable-systems/vs/kubernetes-security" />
<lastmod>2026-05-05T08:12:41.217Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/kubernetes-security/vs/security-chaos-engineering</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/kubernetes-security/vs/security-chaos-engineering" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/kubernetes-security/vs/security-chaos-engineering" />
<lastmod>2026-05-05T08:12:41.485Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/kubernetes-security-and-observability/vs/pentesting-azure-applications</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/kubernetes-security-and-observability/vs/pentesting-azure-applications" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/kubernetes-security-and-observability/vs/pentesting-azure-applications" />
<lastmod>2026-05-05T08:12:40.858Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/countdown-to-zero-day/vs/la-cyberdefense-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/countdown-to-zero-day/vs/la-cyberdefense-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/countdown-to-zero-day/vs/la-cyberdefense-2e" />
<lastmod>2026-05-05T08:12:34.891Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/la-cyberdefense-2e/vs/sandworm</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/la-cyberdefense-2e/vs/sandworm" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/la-cyberdefense-2e/vs/sandworm" />
<lastmod>2026-05-05T08:12:34.539Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/la-cyberdefense-2e/vs/the-hacker-and-the-state</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/la-cyberdefense-2e/vs/the-hacker-and-the-state" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/la-cyberdefense-2e/vs/the-hacker-and-the-state" />
<lastmod>2026-05-05T08:12:41.416Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/at-war-rise-of-military-internet-complex/vs/la-cyberdefense-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/at-war-rise-of-military-internet-complex/vs/la-cyberdefense-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/at-war-rise-of-military-internet-complex/vs/la-cyberdefense-2e" />
<lastmod>2026-05-05T08:12:35.826Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/les-virus-informatiques/vs/practical-reverse-engineering</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/les-virus-informatiques/vs/practical-reverse-engineering" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/les-virus-informatiques/vs/practical-reverse-engineering" />
<lastmod>2026-05-05T08:12:35.086Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/les-virus-informatiques/vs/rootkits-and-bootkits</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/les-virus-informatiques/vs/rootkits-and-bootkits" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/les-virus-informatiques/vs/rootkits-and-bootkits" />
<lastmod>2026-05-05T08:12:35.280Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/les-virus-informatiques/vs/techniques-virales-avancees</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/les-virus-informatiques/vs/techniques-virales-avancees" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/les-virus-informatiques/vs/techniques-virales-avancees" />
<lastmod>2026-05-04T21:43:28.146Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/art-of-mac-malware-v1/vs/les-virus-informatiques</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/art-of-mac-malware-v1/vs/les-virus-informatiques" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/art-of-mac-malware-v1/vs/les-virus-informatiques" />
<lastmod>2026-05-05T08:12:36.679Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/linux-basics-for-hackers-2e/vs/the-pragmatic-programmer-20a</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/linux-basics-for-hackers-2e/vs/the-pragmatic-programmer-20a" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/linux-basics-for-hackers-2e/vs/the-pragmatic-programmer-20a" />
<lastmod>2026-05-05T08:12:40.009Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/alice-and-bob-learn-application-security/vs/linux-basics-for-hackers-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/alice-and-bob-learn-application-security/vs/linux-basics-for-hackers-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/alice-and-bob-learn-application-security/vs/linux-basics-for-hackers-2e" />
<lastmod>2026-05-05T08:12:41.067Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/click-here-to-kill-everybody/vs/linux-basics-for-hackers-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/click-here-to-kill-everybody/vs/linux-basics-for-hackers-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/click-here-to-kill-everybody/vs/linux-basics-for-hackers-2e" />
<lastmod>2026-05-05T08:12:39.499Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/linux-firewalls-rash/vs/practice-of-network-security-monitoring</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/linux-firewalls-rash/vs/practice-of-network-security-monitoring" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/linux-firewalls-rash/vs/practice-of-network-security-monitoring" />
<lastmod>2026-05-05T08:12:38.809Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/linux-firewalls-rash/vs/network-security-through-data-analysis-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/linux-firewalls-rash/vs/network-security-through-data-analysis-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/linux-firewalls-rash/vs/network-security-through-data-analysis-2e" />
<lastmod>2026-05-05T08:12:38.809Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/linux-firewalls-rash/vs/practical-linux-forensics</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/linux-firewalls-rash/vs/practical-linux-forensics" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/linux-firewalls-rash/vs/practical-linux-forensics" />
<lastmod>2026-05-05T08:12:38.809Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/linux-firewalls-rash/vs/zero-trust-networks</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/linux-firewalls-rash/vs/zero-trust-networks" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/linux-firewalls-rash/vs/zero-trust-networks" />
<lastmod>2026-05-05T08:12:40.992Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/linux-firewalls-rash/vs/practical-packet-analysis-3e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/linux-firewalls-rash/vs/practical-packet-analysis-3e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/linux-firewalls-rash/vs/practical-packet-analysis-3e" />
<lastmod>2026-05-05T08:12:38.809Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/malware-data-science/vs/practical-malware-analysis</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/malware-data-science/vs/practical-malware-analysis" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/malware-data-science/vs/practical-malware-analysis" />
<lastmod>2026-05-05T08:12:37.600Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/malware-data-science/vs/practice-of-network-security-monitoring</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/malware-data-science/vs/practice-of-network-security-monitoring" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/malware-data-science/vs/practice-of-network-security-monitoring" />
<lastmod>2026-05-05T08:12:37.871Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/malware-data-science/vs/network-security-through-data-analysis-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/malware-data-science/vs/network-security-through-data-analysis-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/malware-data-science/vs/network-security-through-data-analysis-2e" />
<lastmod>2026-05-05T08:12:37.600Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/countdown-to-zero-day/vs/malware-data-science</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/countdown-to-zero-day/vs/malware-data-science" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/countdown-to-zero-day/vs/malware-data-science" />
<lastmod>2026-05-05T08:12:37.600Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/les-virus-informatiques/vs/malware-data-science</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/les-virus-informatiques/vs/malware-data-science" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/les-virus-informatiques/vs/malware-data-science" />
<lastmod>2026-05-05T08:12:37.600Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/metasploit-2e/vs/penetration-testing-weidman</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/metasploit-2e/vs/penetration-testing-weidman" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/metasploit-2e/vs/penetration-testing-weidman" />
<lastmod>2026-05-05T08:12:36.254Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/metasploit-2e/vs/the-hacker-playbook-3</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/metasploit-2e/vs/the-hacker-playbook-3" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/metasploit-2e/vs/the-hacker-playbook-3" />
<lastmod>2026-05-05T08:12:38.879Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/network-security-through-data-analysis-2e/vs/practice-of-network-security-monitoring</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/network-security-through-data-analysis-2e/vs/practice-of-network-security-monitoring" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/network-security-through-data-analysis-2e/vs/practice-of-network-security-monitoring" />
<lastmod>2026-05-05T08:12:37.871Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/network-security-through-data-analysis-2e/vs/zero-trust-networks</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/network-security-through-data-analysis-2e/vs/zero-trust-networks" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/network-security-through-data-analysis-2e/vs/zero-trust-networks" />
<lastmod>2026-05-05T08:12:40.992Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/network-security-through-data-analysis-2e/vs/practical-packet-analysis-3e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/network-security-through-data-analysis-2e/vs/practical-packet-analysis-3e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/network-security-through-data-analysis-2e/vs/practical-packet-analysis-3e" />
<lastmod>2026-05-05T08:12:37.804Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/designing-secure-software/vs/network-security-through-data-analysis-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/designing-secure-software/vs/network-security-through-data-analysis-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/designing-secure-software/vs/network-security-through-data-analysis-2e" />
<lastmod>2026-05-05T08:12:37.530Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/open-source-intelligence-techniques-tools/vs/osint-techniques-11e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/open-source-intelligence-techniques-tools/vs/osint-techniques-11e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/open-source-intelligence-techniques-tools/vs/osint-techniques-11e" />
<lastmod>2026-05-05T08:12:39.235Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/open-source-intelligence-techniques-tools/vs/tracers-in-the-dark</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/open-source-intelligence-techniques-tools/vs/tracers-in-the-dark" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/open-source-intelligence-techniques-tools/vs/tracers-in-the-dark" />
<lastmod>2026-05-05T08:12:39.365Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/open-source-intelligence-techniques-tools/vs/practical-social-engineering</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/open-source-intelligence-techniques-tools/vs/practical-social-engineering" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/open-source-intelligence-techniques-tools/vs/practical-social-engineering" />
<lastmod>2026-05-05T08:12:39.235Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/osint-techniques-11e/vs/practical-social-engineering</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/osint-techniques-11e/vs/practical-social-engineering" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/osint-techniques-11e/vs/practical-social-engineering" />
<lastmod>2026-05-05T08:12:39.102Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/osint-techniques-11e/vs/tracers-in-the-dark</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/osint-techniques-11e/vs/tracers-in-the-dark" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/osint-techniques-11e/vs/tracers-in-the-dark" />
<lastmod>2026-05-05T08:12:39.365Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/black-hat-go/vs/penetration-testing-weidman</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-go/vs/penetration-testing-weidman" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-go/vs/penetration-testing-weidman" />
<lastmod>2026-05-05T08:12:36.331Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/black-hat-python-2e/vs/penetration-testing-weidman</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-python-2e/vs/penetration-testing-weidman" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-python-2e/vs/penetration-testing-weidman" />
<lastmod>2026-05-05T08:12:36.254Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/penetration-testing-weidman/vs/the-hacker-playbook-3</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/penetration-testing-weidman/vs/the-hacker-playbook-3" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/penetration-testing-weidman/vs/the-hacker-playbook-3" />
<lastmod>2026-05-05T08:12:38.879Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/metasploit-2e/vs/pentesting-azure-applications</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/metasploit-2e/vs/pentesting-azure-applications" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/metasploit-2e/vs/pentesting-azure-applications" />
