<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://peritoit.com/casos-de-exito/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2024/10/busqueda-ciegas-palabras-clave--1.png</image:loc><image:title>Busqueda ciegas palabras clave</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2018/03/trazas-y-monitorizado.png</image:loc><image:title>trazas y monitorizado</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2018/03/investigacic3b3n-forense-de-dispositivos.png</image:loc><image:title>investigación forense de dispositivos</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2018/03/2-niveles-de-investigacion-forenses.png</image:loc><image:title>2 niveles de investigacion forenses</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/05/localizacion-y-seguimiento-por-antenas-de-comunicacic3b3n.jpg</image:loc><image:title>localizacion y seguimiento por Antenas de Comunicación</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/05/esquema-de-exclusic3b3n-pulsera.jpg</image:loc><image:title>Esquema de Exclusión Pulsera</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/05/analisis-de-ficheros-de-audio.png</image:loc><image:title>Analisis de ficheros de audio</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/05/analisis-ficheros-de-imagenes-y-fotografia.png</image:loc><image:title>Analisis ficheros de imagenes y fotografia</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/05/apropiacion-informacic3b3n-empresa2.png</image:loc><image:title>apropiacion información empresa</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/05/apropiacion-informacic3b3n-empresa1.png</image:loc><image:title>apropiacion información empresa</image:title></image:image><lastmod>2024-11-14T04:00:53+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://peritoit.com/2016/10/25/google-maps-localizacion-y-geoposicion-trayectos-y-tracking-aplicacion-en-peritajes-informaticos/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2016/10/google_maps_rutas_1.png</image:loc><image:title>google_maps_rutas_1</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2016/10/funciones-google-maps.png</image:loc><image:title>funciones-google-maps</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2016/10/tu_cronologia-google-maps.png</image:loc><image:title>tu_cronologia-google-maps</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2016/10/google_maps_vista-peatonal.png</image:loc><image:title>google_maps_vista-peatonal</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2016/10/google_maps_mapa-cartesiano.png</image:loc><image:title>google_maps_mapa-cartesiano</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2016/10/google_maps_y-movil.png</image:loc><image:title>google_maps_y-movil</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2016/10/google_maps_tracking_1.png</image:loc><image:title>google_maps_tracking_1</image:title></image:image><lastmod>2024-11-14T03:46:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/asesoramiento-peritaje-informatico-gratuito/</loc><lastmod>2024-11-13T04:23:39+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://peritoit.com/2024/11/11/estafa-piramidal-evidencias-electronicas/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2024/09/estafa-piramidal_1.png</image:loc><image:title>Estafa Piramidal_1</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2024/09/estafa-piramidal.png</image:loc><image:title>Estafa Piramidal</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2024/09/image-3.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-11-11T14:29:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2014/09/21/estafa-nigeriana-o-estafa-419-y-su-peritaje-informatico/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2014/09/maletin-estafa-nigeriana.jpg</image:loc><image:title>maletin estafa nigeriana</image:title></image:image><lastmod>2024-11-11T09:07:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2013/02/01/las-obsoletas-cartas-nigerianas-son-eficientes-y-rentables/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/02/fraude_cartas_nigerianas.jpg</image:loc><image:title>fraude_cartas_nigerianas</image:title></image:image><lastmod>2024-11-09T14:44:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2013/11/19/vuelve-la-navidad-y-con-ella-la-estafas-de-las-cartas-nigerianas-en-forma-de-loteria/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/11/33-brochure-homelifts-b2c_lr.jpg</image:loc><image:title>33-brochure-homelifts-b2c_LR</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/11/carta-nigeriana.jpg</image:loc><image:title>carta nigeriana</image:title></image:image><lastmod>2024-11-09T14:42:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/peritaje-de-gestion/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/04/desempec3b1os-peritaje-de-gestion-o-management.png</image:loc><image:title>Desempeños peritaje de Gestion o Management</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/04/gestion-proyectos-y-servicios.jpg</image:loc><image:title>Gestion Proyectos y Servicios</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/04/gestion-de-proyectos.png</image:loc><image:title>gestion de proyectos</image:title></image:image><lastmod>2024-11-07T05:39:02+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://peritoit.com/2017/05/29/tipologias-de-los-contratos-segun-la-responsabilidad-de-las-partes/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2017/05/pelea_contrato1.jpg</image:loc><image:title>Pelea_Contrato</image:title></image:image><lastmod>2024-11-07T05:38:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2016/10/31/resolucion-de-contrato-tic-por-incumplimiento-esencial-peritaje-de-gestion-y-management/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2016/10/incumplimiento-esencial1.png</image:loc><image:title>incumplimiento-esencial</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2016/10/incumplimiento-esencial-degradaciones.png</image:loc><image:title>incumplimiento-esencial-degradaciones</image:title></image:image><lastmod>2024-11-07T05:34:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2016/11/08/el-fracaso-de-los-proyectos-tics-y-su-reclamacion-judicial/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2016/11/finalizacic3b3n-por-periodo.png</image:loc><image:title>finalizacion-por-periodo</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2016/11/finalizacic3b3n-por-tamac3b1o.png</image:loc><image:title>finalizacion-por-tamano</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2016/11/tabla-de-riesgos-en-proyectos.png</image:loc><image:title>tabla-de-riesgos-en-proyectos</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2016/11/fracaso-proyecto.png</image:loc><image:title>fracaso-proyecto</image:title></image:image><lastmod>2024-11-07T05:32:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2024/10/14/implantacion-software-el-fracaso-de-los-proyectos-incumplimiento-de-requerimientos/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2024/10/fracaso-proyectos-1.png</image:loc><image:title>Fracaso Proyectos</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2024/10/cronograma-de-eventos.png</image:loc><image:title>Cronograma de eventos</image:title></image:image><lastmod>2024-11-07T05:29:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2024/11/05/tratamiento-de-las-penalizaciones-a-proveedores-en-los-contratos-de-proyectos-tic/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2019/10/penalizaciones-en-proyectos.png</image:loc><image:title>PENALIZACIONES EN PROYECTOS</image:title></image:image><lastmod>2024-11-07T05:27:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2015/12/14/cliente-y-proveedor-de-software-pulso-de-expectativas-peritaje-de-gestion-o-management/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2015/12/propuesta-y-contrato1.png</image:loc><image:title>Propuesta y Contrato</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2015/12/contrato-y-desacuerdo.png</image:loc><image:title>Contrato y desacuerdo</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2015/12/ciclo-de-expectativas-coche-amarillo.png</image:loc><image:title>Ciclo de Expectativas coche amarillo</image:title></image:image><lastmod>2024-11-07T05:25:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2015/10/27/peritaje-de-gestion-o-management-una-especialidad-del-perito-informatico/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2015/10/proyectos-servicios-y-contratos-tics.png</image:loc><image:title>Proyectos servicios y contratos tics</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2015/10/peritaje-de-gestion-y-management.png</image:loc><image:title>Peritaje de Gestion y Management</image:title></image:image><lastmod>2024-11-07T05:21:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2019/04/09/la-reingeneria-inversa-en-el-plagio-de-software/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2019/04/extracto-comparativa-funcionalidad.jpg</image:loc><image:title>Extracto Comparativa Funcionalidad</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2019/04/extracto-comparativa-lookfeel.jpg</image:loc><image:title>Extracto Comparativa Lookfeel</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2019/04/reingenieria-y-plagio.jpg</image:loc><image:title>rEINGENIERIA Y pLAGIO</image:title></image:image><lastmod>2024-11-07T05:05:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2014/04/27/el-peritaje-de-la-propiedad-intelectual-una-especializacion-del-peritaje-informatico-y-tecnologico/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2014/04/propiedad_intelectual_cadenas__big.jpg</image:loc><image:title>propiedad_intelectual_cadenas__big</image:title></image:image><lastmod>2024-11-07T05:02:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2024/10/29/suplantacion-de-identidad-en-redes-sociales-perfiles-falsos/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2024/10/suplantar-identidad.png</image:loc><image:title>Suplantar