<?xml version="1.0" encoding="utf-8" ?> <rss version="2.0" xmlns:opensearch="http://a9.com/-/spec/opensearch/1.1/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"> <channel> <title> <![CDATA[Delhi University Library System Search for 'se,phr:&quot;information systems security &amp; assurance series&quot;']]> </title> <!-- prettier-ignore-start --> <link> /cgi-bin/koha/opac-search.pl?idx=&#38;q=se%2Cphr%3A%22information%20systems%20security%20%26%20assurance%20series%22&#38;sort_by=title_asc&#38;format=rss </link> <!-- prettier-ignore-end --> <atom:link rel="self" type="application/rss+xml" href="/cgi-bin/koha/opac-search.pl?idx=&#38;q=se%2Cphr%3A%22information%20systems%20security%20%26%20assurance%20series%22&#38;sort_by=title_asc&#38;format=rss" /> <description> <![CDATA[ Search results for 'se,phr:&quot;information systems security &amp; assurance series&quot;' at Delhi University Library System]]> </description> <opensearch:totalResults>5</opensearch:totalResults> <opensearch:startIndex>0</opensearch:startIndex> <opensearch:itemsPerPage>50</opensearch:itemsPerPage> <atom:link rel="search" type="application/opensearchdescription+xml" href="/cgi-bin/koha/opac-search.pl?idx=&#38;q=se%2Cphr%3A%22information%20systems%20security%20%26%20assurance%20series%22&#38;sort_by=title_asc&#38;format=opensearchdescription" /> <opensearch:Query role="request" searchTerms="idx%3D%26q%3Dse%252Cphr%253A%2522information%2520systems%2520security%2520%2526%2520assurance%2520series%2522" startPage="" /> <item> <title> Fundamentals of information systems security </title> <dc:identifier>ISBN:9780763790257 (pbk) | SL01535375</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=16099</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0763790257.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Kim David; Soloman Michael G.<br /> Sudbury Jones &amp; Bartlett 2012 .<br /> xxii; 514p. , Reference 493-496p.; Index 497-514p. 9780763790257 (pbk) | SL01535375 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=16099">Place hold on <em>Fundamentals of information systems security</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=16099</guid> </item> <item> <title> Fundamentals of information systems security </title> <dc:identifier>ISBN:9781284116458 (pbk)</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=1016</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/128411645X.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Kim David.<br /> Burlington Jones &amp; Bartlett Learning 2018 .<br /> xxii, 548p. ill. , Appendix A-C 491-497p.; Glossary 498-521p.; Index 522-548p. cm.<br /> 9781284116458 (pbk) </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=1016">Place hold on <em>Fundamentals of information systems security</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=1016</guid> </item> <item> <title> Network security, firewalls and VPNs </title> <dc:identifier>ISBN:9780763791308 (pbk) | SL01536269</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=16089</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/076379130X.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Stewart J Michael.<br /> Sudbury J &amp; B 2011 .<br /> xiv; 482p. , References 467-470p.; Index 471-482p. 9780763791308 (pbk) | SL01536269 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=16089">Place hold on <em>Network security, firewalls and VPNs</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=16089</guid> </item> <item> <title> Security policies and implementation issues </title> <dc:identifier>ISBN:9780763791322 (pbk) | SL01535502</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=16366</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0763791326.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Rob Johnson.<br /> UK Jones &amp; Bartlett Learning 2011 .<br /> xvii;437p. , Appendix A-403, B-406; Glossary 407-417p; Include bibbliographical references 419-425p; Index 427-437p 9780763791322 (pbk) | SL01535502 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=16366">Place hold on <em>Security policies and implementation issues</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=16366</guid> </item> <item> <title> Security strategies in window platforms and applications </title> <dc:identifier>ISBN:9780763791933 (pbk) | SL01535138</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=16088</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0763791938.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Solomon Michael G.<br /> Sudbury J &amp; B 2011 .<br /> xv; 384p. , Appendix A-B357-360p.; Glossary 361-370p. ; References 371-374p.; Index 375-384p. 9780763791933 (pbk) | SL01535138 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=16088">Place hold on <em>Security strategies in window platforms and applications</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=16088</guid> </item> </channel> </rss>