<lastmod>2026-05-05T08:12:37.735Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/pentesting-azure-applications/vs/the-hacker-playbook-3</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/pentesting-azure-applications/vs/the-hacker-playbook-3" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/pentesting-azure-applications/vs/the-hacker-playbook-3" />
<lastmod>2026-05-05T08:12:38.879Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/penetration-testing-weidman/vs/pentesting-azure-applications</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/penetration-testing-weidman/vs/pentesting-azure-applications" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/penetration-testing-weidman/vs/pentesting-azure-applications" />
<lastmod>2026-05-05T08:12:37.735Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/hacking-art-of-exploitation/vs/pentesting-azure-applications</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacking-art-of-exploitation/vs/pentesting-azure-applications" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacking-art-of-exploitation/vs/pentesting-azure-applications" />
<lastmod>2026-05-05T08:12:37.735Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/bug-hunters-diary/vs/pentesting-azure-applications</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/bug-hunters-diary/vs/pentesting-azure-applications" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/bug-hunters-diary/vs/pentesting-azure-applications" />
<lastmod>2026-05-05T08:12:38.378Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/kingpin/vs/permanent-record</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/kingpin/vs/permanent-record" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/kingpin/vs/permanent-record" />
<lastmod>2026-05-05T08:12:40.309Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/permanent-record/vs/sandworm</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/permanent-record/vs/sandworm" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/permanent-record/vs/sandworm" />
<lastmod>2026-05-05T08:12:39.434Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/permanent-record/vs/the-cuckoos-egg</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/permanent-record/vs/the-cuckoos-egg" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/permanent-record/vs/the-cuckoos-egg" />
<lastmod>2026-05-05T08:12:39.434Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/permanent-record/vs/the-hacker-and-the-state</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/permanent-record/vs/the-hacker-and-the-state" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/permanent-record/vs/the-hacker-and-the-state" />
<lastmod>2026-05-05T08:12:41.416Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/at-war-rise-of-military-internet-complex/vs/permanent-record</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/at-war-rise-of-military-internet-complex/vs/permanent-record" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/at-war-rise-of-military-internet-complex/vs/permanent-record" />
<lastmod>2026-05-05T08:12:39.434Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/ida-pro-book-2e/vs/practical-binary-analysis</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/ida-pro-book-2e/vs/practical-binary-analysis" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/ida-pro-book-2e/vs/practical-binary-analysis" />
<lastmod>2026-05-05T08:12:37.021Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/les-virus-informatiques/vs/practical-binary-analysis</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/les-virus-informatiques/vs/practical-binary-analysis" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/les-virus-informatiques/vs/practical-binary-analysis" />
<lastmod>2026-05-05T08:12:37.021Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/hardware-hacking-handbook/vs/practical-binary-analysis</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hardware-hacking-handbook/vs/practical-binary-analysis" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hardware-hacking-handbook/vs/practical-binary-analysis" />
<lastmod>2026-05-05T08:12:41.285Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/evasive-malware/vs/practical-binary-analysis</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/evasive-malware/vs/practical-binary-analysis" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/evasive-malware/vs/practical-binary-analysis" />
<lastmod>2026-05-05T08:12:37.375Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/hardware-hacking-handbook/vs/practical-iot-hacking</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hardware-hacking-handbook/vs/practical-iot-hacking" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hardware-hacking-handbook/vs/practical-iot-hacking" />
<lastmod>2026-05-05T08:12:41.285Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/car-hackers-handbook/vs/practical-iot-hacking</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/car-hackers-handbook/vs/practical-iot-hacking" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/car-hackers-handbook/vs/practical-iot-hacking" />
<lastmod>2026-05-05T08:12:36.743Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/click-here-to-kill-everybody/vs/practical-iot-hacking</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/click-here-to-kill-everybody/vs/practical-iot-hacking" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/click-here-to-kill-everybody/vs/practical-iot-hacking" />
<lastmod>2026-05-05T08:12:39.499Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/designing-secure-software/vs/practical-linux-forensics</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/designing-secure-software/vs/practical-linux-forensics" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/designing-secure-software/vs/practical-linux-forensics" />
<lastmod>2026-05-05T08:12:37.530Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/practical-linux-forensics/vs/practical-malware-analysis</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-linux-forensics/vs/practical-malware-analysis" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-linux-forensics/vs/practical-malware-analysis" />
<lastmod>2026-05-05T08:12:37.164Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/practical-linux-forensics/vs/practice-of-network-security-monitoring</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-linux-forensics/vs/practice-of-network-security-monitoring" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-linux-forensics/vs/practice-of-network-security-monitoring" />
<lastmod>2026-05-05T08:12:37.871Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/practical-malware-analysis/vs/techniques-virales-avancees</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-malware-analysis/vs/techniques-virales-avancees" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-malware-analysis/vs/techniques-virales-avancees" />
<lastmod>2026-05-05T08:12:34.241Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/les-virus-informatiques/vs/practical-malware-analysis</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/les-virus-informatiques/vs/practical-malware-analysis" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/les-virus-informatiques/vs/practical-malware-analysis" />
<lastmod>2026-05-05T08:12:34.241Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/ida-pro-book-2e/vs/practical-malware-analysis</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/ida-pro-book-2e/vs/practical-malware-analysis" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/ida-pro-book-2e/vs/practical-malware-analysis" />
<lastmod>2026-05-05T08:12:35.151Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/practical-malware-analysis/vs/practical-reverse-engineering</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-malware-analysis/vs/practical-reverse-engineering" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-malware-analysis/vs/practical-reverse-engineering" />
<lastmod>2026-05-05T08:12:35.086Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/practical-packet-analysis-3e/vs/practice-of-network-security-monitoring</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-packet-analysis-3e/vs/practice-of-network-security-monitoring" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-packet-analysis-3e/vs/practice-of-network-security-monitoring" />
<lastmod>2026-05-05T08:12:37.871Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/foundations-of-information-security/vs/practical-packet-analysis-3e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/foundations-of-information-security/vs/practical-packet-analysis-3e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/foundations-of-information-security/vs/practical-packet-analysis-3e" />
<lastmod>2026-05-05T08:12:37.804Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/how-cybersecurity-really-works/vs/practical-packet-analysis-3e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/how-cybersecurity-really-works/vs/practical-packet-analysis-3e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/how-cybersecurity-really-works/vs/practical-packet-analysis-3e" />
<lastmod>2026-05-05T08:12:38.165Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/practical-reverse-engineering/vs/rootkits-and-bootkits</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-reverse-engineering/vs/rootkits-and-bootkits" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-reverse-engineering/vs/rootkits-and-bootkits" />
<lastmod>2026-05-05T08:12:35.280Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/practical-reverse-engineering/vs/techniques-virales-avancees</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-reverse-engineering/vs/techniques-virales-avancees" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-reverse-engineering/vs/techniques-virales-avancees" />
<lastmod>2026-05-05T08:12:35.086Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/art-of-mac-malware-v1/vs/practical-reverse-engineering</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/art-of-mac-malware-v1/vs/practical-reverse-engineering" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/art-of-mac-malware-v1/vs/practical-reverse-engineering" />
<lastmod>2026-05-05T08:12:36.679Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/practical-social-engineering/vs/social-engineering-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-social-engineering/vs/social-engineering-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-social-engineering/vs/social-engineering-2e" />
<lastmod>2026-05-05T08:12:40.438Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/metasploit-2e/vs/practical-social-engineering</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/metasploit-2e/vs/practical-social-engineering" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/metasploit-2e/vs/practical-social-engineering" />
<lastmod>2026-05-05T08:12:38.950Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/practical-social-engineering/vs/the-hacker-playbook-3</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-social-engineering/vs/the-hacker-playbook-3" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-social-engineering/vs/the-hacker-playbook-3" />
<lastmod>2026-05-05T08:12:38.950Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/black-hat-graphql/vs/real-world-bug-hunting</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-graphql/vs/real-world-bug-hunting" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-graphql/vs/real-world-bug-hunting" />
<lastmod>2026-05-05T08:12:38.311Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/hacking-apis/vs/real-world-bug-hunting</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacking-apis/vs/real-world-bug-hunting" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacking-apis/vs/real-world-bug-hunting" />
<lastmod>2026-05-05T08:12:36.803Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/real-world-bug-hunting/vs/web-application-hackers-handbook</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/real-world-bug-hunting/vs/web-application-hackers-handbook" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/real-world-bug-hunting/vs/web-application-hackers-handbook" />
<lastmod>2026-05-05T08:12:35.218Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/penetration-testing-weidman/vs/real-world-bug-hunting</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/penetration-testing-weidman/vs/real-world-bug-hunting" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/penetration-testing-weidman/vs/real-world-bug-hunting" />
<lastmod>2026-05-05T08:12:36.254Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/real-world-cryptography/vs/serious-cryptography-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/real-world-cryptography/vs/serious-cryptography-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/real-world-cryptography/vs/serious-cryptography-2e" />
<lastmod>2026-05-05T08:12:35.496Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/real-world-cryptography/vs/threat-modeling-designing-for-security</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/real-world-cryptography/vs/threat-modeling-designing-for-security" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/real-world-cryptography/vs/threat-modeling-designing-for-security" />
<lastmod>2026-05-05T08:12:35.429Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/rootkits-and-bootkits/vs/techniques-virales-avancees</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/rootkits-and-bootkits/vs/techniques-virales-avancees" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/rootkits-and-bootkits/vs/techniques-virales-avancees" />
<lastmod>2026-05-05T08:12:35.280Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/art-of-mac-malware-v1/vs/rootkits-and-bootkits</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/art-of-mac-malware-v1/vs/rootkits-and-bootkits" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/art-of-mac-malware-v1/vs/rootkits-and-bootkits" />
