<?xml version="1.0" encoding="utf-8" ?> <rss version="2.0" xmlns:opensearch="http://a9.com/-/spec/opensearch/1.1/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"> <channel> <title> <![CDATA[MAASAI MARA UNIVERSITY LIBRARY Search for 'su:&quot;Computer security&quot;']]> </title> <!-- prettier-ignore-start --> <link> /cgi-bin/koha/opac-search.pl?q=ccl=su%3A%22Computer%20security%22&#38;sort_by=relevance&#38;format=rss </link> <!-- prettier-ignore-end --> <atom:link rel="self" type="application/rss+xml" href="/cgi-bin/koha/opac-search.pl?q=ccl=su%3A%22Computer%20security%22&#38;sort_by=relevance&#38;format=rss" /> <description> <![CDATA[ Search results for 'su:&quot;Computer security&quot;' at MAASAI MARA UNIVERSITY LIBRARY]]> </description> <opensearch:totalResults>16</opensearch:totalResults> <opensearch:startIndex>0</opensearch:startIndex> <opensearch:itemsPerPage>50</opensearch:itemsPerPage> <atom:link rel="search" type="application/opensearchdescription+xml" href="/cgi-bin/koha/opac-search.pl?q=ccl=su%3A%22Computer%20security%22&#38;sort_by=relevance&#38;format=opensearchdescription" /> <opensearch:Query role="request" searchTerms="q%3Dccl%3Dsu%253A%2522Computer%2520security%2522" startPage="" /> <item> <title> Pfleeger charles P </title> <dc:identifier>ISBN:130355488</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=3359</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> .<br /> USA Prentice Hall 2003 , Includes index 130355488 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=3359">Place hold on <em>Pfleeger charles P </em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=3359</guid> </item> <item> <title> _Security in computing / </title> <dc:identifier>ISBN:133374866</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=3714</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Pfleeger, Charles P. .<br /> Upper Saddle: Prentice hall, 1996 .<br /> xviii, 574 p. : , include index 133374866 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=3714">Place hold on <em>_Security in computing /</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=3714</guid> </item> <item> <title> _Mainframe basics for securit getting started with RACF Ori Pomerantz </title> <dc:identifier>ISBN:9.7801317386e+012</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=7401</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> Upper Saddle pearson 2008 .<br /> xxi,156p.;ill 9.7801317386e+012 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=7401">Place hold on <em>_Mainframe basics for securit getting started with RACF Ori Pomerantz </em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=7401</guid> </item> <item> <title> Greekonomics The Real cost of insecure Software / </title> <dc:identifier>ISBN:321477898</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=7918</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Rice David .<br /> New York : Pearson Education, 1999 .<br /> xx,362 p. : , Includes index 321477898 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=7918">Place hold on <em>Greekonomics The Real cost of insecure Software / </em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=7918</guid> </item> <item> <title> _Security in computing [3rd ed.] </title> <dc:identifier>ISBN:130355488</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=12299</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> USA Prentice Hall 2003 .<br /> xxix,746p. , Includes index 130355488 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=12299">Place hold on <em>_Security in computing [3rd ed.] </em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=12299</guid> </item> <item> <title> _Security in computing (2nd ed) charles P. Pfleeger </title> <dc:identifier>ISBN:133374866</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=12654</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> Upper Saddle Prentice hall 1996 .<br /> xviii,574p.;ill. , include index 133374866 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=12654">Place hold on <em>_Security in computing (2nd ed) charles P. Pfleeger </em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=12654</guid> </item> <item> <title> Security in computing/ </title> <dc:identifier>ISBN:130355488</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=15336</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> USA : Prentice Hall , 2003 .<br /> xxix, 746 p. : , Includes index 130355488 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=15336">Place hold on <em>Security in computing/</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=15336</guid> </item> <item> <title> Minoli-Cordovana's authoritative computer &amp; network security dictionary / </title> <dc:identifier>ISBN:0471782637 | 9780471782636</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=16325</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Minoli, Daniel,.<br /> Hoboken, N.J. : Wiley-Interscience, 2006 .<br /> xii, 443 p. : 26 cm..<br /> 0471782637 | 9780471782636 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=16325">Place hold on <em>Minoli-Cordovana's authoritative computer &amp; network security dictionary /</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=16325</guid> </item> <item> <title> Java security / </title> <dc:identifier>ISBN:0596001576</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=17017</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Oaks, Scott..<br /> Sebastopol, CA : O'Reilly, 2001 .<br /> xvi, 599 p. : , Includes index. 24 cm..<br /> 0596001576 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=17017">Place hold on <em>Java security /</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=17017</guid> </item> <item> <title> Mainframe basics for security professionals : getting started with RACF / </title> <dc:identifier>ISBN:9780131738560 (hbk. : alk. paper) | 0131738569 (hbk. : alk. paper)</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=18903</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> Upper Saddle River, NJ : IBM Press/Pearson, 2008 .<br /> xxi, 156 p. : 25 cm..<br /> 9780131738560 (hbk. : alk. paper) | 0131738569 (hbk. : alk. paper) </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=18903">Place hold on <em>Mainframe basics for security professionals :</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=18903</guid> </item> <item> <title> Building secure software how to avoid security problems the right way / </title> <dc:identifier>ISBN:020172152X</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=21537</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Viega, John..<br /> Boston : Addison-Wesley, 2002 .<br /> xxx, 493 p. : , Includes bibliographical references and index. 24 cm..<br /> 020172152X </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=21537">Place hold on <em>Building secure software</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=21537</guid> </item> <item> <title> B2B and beyond : new business models built on trust / </title> <dc:identifier>ISBN:0471054666 (cloth : alk. paper)</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=22897</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By DeMaio, Harry B..<br /> New York : Wiley, 2001 .<br /> xix, 380 p. : , Includes index. 24 cm..<br /> 0471054666 (cloth : alk. paper) </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=22897">Place hold on <em>B2B and beyond :</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=22897</guid> </item> <item> <title> The web application hacker's handbook : discovering and exploiting security flaws / </title> <dc:identifier>ISBN:9780470170779 (pbk.) | 0470170778 (pbk.)</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=23465</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Stuttard, Dafydd,.<br /> Indianapolis, IN : Wiley Pub., 2008 .<br /> xxxii, 736 p. : , Includes index. 24 cm..<br /> 9780470170779 (pbk.) | 0470170778 (pbk.) </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=23465">Place hold on <em>The web application hacker's handbook :</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=23465</guid> </item> <item> <title> Cyber security/ </title> <dc:identifier>ISBN:9781633697874</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=32592</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> Boston: Harvard Business, 2019 .<br /> 158 p,: , includes bibliography and index 9781633697874 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=32592">Place hold on <em>Cyber security/</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=32592</guid> </item> <item> <title> Network forensics : privacy and security / </title> <dc:identifier>ISBN:9780367493615 | 9780367493646</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=32797</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Bijalwan, Anchit,.<br /> Boca Raton : Chapman &amp; Hall/CRC Press, 2022 .<br /> xv,281pages , Includes bibliographical references and index 9780367493615 | 9780367493646 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=32797">Place hold on <em>Network forensics :</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=32797</guid> </item> <item> <title> Network forensics : privacy and security / </title> <dc:identifier>ISBN:9780367493615 | 9780367493646</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=32798</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Bijalwan, Anchit,.<br /> Boca Raton : Chapman &amp; Hall/CRC Press, 2022 .<br /> xv,281pages , Includes bibliographical references and index 9780367493615 | 9780367493646 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=32798">Place hold on <em>Network forensics :</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=32798</guid> </item> </channel> </rss>
