<?xml version="1.0" encoding="utf-8" ?> <rss version="2.0" xmlns:opensearch="http://a9.com/-/spec/opensearch/1.1/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"> <channel> <title> <![CDATA[Delhi University Library System Search for 'su:{ Windows security}']]> </title> <!-- prettier-ignore-start --> <link> /cgi-bin/koha/opac-search.pl?idx=&#38;q=su%3A%7B%20Windows%20security%7D&#38;sort_by=title_asc&#38;format=rss </link> <!-- prettier-ignore-end --> <atom:link rel="self" type="application/rss+xml" href="/cgi-bin/koha/opac-search.pl?idx=&#38;q=su%3A%7B%20Windows%20security%7D&#38;sort_by=title_asc&#38;format=rss" /> <description> <![CDATA[ Search results for 'su:{ Windows security}' at Delhi University Library System]]> </description> <opensearch:totalResults>19</opensearch:totalResults> <opensearch:startIndex>0</opensearch:startIndex> <opensearch:itemsPerPage>50</opensearch:itemsPerPage> <atom:link rel="search" type="application/opensearchdescription+xml" href="/cgi-bin/koha/opac-search.pl?idx=&#38;q=su%3A%7B%20Windows%20security%7D&#38;sort_by=title_asc&#38;format=opensearchdescription" /> <opensearch:Query role="request" searchTerms="idx%3D%26q%3Dsu%253A%257B%2520Windows%2520security%257D" startPage="" /> <item> <title> Computer security </title> <dc:identifier>ISBN:9780470741153 (pbk) | SL01559257</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=16835</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0470741155.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Gollmann Dieter.<br /> West Sessex Wiley 2011 .<br /> xix,436p. 9780470741153 (pbk) | SL01559257 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=16835">Place hold on <em>Computer security</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=16835</guid> </item> <item> <title> Computer security </title> <dc:identifier>ISBN:9780470741153 (pbk) | SL01559256</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=16834</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0470741155.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Gollmann Dieter.<br /> West Sessex Wiley 2011 .<br /> xix,436p. 9780470741153 (pbk) | SL01559256 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=16834">Place hold on <em>Computer security</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=16834</guid> </item> <item> <title> Digital Privacy and Security Using Windows </title> <dc:identifier>ISBN:9781484227992</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=1624187</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1484227999.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Nihad Hassan, Rami Hijazi.<br /> Springer 2017 9781484227992 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=1624187">Place hold on <em>Digital Privacy and Security Using Windows</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=1624187</guid> </item> <item> <title> Mastering Defensive Security: Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=1724181</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Bravo.<br /> IEEE </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=1724181">Place hold on <em>Mastering Defensive Security: Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=1724181</guid> </item> <item> <title> Mastering Windows Security and Hardening: Secure and protect your Windows environment from cyber threats using zero-trust security principles </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=1724241</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Dunkerley.<br /> IEEE </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=1724241">Place hold on <em>Mastering Windows Security and Hardening: Secure and protect your Windows environment from cyber threats using zero-trust security principles</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=1724241</guid> </item> <item> <title> MDM: Fundamentals, Security and the Modern Desktop - Using Intune, Autopilot and Azure to Manage, Deploy and Secure Windows 10 </title> <dc:identifier>ISBN:9781119564362</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=1552157</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1119564360.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Jeremy Moskowitz.<br /> Wiley 2019 9781119564362 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=1552157">Place hold on <em>MDM: Fundamentals, Security and the Modern Desktop - Using Intune, Autopilot and Azure to Manage, Deploy and Secure Windows 10</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=1552157</guid> </item> <item> <title> MDM: Fundamentals, Security, and the Modern Desktop: Using Intune, Autopilot, and Azure to Manage, Deploy, and Secure Windows 10 </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=1719825</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Moskowitz.<br /> IEEE </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=1719825">Place hold on <em>MDM: Fundamentals, Security, and the Modern Desktop: Using Intune, Autopilot, and Azure to Manage, Deploy, and Secure Windows 10</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=1719825</guid> </item> <item> <title> Microsoft windows 2000 security Technical reference. </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=773811</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> New Delhi Prentice-Hall of India 2001 .<br /> xix,582p. cm..<br /> </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=773811">Place hold on <em>Microsoft windows 2000 security </em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=773811</guid> </item> <item> <title> Microsoft windows 2000 security Technical reference. </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=773810</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> New Delhi Prentice-Hall of India 2001 .<br /> xix,582p. cm..