<?xml version="1.0" encoding="utf-8" ?> <rss version="2.0" xmlns:opensearch="http://a9.com/-/spec/opensearch/1.1/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"> <channel> <title> <![CDATA[Southville International School and Colleges Search for 'su:&quot;Computer security.&quot;']]> </title> <!-- prettier-ignore-start --> <link> https://librarytest.southville.edu.ph/cgi-bin/koha/opac-search.pl?q=ccl=su%3A%22Computer%20security.%22&#38;sort_by=relevance&#38;format=rss </link> <!-- prettier-ignore-end --> <atom:link rel="self" type="application/rss+xml" href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-search.pl?q=ccl=su%3A%22Computer%20security.%22&#38;sort_by=relevance&#38;format=rss" /> <description> <![CDATA[ Search results for 'su:&quot;Computer security.&quot;' at Southville International School and Colleges]]> </description> <opensearch:totalResults>75</opensearch:totalResults> <opensearch:startIndex>0</opensearch:startIndex> <opensearch:itemsPerPage>50</opensearch:itemsPerPage> <atom:link rel="search" type="application/opensearchdescription+xml" href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-search.pl?q=ccl=su%3A%22Computer%20security.%22&#38;sort_by=relevance&#38;format=opensearchdescription" /> <opensearch:Query role="request" searchTerms="q%3Dccl%3Dsu%253A%2522Computer%2520security.%2522" startPage="" /> <item> <title> Digital fortress / </title> <dc:identifier>ISBN:9780312995423 (pbk.) | 0312995423</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=11048</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Brown, Dan,.<br /> New York : St. Martin's Paperbacks, 2004 .<br /> 429 p. ; 18 cm..<br /> 9780312995423 (pbk.) | 0312995423 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=11048">Place hold on <em>Digital fortress /</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=11048</guid> </item> <item> <title> Hacking exposed : Network security secrets and solutions / </title> <dc:identifier>ISBN:0072260815</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=14324</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By McClure, Stuart..<br /> Emeryville, California : McGraw-Hill / Osborne, 2005 .<br /> 692 pages : 23 cm..<br /> 0072260815 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=14324">Place hold on <em>Hacking exposed : Network security secrets and solutions /</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=14324</guid> </item> <item> <title> Defend I.T. : security by example / </title> <dc:identifier>ISBN:0321197674 </dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=14330</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Gupta, Ajay..<br /> Boston : Addison-Wesley, 2004 .<br /> 349 pages : 24 cm..<br /> 0321197674 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=14330">Place hold on <em>Defend I.T. : security by example /</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=14330</guid> </item> <item> <title> Firewalls and internet security : Repelling the wily hacker / </title> <dc:identifier>ISBN:020163466</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=14339</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Cheswick, William R..<br /> Boston, Maassachusetts : Pearson Education, Inc, 2003 .<br /> 433 pages : 24 cm..<br /> 020163466 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=14339">Place hold on <em>Firewalls and internet security : Repelling the wily hacker /</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=14339</guid> </item> <item> <title> Internet security : a jumpstart for systems administrators and IT managers / </title> <dc:identifier>ISBN:1555582982</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=14351</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Speed, Tim..<br /> Amsterdam ; | Boston : Digital Press, 2003 .<br /> 398 pages : 24 cm..<br /> 1555582982 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=14351">Place hold on <em>Internet security : a jumpstart for systems administrators and IT managers /</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=14351</guid> </item> <item> <title> Windows Internet security : protecting your critical data / </title> <dc:identifier>ISBN:0130428310 </dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=15474</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Fogie, Seth..<br /> Upper Saddle River, NJ : Prentice Hall, 2002 .<br /> 370 p. : 24 cm..<br /> 0130428310 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=15474">Place hold on <em>Windows Internet security :</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=15474</guid> </item> <item> <title> Principles of information security / </title> <dc:identifier>ISBN:0619216255 | 9780619216252</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=15479</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Whitman, Michael E.,.<br /> Boston, Mass. : Thomson Course Technology, 2005 .<br /> 576 p. : , Includes index. 24 cm..<br /> 0619216255 | 9780619216252 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=15479">Place hold on <em>Principles of information security /</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=15479</guid> </item> <item> <title> Computer security fundamentals / </title> <dc:identifier>ISBN:0131711296</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=21585</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Easttom, Chuck.<br /> New Jersey : Pearson Prentice Hall, 2006 .<br /> 344 p. : 23 cm..