<lastmod>2026-05-05T08:12:36.679Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/sandworm/vs/the-cuckoos-egg</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/sandworm/vs/the-cuckoos-egg" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/sandworm/vs/the-cuckoos-egg" />
<lastmod>2026-05-05T08:12:34.740Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/sandworm/vs/the-hacker-and-the-state</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/sandworm/vs/the-hacker-and-the-state" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/sandworm/vs/the-hacker-and-the-state" />
<lastmod>2026-05-05T08:12:41.416Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/sandworm/vs/this-is-how-they-tell-me-the-world-ends</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/sandworm/vs/this-is-how-they-tell-me-the-world-ends" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/sandworm/vs/this-is-how-they-tell-me-the-world-ends" />
<lastmod>2026-05-05T08:12:35.976Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/security-chaos-engineering/vs/security-engineering-3e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/security-chaos-engineering/vs/security-engineering-3e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/security-chaos-engineering/vs/security-engineering-3e" />
<lastmod>2026-05-05T08:12:41.485Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/evasive-malware/vs/security-chaos-engineering</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/evasive-malware/vs/security-chaos-engineering" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/evasive-malware/vs/security-chaos-engineering" />
<lastmod>2026-05-05T08:12:41.485Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/security-chaos-engineering/vs/techniques-virales-avancees</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/security-chaos-engineering/vs/techniques-virales-avancees" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/security-chaos-engineering/vs/techniques-virales-avancees" />
<lastmod>2026-05-05T08:12:41.485Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/designing-secure-software/vs/security-chaos-engineering</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/designing-secure-software/vs/security-chaos-engineering" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/designing-secure-software/vs/security-chaos-engineering" />
<lastmod>2026-05-05T08:12:41.485Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/security-engineering-3e/vs/serious-cryptography-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/security-engineering-3e/vs/serious-cryptography-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/security-engineering-3e/vs/serious-cryptography-2e" />
<lastmod>2026-05-05T08:12:35.496Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/real-world-cryptography/vs/security-engineering-3e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/real-world-cryptography/vs/security-engineering-3e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/real-world-cryptography/vs/security-engineering-3e" />
<lastmod>2026-05-05T08:12:35.429Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/les-virus-informatiques/vs/silence-on-the-wire</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/les-virus-informatiques/vs/silence-on-the-wire" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/les-virus-informatiques/vs/silence-on-the-wire" />
<lastmod>2026-05-05T08:12:38.444Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/silence-on-the-wire/vs/social-engineering-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/silence-on-the-wire/vs/social-engineering-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/silence-on-the-wire/vs/social-engineering-2e" />
<lastmod>2026-05-05T08:12:40.438Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/hacking-art-of-exploitation/vs/silence-on-the-wire</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacking-art-of-exploitation/vs/silence-on-the-wire" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacking-art-of-exploitation/vs/silence-on-the-wire" />
<lastmod>2026-05-05T08:12:38.444Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/practice-of-network-security-monitoring/vs/silence-on-the-wire</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practice-of-network-security-monitoring/vs/silence-on-the-wire" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practice-of-network-security-monitoring/vs/silence-on-the-wire" />
<lastmod>2026-05-05T08:12:38.444Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/social-engineering-2e/vs/the-art-of-deception</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/social-engineering-2e/vs/the-art-of-deception" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/social-engineering-2e/vs/the-art-of-deception" />
<lastmod>2026-05-05T08:12:40.438Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/les-virus-informatiques/vs/social-engineering-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/les-virus-informatiques/vs/social-engineering-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/les-virus-informatiques/vs/social-engineering-2e" />
<lastmod>2026-05-05T08:12:40.438Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/social-engineering-2e/vs/the-pragmatic-programmer-20a</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/social-engineering-2e/vs/the-pragmatic-programmer-20a" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/social-engineering-2e/vs/the-pragmatic-programmer-20a" />
<lastmod>2026-05-05T08:12:40.438Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/spam-nation/vs/the-cuckoos-egg</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/spam-nation/vs/the-cuckoos-egg" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/spam-nation/vs/the-cuckoos-egg" />
<lastmod>2026-05-05T08:12:40.374Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/at-war-rise-of-military-internet-complex/vs/spam-nation</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/at-war-rise-of-military-internet-complex/vs/spam-nation" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/at-war-rise-of-military-internet-complex/vs/spam-nation" />
<lastmod>2026-05-05T08:12:40.374Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/cult-of-the-dead-cow/vs/spam-nation</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cult-of-the-dead-cow/vs/spam-nation" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cult-of-the-dead-cow/vs/spam-nation" />
<lastmod>2026-05-05T08:12:40.374Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/dark-territory/vs/spam-nation</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/dark-territory/vs/spam-nation" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/dark-territory/vs/spam-nation" />
<lastmod>2026-05-05T08:12:40.374Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/ghost-in-the-wires/vs/the-art-of-deception</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/ghost-in-the-wires/vs/the-art-of-deception" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/ghost-in-the-wires/vs/the-art-of-deception" />
<lastmod>2026-05-05T08:12:39.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/foundations-of-information-security/vs/the-art-of-deception</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/foundations-of-information-security/vs/the-art-of-deception" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/foundations-of-information-security/vs/the-art-of-deception" />
<lastmod>2026-05-05T08:12:39.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/how-cybersecurity-really-works/vs/the-art-of-deception</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/how-cybersecurity-really-works/vs/the-art-of-deception" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/how-cybersecurity-really-works/vs/the-art-of-deception" />
<lastmod>2026-05-05T08:12:39.654Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/kingpin/vs/the-art-of-deception</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/kingpin/vs/the-art-of-deception" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/kingpin/vs/the-art-of-deception" />
<lastmod>2026-05-05T08:12:40.309Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/kingpin/vs/the-art-of-intrusion</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/kingpin/vs/the-art-of-intrusion" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/kingpin/vs/the-art-of-intrusion" />
<lastmod>2026-05-05T08:12:40.309Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/the-art-of-intrusion/vs/the-cuckoos-egg</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-art-of-intrusion/vs/the-cuckoos-egg" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-art-of-intrusion/vs/the-cuckoos-egg" />
<lastmod>2026-05-05T08:12:39.726Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/at-war-rise-of-military-internet-complex/vs/the-art-of-intrusion</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/at-war-rise-of-military-internet-complex/vs/the-art-of-intrusion" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/at-war-rise-of-military-internet-complex/vs/the-art-of-intrusion" />
<lastmod>2026-05-05T08:12:39.726Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/cult-of-the-dead-cow/vs/the-art-of-intrusion</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/cult-of-the-dead-cow/vs/the-art-of-intrusion" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/cult-of-the-dead-cow/vs/the-art-of-intrusion" />
<lastmod>2026-05-05T08:12:40.239Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/dark-territory/vs/the-art-of-intrusion</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/dark-territory/vs/the-art-of-intrusion" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/dark-territory/vs/the-art-of-intrusion" />
<lastmod>2026-05-05T08:12:39.726Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/art-of-mac-malware-v1/vs/evasive-malware</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/art-of-mac-malware-v1/vs/evasive-malware" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/art-of-mac-malware-v1/vs/evasive-malware" />
<lastmod>2026-05-05T08:12:37.375Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/art-of-mac-malware-v1/vs/techniques-virales-avancees</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/art-of-mac-malware-v1/vs/techniques-virales-avancees" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/art-of-mac-malware-v1/vs/techniques-virales-avancees" />
<lastmod>2026-05-05T08:12:36.679Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/les-virus-informatiques/vs/the-art-of-memory-forensics</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/les-virus-informatiques/vs/the-art-of-memory-forensics" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/les-virus-informatiques/vs/the-art-of-memory-forensics" />
<lastmod>2026-05-05T08:12:39.870Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/evasive-malware/vs/the-art-of-memory-forensics</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/evasive-malware/vs/the-art-of-memory-forensics" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/evasive-malware/vs/the-art-of-memory-forensics" />
<lastmod>2026-05-05T08:12:39.870Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/practical-reverse-engineering/vs/the-art-of-memory-forensics</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-reverse-engineering/vs/the-art-of-memory-forensics" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-reverse-engineering/vs/the-art-of-memory-forensics" />
<lastmod>2026-05-05T08:12:39.870Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/rootkits-and-bootkits/vs/the-art-of-memory-forensics</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/rootkits-and-bootkits/vs/the-art-of-memory-forensics" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/rootkits-and-bootkits/vs/the-art-of-memory-forensics" />
<lastmod>2026-05-05T08:12:39.870Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/art-of-software-security-assessment/vs/the-tangled-web</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/art-of-software-security-assessment/vs/the-tangled-web" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/art-of-software-security-assessment/vs/the-tangled-web" />
<lastmod>2026-05-05T08:12:35.561Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/art-of-software-security-assessment/vs/real-world-cryptography</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/art-of-software-security-assessment/vs/real-world-cryptography" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/art-of-software-security-assessment/vs/real-world-cryptography" />
<lastmod>2026-05-05T08:12:35.561Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/art-of-software-security-assessment/vs/the-database-hackers-handbook</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/art-of-software-security-assessment/vs/the-database-hackers-handbook" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/art-of-software-security-assessment/vs/the-database-hackers-handbook" />
<lastmod>2026-05-05T08:12:40.725Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/art-of-software-security-assessment/vs/designing-secure-software</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/art-of-software-security-assessment/vs/designing-secure-software" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/art-of-software-security-assessment/vs/designing-secure-software" />
<lastmod>2026-05-05T08:12:37.530Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/art-of-software-security-assessment/vs/threat-modeling-designing-for-security</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/art-of-software-security-assessment/vs/threat-modeling-designing-for-security" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/art-of-software-security-assessment/vs/threat-modeling-designing-for-security" />
<lastmod>2026-05-05T08:12:35.561Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/car-hackers-handbook/vs/hardware-hacking-handbook</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/car-hackers-handbook/vs/hardware-hacking-handbook" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/car-hackers-handbook/vs/hardware-hacking-handbook" />