identidad</image:title></image:image><lastmod>2024-11-04T02:39:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2024/10/08/nuevo-sistema-de-pulseras-telematicas-de-control-de-condena-cometa/</loc><lastmod>2024-10-22T02:23:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2018/10/02/incoherencias-en-el-sistema-cometa-de-control-de-pulseras-de-alejamiento/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2018/10/pulseras_funcionan_.png</image:loc><image:title>Pulseras_Funcionan_</image:title></image:image><lastmod>2024-10-22T02:22:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2017/07/17/las-pulseras-electronicas-de-proximidad-y-el-quebrantamiento-de-condena/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2017/07/dispositivos-electrc3b3nicos-control-proximidad1.jpg</image:loc><image:title>Dispositivos electrónicos control proximidad</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2017/07/pulsera-y-quebrantamiento-de-delito.jpg</image:loc><image:title>Pulsera y quebrantamiento de delito</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2017/07/funcionamiento-sistema-de-control-proximidad.jpg</image:loc><image:title>funcionamiento sistema de control proximidad</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2017/07/distancia-gps-frente-a-recorrido.jpg</image:loc><image:title>distancia GPS frente a recorrido</image:title></image:image><lastmod>2024-10-22T02:18:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2016/08/01/la-manipulacion-de-mensajes-de-whatsapp/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2016/08/manipulacion_whatsapp.png</image:loc><image:title>Manipulacion_WhatsApp</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2016/07/emoticones_whatsapp.png</image:loc><image:title>Emoticones_WhatsApp</image:title></image:image><lastmod>2024-10-22T02:06:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2017/04/24/las-conversaciones-falsas-de-whatsapp/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2017/04/whatsapp_falso.jpg</image:loc><image:title>whatsapp_falso</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2017/04/conversaciones_whatsapp_simuladas.jpg</image:loc><image:title>Conversaciones_WhatsApp_Simuladas</image:title></image:image><lastmod>2024-10-22T02:02:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2016/02/15/las-evidencias-via-whatsapp/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2016/02/captura-evidencias-whatsapp1.png</image:loc><image:title>Captura evidencias WhatsApp</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2016/02/captura-y-analisis-whatsapp.png</image:loc><image:title>Captura y Analisis WhatsApp</image:title></image:image><lastmod>2024-10-22T02:02:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2024/10/22/los-usos-de-los-algoritmos-hash-o-funciones-resumen/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2024/10/transformacion-hash.png</image:loc><image:title>Transformación Hash</image:title></image:image><lastmod>2024-10-22T01:52:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2016/05/23/funciones-hash-en-la-investigacion-forense/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2016/05/algoritmo_md52.png</image:loc><image:title>Algoritmo_MD5</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2016/05/algoritmos_hash.png</image:loc><image:title>Algoritmos_hash</image:title></image:image><lastmod>2024-10-22T01:48:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2012/07/03/ciberbullying-cuando-la-crueldad-se-genera-entre-los-menores/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/07/ciberbullying.png</image:loc><image:title>ciberbullying</image:title></image:image><lastmod>2024-10-09T09:41:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2012/10/23/isoiec-270372012-nueva-norma-para-la-recopilacion-de-evidencias/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/10/caracterc3adsitcas-de-la-evidencia-telemc3a1tica.png</image:loc><image:title>Caracterísitcas de la evidencia telemática</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/10/procesos-iso-27037.png</image:loc><image:title>procesos ISO-27037</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/10/tipologia-dispositivos-iso-27037.png</image:loc><image:title>Tipologia dispositivos ISo-27037</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/10/iso-27037.png</image:loc><image:title>ISO 27037</image:title></image:image><lastmod>2024-10-09T09:34:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2024/10/09/iso-eic-270322012-contenido-parte-iii/</loc><lastmod>2024-10-09T09:32:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2024/10/09/iso-eic-270322012-contenido-parte-iv/</loc><lastmod>2024-10-09T09:31:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2024/10/09/iso-eic-270322012-contenido-parte-ii/</loc><lastmod>2024-10-09T09:28:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2024/10/09/iso-eic-270322012-contenido-parte-i/</loc><lastmod>2024-10-09T09:24:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2019/09/03/estafa-por-suplantacion-de-facturas-en-correos-electronicos/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2019/09/factura-manipulada-en-correo.png</image:loc><image:title>Factura Manipulada en Correo</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2019/09/esquema-mitm-en-estafa-de-facturas-en-correos-electrc3b3nicos.png</image:loc><image:title>Esquema MitM en estafa de facturas en correos electrónicos</image:title></image:image><lastmod>2024-10-05T08:59:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/peritaje-extrajudicial/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/04/peritaje-extrajudicial.jpg</image:loc><image:title>Peritaje extrajudicial</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/04/el-arbitraje.jpg</image:loc><image:title>el arbitraje</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/04/auditoria.jpg</image:loc><image:title>auditoria</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/04/uso-futuro.jpg</image:loc><image:title>uso futuro</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/04/peritajes-y-conflictos.jpg</image:loc><image:title>Peritajes y conflictos</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/04/arbitraje.jpg</image:loc><image:title>Arbitraje</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/04/mediacion.png</image:loc><image:title>mediacion</image:title></image:image><lastmod>2024-10-05T08:55:50+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://peritoit.com/2014/07/23/localizacion-y-posicionamiento-por-medio-de-llamadas-telefonicas-peritaje-informatico-y-tecnologico/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2014/07/esquema-de-localizacion-por-telefonia-y-antena.png</image:loc><image:title>Esquema de Localizacion por telefonia y antena</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2014/07/telefono-y-antena.png</image:loc><image:title>telefono y antena</image:title></image:image><lastmod>2024-10-05T08:44:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2017/09/22/elementos-de-localizacion-por-posicionamiento-telefonico/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2017/09/mapa-de-localizacic3b3n-de-llamadas1.jpg</image:loc><image:title>Mapa de Localización de llamadas</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2017/09/localizacion-por-mensajeria.jpg</image:loc><image:title>localizacion por mensajeria</image:title></image:image><lastmod>2024-10-05T08:44:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2024/09/19/10o-aniversario-de-peritoit-iniciativa-de-consultas-y-peritajes-informaticos-gratis/</loc><lastmod>2024-10-05T08:36:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/peritaje-judicial/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/04/perito-judicial.jpg</image:loc><image:title>perito judicial</image:title></image:image><lastmod>2024-10-05T08:16:27+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://peritoit.com/peritaje-forense/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/04/desempec3b1o-peritaje-forense.png</image:loc><image:title>desempeño peritaje forense</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/04/peritaje-forense.jpg</image:loc><image:title>peritaje forense</image:title></image:image><lastmod>2024-10-05T07:56:43+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://peritoit.com/2019/10/16/la-privacidad-de-los-trabajadores-en-los-medios-de-la-empresa/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2019/09/privacidad-empleado.png</image:loc><image:title>pRIVACIDAD eMPLEADO</image:title></image:image><lastmod>2024-10-04T01:54:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2024/09/24/estafa-economica-via-virus-fedex-correo-y-otras-apps-de-mensajeria/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2024/09/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-10-02T07:02:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2024/10/02/phishing-en-estafa-bancaria-recuperacion-del-dinero-estafado/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2024/09/image-2.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2024/09/image-1.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-10-02T06:51:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2013/09/02/cuanto-cuesta-un-peritaje-una-pericia-o-informe-pericial/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/09/coste-presupuesto.jpg</image:loc><image:title>coste presupuesto</image:title></image:image><lastmod>2024-09-26T13:43:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/portafolio-de-servicios/</loc><lastmod>2024-09-26T13:38:17+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://peritoit.com/2024/09/17/ciberbullying-en-menores-responsabilidades-derivadas/</loc><lastmod>2024-09-19T16:35:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/contacto/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/foto-rlr.jpg</image:loc><image:title>foto RLR</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/twitter-logo.png</image:loc><image:title>twitter-logo</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/skype-800x600.jpg</image:loc><image:title>Skype-800x600</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/ser-diferente-multicolor.jpg</image:loc><image:title>Ser diferente multicolor</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/telf-movil.jpg</image:loc><image:title>telf movil</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/movil.png</image:loc><image:title>movil</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/correo-electronico.png</image:loc><image:title>correo