<br /> 0131711296 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=21585">Place hold on <em>Computer security fundamentals /</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=21585</guid> </item> <item> <title> Cyber security essentials / </title> <dc:identifier>ISBN:9781439851234</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=22343</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> Boca Raton, FL : Auerbach Publications, 2011 .<br /> 325 p. : , Includes bibliographical references and index. 23 cm..<br /> 9781439851234 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=22343">Place hold on <em>Cyber security essentials /</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=22343</guid> </item> <item> <title> The art of software security testing : identifying software security flaws / </title> <dc:identifier>ISBN:978-0321-304865</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=22641</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Wysopal, Chris et al..<br /> New Jersey : Addison and Wesley, 2007 .<br /> 266 p. : 25 cm..<br /> 978-0321-304865 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=22641">Place hold on <em>The art of software security testing :</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=22641</guid> </item> <item> <title> Cryptography and network security : principles and practices / </title> <dc:identifier>ISBN:0-13-187316-4</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=23561</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Stallings, William.<br /> Upper Saddle River, New Jersey : Pearson Prentice Hall, 2008 .<br /> 680 p. : 25 cm..<br /> 0-13-187316-4 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=23561">Place hold on <em>Cryptography and network security :</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=23561</guid> </item> <item> <title> Computer security : principles and practice / </title> <dc:identifier>ISBN:9780136004240</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=23562</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Stallings, William.<br /> Upper Saddle River, New Jersey : Pearson Prentice Hall, 2008 .<br /> 680 p. : 26 cm..<br /> 9780136004240 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=23562">Place hold on <em>Computer security :</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=23562</guid> </item> <item> <title> Applied Algebra : codes, ciphers, and discrete algorithms / </title> <dc:identifier>ISBN:9781420071429</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=23663</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Hardy, Darel W..<br /> London : CRC Press, 2009 .<br /> 410 p. : 26 cm..<br /> 9781420071429 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=23663">Place hold on <em>Applied Algebra :</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=23663</guid> </item> <item> <title> Managing information security / </title> <dc:identifier>ISBN:9781597495332</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=24360</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> Amsterdam : Elsevier, 2010 .<br /> 296 p. : 24 cm..<br /> 9781597495332 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=24360">Place hold on <em>Managing information security /</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=24360</guid> </item> <item> <title> Network security essentials : applications and standards / </title> <dc:identifier>ISBN:9780137067923</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=25048</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Stallings, William.<br /> Boston : Pearson, 2011 .<br /> 431 p. : 25 cm..<br /> 9780137067923 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=25048">Place hold on <em>Network security essentials :</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=25048</guid> </item> <item> <title> Management of information security / </title> <dc:identifier>ISBN:9780840031602</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=25487</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Whitman, Michael E..<br /> Boston, MA : Course Technology Cengage Learning, 2010 .<br /> 546 p. : , Includes bibliographical references and index. 25 cm..<br /> 9780840031602 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=25487">Place hold on <em>Management of information security /</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=25487</guid> </item> <item> <title> Low tech hacking : street smarts for security professionals / </title> <dc:identifier>ISBN:9781597496650</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=25494</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Wiles, Jack.<br /> Waltham, Mass : Syngress, 2012 .<br /> xix, 243 p. : , Includes bibliographical references and index 25 cm..<br /> 9781597496650 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=25494">Place hold on <em>Low tech hacking :</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=25494</guid> </item> <item> <title> IT auditing : using controls to protect information assets / </title> <dc:identifier>ISBN:9780071742382</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=25781</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Davis, Chris..<br /> New York : McGraw-Hill, 2011 .<br /> xxix, 480 p. : 24 cm..<br /> 9780071742382 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=25781">Place hold on <em>IT auditing : </em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=25781</guid> </item> <item> <title> Cyberspace and cybersecurity / </title> <dc:identifier>ISBN:9781466501331</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=25788</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Kostopoulos, George K..<br /> Boca Raton, Fl. : CRC Press, 2013 .<br /> xvii, 218 p. : 24 cm..