<lastmod>2026-05-05T08:12:41.285Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/car-hackers-handbook/vs/ida-pro-book-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/car-hackers-handbook/vs/ida-pro-book-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/car-hackers-handbook/vs/ida-pro-book-2e" />
<lastmod>2026-05-05T08:12:36.545Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/car-hackers-handbook/vs/practical-malware-analysis</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/car-hackers-handbook/vs/practical-malware-analysis" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/car-hackers-handbook/vs/practical-malware-analysis" />
<lastmod>2026-05-05T08:12:36.545Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/kingpin/vs/the-cyber-effect</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/kingpin/vs/the-cyber-effect" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/kingpin/vs/the-cyber-effect" />
<lastmod>2026-05-05T08:12:40.309Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/sandworm/vs/the-cyber-effect</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/sandworm/vs/the-cyber-effect" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/sandworm/vs/the-cyber-effect" />
<lastmod>2026-05-05T08:12:40.170Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/the-cuckoos-egg/vs/the-cyber-effect</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-cuckoos-egg/vs/the-cyber-effect" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-cuckoos-egg/vs/the-cyber-effect" />
<lastmod>2026-05-05T08:12:40.170Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/the-cyber-effect/vs/the-hacker-and-the-state</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-cyber-effect/vs/the-hacker-and-the-state" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-cyber-effect/vs/the-hacker-and-the-state" />
<lastmod>2026-05-05T08:12:41.416Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/at-war-rise-of-military-internet-complex/vs/the-cyber-effect</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/at-war-rise-of-military-internet-complex/vs/the-cyber-effect" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/at-war-rise-of-military-internet-complex/vs/the-cyber-effect" />
<lastmod>2026-05-05T08:12:40.170Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/the-database-hackers-handbook/vs/the-tangled-web</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-database-hackers-handbook/vs/the-tangled-web" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-database-hackers-handbook/vs/the-tangled-web" />
<lastmod>2026-05-05T08:12:40.725Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/real-world-cryptography/vs/the-database-hackers-handbook</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/real-world-cryptography/vs/the-database-hackers-handbook" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/real-world-cryptography/vs/the-database-hackers-handbook" />
<lastmod>2026-05-05T08:12:40.725Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/gray-hat-hacking-6e/vs/the-database-hackers-handbook</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/gray-hat-hacking-6e/vs/the-database-hackers-handbook" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/gray-hat-hacking-6e/vs/the-database-hackers-handbook" />
<lastmod>2026-05-05T08:12:40.725Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/the-database-hackers-handbook/vs/the-mac-hackers-handbook</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-database-hackers-handbook/vs/the-mac-hackers-handbook" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-database-hackers-handbook/vs/the-mac-hackers-handbook" />
<lastmod>2026-05-05T08:12:40.725Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/the-hacker-and-the-state/vs/this-is-how-they-tell-me-the-world-ends</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-hacker-and-the-state/vs/this-is-how-they-tell-me-the-world-ends" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-hacker-and-the-state/vs/this-is-how-they-tell-me-the-world-ends" />
<lastmod>2026-05-05T08:12:41.416Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/hacking-art-of-exploitation/vs/the-hacker-playbook-3</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hacking-art-of-exploitation/vs/the-hacker-playbook-3" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hacking-art-of-exploitation/vs/the-hacker-playbook-3" />
<lastmod>2026-05-05T08:12:38.879Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/bug-hunters-diary/vs/the-hacker-playbook-3</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/bug-hunters-diary/vs/the-hacker-playbook-3" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/bug-hunters-diary/vs/the-hacker-playbook-3" />
<lastmod>2026-05-05T08:12:38.879Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/hardware-hacking-handbook/vs/les-virus-informatiques</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hardware-hacking-handbook/vs/les-virus-informatiques" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hardware-hacking-handbook/vs/les-virus-informatiques" />
<lastmod>2026-05-05T08:12:41.285Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/black-hat-go/vs/ida-pro-book-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-go/vs/ida-pro-book-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-go/vs/ida-pro-book-2e" />
<lastmod>2026-05-05T08:12:36.331Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/black-hat-python-2e/vs/ida-pro-book-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-python-2e/vs/ida-pro-book-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-python-2e/vs/ida-pro-book-2e" />
<lastmod>2026-05-05T08:12:35.151Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/art-of-mac-malware-v1/vs/the-mac-hackers-handbook</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/art-of-mac-malware-v1/vs/the-mac-hackers-handbook" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/art-of-mac-malware-v1/vs/the-mac-hackers-handbook" />
<lastmod>2026-05-05T08:12:40.507Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/les-virus-informatiques/vs/the-mac-hackers-handbook</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/les-virus-informatiques/vs/the-mac-hackers-handbook" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/les-virus-informatiques/vs/the-mac-hackers-handbook" />
<lastmod>2026-05-05T08:12:40.507Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/practical-binary-analysis/vs/the-mac-hackers-handbook</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-binary-analysis/vs/the-mac-hackers-handbook" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-binary-analysis/vs/the-mac-hackers-handbook" />
<lastmod>2026-05-05T08:12:40.507Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/hardware-hacking-handbook/vs/the-mac-hackers-handbook</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hardware-hacking-handbook/vs/the-mac-hackers-handbook" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hardware-hacking-handbook/vs/the-mac-hackers-handbook" />
<lastmod>2026-05-05T08:12:41.285Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/real-world-cryptography/vs/the-mobile-application-hackers-handbook</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/real-world-cryptography/vs/the-mobile-application-hackers-handbook" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/real-world-cryptography/vs/the-mobile-application-hackers-handbook" />
<lastmod>2026-05-05T08:12:40.658Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/designing-secure-software/vs/the-mobile-application-hackers-handbook</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/designing-secure-software/vs/the-mobile-application-hackers-handbook" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/designing-secure-software/vs/the-mobile-application-hackers-handbook" />
<lastmod>2026-05-05T08:12:40.658Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/the-mobile-application-hackers-handbook/vs/threat-modeling-designing-for-security</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-mobile-application-hackers-handbook/vs/threat-modeling-designing-for-security" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-mobile-application-hackers-handbook/vs/threat-modeling-designing-for-security" />
<lastmod>2026-05-05T08:12:40.658Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/black-hat-graphql/vs/the-mobile-application-hackers-handbook</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-graphql/vs/the-mobile-application-hackers-handbook" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-graphql/vs/the-mobile-application-hackers-handbook" />
<lastmod>2026-05-05T08:12:40.658Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/practice-of-network-security-monitoring/vs/zero-trust-networks</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practice-of-network-security-monitoring/vs/zero-trust-networks" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practice-of-network-security-monitoring/vs/zero-trust-networks" />
<lastmod>2026-05-05T08:12:40.992Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/designing-secure-software/vs/practice-of-network-security-monitoring</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/designing-secure-software/vs/practice-of-network-security-monitoring" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/designing-secure-software/vs/practice-of-network-security-monitoring" />
<lastmod>2026-05-05T08:12:37.871Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/les-virus-informatiques/vs/shellcoders-handbook-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/les-virus-informatiques/vs/shellcoders-handbook-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/les-virus-informatiques/vs/shellcoders-handbook-2e" />
<lastmod>2026-05-05T08:12:34.955Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/practical-binary-analysis/vs/shellcoders-handbook-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-binary-analysis/vs/shellcoders-handbook-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-binary-analysis/vs/shellcoders-handbook-2e" />
<lastmod>2026-05-05T08:12:37.021Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/hardware-hacking-handbook/vs/shellcoders-handbook-2e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/hardware-hacking-handbook/vs/shellcoders-handbook-2e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/hardware-hacking-handbook/vs/shellcoders-handbook-2e" />
<lastmod>2026-05-05T08:12:41.285Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/the-tangled-web/vs/web-application-hackers-handbook</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-tangled-web/vs/web-application-hackers-handbook" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-tangled-web/vs/web-application-hackers-handbook" />
<lastmod>2026-05-05T08:12:34.471Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/real-world-cryptography/vs/the-tangled-web</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/real-world-cryptography/vs/the-tangled-web" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/real-world-cryptography/vs/the-tangled-web" />
<lastmod>2026-05-05T08:12:35.429Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/real-world-cryptography/vs/web-application-hackers-handbook</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/real-world-cryptography/vs/web-application-hackers-handbook" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/real-world-cryptography/vs/web-application-hackers-handbook" />
<lastmod>2026-05-05T08:12:35.429Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/at-war-rise-of-military-internet-complex/vs/this-is-how-they-tell-me-the-world-ends</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/at-war-rise-of-military-internet-complex/vs/this-is-how-they-tell-me-the-world-ends" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/at-war-rise-of-military-internet-complex/vs/this-is-how-they-tell-me-the-world-ends" />
<lastmod>2026-05-05T08:12:35.976Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/dark-territory/vs/this-is-how-they-tell-me-the-world-ends</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/dark-territory/vs/this-is-how-they-tell-me-the-world-ends" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/dark-territory/vs/this-is-how-they-tell-me-the-world-ends" />
<lastmod>2026-05-05T08:12:35.976Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/threat-modeling-designing-for-security/vs/web-security-for-developers</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/threat-modeling-designing-for-security/vs/web-security-for-developers" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/threat-modeling-designing-for-security/vs/web-security-for-developers" />
<lastmod>2026-05-05T08:12:37.095Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/practical-malware-analysis/vs/threat-modeling-designing-for-security</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-malware-analysis/vs/threat-modeling-designing-for-security" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-malware-analysis/vs/threat-modeling-designing-for-security" />
<lastmod>2026-05-05T08:12:34.680Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/kingpin/vs/tracers-in-the-dark</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/kingpin/vs/tracers-in-the-dark" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/kingpin/vs/tracers-in-the-dark" />
<lastmod>2026-05-05T08:12:40.309Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/spam-nation/vs/tracers-in-the-dark</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/spam-nation/vs/tracers-in-the-dark" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/spam-nation/vs/tracers-in-the-dark" />
<lastmod>2026-05-05T08:12:40.374Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/the-pragmatic-programmer-20a/vs/tribe-of-hackers</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-pragmatic-programmer-20a/vs/tribe-of-hackers" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-pragmatic-programmer-20a/vs/tribe-of-hackers" />
