<?xml version='1.0' encoding='utf-8' ?>







<rss version="2.0"
      xmlns:opensearch="http://a9.com/-/spec/opensearch/1.1/"
      xmlns:dc="http://purl.org/dc/elements/1.1/"
      xmlns:atom="http://www.w3.org/2005/Atom">
   <channel>
     <title><![CDATA[UCSC Library Search for '(su:&quot;Security&quot;)']]></title>
     <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?q=ccl=%28su%3A%22Security%22%29&amp;format=rss</link>
     <atom:link rel="self" type="application/rss+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?q=ccl=%28su%3A%22Security%22%29&amp;sort_by=title_asc&amp;format=atom"/>
     <description><![CDATA[ Search results for '(su:&quot;Security&quot;)' at UCSC Library]]></description>
     <opensearch:totalResults>121</opensearch:totalResults>
     <opensearch:startIndex>0</opensearch:startIndex>
     
       <opensearch:itemsPerPage>50</opensearch:itemsPerPage>
     
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    ACTUALLY USEFUL INTERNET SECURITY TECHNIQUES






</title>
       <dc:identifier>ISBN:0001562055089</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=23752</link>
       <description><![CDATA[








	   <p>By HUGHES L.J.. 
	   INDIANA : NEWRIDERS 1995
                        . 378 p.
                        
                        
                         0001562055089
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=23752">Place hold on <em>ACTUALLY USEFUL INTERNET SECURITY TECHNIQUES</em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=23752</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Applied Cryptography and Network Security:14th International Conference,ACNS 2016 Guildford,UK,June 19-22,2016 Proceedings






</title>
       <dc:identifier>ISBN:9783319395548</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=29531</link>
       <description><![CDATA[








	   <p>By Ed: MANULIS,MARK;SADEGHI,AHMAD-REZA;SCHNEIDER,STEVE. 
	   Switzerland: Springer International Publishing AG 2016
                        . 668 p.
                        
                        
                         9783319395548
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=29531">Place hold on <em>Applied Cryptography and Network Security:14th International Conference,ACNS 2016 Guildford,UK,June 19-22,2016 Proceedings</em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=29531</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    APPLIED CRYPTOGRAPHY : PROTOCOLS, ALGORITHMS, AND SOURCE CODE IN C






</title>
       <dc:identifier>ISBN:997151348X</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=21873</link>
       <description><![CDATA[








	   <p>By SCHNEIER, B.. 
	   John Wiley &amp; Sons Inc. 2005
                        . 758 p.
                        
                        
                         997151348X
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=21873">Place hold on <em>APPLIED CRYPTOGRAPHY : PROTOCOLS, ALGORITHMS, AND SOURCE CODE IN C</em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=21873</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    APPLIED CRYPTOGRAPHY : PROTOCOLS, ALGORITHMS, &amp; SOURCE CODE IN C






</title>
       <dc:identifier>ISBN:0000471117099</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=22070</link>
       <description><![CDATA[








	   <p>By SCHNEIER B.;. 
	   JOHN WILEY : NEW YORK 1996
                        . 758 p.
                        
                        
                         0000471117099
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=22070">Place hold on <em>APPLIED CRYPTOGRAPHY : PROTOCOLS, ALGORITHMS, &amp; SOURCE CODE IN C</em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=22070</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    BIOMETRICS FOR NETWORK SECURITY






</title>
       <dc:identifier>ISBN:0008131716007</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=23128</link>
       <description><![CDATA[








	   <p>By REID, P.:. 
	   PEARSON EDUCATION INDIA 2004
                        . 252 p.
                        
                        
                         0008131716007
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=23128">Place hold on <em>BIOMETRICS FOR NETWORK SECURITY</em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=23128</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Building a secure computer system






</title>
       <dc:identifier>ISBN:0000442230222</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=25345</link>
       <description><![CDATA[








	   <p>By GASSER, Morrie. 
	   New York : Van Nostrand 1988
                        . 288 p.
                        
                        
                         0000442230222
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=25345">Place hold on <em>Building a secure computer system</em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=25345</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    BUILDING INTERNET FIREWALLS






</title>
       <dc:identifier>ISBN:0001565921240</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=26508</link>
       <description><![CDATA[








	   <p>By CHAPMAN D. B. &amp; ZWICKY E. D.. 
	   CALIFORNIA : O'REILLY 1995
                        . 517 p.
                        
                        
                         0001565921240
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=26508">Place hold on <em>BUILDING INTERNET FIREWALLS</em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=26508</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    BUILDING SET APPLICATIONS FOR SECURE TRANSACTIONS






</title>
       <dc:identifier>ISBN:0000471283053</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=25444</link>
       <description><![CDATA[








	   <p>By MERKOW M.S. : BREITHAUPT J. : WHEELER K.L.. 
	   JOHN WILEY : NEW YORK 1998
                        . 403 p.
                        