<br /> 9781466501331 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=25788">Place hold on <em>Cyberspace and cybersecurity / </em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=25788</guid> </item> <item> <title> You have mail : true stories of cybercrime / </title> <dc:identifier>ISBN:978053120859 (hbk. lib. bdg) | 0531120856 (hbk. lib. bdg) | 9780531187319 (pbk.) | 0531187314 (pbk.)</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=33822</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Newman, Matthew..<br /> New York : Franklin Watts, 2008 .<br /> 64 p. : 24 cm..<br /> 978053120859 (hbk. lib. bdg) | 0531120856 (hbk. lib. bdg) | 9780531187319 (pbk.) | 0531187314 (pbk.) </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=33822">Place hold on <em>You have mail :</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=33822</guid> </item> <item> <title> Guide to network defense and countermeasures / </title> <dc:identifier>ISBN:9781133727965</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=48686</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Weaver, Randy.<br /> Massachusetts : Course Technology Cengage Learning, 2014 .<br /> 584 p. : , Includes index. 24 cm..<br /> 9781133727965 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=48686">Place hold on <em>Guide to network defense and countermeasures /</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=48686</guid> </item> <item> <title> Preparedness of the Philippine banking industry in dealing with the millenium bug problem / </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=96414</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Co, Ma. Jessielit A..<br /> Las Piñas City, Philippines : Southville International School and Colleges, 2000 .<br /> 31 pages ; 28 cm..<br /> </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=96414">Place hold on <em>Preparedness of the Philippine banking industry in dealing with the millenium bug problem /</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=96414</guid> </item> <item> <title> Awareness on computer viruses / </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=96884</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Lee, Ji Soo..<br /> Las Piñas City, Philippines : Southville International School and Colleges, 2003 .<br /> 54 pages : 28 cm..<br /> </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=96884">Place hold on <em>Awareness on computer viruses /</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=96884</guid> </item> <item> <title> Case studies on computer hacking / </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=97198</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Cabahug, Gino Miguel L..<br /> Las Piñas City, Philippines : Southville International School and Colleges, 2005 .<br /> 39 pages ; 28 cm..<br /> </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=97198">Place hold on <em>Case studies on computer hacking /</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=97198</guid> </item> <item> <title> Computer security practices of S.I.S.C grade 6 student / </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=99010</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Froehlich, Michael Angelo..<br /> Las Piñas City, Philippines : Southville International School and Colleges, 2013 .<br /> 55 pages : 28 cm..<br /> </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=99010">Place hold on <em>Computer security practices of S.I.S.C grade 6 student /</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=99010</guid> </item> <item> <title> Business data networks and security / </title> <dc:identifier>ISBN:9780133080452</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=117471</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Panko, Raymond R..<br /> Boston : Pearson, 2013 .<br /> 500 p. : , Includes glossary and index. 23 cm..<br /> 9780133080452 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=117471">Place hold on <em>Business data networks and security /</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=117471</guid> </item> <item> <title> Terminal Compromise </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=229450</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Schwartau, Winn.<br /> Project Gutenberg, 1993 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=229450">Place hold on <em>Terminal Compromise</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=229450</guid> </item> <item> <title> Underground : Hacking, madness and obsession on the electronic frontier </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=234015</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Dreyfus, Suelette.<br /> Project Gutenberg, 2003 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=234015">Place hold on <em>Underground :</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=234015</guid> </item> <item> <title> Digital defense : what you should know about protecting your company's assets / </title> <dc:identifier>ISBN:1-57851-779-6</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=291085</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Parenty, Thomas J..<br /> Boston, Massachusetts : Harvard Business School Press. 2003 .<br /> 163 pages : , Includes bibliographical references and index. 24 cm. .<br /> 1-57851-779-6 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=291085">Place hold on <em>Digital defense :</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=291085</guid> </item> <item> <title> Hacking and penetration testing with low power devices / </title> <dc:identifier>ISBN:9780128008249 | 0128008245 | 0128007516 | 9780128007518</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=292840</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Polstra, Philip,.