electronico</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/diferente.png</image:loc><image:title>diferente</image:title></image:image><lastmod>2024-09-19T07:50:33+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://peritoit.com/consulta/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/dudas.jpg</image:loc><image:title>dudas</image:title></image:image><lastmod>2024-09-19T07:45:12+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://peritoit.com/consulta-2/</loc><lastmod>2024-09-19T04:48:52+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://peritoit.com/tarjetas/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2024/09/tarjeta_rafael_lopez.png</image:loc><image:title>Tarjeta_Rafael_Lopez</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/tarjetas-perito-y-organizacion.jpg</image:loc><image:title>Tarjetas Perito y Organizacion</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/tarjeta-perito-rafael-lc3b3pez.jpg</image:loc><image:title>Tarjeta Perito Rafael López</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/tarjeta.jpg</image:loc><image:title>tarjeta</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/tarjeta-organizacion.png</image:loc><image:title>Tarjeta Organizacion</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/tarjeta-perito.png</image:loc><image:title>Tarjeta Perito</image:title></image:image><lastmod>2024-09-17T04:04:41+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://peritoit.com/formacion/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/medalla.png</image:loc><image:title>medalla</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/udima.png</image:loc><image:title>Udima</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/huella-disco.png</image:loc><image:title>huella disco</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/otros.jpg</image:loc><image:title>otros</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/masters.jpg</image:loc><image:title>Masters</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/idiomas.jpg</image:loc><image:title>idiomas</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/certificaciones.jpg</image:loc><image:title>certificaciones</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/postgraduados.jpg</image:loc><image:title>postgraduados</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/titulacion-universitaria.png</image:loc><image:title>titulacion universitaria</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/estudios.jpg</image:loc><image:title>Estudios</image:title></image:image><lastmod>2024-09-17T03:55:26+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://peritoit.com/2019/11/18/grabaciones-a-los-trabajadores-tedh-caso-lopez-ribalda-y-otros-contra-espana/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2019/10/videovigilancia-en-el-trabajo.png</image:loc><image:title>Videovigilancia en el trabajo</image:title></image:image><lastmod>2019-11-18T04:32:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/ambitos/</loc><lastmod>2019-10-23T05:58:01+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://peritoit.com/servicios-3/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/servicios-adicionales.jpg</image:loc><image:title>servicios adicionales</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/pensando.jpg</image:loc><image:title>pensando</image:title></image:image><lastmod>2019-10-23T05:56:42+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://peritoit.com/mediacion-y-arbitraje/</loc><lastmod>2019-10-23T05:51:04+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://peritoit.com/este-blog/</loc><lastmod>2019-10-22T04:30:48+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://peritoit.com/conferencias/</loc><lastmod>2019-10-22T04:28:28+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://peritoit.com/experiencia/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/01/rafael_escritorio.png</image:loc><image:title>Rafael López</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/areas-funcionales2.jpg</image:loc><image:title>areas funcionales</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/areas-funcionales1.jpg</image:loc><image:title>areas funcionales</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/sectores1.jpg</image:loc><image:title>Sectores</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/sectores.jpg</image:loc><image:title>Sectores</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/areas-funcionales.jpg</image:loc><image:title>areas funcionales</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/gestion-de-proyectos.png</image:loc><image:title>gestion de proyectos</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/entorno-multinacional.jpg</image:loc><image:title>entorno multinacional</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/bagaje-profesional.png</image:loc><image:title>miscelanea</image:title></image:image><lastmod>2019-10-17T04:15:14+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://peritoit.com/2019/04/03/coherencia-en-la-valoracion-del-software-implantado-o-entregado/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2019/03/esquema-de-proceso-de-validacion-de-las-coherencias-1.jpg</image:loc><image:title>Esquema de Proceso de Validacion de las Coherencias</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2019/03/valoracion-software.jpg</image:loc><image:title>Valoracion Software</image:title></image:image><lastmod>2019-04-07T05:52:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/libros/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2017/12/portada-libro-de-esquemas.png</image:loc><image:title>Portada Libro de Esquemas</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/caratula-frontal-libro-pi.jpg</image:loc><image:title>caratula frontal Libro PI</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/expedientes.jpg</image:loc><image:title>expedientes</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/peritajes_informaticos.jpg</image:loc><image:title>peritajes_informaticos</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/distinto.png</image:loc><image:title>distinto</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/libros.jpg</image:loc><image:title>Libros</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/portada-de-dictamen-de-peritos-en-la-ley-1-2000.png</image:loc><image:title>Portada de Dictamen de Peritos en la Ley 1-2000</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/portada-la-peritacion-informatica.png</image:loc><image:title>Portada la Peritacion Informatica</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/manual-basico-de-perito-judicial1.png</image:loc><image:title>Manual basico de perito judicial</image:title></image:image><lastmod>2019-03-29T12:57:35+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://peritoit.com/2012/07/23/norma-isoiec-15408-common-criteria/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/07/common-criteria-unificacion-normativa.jpg</image:loc><image:title>Common Criteria Unificacion Normativa</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/07/common-criteria-unificacion-normativa.png</image:loc><image:title>Common Criteria Unificacion Normativa</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/07/common-criteria-certificacion.png</image:loc><image:title>Common Criteria Certificacion</image:title></image:image><lastmod>2018-12-06T04:24:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2014/06/12/directiva-201340eu-relativa-a-los-ataques-contra-sistemas-de-informacion-y-el-peritaje-informatico/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2014/06/directiva_2013_40_ue_parlamento_europeo.png</image:loc><image:title>DIRECTIVA_2013_40_UE_Parlamento_Europeo</image:title></image:image><lastmod>2018-12-06T04:17:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2016/07/13/absolucion-por-falta-de-garantias-en-la-cadena-de-custodia/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2016/07/absolucion-anonymous.png</image:loc><image:title>Absolucion Anonymous</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2016/07/cadena-de-custodia.png</image:loc><image:title>Cadena de Custodia</image:title></image:image><lastmod>2018-12-06T03:35:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2018/12/03/resolucion-de-la-aepd-sobre-la-publicacion-de-una-sentencia-en-facebook/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2018/12/resolucic3b3n-aepd.png</image:loc><image:title>Resolución AEPD</image:title></image:image><lastmod>2018-12-04T04:20:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2018/11/07/las-ayudas-del-plan-avanza-y-las-resoluciones-de-reintegro/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2018/11/plan-avanza.png</image:loc><image:title>Plan Avanza</image:title></image:image><lastmod>2018-11-07T05:50:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2013/09/19/sancion-de-la-cnc-por-valor-de-30-000-e-por-fijar-los-honorarios-de-los-peritos/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/09/captura_plagio-articulo-de-la-antpji.png</image:loc><image:title>Captura_Plagio articulo de la ANTPJI</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/09/recibo-electronico.jpg</image:loc><image:title>recibo electronico</image:title></image:image><lastmod>2018-10-20T05:03:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2018/04/02/norma-iso-27018-el-rgpd-y-su-impacto-en-los-servicios-prestados-en-la-nube/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2018/04/normas-servicio-en-nube1.png</image:loc><image:title>Normas Servicio en Nube</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2018/04/responsabilidades-en-la-nube1.png</image:loc><image:title>Responsabilidades en la Nube</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2018/04/cuadro-normas-iso-para-servicios-tic1.png</image:loc><image:title>Cuadro Normas ISO para servicios TIC</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2018/04/rgpd_iso_nube.png</image:loc><image:title>rgpd_iso_nube</image:title></image:image><lastmod>2018-05-04T07:30:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2018/04/16/grabaciones-conversaciones-telefonicas-por-parte-de-una-madre-a-una-menor/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2018/04/padres-controlando-a-menores.png</image:loc><image:title>Padres Controlando a menores</image:title></image:image><lastmod>2018-04-29T07:02:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/clasificacion/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/04/clasificacion-especialidad.jpg</image:loc><image:title>clasificacion