<?xml version="1.0" encoding="utf-8" ?> <rss version="2.0" xmlns:opensearch="http://a9.com/-/spec/opensearch/1.1/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"> <channel> <title> <![CDATA[NUN Library Search for 'su:&quot;Computer security.&quot;']]> </title> <link> /cgi-bin/koha/opac-search.pl?q=ccl=su%3A%22Computer%20security.%22&#38;sort_by=relevance&#38;format=rss </link> <atom:link rel="self" type="application/rss+xml" href="/cgi-bin/koha/opac-search.pl?q=ccl=su%3A%22Computer%20security.%22&#38;sort_by=relevance&#38;format=rss"/> <description> <![CDATA[ Search results for 'su:&quot;Computer security.&quot;' at NUN Library]]> </description> <opensearch:totalResults>45</opensearch:totalResults> <opensearch:startIndex>0</opensearch:startIndex> <opensearch:itemsPerPage>50</opensearch:itemsPerPage> <atom:link rel="search" type="application/opensearchdescription+xml" href="/cgi-bin/koha/opac-search.pl?q=ccl=su%3A%22Computer%20security.%22&#38;sort_by=relevance&#38;format=opensearchdescription"/> <opensearch:Query role="request" searchTerms="q%3Dccl%3Dsu%253A%2522Computer%2520security.%2522" startPage="" /> <item> <title> Advanced smart computing technologies in cybersecurity and forensics </title> <dc:identifier>ISBN:9780367690137</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=26994</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0367690136.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Edited by Keshav Kaushik, Shubham Tayal, Akashdeep Bhardwaj, and Manoj Kumar..<br /> Boca Raton CRC Press 2022 .<br /> 241 p 9780367690137 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=26994">Place hold on <em>Advanced smart computing technologies in cybersecurity and forensics</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=26994</guid> </item> <item> <title> Computer security : principles and practice </title> <dc:identifier>ISBN:9780273764496</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=28481</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0273764497.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Stallings, William.<br /> Boston Pearson 2012 .<br /> 810 p 9780273764496 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=28481">Place hold on <em>Computer security : principles and practice</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=28481</guid> </item> <item> <title> Corporate computer security </title> <dc:identifier>ISBN:9781292039633</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=28644</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1292039639.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Boyle, Randy J..<br /> United States Pearson 2014 .<br /> 616 p 9781292039633 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=28644">Place hold on <em>Corporate computer security</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=28644</guid> </item> <item> <title> Cryptography and network security : principles and practice </title> <dc:identifier>ISBN:9780273793359</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=28802</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0273793357.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Stallings, William.<br /> Boston Pearson 2014 .<br /> 751 p 9780273793359 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=28802">Place hold on <em>Cryptography and network security : principles and practice</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=28802</guid> </item> <item> <title> Cyber Resilience </title> <dc:identifier>ISBN:9788770221160</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=28853</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/8770221162.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Petrenko, Sergei.<br /> Denmark River Publishers 2019 .<br /> 444 p 9788770221160 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=28853">Place hold on <em>Cyber Resilience</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=28853</guid> </item> <item> <title> Cyber security and operations management for Industry 4.0 </title> <dc:identifier>ISBN:9781032079479</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=28855</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1032079479.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Elngar Ahmed A. .<br /> UK Newgen 2023 .<br /> 146 p 9781032079479 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=28855">Place hold on <em>Cyber security and operations management for Industry 4.0</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=28855</guid> </item> <item> <title> Cyber-physical attacks : a growing invisible threat </title> <dc:identifier>ISBN:9780128012901</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=28858</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0128012900.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Loukas, George.<br /> New York Butterworth-Heinemann 2015 .<br /> 262 p 9780128012901 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=28858">Place hold on <em>Cyber-physical attacks : a growing invisible threat</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=28858</guid> </item> <item> <title> Cybersecurity for business organization-wide strategies to ensure </title> <dc:identifier>ISBN:981398606142</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=28859</link> <description> <![CDATA[ <p> By Edited by Larry Clinton &amp; ISA President .<br /> USA Inc. 2022 .<br /> 243 p 981398606142 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=28859">Place hold on <em>Cybersecurity for business organization-wide strategies to ensure</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=28859</guid> </item> <item> <title> Cybersecurity is everybody’s business : solve the security puzzle for your small business and home </title> <dc:identifier>ISBN:9780996902267</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=28860</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0996902260.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Schober, Scott N..<br /> New Jersey ScottSchober.com Publishing 2019 .