<?xml version="1.0" encoding="utf-8" ?> <rss version="2.0" xmlns:opensearch="http://a9.com/-/spec/opensearch/1.1/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"> <channel> <title> <![CDATA[ Search for 'su:&quot;Computer security&quot;']]> </title> <!-- prettier-ignore-start --> <link> http://saiunivopac.2cqrkoha.com/cgi-bin/koha/opac-search.pl?q=ccl=su%3A%22Computer%20security%22&#38;sort_by=relevance&#38;format=rss </link> <!-- prettier-ignore-end --> <atom:link rel="self" type="application/rss+xml" href="http://saiunivopac.2cqrkoha.com/cgi-bin/koha/opac-search.pl?q=ccl=su%3A%22Computer%20security%22&#38;sort_by=relevance&#38;format=rss" /> <description> <![CDATA[ Search results for 'su:&quot;Computer security&quot;' at ]]> </description> <opensearch:totalResults>3</opensearch:totalResults> <opensearch:startIndex>0</opensearch:startIndex> <opensearch:itemsPerPage>50</opensearch:itemsPerPage> <atom:link rel="search" type="application/opensearchdescription+xml" href="http://saiunivopac.2cqrkoha.com/cgi-bin/koha/opac-search.pl?q=ccl=su%3A%22Computer%20security%22&#38;sort_by=relevance&#38;format=opensearchdescription" /> <opensearch:Query role="request" searchTerms="q%3Dccl%3Dsu%253A%2522Computer%2520security%2522" startPage="" /> <item> <title> Machine Learning, Blockchain Technologies and Big Data Analytics for IoTs : Methods, technologies and applications / </title> <dc:identifier>ISBN:9781839533396</dc:identifier> <!-- prettier-ignore-start --> <link>http://saiunivopac.2cqrkoha.com/cgi-bin/koha/opac-detail.pl?biblionumber=6789</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1839533390.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> Stevenage : Institution of Engineering &amp; Technology, | ©2022 2022 .<br /> xix, 639 pages : , Include Index | Gifted By Ajith Abraham 9781839533396 </p> ]]> <![CDATA[ <p> <a href="http://saiunivopac.2cqrkoha.com/cgi-bin/koha/opac-reserve.pl?biblionumber=6789">Place hold on <em>Machine Learning, Blockchain Technologies and Big Data Analytics for IoTs :</em></a> </p> ]]> </description> <guid>http://saiunivopac.2cqrkoha.com/cgi-bin/koha/opac-detail.pl?biblionumber=6789</guid> </item> <item> <title> Computational intelligence in information assurance and security / </title> <dc:identifier>ISBN:9783540710776</dc:identifier> <!-- prettier-ignore-start --> <link>http://saiunivopac.2cqrkoha.com/cgi-bin/koha/opac-detail.pl?biblionumber=6831</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/3540710779.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> Berlin : Springer, | 2007 | ©2007 2007 .<br /> xx, 254 pages : , Gifted by Professor Ajith Abraham 9783540710776 </p> ]]> <![CDATA[ <p> <a href="http://saiunivopac.2cqrkoha.com/cgi-bin/koha/opac-reserve.pl?biblionumber=6831">Place hold on <em>Computational intelligence in information assurance and security /</em></a> </p> ]]> </description> <guid>http://saiunivopac.2cqrkoha.com/cgi-bin/koha/opac-detail.pl?biblionumber=6831</guid> </item> <item> <title> The Art of Intrusion : The Real Stories Behind the Exploits of Hackers, Intruders &amp; Deceivers / </title> <dc:identifier>ISBN:9780471782667 | 0471782661</dc:identifier> <!-- prettier-ignore-start --> <link>http://saiunivopac.2cqrkoha.com/cgi-bin/koha/opac-detail.pl?biblionumber=6850</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0471782661.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Mitnick, Kevin D.<br /> Indianapolis, IN : Wiley Publishing, Inc., | [2006]. | ©2006 2006 .<br /> xvii, 270 pages : , Gifted by Professor Ajith Abraham 9780471782667 | 0471782661 </p> ]]> <![CDATA[ <p> <a href="http://saiunivopac.2cqrkoha.com/cgi-bin/koha/opac-reserve.pl?biblionumber=6850">Place hold on <em>The Art of Intrusion :</em></a> </p> ]]> </description> <guid>http://saiunivopac.2cqrkoha.com/cgi-bin/koha/opac-detail.pl?biblionumber=6850</guid> </item> </channel> </rss>