especialidad</image:title></image:image><lastmod>2018-04-21T10:20:18+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://peritoit.com/2016/10/17/norma-une-1970102015-para-la-elaboracion-de-informes-periciales-tic/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2016/10/foto_expediente_pericial.jpg</image:loc><image:title>foto_expediente_pericial</image:title></image:image><lastmod>2018-04-21T10:14:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2012/05/10/informe-o-dictamen-pericial-une-1970012011-ay-que-me-da-la-risa/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/05/raspa-de-pescado.jpg</image:loc><image:title>raspa de pescado</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/05/que-me-parto-de-risa.jpg</image:loc><image:title>que me parto de risa</image:title></image:image><lastmod>2018-04-21T10:13:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2018/01/16/capturas-de-evidencias-web-notario-vs-perito-informatico/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2018/01/perito-vs-notario.png</image:loc><image:title>Perito vs Notario</image:title></image:image><lastmod>2018-04-19T04:36:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2013/01/28/el-fraude-a-traves-de-internet-unas-cifras-y-tendencias-orientativas/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/01/fraude-en-internet.png</image:loc><image:title>fraude en internet</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/01/formas-adoptadas-por-los-remitentes.png</image:loc><image:title>formas adoptadas por los remitentes</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/01/evolucic3b3n-de-los-equipos-infectados.png</image:loc><image:title>evolución de los equipos infectados</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/01/evolucion-de-la-incidencia-de-los-intentos-de-fraudes.png</image:loc><image:title>evolucion de la incidencia de los intentos de fraudes</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/01/impacto-de-los-fraudes.png</image:loc><image:title>Impacto de los fraudes</image:title></image:image><lastmod>2018-04-19T04:28:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2016/04/18/7-debilidades-del-informe-pericial/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2016/04/7-debilidades-del-informe.png</image:loc><image:title>7 DEBILIDADES DEL INFORME</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2016/04/imagen-7-debilidades.png</image:loc><image:title>IMAGEN 7 DEBILIDADES</image:title></image:image><lastmod>2018-04-18T03:45:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2012/12/09/seguridad-informatica-herramientas-de-test-de-penetracion-penetration-test/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/12/penetration-testing.jpg</image:loc><image:title>Penetration Testing</image:title></image:image><lastmod>2018-04-16T05:57:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2013/12/08/utilizacion-de-un-programa-espia-para-el-despido-por-uso-indebido-de-medios-de-la-empresa/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/12/despido-laboral.jpg</image:loc><image:title>despido laboral</image:title></image:image><lastmod>2018-04-16T05:56:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/acronimos/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/04/acronimos_siglas.jpg</image:loc><image:title>acronimos_siglas</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/04/acronimos-y-siglas.jpg</image:loc><image:title>acronimos y siglas</image:title></image:image><lastmod>2018-04-15T05:05:32+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://peritoit.com/2012/06/18/footprinting-informatico-primer-paso-del-pentest-o-test-de-intrusion/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/06/footprinting-informatico1.jpg</image:loc><image:title>footprinting informatico</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/06/footprinting-informatico.jpg</image:loc><image:title>footprinting informatico</image:title></image:image><lastmod>2018-04-15T05:02:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2012/12/21/las-pruebas-tecnologicas-en-el-proceso-judicial/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/12/la-prueba-tecnolc3b3gica1.jpg</image:loc><image:title>La Prueba Tecnológica</image:title></image:image><lastmod>2018-04-14T06:23:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2014/08/25/el-troyano-koler-el-virus-de-la-policia-un-ejemplo-de-superacion/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2014/08/koler-pantalla-espac3b1a1.png</image:loc><image:title>koler pantalla España</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2014/08/koler-virus.png</image:loc><image:title>Koler virus</image:title></image:image><lastmod>2018-04-14T06:22:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2018/01/22/la-cadena-de-custodia-en-dispositivos-informaticos-danados/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2018/01/custodia_dispositivos_dac3b1ados_pequec3b1o.png</image:loc><image:title>Custodia_Dispositivos_Dañados_pequeño</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2018/01/fases_cadena_custodia_dispositivos_dac3b1ados.png</image:loc><image:title>Fases_Cadena_Custodia_Dispositivos_dañados</image:title></image:image><lastmod>2018-04-14T06:21:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2013/05/15/el-fruto-del-arbol-envenenado-en-el-peritaje-informatico-y-tecnologico/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/05/elfruto-envenenado.jpg</image:loc><image:title>SONY DSC</image:title></image:image><lastmod>2018-04-14T06:19:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2018/03/26/phishing-con-dominios-y-url-con-punto-bajo/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2018/03/caracteres-unicode-con-puntos.png</image:loc><image:title>Caracteres unicode con puntos</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2018/03/url_www_nike_com_zapatos-gratis.png</image:loc><image:title>URL_www_nike_com_zapatos-gratis</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2018/03/pantalla_url_www_nike_com_zapatos-gratis.png</image:loc><image:title>Pantalla_URL_www_nike_com_zapatos-gratis</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2018/03/url_nike_punto_bajo.png</image:loc><image:title>URL_nike_punto_Bajo</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2018/03/pantalla_url_nike-punto-bajo.png</image:loc><image:title>Pantalla_URL_nike punto bajo</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2018/03/phishing-punto-bajo.png</image:loc><image:title>Phishing punto bajo</image:title></image:image><lastmod>2018-04-13T01:40:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2013/05/28/radiografia-a-los-correos-electronicos-que-esconden/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/05/nivel-de-manipulacion-del-correo1.png</image:loc><image:title>nivel de  manipulacion del correo</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/05/nivel-de-manipulacion-del-correo.png</image:loc><image:title>nivel de  manipulacion del correo</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/05/analisis-de-correo.jpg</image:loc><image:title>analisis de correo</image:title></image:image><lastmod>2018-04-11T15:03:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2013/09/12/cuanto-vale-mi-pagina-web/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/09/venta-pagina-web.gif</image:loc><image:title>Venta pagina Web</image:title></image:image><lastmod>2018-04-11T05:50:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2017/06/05/cuanto-vale-una-aplicacion-informatica-desarrollo-o-producto-finalizado/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2017/06/aplicacion-informativa-y-dinero.jpg</image:loc><image:title>Aplicacion informativa y dinero</image:title></image:image><lastmod>2018-04-11T05:49:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2013/10/17/cuanto-vale-o-cual-es-el-precio-de-un-dominio-web/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/10/registro-de-dominio.jpg</image:loc><image:title>registro-de-dominio</image:title></image:image><lastmod>2018-04-11T05:49:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2017/12/13/cuando-es-necesario-un-peritaje-informatico-en-mi-empresa/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2017/12/peritaje-en-empresa_pequec3b1o.png</image:loc><image:title>Peritaje en Empresa_pequeño</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2017/12/esquema-peritaje-forense.png</image:loc><image:title>Esquema Peritaje Forense</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2017/12/esquema-peritaje-de-gestion.png</image:loc><image:title>Esquema Peritaje de Gestion</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2017/12/tipologc3ada-de-las-problemc3a1ticas.png</image:loc><image:title>Tipología de las Problemáticas</image:title></image:image><lastmod>2018-04-11T05:39:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2014/04/18/las-4-fcs-de-un-informe-pericial/</loc><lastmod>2018-04-11T05:36:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2017/10/03/normativa-de-seguridad-sobre-el-iot-internet-de-las-cosas-internet-of-things/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2017/09/normativa-iot.jpg</image:loc><image:title>Normativa IoT</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2017/09/internet-of-things.jpg</image:loc><image:title>Internet-of-things</image:title></image:image><lastmod>2018-04-11T05:29:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2017/12/04/los-riesgos-de-la-monitorizacion-de-los-dispositivos-de-los-empleados/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2017/12/monitorizacion-empleado.jpg</image:loc><image:title>Monitorizacion empleado</image:title></image:image><lastmod>2018-04-10T09:52:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2018/02/04/secreto-de-las-comunicaciones-en-los-medios-de-mensajeria-instantanea/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2018/02/secreto-de-las-comunicaciones.png</image:loc><image:title>Secreto de las