<br /> 322 p 9780996902267 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=28860">Place hold on <em>Cybersecurity is everybody’s business : solve the security puzzle for your small business and home</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=28860</guid> </item> <item> <title> Cybersecurity law </title> <dc:identifier>ISBN:9781119517207</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=28861</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1119517206.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Kosseff Jeff.<br /> USA Wiley 2020 .<br /> 725 p 9781119517207 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=28861">Place hold on <em>Cybersecurity law</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=28861</guid> </item> <item> <title> Cybersecurity law, standards and regulations </title> <dc:identifier>ISBN:9781944480561</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=28862</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1944480560.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Schreider, Tari.<br /> Brookfield Rothstein Associates Inc 2020 .<br /> 315 p 9781944480561 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=28862">Place hold on <em>Cybersecurity law, standards and regulations</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=28862</guid> </item> <item> <title> Cybersecurity risk management </title> <dc:identifier>ISBN:9781685074289</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=28863</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1685074286.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Oh Bruce HO Kok-Boon .<br /> New York Nova Science 2022 .<br /> 244 p 9781685074289 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=28863">Place hold on <em>Cybersecurity risk management</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=28863</guid> </item> <item> <title> Fundamentals of Cyber Security </title> <dc:identifier>ISBN:9789386551559</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=30292</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/9386551551.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Bhushan, Mayank; Rathore, Rajkumar Singh and Jamshed, Aatif.<br /> India BPB 2022 9789386551559 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=30292">Place hold on <em>Fundamentals of Cyber Security</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=30292</guid> </item> <item> <title> Fundamentals of information systems security </title> <dc:identifier>ISBN:9781284220737</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=30330</link> <description> <![CDATA[ <p> By Kim David .<br /> USA Jones &amp; Bartlett 2023 .<br /> 544 p 9781284220737 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=30330">Place hold on <em>Fundamentals of information systems security</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=30330</guid> </item> <item> <title> Guide to computer forensics and investigations </title> <dc:identifier>ISBN:9781337568944</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=30631</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1337568945.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Nelson Bill, et al... .<br /> USA Cengage 2019 .<br /> 738 p 9781337568944 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=30631">Place hold on <em>Guide to computer forensics and investigations</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=30631</guid> </item> <item> <title> Hacking with Kali Linux </title> <dc:identifier>ISBN:9781695786639</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=30652</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1695786637.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Snow, Juliian.<br /> Britain 2019 .<br /> 241 p 9781695786639 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=30652">Place hold on <em>Hacking with Kali Linux</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=30652</guid> </item> <item> <title> Hands-on ethical hacking and network defense </title> <dc:identifier>ISBN:9780357509753</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=30711</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0357509757.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Simpson, Michael T.; Antill, Nicholas D.; Wilson, Robert S..<br /> Australia Cengage Learning 2021 .<br /> 366 p 9780357509753 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=30711">Place hold on <em>Hands-on ethical hacking and network defense</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=30711</guid> </item> <item> <title> Information Security </title> <dc:identifier>ISBN:9789350144435</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=31113</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/9350144433.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Sharma, Pankaj..<br /> New Delhi S. K. Kataria &amp; Sons 2013 .<br /> 206 p 9789350144435 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=31113">Place hold on <em>Information Security</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=31113</guid> </item> <item> <title> Information security management </title> <dc:identifier>ISBN:9781284211658</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=31114</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1284211657.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Workman, Michael D..<br /> Massachusetts Jones &amp; Bartlett Learning 2023 9781284211658 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=31114">Place hold on <em>Information security management</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=31114</guid> </item> <item> <title> Information security policies, procedures, and standards </title> <dc:identifier>ISBN:9781482245912</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=31115</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1482245914.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Landoll J. Douglas .<br /> NewYork CRC Press 2016 .<br /> 240 p 9781482245912 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=31115">Place hold on <em>Information security policies, procedures, and standards</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=31115</guid> </item> <item> <title> Inside Java 2 platform security : architecture, API design, and implementation </title> <dc:identifier>ISBN:9780201787917</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=31147</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0201787911.