<br /> </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=773810">Place hold on <em>Microsoft windows 2000 security </em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=773810</guid> </item> <item> <title> MICROSOFT WINDOWS 2000 security. </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=815710</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> 2000 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=815710">Place hold on <em>MICROSOFT WINDOWS 2000 security.</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=815710</guid> </item> <item> <title> Microsoft windows security fundamentals </title> <dc:identifier>ISBN:9781555583408 (pbk)</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=30709</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1555583407.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Clercq Jan de.<br /> Amsterdam Elsevier Digital Press 2007 .<br /> xxviii, 803p. , Index 773-803p. cm..<br /> 9781555583408 (pbk) </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=30709">Place hold on <em>Microsoft windows security fundamentals</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=30709</guid> </item> <item> <title> Securing Cloud PCs and Azure Virtual Desktop: Start implementing and optimizing security for Windows 365 and AVD infrastructure </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=1724503</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Verham.<br /> IEEE </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=1724503">Place hold on <em>Securing Cloud PCs and Azure Virtual Desktop: Start implementing and optimizing security for Windows 365 and AVD infrastructure</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=1724503</guid> </item> <item> <title> Security strategies in window platforms and applications </title> <dc:identifier>ISBN:9780763791933 (pbk) | SL01535138</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=16088</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0763791938.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Solomon Michael G.<br /> Sudbury J &amp; B 2011 .<br /> xv; 384p. , Appendix A-B357-360p.; Glossary 361-370p. ; References 371-374p.; Index 375-384p. 9780763791933 (pbk) | SL01535138 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=16088">Place hold on <em>Security strategies in window platforms and applications</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=16088</guid> </item> <item> <title> Windows 2012 Server Network Security </title> <dc:identifier>ISBN:9781597499583</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=1840073</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1597499587.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Rountree, Derrick.<br /> Elsevier 2013 9781597499583 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=1840073">Place hold on <em>Windows 2012 Server Network Security</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=1840073</guid> </item> <item> <title> Windows forensic analysis DVD tool kit </title> <dc:identifier>ISBN:9781597494229 (pbk)</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=29977</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1597494224.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Carvey Harlan.<br /> Burlington Syngress Publishing Inc. 2009 .<br /> xxiv, 482p. , Index 469- 482p. cm..<br /> 9781597494229 (pbk) </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=29977">Place hold on <em>Windows forensic analysis DVD tool kit</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=29977</guid> </item> <item> <title> Windows networking tools : the complete guide to managemant, troubleshooting, and security </title> <dc:identifier>ISBN:9781466511064 (pbk) | SL01560366</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=6732</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1466511060.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Gilbert Held.<br /> Boca RAton CRC Press 2013 .<br /> xii, 378p. , Index 361-378p. 9781466511064 (pbk) | SL01560366 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=6732">Place hold on <em>Windows networking tools : the complete guide to managemant, troubleshooting, and security</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=6732</guid> </item> <item> <title> Windows Networking Tools The Complete Guide to Management, Troubleshooting, and Security </title> <dc:identifier>ISBN:9780429185496</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=1757275</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0429185499.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Gilbert Held.<br /> Taylor and Francis 2013 9780429185496 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=1757275">Place hold on <em>Windows Networking Tools</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=1757275</guid> </item> <item> <title> Windows Security Monitoring: Scenarios and Patterns </title> <dc:identifier>ISBN:9781119390909</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=1553947</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1119390907.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Andrei Miroshnikov.<br /> Wiley 2018 9781119390909 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=1553947">Place hold on <em>Windows Security Monitoring: Scenarios and Patterns</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=1553947</guid> </item> <item> <title> Windows Server 2012 Security from End to Edge and Beyond </title> <dc:identifier>ISBN:9781597499804</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=1840074</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1597499803.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Shinder, Thomas W.<br /> Elsevier 2013 9781597499804 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=1840074">Place hold on <em>Windows Server 2012 Security from End to Edge and Beyond</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=1840074</guid> </item> </channel> </rss>
