<?xml version="1.0" encoding="utf-8" ?> <rss version="2.0" xmlns:opensearch="http://a9.com/-/spec/opensearch/1.1/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"> <channel> <title> <![CDATA[Delhi University Library System Search for 'au:&quot;Schneier Bruce&quot;']]> </title> <!-- prettier-ignore-start --> <link> /cgi-bin/koha/opac-search.pl?idx=&#38;q=au%3A%22Schneier%20Bruce%22&#38;sort_by=title_asc&#38;format=rss </link> <!-- prettier-ignore-end --> <atom:link rel="self" type="application/rss+xml" href="/cgi-bin/koha/opac-search.pl?idx=&#38;q=au%3A%22Schneier%20Bruce%22&#38;sort_by=title_asc&#38;format=rss" /> <description> <![CDATA[ Search results for 'au:&quot;Schneier Bruce&quot;' at Delhi University Library System]]> </description> <opensearch:totalResults>10</opensearch:totalResults> <opensearch:startIndex>0</opensearch:startIndex> <opensearch:itemsPerPage>50</opensearch:itemsPerPage> <atom:link rel="search" type="application/opensearchdescription+xml" href="/cgi-bin/koha/opac-search.pl?idx=&#38;q=au%3A%22Schneier%20Bruce%22&#38;sort_by=title_asc&#38;format=opensearchdescription" /> <opensearch:Query role="request" searchTerms="idx%3D%26q%3Dau%253A%2522Schneier%2520Bruce%2522" startPage="" /> <item> <title> Applied cryptography </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=813426</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Schneier Bruce Ed..<br /> 1996 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=813426">Place hold on <em>Applied cryptography</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=813426</guid> </item> <item> <title> Applied cryptography </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=813425</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Schneier Bruce Ed..<br /> 1996 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=813425">Place hold on <em>Applied cryptography</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=813425</guid> </item> <item> <title> Applied cryptography </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=813424</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Schneier Bruce Ed..<br /> 1996 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=813424">Place hold on <em>Applied cryptography</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=813424</guid> </item> <item> <title> Applied cryptography: Protocols algorithms, and source code in C </title> <dc:identifier>ISBN:9781119096726 (hbk) | SL01599145</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=8535</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1119096723.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Schneier Bruce.<br /> Indianapolis Wiley 2015 .<br /> xxv, 758p ill. , References 675-741p.; Index 743-758p. 9781119096726 (hbk) | SL01599145 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=8535">Place hold on <em>Applied cryptography: Protocols algorithms, and source code in C</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=8535</guid> </item> <item> <title> Applied cryptography: protocols, algorithms, and source code in C </title> <dc:identifier>ISBN:0471117099 (pbk)</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=29846</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0471117099.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Schneier Bruce.<br /> New York John Wiley &amp; Sons 1996 .<br /> xxiii, 758p. , Bibliographical references 675-741p.; Index 743-758p. cm..<br /> 0471117099 (pbk) </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=29846">Place hold on <em>Applied cryptography: protocols, algorithms, and source code in C</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=29846</guid> </item> <item> <title> Cryptography engineering Design principles and practical applications. </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=788035</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Ferguson Niels.<br /> Indianapolis Wiley Publishing 2010 .<br /> xxii,353p. cm..<br /> </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=788035">Place hold on <em>Cryptography engineering </em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=788035</guid> </item> <item> <title> Cryptography engineering:design principles and practical applications </title> <dc:identifier>ISBN:9780470474242 (pbk)</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=30125</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0470474246.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Ferguson Niels.<br /> Indianapolis Wiley 2010 .<br /> xxix, 353p. , Bibliography 327-338p.; Index 339-353p. cm..<br /> 9780470474242 (pbk) </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=30125">Place hold on <em>Cryptography engineering:design principles and practical applications</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=30125</guid> </item> <item> <title> Data and Goliath Hidden battles to collect your data and control your world </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=1163602</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By SCHNEIER Bruce.<br /> New York W.W. Norton 2015 .<br /> 383p. cm..<br /> </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=1163602">Place hold on <em>Data and Goliath </em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=1163602</guid> </item> <item> <title> Practical cryptography </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=813464</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Schneier Bruce Ed..<br /> 2003 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=813464">Place hold on <em>Practical cryptography</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=813464</guid> </item> <item> <title> Practical cryptography </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=813463</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Schneier Bruce Ed..<br /> 2003 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=813463">Place hold on <em>Practical cryptography</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=813463</guid> </item> </channel> </rss>
