<?xml version="1.0" encoding="utf-8" ?> <rss version="2.0" xmlns:opensearch="http://a9.com/-/spec/opensearch/1.1/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"> <channel> <title> <![CDATA[Delhi University Library System Search for 'an:1168478']]> </title> <!-- prettier-ignore-start --> <link> /cgi-bin/koha/opac-search.pl?idx=&#38;q=an%3A1168478&#38;sort_by=title_asc&#38;format=rss </link> <!-- prettier-ignore-end --> <atom:link rel="self" type="application/rss+xml" href="/cgi-bin/koha/opac-search.pl?idx=&#38;q=an%3A1168478&#38;sort_by=title_asc&#38;format=rss" /> <description> <![CDATA[ Search results for 'an:1168478' at Delhi University Library System]]> </description> <opensearch:totalResults>4</opensearch:totalResults> <opensearch:startIndex>0</opensearch:startIndex> <opensearch:itemsPerPage>50</opensearch:itemsPerPage> <atom:link rel="search" type="application/opensearchdescription+xml" href="/cgi-bin/koha/opac-search.pl?idx=&#38;q=an%3A1168478&#38;sort_by=title_asc&#38;format=opensearchdescription" /> <opensearch:Query role="request" searchTerms="idx%3D%26q%3Dan%253A1168478" startPage="" /> <item> <title> Adaptive Security Management Architecture </title> <dc:identifier>ISBN:9780429119095</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=1768451</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0429119097.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By James S. Tiller.<br /> Taylor and Francis 2010 9780429119095 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=1768451">Place hold on <em>Adaptive Security Management Architecture</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=1768451</guid> </item> <item> <title> CISO's Guide to Penetration Testing A Framework to Plan, Manage, and Maximize Benefits </title> <dc:identifier>ISBN:9780429184758</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=1761578</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0429184751.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By James S. Tiller.<br /> Taylor and Francis 2012 9780429184758 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=1761578">Place hold on <em>CISO's Guide to Penetration Testing</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=1761578</guid> </item> <item> <title> The Ethical Hack A Framework for Business Value Penetration Testing </title> <dc:identifier>ISBN:9780429209550</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=1787923</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/042920955X.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By James S. Tiller.<br /> Taylor and Francis 2004 9780429209550 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=1787923">Place hold on <em>The Ethical Hack</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=1787923</guid> </item> <item> <title> A Technical Guide to IPSec Virtual Private Networks </title> <dc:identifier>ISBN:9780429225178</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=1797970</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0429225172.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By James S. Tiller.<br /> Taylor and Francis 2001 9780429225178 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=1797970">Place hold on <em>A Technical Guide to IPSec Virtual Private Networks</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=1797970</guid> </item> </channel> </rss>