<lastmod>2026-05-05T08:12:40.009Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/kingpin/vs/we-are-anonymous</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/kingpin/vs/we-are-anonymous" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/kingpin/vs/we-are-anonymous" />
<lastmod>2026-05-05T08:12:40.309Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/the-cuckoos-egg/vs/we-are-anonymous</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/the-cuckoos-egg/vs/we-are-anonymous" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/the-cuckoos-egg/vs/we-are-anonymous" />
<lastmod>2026-05-05T08:12:39.301Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/at-war-rise-of-military-internet-complex/vs/we-are-anonymous</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/at-war-rise-of-military-internet-complex/vs/we-are-anonymous" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/at-war-rise-of-military-internet-complex/vs/we-are-anonymous" />
<lastmod>2026-05-05T08:12:39.301Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/dark-territory/vs/we-are-anonymous</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/dark-territory/vs/we-are-anonymous" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/dark-territory/vs/we-are-anonymous" />
<lastmod>2026-05-05T08:12:39.301Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/foundations-of-information-security/vs/web-security-for-developers</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/foundations-of-information-security/vs/web-security-for-developers" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/foundations-of-information-security/vs/web-security-for-developers" />
<lastmod>2026-05-05T08:12:37.238Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/how-cybersecurity-really-works/vs/web-security-for-developers</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/how-cybersecurity-really-works/vs/web-security-for-developers" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/how-cybersecurity-really-works/vs/web-security-for-developers" />
<lastmod>2026-05-05T08:12:38.165Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/black-hat-graphql/vs/web-security-for-developers</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/black-hat-graphql/vs/web-security-for-developers" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/black-hat-graphql/vs/web-security-for-developers" />
<lastmod>2026-05-05T08:12:38.311Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/practical-reverse-engineering/vs/windows-internals-part-1-7e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-reverse-engineering/vs/windows-internals-part-1-7e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-reverse-engineering/vs/windows-internals-part-1-7e" />
<lastmod>2026-05-05T08:12:35.695Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/rootkits-and-bootkits/vs/windows-internals-part-1-7e</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/rootkits-and-bootkits/vs/windows-internals-part-1-7e" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/rootkits-and-bootkits/vs/windows-internals-part-1-7e" />
<lastmod>2026-05-05T08:12:35.695Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/practical-packet-analysis-3e/vs/zero-trust-networks</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/practical-packet-analysis-3e/vs/zero-trust-networks" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/practical-packet-analysis-3e/vs/zero-trust-networks" />
<lastmod>2026-05-05T08:12:40.992Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/books/designing-secure-software/vs/zero-trust-networks</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/books/designing-secure-software/vs/zero-trust-networks" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/books/designing-secure-software/vs/zero-trust-networks" />
<lastmod>2026-05-05T08:12:40.992Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/levels/beginner</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/levels/beginner" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/levels/beginner" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/levels/intermediate</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/levels/intermediate" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/levels/intermediate" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/levels/advanced</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/levels/advanced" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/levels/advanced" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/guides</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/guides" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/guides" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/years</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/years" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/years" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/aaron-rinehart</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/aaron-rinehart" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/aaron-rinehart" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/aaron-walters</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/aaron-walters" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/aaron-walters" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/adam-shostack</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/adam-shostack" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/adam-shostack" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/adam-stubblefield</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/adam-stubblefield" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/adam-stubblefield" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/alex-ionescu</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/alex-ionescu" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/alex-ionescu" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/alex-matrosov</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/alex-matrosov" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/alex-matrosov" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/alexandre-gazet</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/alexandre-gazet" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/alexandre-gazet" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/allen-harper</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/allen-harper" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/allen-harper" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/amael-cattaruzza</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/amael-cattaruzza" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/amael-cattaruzza" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/amit-gupta</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/amit-gupta" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/amit-gupta" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/ana-oprea</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/ana-oprea" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/ana-oprea" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/andrew-bunnie-huang</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/andrew-bunnie-huang" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/andrew-bunnie-huang" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/andrew-case</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/andrew-case" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/andrew-case" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/andrew-honig</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/andrew-honig" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/andrew-honig" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/andrew-hunt</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/andrew-hunt" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/andrew-hunt" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/andy-greenberg</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/andy-greenberg" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/andy-greenberg" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/anissa-makhlouf</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/anissa-makhlouf" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/anissa-makhlouf" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/bandeatoz</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/bandeatoz" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/bandeatoz" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/beau-woods</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/beau-woods" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/beau-woods" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/ben-buchanan</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/ben-buchanan" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/ben-buchanan" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/ben-mccarty</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/ben-mccarty" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/ben-mccarty" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/betsy-beyer</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/betsy-beyer" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/betsy-beyer" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/bill-grindlay</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/bill-grindlay" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/bill-grindlay" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/brendan-creane</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/brendan-creane" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/brendan-creane" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/brian-krebs</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/brian-krebs" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/brian-krebs" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/bruce-dang</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/bruce-dang" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/bruce-dang" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/bruce-nikkel</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/bruce-nikkel" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/bruce-nikkel" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/bruce-schneier</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/bruce-schneier" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/bruce-schneier" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/charlie-miller</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/charlie-miller" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/charlie-miller" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/chris-anley</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/chris-anley" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/chris-anley" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/chris-eagle</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/chris-eagle" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/chris-eagle" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/chris-patten</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/chris-patten" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/chris-patten" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/chris-sanders</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/chris-sanders" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/chris-sanders" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/christopher-hadnagy</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/christopher-hadnagy" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/christopher-hadnagy" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/clifford-stoll</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/clifford-stoll" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/clifford-stoll" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/colin-o-flynn</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/colin-o-flynn" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/colin-o-flynn" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/corey-j-ball</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/corey-j-ball" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/corey-j-ball" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/craig-smith</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/craig-smith" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/craig-smith" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/dafydd-stuttard</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/dafydd-stuttard" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/dafydd-stuttard" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/dan-kottmann</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/dan-kottmann" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/dan-kottmann" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/daniel-fernandez</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/daniel-fernandez" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/daniel-fernandez" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/daniel-g-graham</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/daniel-g-graham" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/daniel-g-graham" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/david-kennedy</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/david-kennedy" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/david-kennedy" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/david-litchfield</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/david-litchfield" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/david-litchfield" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/david-solomon</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/david-solomon" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/david-solomon" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/david-thiel</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/david-thiel" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/david-thiel" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/david-thomas</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/david-thomas" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/david-thomas" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/david-wong</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/david-wong" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/david-wong" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/dennis-andriesse</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/dennis-andriesse" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/dennis-andriesse" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/devon-kearns</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/devon-kearns" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/devon-kearns" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/didier-danet</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/didier-danet" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/didier-danet" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/dino-dai-zovi</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/dino-dai-zovi" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/dino-dai-zovi" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/dolev-farhi</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/dolev-farhi" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/dolev-farhi" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/dominic-chell</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/dominic-chell" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/dominic-chell" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/doug-barth</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/doug-barth" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/doug-barth" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/edward-snowden</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/edward-snowden" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/edward-snowden" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/elias-bachaalany</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/elias-bachaalany" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/elias-bachaalany" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/eric-filiol</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/eric-filiol" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/eric-filiol" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/eugene-rodionov</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/eugene-rodionov" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/eugene-rodionov" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/evan-gilman</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/evan-gilman" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/evan-gilman" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/evangelos-deirmentzoglou</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/evangelos-deirmentzoglou" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/evangelos-deirmentzoglou" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/felix-lindner</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/felix-lindner" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/felix-lindner" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/fotios-chantzis</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/fotios-chantzis" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/fotios-chantzis" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/fred-kaplan</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/fred-kaplan" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/fred-kaplan" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/georgia-weidman</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/georgia-weidman" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/georgia-weidman" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/gerardo-richarte</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/gerardo-richarte" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/gerardo-richarte" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/heather-adkins</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/heather-adkins" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/heather-adkins" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/hillary-sanders</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/hillary-sanders" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/hillary-sanders" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/huascar-tejeda</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/huascar-tejeda" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/huascar-tejeda" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/ioannis-stais</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/ioannis-stais" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/ioannis-stais" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/james-forshaw</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/james-forshaw" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/james-forshaw" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/jamie-levy</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/jamie-levy" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/jamie-levy" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/jason-andress</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/jason-andress" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/jason-andress" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/jason-t-luttgens</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/jason-t-luttgens" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/jason-t-luttgens" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/jasper-van-woudenberg</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/jasper-van-woudenberg" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/jasper-van-woudenberg" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/jean-philippe-aumasson</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/jean-philippe-aumasson" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/jean-philippe-aumasson" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/jennifer-jin</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/jennifer-jin" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/jennifer-jin" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/jim-o-gorman</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/jim-o-gorman" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/jim-o-gorman" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/joe-gray</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/joe-gray" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/joe-gray" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/john-heasman</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/john-heasman" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/john-heasman" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/john-mcdonald</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/john-mcdonald" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/john-mcdonald" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/jon-erickson</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/jon-erickson" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/jon-erickson" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/jos-weyers</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/jos-weyers" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/jos-weyers" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/joseph-menn</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/joseph-menn" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/joseph-menn" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/joshua-saxe</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/joshua-saxe" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/joshua-saxe" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/justin-schuh</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/justin-schuh" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/justin-schuh" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/justin-seitz</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/justin-seitz" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/justin-seitz" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/kelly-shortridge</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/kelly-shortridge" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/kelly-shortridge" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/kevin-mandia</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/kevin-mandia" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/kevin-mandia" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/kevin-mitnick</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/kevin-mitnick" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/kevin-mitnick" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/kevin-poulsen</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/kevin-poulsen" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/kevin-poulsen" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/kim-zetter</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/kim-zetter" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/kim-zetter" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/kyle-cucci</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/kyle-cucci" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/kyle-cucci" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/liz-rice</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/liz-rice" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/liz-rice" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/loren-kohnfelder</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/loren-kohnfelder" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/loren-kohnfelder" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/malcolm-mcdonald</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/malcolm-mcdonald" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/malcolm-mcdonald" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/marcus-j-carey</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/marcus-j-carey" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/marcus-j-carey" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/marcus-pinto</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/marcus-pinto" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/marcus-pinto" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/mark-dowd</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/mark-dowd" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/mark-dowd" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/mark-russinovich</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/mark-russinovich" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/mark-russinovich" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/mary-aiken</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/mary-aiken" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/mary-aiken" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/mati-aharoni</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/mati-aharoni" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/mati-aharoni" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/matt-burrough</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/matt-burrough" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/matt-burrough" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/matthew-pepe</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/matthew-pepe" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/matthew-pepe" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/micah-lee</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/micah-lee" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/micah-lee" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/michael-baucom</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/michael-baucom" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/michael-baucom" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/michael-bazzell</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/michael-bazzell" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/michael-bazzell" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/michael-collins</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/michael-collins" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/michael-collins" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/michael-hale-ligh</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/michael-hale-ligh" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/michael-hale-ligh" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/michael-hausenblas</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/michael-hausenblas" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/michael-hausenblas" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/michael-rash</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/michael-rash" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/michael-rash" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/michael-sikorski</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/michael-sikorski" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/michael-sikorski" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/michal-zalewski</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/michal-zalewski" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/michal-zalewski" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/moses-frost</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/moses-frost" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/moses-frost" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/nick-aleks</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/nick-aleks" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/nick-aleks" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/nicole-perlroth</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/nicole-perlroth" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/nicole-perlroth" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/niels-ferguson</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/niels-ferguson" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/niels-ferguson" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/nigel-k-tolley</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/nigel-k-tolley" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/nigel-k-tolley" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/nihad-a-hassan</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/nihad-a-hassan" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/nihad-a-hassan" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/nikolay-elenkov</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/nikolay-elenkov" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/nikolay-elenkov" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/occupytheweb</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/occupytheweb" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/occupytheweb" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/ollie-whitehouse</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/ollie-whitehouse" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/ollie-whitehouse" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/parmy-olson</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/parmy-olson" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/parmy-olson" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/patrick-wardle</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/patrick-wardle" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/patrick-wardle" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/paul-blankinship</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/paul-blankinship" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/paul-blankinship" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/paulino-calderon</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/paulino-calderon" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/paulino-calderon" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/pavel-yosifovich</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/pavel-yosifovich" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/pavel-yosifovich" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/peter-kim</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/peter-kim" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/peter-kim" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/peter-yaworski</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/peter-yaworski" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/peter-yaworski" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/piotr-lewandowski</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/piotr-lewandowski" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/piotr-lewandowski" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/rami-hijazi</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/rami-hijazi" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/rami-hijazi" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/richard-bejtlich</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/richard-bejtlich" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/richard-bejtlich" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/romain-hennion</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/romain-hennion" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/romain-hennion" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/ross-anderson</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/ross-anderson" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/ross-anderson" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/ryan-linn</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/ryan-linn" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/ryan-linn" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/sam-grubb</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/sam-grubb" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/sam-grubb" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/sergey-bratus</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/sergey-bratus" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/sergey-bratus" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/shane-harris</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/shane-harris" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/shane-harris" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/shaun-colley</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/shaun-colley" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/shaun-colley" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/stephane-taillat</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/stephane-taillat" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/stephane-taillat" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/stephen-sims</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/stephen-sims" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/stephen-sims" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/tadayoshi-kohno</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/tadayoshi-kohno" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/tadayoshi-kohno" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/tanya-janca</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/tanya-janca" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/tanya-janca" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/tim-arnold</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/tim-arnold" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/tim-arnold" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/tobias-klein</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/tobias-klein" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/tobias-klein" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/tom-steele</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/tom-steele" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/tom-steele" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/tyrone-erasmus</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/tyrone-erasmus" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/tyrone-erasmus" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/vickie-li</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/vickie-li" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/vickie-li" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/walter-belgers</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/walter-belgers" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/walter-belgers" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/authors/william-l-simon</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/authors/william-l-simon" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/authors/william-l-simon" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/years/2025</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/years/2025" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/years/2025" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/years/2024</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/years/2024" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/years/2024" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/years/2023</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/years/2023" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/years/2023" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/years/2022</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/years/2022" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/years/2022" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/years/2021</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/years/2021" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/years/2021" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/years/2020</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/years/2020" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/years/2020" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/years/2019</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/years/2019" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/years/2019" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/years/2018</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/years/2018" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/years/2018" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/years/2017</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/years/2017" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/years/2017" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/years/2016</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/years/2016" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/years/2016" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/years/2015</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/years/2015" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/years/2015" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/years/2014</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/years/2014" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/years/2014" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/years/2013</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/years/2013" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/years/2013" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/years/2012</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/years/2012" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/years/2012" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/years/2011</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/years/2011" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/years/2011" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/years/2010</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/years/2010" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/years/2010" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/years/2009</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/years/2009" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/years/2009" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/years/2008</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/years/2008" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/years/2008" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/years/2007</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/years/2007" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/years/2007" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/years/2006</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/years/2006" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/years/2006" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/years/2005</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/years/2005" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/years/2005" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/years/2003</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/years/2003" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/years/2003" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/years/2002</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/years/2002" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/years/2002" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/years/1989</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/years/1989" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/years/1989" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/geopolitics</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/geopolitics" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/geopolitics" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/history</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/history" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/history" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/narrative</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/narrative" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/narrative" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/vulnerability-research</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/vulnerability-research" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/vulnerability-research" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/offensive</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/offensive" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/offensive" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/strategy</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/strategy" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/strategy" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/policy</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/policy" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/policy" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/appsec</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/appsec" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/appsec" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/foundations</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