                        
                         0000471283053
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=25444">Place hold on <em>BUILDING SET APPLICATIONS FOR SECURE TRANSACTIONS</em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=25444</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Bulletproofing Web Applications :( With CD)






</title>
       <dc:identifier>ISBN:0000764548602</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=27851</link>
       <description><![CDATA[








	   <p>By Kolawa,A.:  Hicken,W.: Dunlop,C.:. 
	   Original USA Com. Book 2002
                        . 544 p.
                        
                        
                         0000764548602
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=27851">Place hold on <em>Bulletproofing Web Applications :( With CD)</em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=27851</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Cloud Security:A Comprehensive Guide to Secure Cloud Computing






</title>
       <dc:identifier>ISBN:9788126528097</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=29310</link>
       <description><![CDATA[








	   <p>By KRUTZ,RONALD L.;VINES,RUSSELL DEAN. 
	   New Delhi:Wiley India 2010
                        . 358 p.
                        
                        
                         9788126528097
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=29310">Place hold on <em>Cloud Security:A Comprehensive Guide to Secure Cloud Computing</em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=29310</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Computer Forensics:Principles and Practices






</title>
       <dc:identifier>ISBN:0000131547275</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=23336</link>
       <description><![CDATA[








	   <p>By VOLONINO,LINDA;ANZALDUA,REYNALDO;GODWIN,JANA. 
	   New Jersey:Pearson Education 2007
                        . 534 p.
                        
                        
                         0000131547275
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=23336">Place hold on <em>Computer Forensics:Principles and Practices</em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=23336</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Computer Incident Response and Forensics Team Management:Conducting a Successful Incident Response






</title>
       <dc:identifier>ISBN:9781597499965</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=23334</link>
       <description><![CDATA[








	   <p>By JOHNSON,LEIGHTON R.. 
	   Waltham:Elsevier 2014
                        . 334 p.
                        
                        
                         9781597499965
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=23334">Place hold on <em>Computer Incident Response and Forensics Team Management:Conducting a Successful Incident Response</em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=23334</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    COMPUTER SECURITY






</title>
       <dc:identifier>ISBN:0000471978442</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=22749</link>
       <description><![CDATA[








	   <p>By GOLLMANN D.. 
	   NEW YORK : JOHN WILEY 1999
                        . 320 p.
                        
                        
                         0000471978442
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=22749">Place hold on <em>COMPUTER SECURITY</em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=22749</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    COMPUTER SECURITY BASICS






</title>
       <dc:identifier>ISBN:0000937175714</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=22354</link>
       <description><![CDATA[








	   <p>By RUSSELL D. : GANGEMI S.. 
	   TOKYO : OREILLY 1991
                        . 448 p.
                        
                        
                         0000937175714
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=22354">Place hold on <em>COMPUTER SECURITY BASICS</em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=22354</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    The computer virus handbook






</title>
       <dc:identifier>ISBN:0000078816475</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=24564</link>
       <description><![CDATA[








	   <p>By LEVIN, Richard B.. 
	   Berkeley : Osborne McGraw-Hill 1990
                        . 411 p.
                        
                        
                         0000078816475
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=24564">Place hold on <em>The computer virus handbook</em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=24564</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Computer viruses : A high-tech disease






</title>
       <dc:identifier>ISBN:0001557550433</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=22858</link>
       <description><![CDATA[








	   <p>By BURGER, Ralf. 
	   Grand Rapids, MI : Abacus 1988
                        . 276 p.
                        
                        
                         0001557550433
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=22858">Place hold on <em>Computer viruses : A high-tech disease</em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=22858</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Computers Under Attack : intruders, worms, and viruses






</title>
       <dc:identifier>ISBN:0000201530678</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=27229</link>
       <description><![CDATA[








	   <p>By Denning, P.J (et.al). 
	   Addison-wesley: Tokyo 1990
                        . 113 p.
                        
                        
                         0000201530678
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=27229">Place hold on <em>Computers Under Attack : intruders, worms, and viruses</em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=27229</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    CRYPTOGRAPHY AND DATA SECURITY






</title>
       <dc:identifier>ISBN:0000201101505</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=24102</link>
       <description><![CDATA[








	   <p>By DENNING,D.E.:. 
	   LONDON ADDISON WESLEY 1982
                        . 400 p.
                        
                        
                         0000201101505
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=24102">Place hold on <em>CRYPTOGRAPHY AND DATA SECURITY</em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=24102</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Cryptography and Network Security 






</title>
       <dc:identifier>ISBN:0100070660468</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=28204</link>
       <description><![CDATA[








	   <p>By FOROUZAN, Behrouz, A. 
	   Toronto : Tata McGraw - Hill 2008
                        . 721 p.
                        