Comunicaciones</image:title></image:image><lastmod>2018-04-10T09:41:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2018/04/08/pericial-informatica-documental-caso-sra-cifuentes/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2018/04/matricula_cifuentes_ediima20180321_0962_5.jpg</image:loc><image:title>MAtricula_Cifuentes_EDIIMA20180321_0962_5</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2018/04/calificaciones_cifuentes_15216646511848.jpg</image:loc><image:title>Calificaciones_cifuentes_15216646511848</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2018/04/examen_matricula.png</image:loc><image:title>Examen_Matricula</image:title></image:image><lastmod>2018-04-08T21:41:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2013/04/22/el-peritaje-informatico-en-la-practica-forense-contable-y-empresarial/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/04/analisis-contable.png</image:loc><image:title>analisis contable</image:title></image:image><lastmod>2018-04-04T01:05:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2018/03/19/la-ciberseguridad-en-la-empresa/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2018/03/ciberseguridad.png</image:loc><image:title>CIBERSEGURIDAD</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2018/03/ciberseguridad_situacion.png</image:loc><image:title>Ciberseguridad_situacion</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2018/03/set-de-ciberseguridad.png</image:loc><image:title>Set de Ciberseguridad</image:title></image:image><lastmod>2018-03-19T09:06:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2017/09/07/control-de-las-comunicaciones-de-los-empleados-vulneracion-de-derechos/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2017/09/corte-europea.jpg</image:loc><image:title>Corte Europea</image:title></image:image><lastmod>2018-03-06T07:12:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2018/02/26/el-tecnico-o-perito-informatico-en-el-modelo-de-compliance-penal-de-la-empresa/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2018/02/compliance-experto-informc3a1tico2.png</image:loc><image:title>Compliance Experto Informático</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2018/02/tecnologias-tics-y-compliance.png</image:loc><image:title>TECNOLOGIAS TICs Y COMPLIANCE</image:title></image:image><lastmod>2018-03-04T05:08:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2018/02/18/la-utilizacion-del-whatsapp-como-canal-de-comunicacion-en-el-trabajo/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2018/02/whatsapp-en-el-trabajo.png</image:loc><image:title>Whatsapp en el trabajo</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2018/02/contexto-whatsapp-en-el-trabajo.png</image:loc><image:title>Contexto Whatsapp en el trabajo</image:title></image:image><lastmod>2018-02-23T16:25:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2015/11/10/prevencion-de-riesgos-informaticos-protocolos-de-cese-de-empleados-en-la-empresa/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2015/11/objetivo-del-retorno-de-equipos.png</image:loc><image:title>objetivo del retorno de equipos</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2015/11/onmia-mea-mecum-porto.png</image:loc><image:title>Onmia mea mecum porto</image:title></image:image><lastmod>2018-02-23T05:21:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2016/05/12/la-privacidad-en-el-correo-electronico-de-la-empresa/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2016/05/correo-electronico-de-la-empresa.png</image:loc><image:title>Correo electronico de la Empresa</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2016/05/privacidad-correo.png</image:loc><image:title>privacidad correo</image:title></image:image><lastmod>2018-02-23T05:20:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2016/07/11/grabacion-de-conversacion-por-un-empleado-en-la-empresa/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2016/07/grabaciones_empresa_pequec3b1o.png</image:loc><image:title>grabaciones_empresa_pequeño</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2016/07/grabaciones_empresa.png</image:loc><image:title>grabaciones_empresa</image:title></image:image><lastmod>2018-02-23T05:18:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2018/02/12/difusion-de-pornografia-infantil-con-buena-intencion/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2018/02/pornografc3ada-infantil-pederastia.png</image:loc><image:title>Pornografía Infantil pederastia</image:title></image:image><lastmod>2018-02-14T06:30:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/estudios-y-guias/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/04/informes-y-guias.jpg</image:loc><image:title>informes y guias</image:title></image:image><lastmod>2018-02-14T06:27:53+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://peritoit.com/2017/11/29/el-peritaje-informatico-en-la-violencia-de-genero/</loc><lastmod>2018-01-16T07:06:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2017/11/01/el-delito-de-stalking-hostigamiento-cibernetico-segun-la-jurisprudencia/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2017/09/stalkin-u-hostigamiento.jpg</image:loc><image:title>Stalkin u Hostigamiento</image:title></image:image><lastmod>2017-11-29T03:53:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/el-cajon/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/cajones.jpg</image:loc><image:title>cajones</image:title></image:image><lastmod>2017-09-15T05:33:41+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://peritoit.com/2013/02/25/direccion-ip-la-huella-digital-telematica-del-criminal/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/02/estafa-cibernetica-con-usurpacic3b3n-de-ip.png</image:loc><image:title>estafa cibernetica con usurpación de IP</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/02/ip-huella-digital.png</image:loc><image:title>IP huella digital</image:title></image:image><lastmod>2017-05-04T17:18:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2017/05/03/delito-de-estafa-con-o-por-medios-informaticos/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2017/05/estafa_con_y_por_medios_informc3a1ticos.jpg</image:loc><image:title>Estafa_CON_y_POR_medios_informáticos</image:title></image:image><lastmod>2017-05-03T08:09:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2016/11/30/gastos-inesperados-de-roaming-o-de-navegacion-por-internet/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2016/11/flujo-servicio-roaming2.png</image:loc><image:title>flujo-servicio-roaming</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2016/11/evidencias-servicio-roaming2.png</image:loc><image:title>evidencias-servicio-roaming</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2016/11/roaming.png</image:loc><image:title>roaming</image:title></image:image><lastmod>2016-12-08T04:18:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2014/10/12/delito-de-descubrimiento-y-revelacion-de-secretos-via-sexting-no-autorizado/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2014/10/sexting-no-autorizado.jpg</image:loc><image:title>Sexting no autorizado</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2014/10/fichero-avi.jpg</image:loc><image:title>fichero avi</image:title></image:image><lastmod>2016-10-22T15:50:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2015/11/03/el-derecho-al-olvido-y-las-hemerotecas-digitales/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2015/10/derecho-al-olvido-y-hemerotecas.png</image:loc><image:title>Derecho al Olvido y Hemerotecas</image:title></image:image><lastmod>2016-10-22T15:36:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2014/05/18/el-rol-del-peritaje-informatico-en-el-derecho-al-olvido/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2014/05/derecho-al-olvido.jpg</image:loc><image:title>derecho-al-olvido</image:title></image:image><lastmod>2016-10-22T15:30:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2015/11/23/grooming-via-facebook/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2015/11/facebook-y-grooming.png</image:loc><image:title>Facebook y Grooming</image:title></image:image><lastmod>2016-10-22T15:22:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2015/12/05/acoso-o-stalking-acoso-en-la-red-o-cyberstalking/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2015/12/esquema-de-cyberstalking.png</image:loc><image:title>Esquema de Cyberstalking</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2015/12/cyberstalking.png</image:loc><image:title>Cyberstalking</image:title></image:image><lastmod>2016-10-22T15:07:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2016/08/11/taller-sobre-correos-electronicos-y-whatsapps/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2016/08/dsc01587.jpg</image:loc><image:title>DSC01587</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2016/08/taller.png</image:loc><image:title>Taller</image:title></image:image><lastmod>2016-08-13T06:32:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2016/06/29/el-estandar-de-la-prueba-electronica/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2016/06/estandar-de-prueba.png</image:loc><image:title>Estandar de Prueba</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2016/06/pequec3b1o_estandar-de-la-prueba-electrc3b3nica.png</image:loc><image:title>pequeño_estandar de la prueba electrónica</image:title></image:image><lastmod>2016-07-31T16:38:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2015/12/21/evidencia-recibida-sin-garantias/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2015/12/flujorama-de-la-captura-de-evidencias3.png</image:loc><image:title>Flujorama de la captura de evidencias</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2015/12/manipulacic3b3n-cortar-y-pegar.png</image:loc><image:title>Manipulación cortar y pegar</image:title></image:image><lastmod>2016-06-10T04:15:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2016/05/31/peritaje-informatico-y-tecnologico-entrevista/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2016/05/noticia-periodico.png</image:loc><image:title>noticia periodico</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2016/05/peritaje-informatico-y-tecnologico-noticia.png</image:loc><image:title>peritaje informatico y tecnologico noticia</image:title></image:image><lastmod>2016-05-31T20:31:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2014/09/09/la-cadena-de-custodia-es-una-garantia-formal-pero-no-es-una-prueba/</loc><lastmod>2016-04-24T17:38:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2015/11/12/criminalidad-informatica-en-2014-en-espana-informe-del-ministerio-fiscal/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2015/11/grafica-de-expedientes-incoados.png</image:loc><image:title>Grafica