<?xml version="1.0" encoding="utf-8" ?> <rss version="2.0" xmlns:opensearch="http://a9.com/-/spec/opensearch/1.1/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"> <channel> <title> <![CDATA[Southville International School and Colleges Search for 'su:&quot;INFORMATION SECURITY&quot;']]> </title> <!-- prettier-ignore-start --> <link> https://librarytest.southville.edu.ph/cgi-bin/koha/opac-search.pl?q=ccl=su%3A%22INFORMATION%20SECURITY%22&#38;sort_by=relevance&#38;format=rss </link> <!-- prettier-ignore-end --> <atom:link rel="self" type="application/rss+xml" href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-search.pl?q=ccl=su%3A%22INFORMATION%20SECURITY%22&#38;sort_by=relevance&#38;format=rss" /> <description> <![CDATA[ Search results for 'su:&quot;INFORMATION SECURITY&quot;' at Southville International School and Colleges]]> </description> <opensearch:totalResults>174</opensearch:totalResults> <opensearch:startIndex>0</opensearch:startIndex> <opensearch:itemsPerPage>50</opensearch:itemsPerPage> <atom:link rel="search" type="application/opensearchdescription+xml" href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-search.pl?q=ccl=su%3A%22INFORMATION%20SECURITY%22&#38;sort_by=relevance&#38;format=opensearchdescription" /> <opensearch:Query role="request" searchTerms="q%3Dccl%3Dsu%253A%2522INFORMATION%2520SECURITY%2522" startPage="" /> <item> <title> Information Security Practice And Experience: </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347156</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> 2015 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=347156">Place hold on <em>Information Security Practice And Experience:</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347156</guid> </item> <item> <title> Information Security: The Complete Reference: </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347157</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> 2013 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=347157">Place hold on <em>Information Security: The Complete Reference:</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347157</guid> </item> <item> <title> Information Security: The Complete Reference: </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347158</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> 2013 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=347158">Place hold on <em>Information Security: The Complete Reference:</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347158</guid> </item> <item> <title> Information Security Applications: 15th International Workshop, Wisa 2014, Jeju Island, Korea, August 25-27, 2014. </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347159</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> 2014 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=347159">Place hold on <em>Information Security Applications: 15th International Workshop, Wisa 2014, Jeju Island, Korea, August 25-27, 2014.</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347159</guid> </item> <item> <title> PRAGMATIC Security Metrics: Applying Metametrics to Information Security: </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347160</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> 2013 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=347160">Place hold on <em>PRAGMATIC Security Metrics: Applying Metametrics to Information Security:</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347160</guid> </item> <item> <title> Cybersecurity Information Gathering using Kali Linux: </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347161</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> 2016 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=347161">Place hold on <em>Cybersecurity Information Gathering using Kali Linux:</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347161</guid> </item> <item> <title> Locked Down: Information Security for Lawyers: </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347162</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> 2013 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=347162">Place hold on <em>Locked Down: Information Security for Lawyers:</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347162</guid> </item> <item> <title> Cyber Threat: The Rise of Information Geopolitics in U.S. National Security: </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347163</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> 2016 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=347163">Place hold on <em>Cyber Threat: The Rise of Information Geopolitics in U.S. National Security:</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347163</guid> </item> <item> <title> Counterterrorism and Cybersecurity: Total Information Awareness: </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347164</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> 2013 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=347164">Place hold on <em>Counterterrorism and Cybersecurity: Total Information Awareness:</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347164</guid> </item> <item> <title> CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide: </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347165</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> 2015 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=347165">Place hold on <em>CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide:</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347165</guid> </item> <item> <title> Modern Cryptography: Applied Mathematics for Encryption and Information Security: </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347166</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> 2015 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=347166">Place hold on <em>Modern Cryptography: Applied Mathematics for Encryption and Information Security:</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347166</guid> </item> <item> <title> Information Security Auditor: Careers in information security: </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347167</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> 2016 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=347167">Place hold on <em>Information Security Auditor: Careers in information security:</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347167</guid> </item> <item> <title> Don't Get Norteled: Authenticity works where information security technology has failed us: </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347168</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> 2015 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=347168">Place hold on <em>Don't Get Norteled: Authenticity works where information security technology has failed us:</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347168</guid> </item> <item> <title> Building a PCI DSS Information Security Program: </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347169</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> 2015 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=347169">Place hold on <em>Building a PCI DSS Information Security Program:</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347169</guid> </item> <item> <title> Securing Systems: Applied Security Architecture and Threat Models: </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347170</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> 2015 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=347170">Place hold on <em>Securing Systems: Applied Security Architecture and Threat Models:</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347170</guid> </item> <item> <title> Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions: </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347171</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> 2013 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=347171">Place hold on <em>Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions:</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347171</guid> </item> <item> <title> 31 Days Before Your CCNA Security Exam: A Day-By-Day Review Guide for the IINS 210-260 Certification Exam </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347172</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> 2016 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=347172">Place hold on <em>31 Days Before Your CCNA Security Exam: A Day-By-Day Review Guide for the IINS 210-260 Certification Exam</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347172</guid> </item> <item> <title> SSCP Systems Security Certified Practitioner All-in-One Exam Guide, 2nd Edition: </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347173</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> 2015 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=347173">Place hold on <em>SSCP Systems Security Certified Practitioner All-in-One Exam Guide, 2nd Edition:</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347173</guid> </item> <item> <title> Focus on IAM (Identity and Access Management): CSFs, metrics, checklists, best practices, and guidelines for defining IAM processes and implementing IAM solutions </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347174</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> 2014 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=347174">Place hold on <em>Focus on IAM (Identity and Access Management): CSFs, metrics, checklists, best practices, and guidelines for defining IAM processes and implementing IAM solutions</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347174</guid> </item> <item> <title> Pattern and Security Requirements: Engineering-Based Establishment of Security Standards </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347175</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> 2015 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=347175">Place hold on <em>Pattern and Security Requirements: Engineering-Based Establishment of Security Standards</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347175</guid> </item> <item> <title> Information Security and Cryptology - ICISC 2014: </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347176</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> 2015 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=347176">Place hold on <em>Information Security and Cryptology - ICISC 2014:</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347176</guid> </item> <item> <title> Essential Cyber Security Handbook: </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347177</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> 2016 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=347177">Place hold on <em>Essential Cyber Security Handbook:</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347177</guid> </item> <item> <title> Cybersecurity Illustrated: Just the Essentials (in just 2 hours): </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347178</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> 2016 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=347178">Place hold on <em>Cybersecurity Illustrated: Just the Essentials (in just 2 hours):</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347178</guid> </item> <item> <title> Assessment of Current Cybersecurity Practices in the Public Domain: Cyber Indications and Warnings Domain by Sandia National Laboratories </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347179</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> 2016 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=347179">Place hold on <em>Assessment of Current Cybersecurity Practices in the Public Domain: Cyber Indications and Warnings Domain by Sandia National Laboratories</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347179</guid> </item> <item> <title> Accounting Information Systems and Cyber Security: Stay ahead of the technology curve: </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347180</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> 2016 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=347180">Place hold on <em>Accounting Information Systems and Cyber Security: Stay ahead of the technology curve:</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347180</guid> </item> <item> <title> Enterprise Level Security: Securing Information Systems in an Uncertain World: </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347181</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> 2016 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=347181">Place hold on <em>Enterprise Level Security: Securing Information Systems in an Uncertain World:</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347181</guid> </item> <item> <title> Cyber Power: Crime, Conflict and Security in Cyberspace: </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347182</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> 2013 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=347182">Place hold on <em>Cyber Power: Crime, Conflict and Security in Cyberspace:</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347182</guid> </item> <item> <title> Intelligence-Based Security in Private Industry: </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347183</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> 2015 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=347183">Place hold on <em>Intelligence-Based Security in Private Industry:</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347183</guid> </item> <item> <title> Information Security Policies, Procedures, and Standards: A Practitioner's Reference: </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347184</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> 2016 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=347184">Place hold on <em>Information Security Policies, Procedures, and Standards: A Practitioner's Reference:</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347184</guid> </item> <item> <title> Sensitive Security Information, Certified® (SSI) Body of Knowledge: </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347185</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> 2016 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=347185">Place hold on <em>Sensitive Security Information, Certified® (SSI) Body of Knowledge:</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347185</guid> </item> <item> <title> Information Security Policy Development for Compliance: ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0 </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347186</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> 2013 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=347186">Place hold on <em>Information Security Policy Development for Compliance: ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347186</guid> </item> <item> <title> Handbook of SCADA/Control Systems Security: </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347187</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> 2016 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=347187">Place hold on <em>Handbook of SCADA/Control Systems Security:</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347187</guid> </item> <item> <title> CompTIA Security+ All-in-One Exam Guide: </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347188</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> 