<br /> Amsterdam : Elsevier, 2015 .<br /> xv, 260 pages : , Includes index. 23 cm..<br /> 9780128008249 | 0128008245 | 0128007516 | 9780128007518 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=292840">Place hold on <em>Hacking and penetration testing with low power devices /</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=292840</guid> </item> <item> <title> Guide to network defense and countermeasures / </title> <dc:identifier>ISBN:9781133727941 (pbk) | 1133727948 (pbk)</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=292852</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Weaver, Randy..<br /> Australia : Cengage, 2014 .<br /> xxiv, 584 pages : , Includes glossary and index. 23 cm.<br /> 9781133727941 (pbk) | 1133727948 (pbk) </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=292852">Place hold on <em>Guide to network defense and countermeasures /</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=292852</guid> </item> <item> <title> Computer and information security handbook / </title> <dc:identifier>ISBN:9780123943972</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=294992</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> Amsterdam : Elsevier, 2013 .<br /> xxviii, 1171 pages : , Includes bibliographical references and index. 29 cm.<br /> 9780123943972 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=294992">Place hold on <em>Computer and information security handbook /</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=294992</guid> </item> <item> <title> The basics of information security : understanding the fundamentals of InfoSec in theory and practice / </title> <dc:identifier>ISBN:9780128007440</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=295583</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Andress, Jason..<br /> Amsterdam : Elsevier, 2014 .<br /> xxi, 217 pages ; , Includes index. 24 cm..<br /> 9780128007440 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=295583">Place hold on <em>The basics of information security :</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=295583</guid> </item> <item> <title> Firewalls : jumpstart for network and systems administrators / </title> <dc:identifier>ISBN:1-55558-297-4</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=300895</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Vacca, John R..<br /> Amsterdam : Elsevier Dig. Press., 2005 .<br /> 418 pages : , Includes bibliographical references and index. 24 cm..<br /> 1-55558-297-4 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=300895">Place hold on <em>Firewalls :</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=300895</guid> </item> <item> <title> Computer security / </title> <dc:identifier>ISBN:978-0-470-47115-3</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=300941</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Gollmann, Dieter..<br /> Great Britain : John Wiley &amp; Sons, Ltd., 2011 .<br /> 436 pages : , Includes bibliographical references and index. 24 cm..<br /> 978-0-470-47115-3 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=300941">Place hold on <em>Computer security /</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=300941</guid> </item> <item> <title> Software forensics : collecting evidence from the scene of a digital crime / </title> <dc:identifier>ISBN:0-07-142804-6</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=300943</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Slade, Robert M..<br /> New York : McGraw-Hill., 2004 .<br /> 512 pages : , Includes index. 24 cm..<br /> 0-07-142804-6 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=300943">Place hold on <em>Software forensics :</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=300943</guid> </item> <item> <title> Hacking for dummies / </title> <dc:identifier>ISBN:1119154685 | 9781119154686</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=305379</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Beaver, Kevin,.<br /> NJ : John Wiley &amp; Sons, Inc., 2016 .<br /> xvi, 390 pages : , Previous edition: 2013. | Includes and index. 24 cm..<br /> 1119154685 | 9781119154686 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=305379">Place hold on <em>Hacking for dummies /</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=305379</guid> </item> <item> <title> Hacker techniques, tools, and incident handling / </title> <dc:identifier>ISBN:9781284031713</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=335151</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Oriyano, Sean-Philip..<br /> MA : Jones &amp; Bartlett Learning, 2016 .<br /> xvii, 417 pages : , Includes glossary, index and bibliographical references. 23 cm..<br /> 9781284031713 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=335151">Place hold on <em>Hacker techniques, tools, and incident handling /</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=335151</guid> </item> <item> <title> Finding and Fixing Vulnerabilities in Information Systems The Vulnerability Assessment and Mitigation Methodology </title> <dc:identifier>ISBN:9780833034342</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=352090</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Anton, Philip S.;Anderson, Robert H.;Mesic, Richard;Scheiern, Michael.