de Expedientes incoados</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2015/11/expedientes-incoados_pag_592.png</image:loc><image:title>Expedientes incoados_Pag_592</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2015/11/memoria-fiscal-2015png.png</image:loc><image:title>Memoria Fiscal 2015PNG</image:title></image:image><lastmod>2015-11-16T06:43:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2013/01/13/el-perito-obedece-a-quien-le-paga-la-verdad-circunstanciada/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/01/el-perito-obedece-a-quien-le-paga.png</image:loc><image:title>El perito obedece a quien le paga</image:title></image:image><lastmod>2015-11-10T03:00:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2014/12/21/picnic4working-marco-legal-para-la-innovacion-y-el-papel-de-las-tics/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2014/12/lineas-de-desarrollo-profesional-de-la-seguridad.png</image:loc><image:title>Lineas de desarrollo profesional de la Seguridad</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2014/12/innovacion_tic.png</image:loc><image:title>Innovacion_TIC</image:title></image:image><lastmod>2014-12-21T09:47:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2014/04/19/mejor-libro-de-peritaje-informatico-premio-de-la-catedra-de-udima/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2014/04/entrega-premio-udima.png</image:loc><image:title>Entrega Premio UDIMA</image:title></image:image><lastmod>2014-08-17T18:31:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2014/08/13/despido-sin-preservar-las-evidencias-informaticas/</loc><lastmod>2014-08-13T07:43:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2014/08/05/el-tratamiento-de-la-calidad-de-imagenes-para-procesos-judiciales/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2014/08/fantasma-radiografia.jpg</image:loc><image:title>fantasma-radiografia</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2014/08/interpolacion_1.png</image:loc><image:title>interpolacion_1</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2014/08/ojo-reflejo_thumb3.jpg</image:loc><image:title>ojo-reflejo_thumb[3]</image:title></image:image><lastmod>2014-08-10T07:29:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2014/08/05/la-pericia-informatica-que-han-de-saber-los-abogados/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2014/08/seminari_pericia_informatica_11072014_006.jpg</image:loc><image:title>Seminari_Pericia_Informatica_11072014_006</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2014/08/luz-y-sombras.jpg</image:loc><image:title>luz y sombras</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2014/08/rorschach.gif</image:loc><image:title>rorschach</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2014/08/ley-sinde-rechazo.png</image:loc><image:title>ley-sinde-rechazo</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2014/08/imagen-de-humo.jpg</image:loc><image:title>imagen de humo</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2014/08/efecto-optico-sombra-y-cuadricula.png</image:loc><image:title>efecto optico sombra y cuadricula</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2014/08/brillo-y-contraste.png</image:loc><image:title>brillo y contraste</image:title></image:image><lastmod>2014-08-05T08:13:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/amigos/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/06/amigos-y-colegas.jpg</image:loc><image:title>amigos y colegas</image:title></image:image><lastmod>2014-07-24T05:59:21+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://peritoit.com/2014/07/20/curso-de-ciberseguridad-y-pericia-tecnologica-de-la-unia/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2014/07/logo_cv_blanco_100.png</image:loc><image:title>logo_CV_blanco_100</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2014/07/img_1690.jpg</image:loc><image:title>charla UNIA Malaga</image:title></image:image><lastmod>2014-07-22T09:00:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2014/06/04/facebook-y-las-evidencias-electronicas-en-delitos-de-injurias-calumnias-y-otros/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2014/06/107549-406-304.jpg</image:loc><image:title>107549-406-304</image:title></image:image><lastmod>2014-06-19T16:00:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2013/05/09/un-caso-de-exito-absolucion-de-una-acusacion-por-direccion-ip/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/05/red-wifi_caso-direccion-ip.png</image:loc><image:title>red wifi_caso direccion IP</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/05/colaboracic3b3n.png</image:loc><image:title>colaboración</image:title></image:image><lastmod>2014-06-12T06:49:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/otras-leyes/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/04/ley.jpg</image:loc><image:title>ley</image:title></image:image><lastmod>2014-06-12T05:25:16+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://peritoit.com/legislaciones/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/legislacion.jpg</image:loc><image:title>legislacion</image:title></image:image><lastmod>2014-06-12T04:25:25+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://peritoit.com/articulos/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/articulos.jpg</image:loc><image:title>articulos</image:title></image:image><lastmod>2014-05-18T05:05:51+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://peritoit.com/enlaces/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/enlazando.jpg</image:loc><image:title>Enlazando</image:title></image:image><lastmod>2014-05-18T04:49:39+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://peritoit.com/2014/05/11/cuando-ha-de-intervenir-un-notario-en-un-peritaje-informatico-o-tecnologico/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2014/05/simbolo-de-los-notarios.jpg</image:loc><image:title>simbolo de los notarios</image:title></image:image><lastmod>2014-05-12T17:08:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2014/04/18/ponencia-de-peritaje-informatico-y-tecnologico-en-el-icas/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2014/04/icaservillaperitaje.jpg</image:loc><image:title>icaservillaperitaje</image:title></image:image><lastmod>2014-05-08T18:32:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/la-asociacion/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/laboratorio-tecnologico.png</image:loc><image:title>laboratorio tecnologico</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/logo_aptan.png</image:loc><image:title>Logo_APTAN</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/logo-ancite.jpg</image:loc><image:title>logo ancite</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/logo-final-ancite.png</image:loc><image:title>Logo final ancite</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/logo_iberforense.png</image:loc><image:title>logo_iberforense</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/acpjt.png</image:loc><image:title>acpjt</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/if-security.jpg</image:loc><image:title>If-security</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/if-security_logo.png</image:loc><image:title>if-security_logo</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/logo_thinking_tech.jpg</image:loc><image:title>logo_Thinking_Tech</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/logo_t_conectamos.png</image:loc><image:title>logo_t_conectamos</image:title></image:image><lastmod>2014-05-06T22:54:58+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://peritoit.com/curso-especialista-en-peritaje-de-propiedad-intelectual/</loc><lastmod>2014-04-27T20:52:11+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://peritoit.com/mis-servicios-profesionales/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/04/servicios-profesionales.jpg</image:loc><image:title>Servicios profesionales</image:title></image:image><lastmod>2014-04-27T17:19:11+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://peritoit.com/curso-online/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/01/trieje-del-curso-e1359079262173.png</image:loc><image:title>Trieje del Curso</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/12/logo_en_peritoit.png</image:loc><image:title>logo_en_peritoit</image:title></image:image><lastmod>2014-04-27T07:07:48+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://peritoit.com/cursos-online-de-tematicas-afines-al-peritaje-informatico-y-tecnologicos/</loc><lastmod>2014-04-27T06:10:48+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://peritoit.com/2013/06/09/la-tasacion-informatica-o-tecnologica-una-actividad-infravalorada/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/06/calculadora.jpg</image:loc><image:title>calculadora</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/06/finalidad-de-la-tasacic3b3n.png</image:loc><image:title>finalidad de la tasación</image:title></image:image><lastmod>2014-04-22T17:48:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2013/03/24/entrega-de-titulos-de-perito-judicial-tecnologico-curso-online-de-peritaje/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/03/entrega-diploma-jordi-sollai.png</image:loc><image:title>entrega diploma Jordi Sollai</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/03/entrega-diploma-jordi-roca.png</image:loc><image:title>entrega diploma Jordi Roca</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/03/juan-fernandez-goula.png</image:loc><image:title>Juan Fernandez Goula</image:title></image:image><lastmod>2013-12-23T05:16:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2013/08/21/codigo-deontologico-asociativo-profesional-consideraciones-y-elaboracion/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/08/codigo-etico-caracteristicas.png</image:loc><image:title>codigo etico caracteristicas</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/08/codigo_de_etica.jpg</image:loc><image:title>codigo_de_etica</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/08/codigos-eticos.png</image:loc><image:title>CODIGOS