<?xml version="1.0" encoding="utf-8" ?> <rss version="2.0" xmlns:opensearch="http://a9.com/-/spec/opensearch/1.1/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"> <channel> <title> <![CDATA[ Search for 'su:&quot;Network Security&quot;']]> </title> <link> /cgi-bin/koha/opac-search.pl?q=ccl=su%3A%22Network%20Security%22&#38;sort_by=relevance&#38;format=rss </link> <atom:link rel="self" type="application/rss+xml" href="/cgi-bin/koha/opac-search.pl?q=ccl=su%3A%22Network%20Security%22&#38;sort_by=relevance&#38;format=rss"/> <description> <![CDATA[ Search results for 'su:&quot;Network Security&quot;' at ]]> </description> <opensearch:totalResults>13</opensearch:totalResults> <opensearch:startIndex>0</opensearch:startIndex> <opensearch:itemsPerPage>50</opensearch:itemsPerPage> <atom:link rel="search" type="application/opensearchdescription+xml" href="/cgi-bin/koha/opac-search.pl?q=ccl=su%3A%22Network%20Security%22&#38;sort_by=relevance&#38;format=opensearchdescription"/> <opensearch:Query role="request" searchTerms="q%3Dccl%3Dsu%253A%2522Network%2520Security%2522" startPage="" /> <item> <title> Cryptography and network security </title> <dc:identifier>ISBN:</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=9517</link> <description> <![CDATA[ <p> By Stallings, William.<br /> Pearson 2006 .<br /> 680 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=9517">Place hold on <em>Cryptography and network security</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=9517</guid> </item> <item> <title> Network security essentials applications and standards </title> <dc:identifier>ISBN:</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=10042</link> <description> <![CDATA[ <p> By Stallings, William.<br /> Pearson 2008 .<br /> 413 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=10042">Place hold on <em>Network security essentials</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=10042</guid> </item> <item> <title> Network security private communication in a public world </title> <dc:identifier>ISBN:</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=10214</link> <description> <![CDATA[ <p> By Kaufman, Charlie.<br /> PHI 2009 .<br /> 713 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=10214">Place hold on <em>Network security private communication in a public world</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=10214</guid> </item> <item> <title> Network security </title> <dc:identifier>ISBN:</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=11302</link> <description> <![CDATA[ <p> By Kaufman, Chalie.<br /> Pearson 2005 .<br /> 713 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=11302">Place hold on <em>Network security</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=11302</guid> </item> <item> <title> NT Network Security </title> <dc:identifier>ISBN:</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=11358</link> <description> <![CDATA[ <p> By Strebe, M.<br /> BPB 1998 .<br /> 929 , With CD </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=11358">Place hold on <em>NT Network Security</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=11358</guid> </item> <item> <title> Cryptography and network security </title> <dc:identifier>ISBN:9788177587746</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=12413</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/8177587749.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Stallings, William.<br /> Delhi Pearson 2006 .<br /> 680p 9788177587746 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=12413">Place hold on <em>Cryptography and network security</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=12413</guid> </item> <item> <title> Network security essentials applications and standards </title> <dc:identifier>ISBN:978813176175-5</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=12821</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/8131761754.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Stallings, William.<br /> Delhi Pearson 2011 .<br /> 417p 978813176175-5 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=12821">Place hold on <em>Network security essentials</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=12821</guid> </item> <item> <title> Network security The complete reference </title> <dc:identifier>ISBN:</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=12915</link> <description> <![CDATA[ <p> By Bragg, Roberta.<br /> New Delhi TMH 2004 .<br /> 854 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=12915">Place hold on <em>Network security</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=12915</guid> </item> <item> <title> Cryptography and network security Principles and practice </title> <dc:identifier>ISBN:</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=12988</link> <description> <![CDATA[ <p> By William, Stallings.<br /> Delhi Pearson 2012 .<br /> 743p. </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=12988">Place hold on <em>Cryptography and network security</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=12988</guid> </item> <item> <title> Network security private communication in a public world </title> <dc:identifier>ISBN:</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=13435</link> <description> <![CDATA[ <p> By Kaufman, Charlie.<br /> Delhi PHI 2009 .<br /> 713 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=13435">Place hold on <em>Network security private communication in a public world</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=13435</guid> </item> <item> <title> Network security essentials applications and standards </title> <dc:identifier>ISBN:978813176175-5</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=13976</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/8131761754.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Stallings, William.<br /> Delhi Pearson 2011 .<br /> 417 978813176175-5 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=13976">Place hold on <em>Network security essentials</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=13976</guid> </item> <item> <title> Cryptography and network security </title> <dc:identifier>ISBN:9789388818865</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=20113</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/9388818865.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Achary, Rathnakar.<br /> New Delhi New Age international 2024 .<br /> 501p. 9789388818865 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=20113">Place hold on <em>Cryptography and network security</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=20113</guid> </item> <item> <title> Computation cryptography and network security </title> <dc:identifier>ISBN:9783319182742</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=20373</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/3319182749.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Daras, Nicholas J..<br /> Greece Springer 2015 .<br /> 756p. 9783319182742 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=20373">Place hold on <em>Computation cryptography and network security</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=20373</guid> </item> </channel> </rss>
