<?xml version="1.0" encoding="utf-8" ?> <rss version="2.0" xmlns:opensearch="http://a9.com/-/spec/opensearch/1.1/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"> <channel> <title> <![CDATA[Delhi University Library System Search for 'su:{CYBER CRIME}']]> </title> <!-- prettier-ignore-start --> <link> /cgi-bin/koha/opac-search.pl?idx=&#38;q=su%3A%7BCYBER%20CRIME%7D&#38;sort_by=relevance&#38;format=rss </link> <!-- prettier-ignore-end --> <atom:link rel="self" type="application/rss+xml" href="/cgi-bin/koha/opac-search.pl?idx=&#38;q=su%3A%7BCYBER%20CRIME%7D&#38;sort_by=relevance&#38;format=rss" /> <description> <![CDATA[ Search results for 'su:{CYBER CRIME}' at Delhi University Library System]]> </description> <opensearch:totalResults>12</opensearch:totalResults> <opensearch:startIndex>0</opensearch:startIndex> <opensearch:itemsPerPage>50</opensearch:itemsPerPage> <atom:link rel="search" type="application/opensearchdescription+xml" href="/cgi-bin/koha/opac-search.pl?idx=&#38;q=su%3A%7BCYBER%20CRIME%7D&#38;sort_by=relevance&#38;format=opensearchdescription" /> <opensearch:Query role="request" searchTerms="idx%3D%26q%3Dsu%253A%257BCYBER%2520CRIME%257D" startPage="" /> <item> <title> Cyber Crime Issues Threats and Management.V2 </title> <dc:identifier>ISBN:8182050502</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=1180209</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/8182050502.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Jain Atul Ed..<br /> Delhi Isha Books India 2005 .<br /> 303+4 8182050502 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=1180209">Place hold on <em>Cyber Crime </em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=1180209</guid> </item> <item> <title> Cyber Crime Issues Threats and Management.V2 </title> <dc:identifier>ISBN:8182050502</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=1180208</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/8182050502.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Jain Atul Ed..<br /> Delhi Isha Books India 2005 .<br /> 303+4 8182050502 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=1180208">Place hold on <em>Cyber Crime </em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=1180208</guid> </item> <item> <title> Cyber Crime Investigon Manual </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=1194929</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Nagpal Rohas.<br /> Pune Sun Publications India 2010 .<br /> 627 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=1194929">Place hold on <em>Cyber Crime Investigon Manual</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=1194929</guid> </item> <item> <title> Cyber Crime in India A Comparative Study </title> <dc:identifier>ISBN:9788171772209</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=1193941</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/817177220X.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Dasgupta M..<br /> Kolkata Eastern Law House Private Ltd. India 2009 .<br /> 419 9788171772209 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=1193941">Place hold on <em>Cyber Crime in India </em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=1193941</guid> </item> <item> <title> Cyber crime and cyber terrorism </title> <dc:identifier>ISBN:9780128007433 (pbk) | SL01562277</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=14015</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0128007435.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Akhgar Babak Ed.; Staniforth Andrew Ed.; Bosco Francesca Ed..<br /> New York Elsevier 2014 .<br /> xxiii, 282p. , Includes bibliographical references; Index 275-282p. 9780128007433 (pbk) | SL01562277 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=14015">Place hold on <em>Cyber crime and cyber terrorism</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=14015</guid> </item> <item> <title> Cyber Crime and Procedural Laws: in Human Rights Context </title> <dc:identifier>ISBN:9789391308254</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=1269281</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/9391308252.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Mishra, Ashutosh.<br /> New Delhi, India: VL Media Solutions, 2021 .<br /> xxvi, 325p. 9789391308254 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=1269281">Place hold on <em>Cyber Crime and Procedural Laws:</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=1269281</guid> </item> <item> <title> Cyber crime security and digital intelligence </title> <dc:identifier>ISBN:9781409454496 (hbk) | SL01562558</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=17061</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1409454495.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Johnson Mark.<br /> Wey court east Gower 2013 .<br /> xlv, 252p. , Appendix 243-246p.; Index 247-252p. 9781409454496 (hbk) | SL01562558 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=17061">Place hold on <em>Cyber crime security and digital intelligence</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=17061</guid> </item> <item> <title> Cyber power : crime conflict and security in cyberspace </title> <dc:identifier>ISBN:9781466573048 (hbk) | SL01560582</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=16163</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/146657304X.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Ghermaouti Solange.<br /> Suite EFPL 2013 .<br /> xv,449p. , Glossary 425-442p.; Annex 443-446p.; Index 447-449p. 9781466573048 (hbk) | SL01560582 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=16163">Place hold on <em>Cyber power : crime conflict and security in cyberspace</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=16163</guid> </item> <item> <title> Language of cyber attacks: a rhetoric of deception </title> <dc:identifier>ISBN:9781350354678 (pbk)</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=1679872</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1350354678.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Mauro, Arron.<br /> London, UK: Bloomsbury, 2024 .<br /> 224p. 9781350354678 (pbk) </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=1679872">Place hold on <em>Language of cyber attacks: a rhetoric of deception</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=1679872</guid> </item> <item> <title> Cyber Crimes/ </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=1400967</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Fatima, Talat .<br /> Faridabad, India: Allahabad Law Agency, 2017 .<br /> Lvi, 703p. </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=1400967">Place hold on <em>Cyber Crimes/</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=1400967</guid> </item> <item> <title> Cyber Attacks: Protecting national infrastructure </title> <dc:identifier>ISBN:9780123918550 (hbk) | SL01559895</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=5861</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0123918553.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Amoroso Edward G.<br /> Amsterdam Butterworth- Heinemann 2013 .<br /> xvi,320p. , Appendix A-B 283-304p.; Index 305-319p. 9780123918550 (hbk) | SL01559895 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=5861">Place hold on <em>Cyber Attacks: Protecting national infrastructure</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=5861</guid> </item> <item> <title> Computer security fundamentals </title> <dc:identifier>ISBN:0131711296 (pbk)</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=29385</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0131711296.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Easttom Chuck.<br /> New Jersey Pearson Education, Inc. 2006 .<br /> xxii, 344p. , Appendix A-C, 301-326p.; Glossary 327-332p.; Bibliographical references 333-344p. cm..<br /> 0131711296 (pbk) </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=29385">Place hold on <em>Computer security fundamentals</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=29385</guid> </item> </channel> </rss>