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Gong, Li...[et al.].<br /> United State Pearson Education 2003 .<br /> 356 p 9780201787917 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=31147">Place hold on <em>Inside Java 2 platform security : architecture, API design, and implementation</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=31147</guid> </item> <item> <title> Intelligent security solutions for cyber-physical systems </title> <dc:identifier>ISBN:9781032029865</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=31212</link> <description> <![CDATA[ <p> By Edited by Vandana Mohindru Sood et.al..<br /> Boca Raton CRC Press 2023 .<br /> 273 p 9781032029865 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=31212">Place hold on <em>Intelligent security solutions for cyber-physical systems</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=31212</guid> </item> <item> <title> International conference on security, surveillance and artificial intelligence (ICSSAI-2023) </title> <dc:identifier>ISBN:9781032530291</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=31260</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1032530294.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Edited by Debasis Chaudhuri et.al..<br /> Boca Raton CRC Press 2023 .<br /> 700 p 9781032530291 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=31260">Place hold on <em>International conference on security, surveillance and artificial intelligence (ICSSAI-2023)</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=31260</guid> </item> <item> <title> Introduction to computer security </title> <dc:identifier>ISBN:9781292025407</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=31382</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1292025409.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Goodrich, Michael T..<br /> United States Pearson 2014 .<br /> 514 p 9781292025407 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=31382">Place hold on <em>Introduction to computer security</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=31382</guid> </item> <item> <title> Kali Linux Hacking </title> <dc:identifier>ISBN:9781672439733</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=31732</link> <description> <![CDATA[ <p> By Mining, Ethem.<br /> 2019 9781672439733 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=31732">Place hold on <em>Kali Linux Hacking</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=31732</guid> </item> <item> <title> Mastering windowa security and Hardening. </title> <dc:identifier>ISBN:9781839216411</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=32351</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1839216417.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Mark Dunkerley, Matt Tumbarello..<br /> United Kingdom 2022 .<br /> 790 p 9781839216411 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=32351">Place hold on <em>Mastering windowa security and Hardening.</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=32351</guid> </item> <item> <title> Measuring and communicating security’s value: a compendium of metrics for enterprise protection </title> <dc:identifier>ISBN:9780128028414</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=32432</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0128028416.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Campbell, George K..<br /> Amsterdam Elsevier 2015 .<br /> 202 p 9780128028414 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=32432">Place hold on <em>Measuring and communicating security’s value: a compendium of metrics for enterprise protection</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=32432</guid> </item> <item> <title> Network security essentials : applications and standards </title> <dc:identifier>ISBN:9780273793366</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=32894</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0273793365.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Stallings, William..<br /> Harlow Pearson 2014 .<br /> 445 p 9780273793366 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=32894">Place hold on <em>Network security essentials : applications and standards</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=32894</guid> </item> <item> <title> Networks attack detection on 5G's networks using data mining techniques </title> <dc:identifier>ISBN:9781932746579</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=32900</link> <description> <![CDATA[ <p> By Edited by Sagar Dhanraj Pande, Aditya Khamparia..<br /> Boca Raton CRC Press 2024 .<br /> 201 p 9781932746579 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=32900">Place hold on <em>Networks attack detection on 5G's networks using data mining techniques</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=32900</guid> </item> <item> <title> Principles of incident response and disaster recovery </title> <dc:identifier>ISBN:9780357508329</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=33884</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0357508327.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Whitman Michael E. &amp; Herbert J. Mattord .<br /> USA Mexico 2021 .<br /> 599 p 9780357508329 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=33884">Place hold on <em>Principles of incident response and disaster recovery</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=33884</guid> </item> <item> <title> Security engineering : a guide to building dependable distributed systems </title> <dc:identifier>ISBN:9781119642787</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=34639</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1119642787.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Ross Anderson..<br /> Indianapolis WILEY 2020 .<br /> 1182 p 9781119642787 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=34639">Place hold on <em>Security engineering : a guide to building dependable distributed systems</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=34639</guid> </item> <item> <title> No title </title> <dc:identifier>ISBN:</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=37484</link> <description> <![CDATA[ <p> .