2014 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=347188">Place hold on <em>CompTIA Security+ All-in-One Exam Guide:</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347188</guid> </item> <item> <title> Information Security of Highly Critical Wireless Networks: </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347189</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> 2017 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=347189">Place hold on <em>Information Security of Highly Critical Wireless Networks:</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347189</guid> </item> <item> <title> The Psychology of Information Security: Resolving Conflicts Between Security Compliance and Human Behaviour </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347190</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> 2016 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=347190">Place hold on <em>The Psychology of Information Security: Resolving Conflicts Between Security Compliance and Human Behaviour</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347190</guid> </item> <item> <title> Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347191</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> 2017 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=347191">Place hold on <em>Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347191</guid> </item> <item> <title> Hacking: Noob to Cyberpunk; Easy Guide to Computer Hacking, Internet Security, Penetration Testing, Cracking, Sniffin: </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347192</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> 2017 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=347192">Place hold on <em>Hacking: Noob to Cyberpunk; Easy Guide to Computer Hacking, Internet Security, Penetration Testing, Cracking, Sniffin:</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347192</guid> </item> <item> <title> Exchange of Information and Data Protection in Cross-border Criminal Proceedings in Europe: </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347193</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> 2014 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=347193">Place hold on <em>Exchange of Information and Data Protection in Cross-border Criminal Proceedings in Europe:</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347193</guid> </item> <item> <title> Vehicular Cyber Physical Systems: Adaptive Connectivity and Security: </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347194</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> 2016 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=347194">Place hold on <em>Vehicular Cyber Physical Systems: Adaptive Connectivity and Security:</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347194</guid> </item> <item> <title> Financial Cryptography and Data Security: FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013 </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347195</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> 2013 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=347195">Place hold on <em>Financial Cryptography and Data Security: FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347195</guid> </item> <item> <title> Building the Infrastructure for Cloud Security: A Solutions View: </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347196</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> 2014 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=347196">Place hold on <em>Building the Infrastructure for Cloud Security: A Solutions View:</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347196</guid> </item> <item> <title> Cyber-Physical Security: Protecting Critical Infrastructure at the State and Local Level: </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347197</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> 2017 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=347197">Place hold on <em>Cyber-Physical Security: Protecting Critical Infrastructure at the State and Local Level:</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347197</guid> </item> <item> <title> Information Systems Security and Privacy: First International Conference, ICISSP 2015 </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347198</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> 2016 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=347198">Place hold on <em>Information Systems Security and Privacy: First International Conference, ICISSP 2015</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347198</guid> </item> <item> <title> Your Guide To Email Security 2017: What You Should Know About Email Security 2017 </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347199</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> 2017 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=347199">Place hold on <em>Your Guide To Email Security 2017: What You Should Know About Email Security 2017</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347199</guid> </item> <item> <title> The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities: </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347200</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> 2017 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=347200">Place hold on <em>The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities:</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347200</guid> </item> <item> <title> Information Security Management Handbook: </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347201</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> 2013 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=347201">Place hold on <em>Information Security Management Handbook:</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347201</guid> </item> <item> <title> Digital Defense: A Cybersecurity Primer: </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347202</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> 2015 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=347202">Place hold on <em>Digital Defense: A Cybersecurity Primer:</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347202</guid> </item> <item> <title> Essentials of Cybersecurity: InfoSec experts share their tips on getting the basics right: </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347203</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> 2017 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=347203">Place hold on <em>Essentials of Cybersecurity: InfoSec experts share their tips on getting the basics right:</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347203</guid> </item> <item> <title> Cybersecurity for Executives: A Practical Guide: </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347204</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> 2014 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=347204">Place hold on <em>Cybersecurity for Executives: A Practical Guide:</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347204</guid> </item> <item> <title> CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide: </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347205</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> 2017 </p> ]]> <![CDATA[ <p> <a href="https://librarytest.southville.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=347205">Place hold on <em>CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide:</em></a> </p> ]]> </description> <guid>https://librarytest.southville.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=347205</guid> </item> </channel> </rss>
