<?xml version="1.0" encoding="utf-8" ?> <rss version="2.0" xmlns:opensearch="http://a9.com/-/spec/opensearch/1.1/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"> <channel> <title> <![CDATA[ Search for 'su:&quot;Cyber security &quot;']]> </title> <link> /cgi-bin/koha/opac-search.pl?q=ccl=su%3A%22Cyber%20security%20%22&#38;sort_by=relevance&#38;format=rss </link> <atom:link rel="self" type="application/rss+xml" href="/cgi-bin/koha/opac-search.pl?q=ccl=su%3A%22Cyber%20security%20%22&#38;sort_by=relevance&#38;format=rss"/> <description> <![CDATA[ Search results for 'su:&quot;Cyber security &quot;' at ]]> </description> <opensearch:totalResults>8</opensearch:totalResults> <opensearch:startIndex>0</opensearch:startIndex> <opensearch:itemsPerPage>50</opensearch:itemsPerPage> <atom:link rel="search" type="application/opensearchdescription+xml" href="/cgi-bin/koha/opac-search.pl?q=ccl=su%3A%22Cyber%20security%20%22&#38;sort_by=relevance&#38;format=opensearchdescription"/> <opensearch:Query role="request" searchTerms="q%3Dccl%3Dsu%253A%2522Cyber%2520security%2520%2522" startPage="" /> <item> <title> Artificial intelligence and network security </title> <dc:identifier>ISBN:</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=13588</link> <description> <![CDATA[ <p> By DESIDOC.<br /> Delhi DRDO 2015 .<br /> 289p. </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=13588">Place hold on <em>Artificial intelligence and network security</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=13588</guid> </item> <item> <title> Terrorism: its legal framework and beyond </title> <dc:identifier>ISBN:9789384370527</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=15512</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/9384370525.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Bhatt, Mithilesh N ed..<br /> New Delhi Manakin Press 2017 .<br /> 378 9789384370527 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=15512">Place hold on <em>Terrorism: its legal framework and beyond</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=15512</guid> </item> <item> <title> Hacker attack </title> <dc:identifier>ISBN:8176563293</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=15867</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/8176563293.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Mansfield, Richard.<br /> New Delhi BPB 2001 .<br /> 293 8176563293 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=15867">Place hold on <em>Hacker attack</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=15867</guid> </item> <item> <title> Network security and cryptography </title> <dc:identifier>ISBN:978-81315-1349-1</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=15868</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/8131513491.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Menezes, Bernard.<br /> Delhi Cengage 2010 .<br /> 434 978-81315-1349-1 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=15868">Place hold on <em>Network security and cryptography</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=15868</guid> </item> <item> <title> Introduction to cybersecurity Concepts, Principles, technologies and practices </title> <dc:identifier>ISBN:9789393330314</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=19155</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/939333031X.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Singh, Ajay.<br /> Telangana university Press 2023 .<br /> 312p. 9789393330314 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=19155">Place hold on <em>Introduction to cybersecurity</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=19155</guid> </item> <item> <title> Computation cryptography and network security </title> <dc:identifier>ISBN:9783319182742</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=20373</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/3319182749.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Daras, Nicholas J..<br /> Greece Springer 2015 .<br /> 756p. 9783319182742 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=20373">Place hold on <em>Computation cryptography and network security</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=20373</guid> </item> <item> <title> Cyber Crime </title> <dc:identifier>ISBN:9788119680948</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=20889</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/8119680944.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Choudhary, Anjeet Kumar.<br /> Delhi Academic publication 2024 .<br /> 291p. 9788119680948 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=20889">Place hold on <em>Cyber Crime</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=20889</guid> </item> <item> <title> Cybersecurity fundamentals Understand the role of cyber security, its importance and modern techniques used by cyber security professionals </title> <dc:identifier>ISBN:9789390684731</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=21120</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/9390684730.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Goutam, Rajesh Kumar.<br /> New Delhi BPB Publication 2024 .<br /> 239p. 9789390684731 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=21120">Place hold on <em>Cybersecurity fundamentals</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=21120</guid> </item> </channel> </rss>