<br /> xi, 89 p. :ill. 24 cm. </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=37484">Place hold on <em></em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=37484</guid> </item> <item> <title> No title </title> <dc:identifier>ISBN:</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=37521</link> <description> <![CDATA[ <p> .<br /> 143 p. :ill. ; 29 cm. </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=37521">Place hold on <em></em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=37521</guid> </item> <item> <title> No title </title> <dc:identifier>ISBN:</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=37538</link> <description> <![CDATA[ <p> .<br /> 82 p. :ill. ; 30 cm. </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=37538">Place hold on <em></em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=37538</guid> </item> <item> <title> No title </title> <dc:identifier>ISBN:</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=37553</link> <description> <![CDATA[ <p> .<br /> 59 p. : ill. ; 28 cm. </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=37553">Place hold on <em></em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=37553</guid> </item> <item> <title> No title </title> <dc:identifier>ISBN:</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=37854</link> <description> <![CDATA[ <p> .<br /> 98 cm. ; 26 cm. </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=37854">Place hold on <em></em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=37854</guid> </item> <item> <title> ACM Transaction on information and system security </title> <dc:identifier>ISBN:</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=38029</link> <description> <![CDATA[ <p> New york Association for computing machinery 2016 .<br /> (various paging). :ill. ; 25 cm. </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=38029">Place hold on <em>ACM Transaction on information and system security</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=38029</guid> </item> <item> <title> ACM transactions on privacy and security </title> <dc:identifier>ISBN:</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=38030</link> <description> <![CDATA[ <p> New york Association for computing machinery 2016 .<br /> (various page), :ill. 25 cm. </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=38030">Place hold on <em>ACM transactions on privacy and security</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=38030</guid> </item> <item> <title> Ilorin journal of computer science and information technology </title> <dc:identifier>ISBN:</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=38267</link> <description> <![CDATA[ <p> Ilorin, Nigeria Department of computer science 2016 .<br /> xi, 89 p. :ill. 24 cm. </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=38267">Place hold on <em>Ilorin journal of computer science and information technology</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=38267</guid> </item> <item> <title> International Journal of cyber criminology </title> <dc:identifier>ISBN:</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=38304</link> <description> <![CDATA[ <p> 2022 .<br /> 143 p. :ill. ; 29 cm. </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=38304">Place hold on <em>International Journal of cyber criminology</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=38304</guid> </item> <item> <title> International journal of information security: an international journal of the Nigeria computer society </title> <dc:identifier>ISBN:</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=38321</link> <description> <![CDATA[ <p> Garki, Abuja. Nigerian computer society 2019 .<br /> 82 p. :ill. ; 30 cm. </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=38321">Place hold on <em>International journal of information security: an international journal of the Nigeria computer society</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=38321</guid> </item> <item> <title> ISACA journal, formerly information systems control journal. </title> <dc:identifier>ISBN:</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=38336</link> <description> <![CDATA[ <p> ISACA 2015 .<br /> 59 p. : ill. ; 28 cm. </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=38336">Place hold on <em>ISACA journal, formerly information systems control journal.</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=38336</guid> </item> <item> <title> Security and communication networks </title> <dc:identifier>ISBN:</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=38637</link> <description> <![CDATA[ <p> John Wiley &amp; Sons, Ltd. 2010 .<br /> 98 cm. ; 26 cm. </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=38637">Place hold on <em>Security and communication networks</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=38637</guid> </item> <item> <title> Artificial intelligence technology in healthcare : </title> <dc:identifier>ISBN:9781032428390</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=43803</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1032428392.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Sharma Neha (edited).<br /> Boca Raton, FL : CRC Press, 2024 .<br /> xvi, 312p. 9781032428390 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=43803">Place hold on <em>Artificial intelligence technology in healthcare :</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=43803</guid> </item> <item> <title> International journal of information security: Private and digital forensic </title> <dc:identifier>ISBN:</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=44052</link> <description> <![CDATA[ <p> Surulere Lagos Nigerian computer society 2024 .<br /> 54 p. :ill. ; 30 cm. </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=44052">Place hold on <em>International journal of information security: Private and digital forensic</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=44052</guid> </item> </channel> </rss>