<br /> RAND Corporation 2003 9780833034342 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=352090">Place hold on <em>Finding and Fixing Vulnerabilities in Information Systems</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=352090</guid> </item> <item> <title> Hackers Wanted An Examination of the Cybersecurity Labor Market </title> <dc:identifier>ISBN:9780833085009</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=352127</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Libicki, Martin C.;Senty, David;Pollak, Julia.<br /> RAND Corporation 2014 9780833085009 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=352127">Place hold on <em>Hackers Wanted</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=352127</guid> </item> <item> <title> Digital Identity An Emergent Legal Concept </title> <dc:identifier>ISBN:9780980723014</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=352914</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Sullivan, Clare.<br /> University of Adelaide Press 2011 9780980723014 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=352914">Place hold on <em>Digital Identity</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=352914</guid> </item> <item> <title> Principles of information security / </title> <dc:identifier>ISBN:978-1-337-10206-3</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=358100</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Whitman, Michael E..<br /> Australia : Cengage Learning, 2018 .<br /> 728 pages : , Includes bibliographical references and index. 23 cm..<br /> 978-1-337-10206-3 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=358100">Place hold on <em>Principles of information security /</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=358100</guid> </item> <item> <title> The CPA Journal: the voice of the profession </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=358876</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Kravitz, Richard H..<br /> The New york state society of certified public accountants 2018 .<br /> pages 6-80, June 2018 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=358876">Place hold on <em>The CPA Journal: the voice of the profession</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=358876</guid> </item> <item> <title> How to build a cyber-resilient organization/ </title> <dc:identifier>ISBN:978-113-85-5819-9</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=364168</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Shoemaker, Dan.<br /> Quezon City: C and E Publishing, Inc. 2019 .<br /> xxi, 296 pages 24 cm..<br /> 978-113-85-5819-9 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=364168">Place hold on <em>How to build a cyber-resilient organization/</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=364168</guid> </item> <item> <title> Guide to operating systems/ </title> <dc:identifier>ISBN:978-981-4846-13-4</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=364384</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Tomsho, Greg.<br /> Singapore: CENGAGE 2019 .<br /> xxii, 579 pages 25 cm..<br /> 978-981-4846-13-4 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=364384">Place hold on <em>Guide to operating systems/</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=364384</guid> </item> <item> <title> Guide to operating systems/ </title> <dc:identifier>ISBN:978-981-4846-13-4</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=364385</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Tomsho, Greg.<br /> Singapore: CENGAGE 2019 .<br /> xxii, 579 pages 25 cm..<br /> 978-981-4846-13-4 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=364385">Place hold on <em>Guide to operating systems/</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=364385</guid> </item> <item> <title> Information assurance and security 1&amp;2 </title> <dc:identifier>ISBN:978-971-9655-03-9</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=365208</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Abante, Marmelo.<br /> Manila Mindshapers Co., Inc. 2022 .<br /> vi, 520 pages ; , Computer security. 26 cm. .<br /> 978-971-9655-03-9 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=365208">Place hold on <em>Information assurance and security 1&amp;2</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=365208</guid> </item> <item> <title> Cyber security </title> <dc:identifier>ISBN:978-1-98467-976-5</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=365320</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By 3G E-learning.<br /> New York 3G E-learning LLC 2023 .<br /> xii, 385 pages : , Cybersecurity. 26cm. .<br /> 978-1-98467-976-5 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=365320">Place hold on <em>Cyber security</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=365320</guid> </item> <item> <title> Cyber security </title> <dc:identifier>ISBN:978-1-98467-976-5</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=365321</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By 3G E-learning.<br /> New York 3G E-learning LLC 2023 .<br /> xii, 385 pages : , Cybersecurity. 26cm. .<br /> 978-1-98467-976-5 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=365321">Place hold on <em>Cyber security</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=365321</guid> </item> <item> <title> Cyber security </title> <dc:identifier>ISBN:978-1-98467-976-5</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=365322</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By 3G E-learning.<br /> New York 3G E-learning LLC 2023 .<br /> xii, 385 pages : , Cybersecurity. 26cm. .<br /> 978-1-98467-976-5 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=365322">Place hold on <em>Cyber security</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=365322</guid> </item> </channel> </rss>