/foundations" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/foundations" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/devsecops</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/devsecops" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/devsecops" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/mobile</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/mobile" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/mobile" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/android</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/android" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/android" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/operating-systems</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/operating-systems" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/operating-systems" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/networking</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/networking" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/networking" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/protocol-analysis</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/protocol-analysis" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/protocol-analysis" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/tooling</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/tooling" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/tooling" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/linux</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/linux" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/linux" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/web-security</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/web-security" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/web-security" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/bug-bounty</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/bug-bounty" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/bug-bounty" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/security-architecture</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/security-architecture" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/security-architecture" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/defensive</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/defensive" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/defensive" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/iot</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/iot" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/iot" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/cloud</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/cloud" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/cloud" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/containers</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/containers" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/containers" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/nation-state</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/nation-state" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/nation-state" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/malware</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/malware" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/malware" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/cryptography</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/cryptography" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/cryptography" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/reference</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/reference" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/reference" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/hacktivism</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/hacktivism" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/hacktivism" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/industry</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/industry" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/industry" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/threat-modeling</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/threat-modeling" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/threat-modeling" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/reverse-engineering</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/reverse-engineering" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/reverse-engineering" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/privacy</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/privacy" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/privacy" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/operational-security</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/operational-security" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/operational-security" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/osint</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/osint" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/osint" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/social-engineering</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/social-engineering" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/social-engineering" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/pentesting</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/pentesting" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/pentesting" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/exploitation</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/exploitation" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/exploitation" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/hardware</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/hardware" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/hardware" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/binary-exploitation</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/binary-exploitation" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/binary-exploitation" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/journalism</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/journalism" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/journalism" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/incident-response</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/incident-response" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/incident-response" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/forensics</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/forensics" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/forensics" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/ios</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/ios" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/ios" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/cybercrime</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/cybercrime" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/cybercrime" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/observability</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/observability" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/observability" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/physical-security</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/physical-security" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/physical-security" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/lockpicking</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/lockpicking" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/lockpicking" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/machine-learning</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/machine-learning" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/machine-learning" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/detection</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/detection" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/detection" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/investigations</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/investigations" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/investigations" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/surveillance</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/surveillance" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/surveillance" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/binary-analysis</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/binary-analysis" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/binary-analysis" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/embedded</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/embedded" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/embedded" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/windows-internals</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/windows-internals" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/windows-internals" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/threat-intelligence</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/threat-intelligence" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/threat-intelligence" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/reconnaissance</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/reconnaissance" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/reconnaissance" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/macos</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/macos" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/macos" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/code-auditing</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/code-auditing" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/code-auditing" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/automotive</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/automotive" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/automotive" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/behavioral</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/behavioral" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/behavioral" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/cyberpsychology</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/cyberpsychology" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/cyberpsychology" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/databases</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/databases" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/databases" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/red-team</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/red-team" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/red-team" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/software-engineering</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/software-engineering" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/software-engineering" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/career</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/career" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/career" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/browser-internals</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/browser-internals" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/browser-internals" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/cryptocurrency</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/cryptocurrency" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/cryptocurrency" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/culture</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/culture" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/culture" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/interviews</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/interviews" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/interviews" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/topics/architecture</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/topics/architecture" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/topics/architecture" />
<lastmod>2026-05-05T08:12:45.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/blog</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/blog" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/blog" />
<lastmod>2026-05-04T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/blog/best-osint-books-2026</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/blog/best-osint-books-2026" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/blog/best-osint-books-2026" />
<lastmod>2026-05-04T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/blog/best-cybersecurity-books-2026</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/blog/best-cybersecurity-books-2026" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/blog/best-cybersecurity-books-2026" />
<lastmod>2026-04-30T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/blog/what-to-read-after-hacking-art-of-exploitation</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/blog/what-to-read-after-hacking-art-of-exploitation" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/blog/what-to-read-after-hacking-art-of-exploitation" />
<lastmod>2026-04-30T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://www.cybershelf.org/fr/privacy</loc>
<xhtml:link rel="alternate" hreflang="en" href="https://www.cybershelf.org/en/privacy" />
<xhtml:link rel="alternate" hreflang="fr" href="https://www.cybershelf.org/fr/privacy" />
<lastmod>2026-01-01T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.5</priority>
</url>
</urlset>
