<?xml version="1.0" encoding="utf-8" ?> <rss version="2.0" xmlns:opensearch="http://a9.com/-/spec/opensearch/1.1/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"> <channel> <title> <![CDATA[Delhi University Library System Search for 'su:{ Business-data processing-security measures}']]> </title> <!-- prettier-ignore-start --> <link> /cgi-bin/koha/opac-search.pl?idx=&#38;q=su%3A%7B%20Business-data%20processing-security%20measures%7D&#38;sort_by=title_asc&#38;format=rss </link> <!-- prettier-ignore-end --> <atom:link rel="self" type="application/rss+xml" href="/cgi-bin/koha/opac-search.pl?idx=&#38;q=su%3A%7B%20Business-data%20processing-security%20measures%7D&#38;sort_by=title_asc&#38;format=rss" /> <description> <![CDATA[ Search results for 'su:{ Business-data processing-security measures}' at Delhi University Library System]]> </description> <opensearch:totalResults>2</opensearch:totalResults> <opensearch:startIndex>0</opensearch:startIndex> <opensearch:itemsPerPage>50</opensearch:itemsPerPage> <atom:link rel="search" type="application/opensearchdescription+xml" href="/cgi-bin/koha/opac-search.pl?idx=&#38;q=su%3A%7B%20Business-data%20processing-security%20measures%7D&#38;sort_by=title_asc&#38;format=opensearchdescription" /> <opensearch:Query role="request" searchTerms="idx%3D%26q%3Dsu%253A%257B%2520Business-data%2520processing-security%2520measures%257D" startPage="" /> <item> <title> Security risk assessment handbook: A complete guide for performing security risk assessments </title> <dc:identifier>ISBN:0849329981 (hbd)</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=29082</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0849329981.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Landoll Douglas J.<br /> Boca Raton Auerbach Publications 2006 .<br /> xxi, 473p. , Includes bibliographical references.; Appendix 433-453p.; Index 455-473p. cm..<br /> 0849329981 (hbd) </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=29082">Place hold on <em>Security risk assessment handbook: A complete guide for performing security risk assessments</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=29082</guid> </item> <item> <title> Security strategy from requirements to reality </title> <dc:identifier>ISBN:9781439827338 (pbk)</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=29719</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1439827338.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Stackpole Bill.<br /> Boca Raton CRC Pres 2011 .<br /> xxiii, 321p. , References 295-302p.; Appendices 303-312p.; Index 313-321p. cm..<br /> 9781439827338 (pbk) </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=29719">Place hold on <em>Security strategy from requirements to reality</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=29719</guid> </item> </channel> </rss>
