<?xml version="1.0" encoding="utf-8" ?> <rss version="2.0" xmlns:opensearch="http://a9.com/-/spec/opensearch/1.1/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"> <channel> <title> <![CDATA[Southville International School and Colleges Search for 'su:&quot;Data protection&quot;']]> </title> <!-- prettier-ignore-start --> <link> https://librarytest.southville.edu.ph/cgi-bin/koha/opac-search.pl?q=ccl=su%3A%22Data%20protection%22&#38;sort_by=relevance&#38;format=rss </link> <!-- prettier-ignore-end --> <atom:link rel="self" type="application/rss+xml" href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-search.pl?q=ccl=su%3A%22Data%20protection%22&#38;sort_by=relevance&#38;format=rss" /> <description> <![CDATA[ Search results for 'su:&quot;Data protection&quot;' at Southville International School and Colleges]]> </description> <opensearch:totalResults>9</opensearch:totalResults> <opensearch:startIndex>0</opensearch:startIndex> <opensearch:itemsPerPage>50</opensearch:itemsPerPage> <atom:link rel="search" type="application/opensearchdescription+xml" href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-search.pl?q=ccl=su%3A%22Data%20protection%22&#38;sort_by=relevance&#38;format=opensearchdescription" /> <opensearch:Query role="request" searchTerms="q%3Dccl%3Dsu%253A%2522Data%2520protection%2522" startPage="" /> <item> <title> Digital defense : what you should know about protecting your company's assets / </title> <dc:identifier>ISBN:1-57851-779-6</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=291085</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Parenty, Thomas J..<br /> Boston, Massachusetts : Harvard Business School Press. 2003 .<br /> 163 pages : , Includes bibliographical references and index. 24 cm. .<br /> 1-57851-779-6 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=291085">Place hold on <em>Digital defense :</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=291085</guid> </item> <item> <title> Software forensics : collecting evidence from the scene of a digital crime / </title> <dc:identifier>ISBN:0-07-142804-6</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=300943</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Slade, Robert M..<br /> New York : McGraw-Hill., 2004 .<br /> 512 pages : , Includes index. 24 cm..<br /> 0-07-142804-6 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=300943">Place hold on <em>Software forensics :</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=300943</guid> </item> <item> <title> From universal towards child-specific protection of the right to privacy online: Dilemmas in the EU General Data Protection Regulation </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347539</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Macenaite, Milda.<br /> 2017 .<br /> pages 765-779, May 2017 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=347539">Place hold on <em>From universal towards child-specific protection of the right to privacy online: Dilemmas in the EU General Data Protection Regulation </em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347539</guid> </item> <item> <title> Finding and Fixing Vulnerabilities in Information Systems The Vulnerability Assessment and Mitigation Methodology </title> <dc:identifier>ISBN:9780833034342</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=352090</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Anton, Philip S.;Anderson, Robert H.;Mesic, Richard;Scheiern, Michael.<br /> RAND Corporation 2003 9780833034342 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=352090">Place hold on <em>Finding and Fixing Vulnerabilities in Information Systems</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=352090</guid> </item> <item> <title> Information assurance and security 1&amp;2 </title> <dc:identifier>ISBN:978-971-9655-03-9</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=365208</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Abante, Marmelo.<br /> Manila Mindshapers Co., Inc. 2022 .<br /> vi, 520 pages ; , Computer security. 26 cm. .<br /> 978-971-9655-03-9 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=365208">Place hold on <em>Information assurance and security 1&amp;2</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=365208</guid> </item> <item> <title> Foundations of information security / </title> <dc:identifier>ISBN:9781647285838</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=366633</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Lewis, Liam,.<br /> Forest Hills, NY : Willford Press, 2024 .<br /> vi, 216 p. : 27 cm..<br /> 9781647285838 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=366633">Place hold on <em>Foundations of information security /</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=366633</guid> </item> <item> <title> Data privacy and security techniques / </title> <dc:identifier>ISBN:978-1-98469-533-8</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=367983</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Bennett, Lydia,.<br /> New York, NY : 3G E-Learning LLC, 2025 .<br /> xviii, 285 pages : 26 cm..<br /> 978-1-98469-533-8 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=367983">Place hold on <em>Data privacy and security techniques /</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=367983</guid> </item> <item> <title> Principles of information security / </title> <dc:identifier>ISBN:978-0-357-50643-1</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=367998</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Whitman, Michael E.,.<br /> Boston, MA : Cengage, 2022 .<br /> xx, 536 pages : 28 cm..<br /> 978-0-357-50643-1 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=367998">Place hold on <em>Principles of information security /</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=367998</guid> </item> <item> <title> Artificial intelligence in cybersecurity / </title> <dc:identifier>ISBN:979-8-89161-701-8</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=368314</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Bennett, Elijah,.<br /> Jersey City, USA : Alexis Press, 2025 .<br /> x, 325 pages : 27 cm..<br /> 979-8-89161-701-8 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=368314">Place hold on <em>Artificial intelligence in cybersecurity /</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=368314</guid> </item> </channel> </rss>
