<?xml version="1.0" encoding="utf-8" ?> <rss version="2.0" xmlns:opensearch="http://a9.com/-/spec/opensearch/1.1/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"> <channel> <title> <![CDATA[Great Zimbabwe University Library Catalogue Search for 'su:&quot;Computer security.&quot;']]> </title> <link> /cgi-bin/koha/opac-search.pl?q=ccl=su%3A%22Computer%20security.%22&#38;sort_by=relevance&#38;format=rss </link> <atom:link rel="self" type="application/rss+xml" href="/cgi-bin/koha/opac-search.pl?q=ccl=su%3A%22Computer%20security.%22&#38;sort_by=relevance&#38;format=rss"/> <description> <![CDATA[ Search results for 'su:&quot;Computer security.&quot;' at Great Zimbabwe University Library Catalogue]]> </description> <opensearch:totalResults>4</opensearch:totalResults> <opensearch:startIndex>0</opensearch:startIndex> <opensearch:itemsPerPage>50</opensearch:itemsPerPage> <atom:link rel="search" type="application/opensearchdescription+xml" href="/cgi-bin/koha/opac-search.pl?q=ccl=su%3A%22Computer%20security.%22&#38;sort_by=relevance&#38;format=opensearchdescription"/> <opensearch:Query role="request" searchTerms="q%3Dccl%3Dsu%253A%2522Computer%2520security.%2522" startPage="" /> <item> <title> Information security management : concepts and practice / </title> <dc:identifier>ISBN:9781420078541 (hardcover : alk. paper)</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=4687</link> <description> <![CDATA[ <p> By Raggad, Bel G..<br /> .<br /> xxxv, 832 p. : , &quot;An Auerbach book.&quot; 9781420078541 (hardcover : alk. paper) </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=4687">Place hold on <em>Information security management :</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=4687</guid> </item> <item> <title> Coding for penetration testers : building better tools / </title> <dc:identifier>ISBN:9781597497299 (pbk.)</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=5144</link> <description> <![CDATA[ <p> By Andress, Jason..<br /> .<br /> xxiv, 295 p. : , lncludes index 9781597497299 (pbk.) </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=5144">Place hold on <em>Coding for penetration testers :</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=5144</guid> </item> <item> <title> Introduction to network security / </title> <dc:identifier>ISBN:9781584885436 </dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=5456</link> <description> <![CDATA[ <p> By Jacobson, Douglas.<br /> .<br /> 478 p. : , Includes bibliographical references and index 9781584885436 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=5456">Place hold on <em>Introduction to network security /</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=5456</guid> </item> <item> <title> Professional penetration testing / </title> <dc:identifier>ISBN:9781597499934 (alkaline paper)</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=7771</link> <description> <![CDATA[ <p> By Wilhelm, Thomas..<br /> .<br /> &lt;1&gt; volumes : , Includes bibliographical references (pages 433-434) and index. 9781597499934 (alkaline paper) </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=7771">Place hold on <em>Professional penetration testing /</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=7771</guid> </item> </channel> </rss>