ETICOS</image:title></image:image><lastmod>2013-12-19T23:25:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2013/10/21/esquemas-y-patrones-delictivos-en-el-peritaje-tecnologico/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/10/esquema476_0.jpg</image:loc><image:title>esquema476_0</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/10/img_2310.jpg</image:loc><image:title>IMG_2310</image:title></image:image><lastmod>2013-12-19T23:20:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2013/07/06/publicidad-enganosa-o-no-fiel-a-la-realidad-o-a-la-verdad/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/07/caballo-tirando-de-coche.jpg</image:loc><image:title>caballo tirando de coche</image:title></image:image><lastmod>2013-12-19T23:19:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2013/12/18/el-peritaje-de-gestion-y-management-en-el-congreso-de-itsmf/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/12/peritaje-gym-en-itsmf.png</image:loc><image:title>Peritaje GyM en itSMF</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/12/phoca_thumb_l_vision13474.jpg</image:loc><image:title>phoca_thumb_l_vision13474</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/12/esquema_proyecto.jpg</image:loc><image:title>esquema_proyecto</image:title></image:image><lastmod>2013-12-18T09:38:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2013/12/01/utilizacion-de-la-wifi-ajena-del-robo-de-suministro-a-la-revelacion-de-secretos/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/12/pirateria-de-wifi.jpg</image:loc><image:title>pirateria de wifi</image:title></image:image><lastmod>2013-12-05T05:11:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2013/11/16/el-peritaje-informatico-y-tecnologico-en-dossier-tecnologico/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/11/mundo-y-teclado.png</image:loc><image:title>mundo y teclado</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/11/tertulia-digital.png</image:loc><image:title>Tertulia Digital</image:title></image:image><lastmod>2013-11-16T00:28:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2013/10/26/la-prueba-electronica-en-el-proceso-penal/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/10/la-prueba-electronica.jpg</image:loc><image:title>la prueba electronica</image:title></image:image><lastmod>2013-10-26T17:37:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/legislacion-y-leyes/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/04/legislacion-y-leyes.jpg</image:loc><image:title>legislacion y leyes</image:title></image:image><lastmod>2013-09-29T16:38:43+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://peritoit.com/2013/09/24/boleitil-no-78-itsmf-la-voz-de-la-experiencia-peritaje-informatico-entrevista/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/09/boleitil.png</image:loc><image:title>boleitil</image:title></image:image><lastmod>2013-09-24T18:20:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2013/06/30/ciberdelitos-y-los-menores-vision-preventiva-y-educacional/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/06/centro-san-agustin.jpg</image:loc><image:title>centro san agustin</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/06/esquema-de-actuacic3b3n-delictiva-acoso.png</image:loc><image:title>Esquema de actuación delictiva acoso</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/06/img_0476.jpg</image:loc><image:title>IMG_0476</image:title></image:image><lastmod>2013-07-01T22:11:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2013/06/23/casos-de-peritajes-informaticos-y-tecnologicos/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/06/peritaje-informatico_1.png</image:loc><image:title>Peritaje Informatico_1</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/06/conferencia-colegio-abogados-de-granada.jpg</image:loc><image:title>Conferencia Colegio Abogados de Granada</image:title></image:image><lastmod>2013-06-25T19:21:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2013/05/01/el-perito-informatico-al-servicio-del-bien-o-del-mal/</loc><lastmod>2013-05-01T22:36:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2013/04/15/cumplir-con-la-norma-une1970012011-un-indicador-de-calidad/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/04/martillo-decorado.jpg</image:loc><image:title>martillo decorado</image:title></image:image><lastmod>2013-04-15T22:56:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2012/04/09/curso-de-perito-informatico-forense-antpji/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/04/curso-antpji.jpg</image:loc><image:title>Curso ANTPJI</image:title></image:image><lastmod>2013-04-15T22:38:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2013/03/08/los-delitos-de-menores-en-la-red/</loc><lastmod>2013-04-15T19:23:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2013/04/08/conclusiones-de-el-peritaje-informatico-una-profesion-de-futuro/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/04/cloud-computing.jpg</image:loc><image:title>cloud-computing</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/04/charla-ati-20130403.jpg</image:loc><image:title>Charla ATI 20130403</image:title></image:image><lastmod>2013-04-11T04:46:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2013/03/19/destierro-virtual-a-un-condenado-de-tenencia-de-pornografia-infantil/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/03/desconexion-internet.jpg</image:loc><image:title>desconexion internet</image:title></image:image><lastmod>2013-03-19T07:55:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2012/12/16/la-prueba-en-internet/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/12/la-prueba-telemc3a1tica.jpg</image:loc><image:title>La prueba telemática</image:title></image:image><lastmod>2013-03-08T02:10:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/los-delitos-de-menores-en-la-red/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/03/esquema-de-actuacic3b3n-delictiva.png</image:loc><image:title>Esquema de actuación delictiva</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/03/responsabilidad-criminal-por-edades.png</image:loc><image:title>Responsabilidad Criminal por Edades</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/03/delitos-de-menores-en-la-red.png</image:loc><image:title>delitos de menores en la red</image:title></image:image><lastmod>2013-03-08T01:53:56+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://peritoit.com/2012/11/11/a-mi-no-me-pillan-he-borrado-mis-datos-desgaussing-eraser/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/11/cabezales-de-disco.png</image:loc><image:title>cabezales de disco</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/11/eraser-de-discos.png</image:loc><image:title>eraser de discos</image:title></image:image><lastmod>2013-02-26T11:49:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2013/02/13/inducir-al-perito-a-delinquir-por-influencia-y-conveniencia-del-cliente/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/02/manipular-o-inducir-al-perito.png</image:loc><image:title>Manipular o Inducir al Perito</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/02/perito-mentiroso.png</image:loc><image:title>perito mentiroso</image:title></image:image><lastmod>2013-02-13T06:23:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2013/02/07/un-tribunal-militar-juzgara-a-un-tte-coronel-en-base-a-evidencias-civiles/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/02/recorte-trama-del-militar.png</image:loc><image:title>recorte trama del militar</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/02/trama-del-militar.png</image:loc><image:title>trama del militar</image:title></image:image><lastmod>2013-02-12T16:55:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2013/02/05/la-revista-sic-y-el-libro-de-peritaje-informatico-peritaje-informatico-y-tecnologico/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/02/portada-revista-sci-no-103-de-feb-2013.png</image:loc><image:title>Portada Revista SCI No 103 de Feb 2013</image:title></image:image><lastmod>2013-02-05T11:57:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2012/03/18/manual-basico-del-perito-judicial/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/by-nc-nd_eu_petit.png</image:loc><image:title>by-nc-nd_eu_petit</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/peritaje-judicial.jpg</image:loc><image:title>peritaje judicial</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/manual-basico-de-perito-judicial.png</image:loc><image:title>Manual basico de perito judicial</image:title></image:image><lastmod>2013-02-02T23:46:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2012/06/03/rfc-3227directrices-para-la-recopilacion-de-evidencias/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/06/evidencia-informatica.png</image:loc><image:title>evidencia informatica</image:title></image:image><lastmod>2013-02-02T06:48:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2012/09/23/curso-de-peritaje-informatico-en-la-upv/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/09/curso-valencia-oct-2012.jpg</image:loc><image:title>Curso Valencia OCT 2012</image:title></image:image><lastmod>2013-02-02T06:45:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2012/12/14/curso-de-peritaje-judicial-tecnologico/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/12/logo-aula-abat-oliba.jpg</image:loc><image:title>logo aula Abat oliba</image:title></image:image><lastmod>2013-01-25T16:36:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2013/01/24/ciberguerra-octubre-rojo-un-malware-para-el-noble-arte-de-espiar/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/01/mapa-ataque-octubre-rojo-malware.png</image:loc><image:title>Mapa ataque Octubre Rojo Malware</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/01/kaspersky-lab-octubre-rojo.jpg</image:loc><image:title>Kaspersky Lab  Octubre Rojo</image:title></image:image><lastmod>2013-01-24T18:46:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2013/01/04/operacion-parachoques-la-velocidad-no-les-deja-pensar/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2013/01/conduccion-temeraria-elche.jpg</image:loc><image:title>conduccion-temeraria-elche</image:title></image:image><lastmod>2013-01-06T05:13:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2012/12/28/perito-inocente-e-inocente-perito/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/12/inocente-perito.jpg</image:loc><image:title>Inocente