<?xml version="1.0" encoding="utf-8" ?> <rss version="2.0" xmlns:opensearch="http://a9.com/-/spec/opensearch/1.1/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"> <channel> <title> <![CDATA[NUN Library Search for 'su:&quot;Computer networks--Security measures. Computer security.&quot;']]> </title> <link> /cgi-bin/koha/opac-search.pl?q=ccl=su%3A%22Computer%20networks--Security%20measures.%20Computer%20security.%22&#38;sort_by=relevance&#38;format=rss </link> <atom:link rel="self" type="application/rss+xml" href="/cgi-bin/koha/opac-search.pl?q=ccl=su%3A%22Computer%20networks--Security%20measures.%20Computer%20security.%22&#38;sort_by=relevance&#38;format=rss"/> <description> <![CDATA[ Search results for 'su:&quot;Computer networks--Security measures. Computer security.&quot;' at NUN Library]]> </description> <opensearch:totalResults>7</opensearch:totalResults> <opensearch:startIndex>0</opensearch:startIndex> <opensearch:itemsPerPage>20</opensearch:itemsPerPage> <atom:link rel="search" type="application/opensearchdescription+xml" href="/cgi-bin/koha/opac-search.pl?q=ccl=su%3A%22Computer%20networks--Security%20measures.%20Computer%20security.%22&#38;sort_by=relevance&#38;format=opensearchdescription"/> <opensearch:Query role="request" searchTerms="q%3Dccl%3Dsu%253A%2522Computer%2520networks--Security%2520measures.%2520Computer%2520security.%2522" startPage="" /> <item> <title> Cyber Resilience </title> <dc:identifier>ISBN:9788770221160</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=28853</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/8770221162.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Petrenko, Sergei.<br /> Denmark River Publishers 2019 .<br /> 444 p 9788770221160 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=28853">Place hold on <em>Cyber Resilience</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=28853</guid> </item> <item> <title> Cybersecurity for business organization-wide strategies to ensure </title> <dc:identifier>ISBN:981398606142</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=28859</link> <description> <![CDATA[ <p> By Edited by Larry Clinton &amp; ISA President .<br /> USA Inc. 2022 .<br /> 243 p 981398606142 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=28859">Place hold on <em>Cybersecurity for business organization-wide strategies to ensure</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=28859</guid> </item> <item> <title> Fundamentals of Cyber Security </title> <dc:identifier>ISBN:9789386551559</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=30292</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/9386551551.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Bhushan, Mayank; Rathore, Rajkumar Singh and Jamshed, Aatif.<br /> India BPB 2022 9789386551559 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=30292">Place hold on <em>Fundamentals of Cyber Security</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=30292</guid> </item> <item> <title> Information security management </title> <dc:identifier>ISBN:9781284211658</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=31114</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1284211657.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Workman, Michael D..<br /> Massachusetts Jones &amp; Bartlett Learning 2023 9781284211658 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=31114">Place hold on <em>Information security management</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=31114</guid> </item> <item> <title> Network security essentials : applications and standards </title> <dc:identifier>ISBN:9780273793366</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=32894</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0273793365.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Stallings, William..<br /> Harlow Pearson 2014 .<br /> 445 p 9780273793366 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=32894">Place hold on <em>Network security essentials : applications and standards</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=32894</guid> </item> <item> <title> No title </title> <dc:identifier>ISBN:</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=37553</link> <description> <![CDATA[ <p> .<br /> 59 p. : ill. ; 28 cm. </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=37553">Place hold on <em></em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=37553</guid> </item> <item> <title> ISACA journal, formerly information systems control journal. </title> <dc:identifier>ISBN:</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=38336</link> <description> <![CDATA[ <p> ISACA 2015 .<br /> 59 p. : ill. ; 28 cm. </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=38336">Place hold on <em>ISACA journal, formerly information systems control journal.</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=38336</guid> </item> </channel> </rss>