Perito</image:title></image:image><lastmod>2012-12-30T06:04:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2012/11/19/picnic4working-los-delitos-informaticos-en-las-organizaciones/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/11/picnic4working.png</image:loc><image:title>PICNIC4WORKING</image:title></image:image><lastmod>2012-12-30T05:59:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2012/11/27/los-delitos-informaticos-en-las-organizaciones/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/11/picnic4working.jpg</image:loc><image:title>Picnic4Working</image:title></image:image><lastmod>2012-12-06T05:19:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2012/12/05/seguridad-informatica-es-mi-despacho-vulnerable/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/12/seguridad-informatica.jpg</image:loc><image:title>seguridad informatica</image:title></image:image><lastmod>2012-12-05T17:59:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/delitos-informaticos/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/04/delito-informatico.jpg</image:loc><image:title>delito informatico</image:title></image:image><lastmod>2012-11-09T18:36:55+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://peritoit.com/2012/11/04/no-con-name-2012-9-o-congreso-de-seguridad-informatica/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/11/no-con-name.png</image:loc><image:title>No cON Name 2012</image:title></image:image><lastmod>2012-11-04T15:30:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2012/11/01/nuevo-libro-sobre-peritaje-informatico-y-tecnologico/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/11/portada2.jpg</image:loc><image:title>Portada</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/11/portada1.jpg</image:loc><image:title>Portada</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/11/portada.jpg</image:loc><image:title>Portada</image:title></image:image><lastmod>2012-11-04T04:00:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2012/05/22/locards-heisenberg-ockham-y-su-aplicacion-en-el-peritaje-informatico/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/05/principio-de-locard.png</image:loc><image:title>Principio de Locard</image:title></image:image><lastmod>2012-10-23T05:40:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2012/10/14/malware-infectando-los-sistemas-it-de-los-vehiculos/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/10/vehiculo-y-satelites.png</image:loc><image:title>vehiculo y satelites</image:title></image:image><lastmod>2012-10-14T19:59:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2012/10/08/condena-penal-de-un-administrador-web-por-los-comentarios-en-su-pagina/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/10/administrador-y-censura.png</image:loc><image:title>Administrador y censura</image:title></image:image><lastmod>2012-10-08T21:34:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2012/10/02/un-reto-de-seguridad-informatica-con-entrada/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/10/reto-1_if_security.jpg</image:loc><image:title>reto 1_if_security</image:title></image:image><lastmod>2012-10-08T07:52:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2012/09/30/el-ens-y-la-ccn-stic-807-entierran-definitivamente-el-md5/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/09/md5-y-ens.png</image:loc><image:title>MD5 y ENS</image:title></image:image><lastmod>2012-09-30T19:00:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2012/09/17/codigos-qr-para-marcar-y-autenticar-billetes/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/09/billete-con-qr.png</image:loc><image:title>billete con QR</image:title></image:image><lastmod>2012-09-17T20:54:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2012/09/11/maas-malware-as-a-service/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/09/malware.jpg</image:loc><image:title>malware</image:title></image:image><lastmod>2012-09-12T22:27:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2012/09/04/shamoon-un-nuevo-virus-destructivo/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/09/virus-shamoon.png</image:loc><image:title>virus shamoon</image:title></image:image><lastmod>2012-09-04T16:32:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2012/04/29/la-cnc-pide-cambios-en-los-procedimientos-de-eleccion-de-peritos-judiciales/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/04/competencia.jpg</image:loc><image:title>Competencia</image:title></image:image><lastmod>2012-07-18T01:35:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2012/05/28/un-informe-pericial-de-la-defensa-confirma-la-manipulacion-de-pruebas/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/05/juicio-informatico3.png</image:loc><image:title>juicio informatico</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/05/juicio-informatico2.png</image:loc><image:title>juicio informatico</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/05/juicio-informatico1.png</image:loc><image:title>juicio informatico</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/05/juicio-informatico.png</image:loc><image:title>juicio informatico</image:title></image:image><lastmod>2012-07-18T01:28:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2012/07/15/pentest-recoleccion-de-informacion-information-gathering/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/07/information-gathering.jpg</image:loc><image:title>information gathering</image:title></image:image><lastmod>2012-07-18T01:25:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2012/07/06/hola-democracia-adios-acta/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/07/no_acta.jpg</image:loc><image:title>NO_ACTA</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/07/hola-democracia_adios-acta.png</image:loc><image:title>Hola Democracia_Adios ACTA</image:title></image:image><lastmod>2012-07-06T04:11:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2012/04/18/sexting-adolescencia-y-tecnologia-un-coctel-de-sabor-agridulce/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/04/sexting2.jpg</image:loc><image:title>sexting2</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/04/sexting1.jpg</image:loc><image:title>sexting1</image:title></image:image><lastmod>2012-07-04T04:26:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2012/06/24/el-delito-del-grooming-abusando-de-la-inocencia-de-los-menores/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/06/grooming.png</image:loc><image:title>grooming</image:title></image:image><lastmod>2012-07-01T09:24:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2012/06/07/seguridad-informatica-el-flame-del-ciberdelito-al-ciberespionaje/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/06/flame_malware.jpg</image:loc><image:title>flame_malware</image:title></image:image><lastmod>2012-06-18T08:10:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2012/05/16/operacion-pitiusa-y-lo-que-son-capaces-de-hacer-con-nuestros-datos/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/05/actuacic3b3n-policial-operacion-pitiusa.jpg</image:loc><image:title>actuación policial operacion Pitiusa</image:title></image:image><lastmod>2012-05-17T17:20:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2012/04/06/llena-mucho-pero-alimenta-poco/</loc><lastmod>2012-05-15T04:52:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2012/04/13/viernes-13-cuantos-peritos-informaticos-sobreviviran/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/04/viernes13.jpg</image:loc><image:title>viernes13</image:title></image:image><lastmod>2012-05-15T04:50:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2012/04/15/los-delitos-informaticos-viejos-enemigos-con-una-nueva-piel-2/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/04/muda-de-piel.jpg</image:loc><image:title>muda de piel</image:title></image:image><lastmod>2012-05-15T04:49:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2012/04/23/el-perito-informatico-forense-un-tecnico-o-un-artesano-de-la-tecnologia/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/04/estandares-informaticos.jpg</image:loc><image:title>estandares informaticos</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/04/artesano-informatico.jpg</image:loc><image:title>artesano informatico</image:title></image:image><lastmod>2012-05-15T04:47:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/2012/05/04/ley-cispa-un-desproposito-a-la-privacidad/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/05/cispa_hr3523.jpg</image:loc><image:title>CISPA_HR3523</image:title></image:image><lastmod>2012-05-15T04:46:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://peritoit.com/internacional/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/bola-de-banderas.jpg</image:loc><image:title>bola de banderas</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/que-he-visitado.jpg</image:loc><image:title>que he visitado</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/donde-he-trabajado.jpg</image:loc><image:title>donde he trabajado</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/mapa-mundi.jpg</image:loc><image:title>mapa-mundi</image:title></image:image><lastmod>2012-05-08T06:45:13+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://peritoit.com/el-perito/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/ser-diferente.jpg</image:loc><image:title>ser diferente</image:title></image:image><lastmod>2012-04-28T08:06:57+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://peritoit.com/servicios/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/el-perejil.jpg</image:loc><image:title>El perejil</image:title></image:image><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/imagescaladrk5.jpg</image:loc><image:title>imagesCALADRK5</image:title></image:image><lastmod>2012-04-28T08:06:26+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://peritoit.com/peritaje-informatico/</loc><image:image><image:loc>https://peritoit.com/wp-content/uploads/2012/03/peritaje-informatico.png</image:loc><image:title>peritaje informatico</image:title></image:image><lastmod>2012-04-28T08:05:40+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://peritoit.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2024-11-14T04:00:53+00:00</lastmod></url></urlset>