                        
                         0100070660468
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=28204">Place hold on <em>Cryptography and Network Security </em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=28204</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Cryptography and Network Security






</title>
       <dc:identifier>ISBN:9789351381884</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=29211</link>
       <description><![CDATA[








	   <p>By GILL,P.S.. 
	   New Delhi:Trinity Press 2011
                        . 288 p.
                        
                        
                         9789351381884
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=29211">Place hold on <em>Cryptography and Network Security</em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=29211</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Cryptography And Network Security






</title>
       <dc:identifier>ISBN:9789339220945</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=29504</link>
       <description><![CDATA[








	   <p>By FOROUZAN,BEHROUZ A.;MUKHOPADHYAY,DEBDEEP. 
	   Chennai:McGraw Hill Education 2015
                        . 674 p.
                        
                        
                         9789339220945
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=29504">Place hold on <em>Cryptography And Network Security</em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=29504</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Cryptography and Network Security : Principles and Practices






</title>
       <dc:identifier>ISBN:9788120330184</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=23215</link>
       <description><![CDATA[








	   <p>By STALLINGS,  William. 
	   New Delhi : Prentics Hall   2006
                        . 680 p.
                        
                        
                         9788120330184
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=23215">Place hold on <em>Cryptography and Network Security : Principles and Practices</em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=23215</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    CRYPTOGRAPHY AND NETWORK SECURITY : PRINCIPLES &amp; PRACTICE






</title>
       <dc:identifier>ISBN:0008120323858</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=22121</link>
       <description><![CDATA[








	   <p>By STALLINGS, W:. 
	   NEW DELHI : PRENTICE HALL 2003
                        . 681 p.
                        
                        
                         0008120323858
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=22121">Place hold on <em>CRYPTOGRAPHY AND NETWORK SECURITY : PRINCIPLES &amp; PRACTICE</em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=22121</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    CRYPTOGRAPHY AND NETWORK SECURITY : PRINCIPLES &amp; PRACTICE






</title>
       <dc:identifier>ISBN:0000138690170</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=22198</link>
       <description><![CDATA[








	   <p>By STALLINGS W.;. 
	   NEW JERSEY : PRINTICE HALL 1999
                        . 569 p.
                        
                        
                         0000138690170
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=22198">Place hold on <em>CRYPTOGRAPHY AND NETWORK SECURITY : PRINCIPLES &amp; PRACTICE</em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=22198</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    CRYPTOGRAPHY FOR VISUAL BASIC : A PROGRAMMER'S GUIDE TO THE MICROSOFT CRYPTO-API :( With CD)






</title>
       <dc:identifier>ISBN:0000471381896</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=22215</link>
       <description><![CDATA[








	   <p>By BONDI R.;. 
	   NEW YORK : JOHN WILEY 2000
                        . 459 p.
                        
                        
                         0000471381896
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=22215">Place hold on <em>CRYPTOGRAPHY FOR VISUAL BASIC : A PROGRAMMER'S GUIDE TO THE MICROSOFT CRYPTO-API :( With CD)</em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=22215</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    CYBER  ETHICS: The walk  towards a  computer law






</title>
       <dc:identifier>ISBN:0009558581119</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=26907</link>
       <description><![CDATA[








	   <p>By WIRASINHA  A.. 
	   Colombo : CLG 2001
                        . 101 p.
                        
                        
                         0009558581119
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=26907">Place hold on <em>CYBER  ETHICS: The walk  towards a  computer law</em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=26907</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Cyber Laws and IT Protection






</title>
       <dc:identifier>ISBN:9788120345706</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=29148</link>
       <description><![CDATA[








	   <p>By CHANDER,HARISH. 
	   India,PHI Learning 2012
                        . 267 p.
                        
                        
                         9788120345706
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=29148">Place hold on <em>Cyber Laws and IT Protection</em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=29148</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Cyber Security: Understanding Cyber Crimes,Computer Forensics and Legal Perspectives (with CD)






</title>
       <dc:identifier>ISBN:9788126521791</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=29267</link>
       <description><![CDATA[








	   <p>By GODBOLE,NINA ; BELAPURE,SUNIT. 
	   New Delhi:Wiley India (pvt) Ltd 2011
                        . 570 p.
                        
                        
                         9788126521791
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=29267">Place hold on <em>Cyber Security: Understanding Cyber Crimes,Computer Forensics and Legal Perspectives (with CD)</em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=29267</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Cybersecurity and Cyberwar: What Everyone Needs to Know






</title>
       <dc:identifier>ISBN:9780199451654</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=23314</link>
       <description><![CDATA[








	   <p>By SINGER,P.W.;FRIEDMAN,ALLAN. 
	   India:Oxford University Press 2014
                        . 306 p.
                        
                        
                         9780199451654
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=23314">Place hold on <em>Cybersecurity and Cyberwar: What Everyone Needs to Know</em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=23314</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Data and computer security : DICTIONARY OF STANDARDS, CONCEPTS AND TERMS






</title>
       <dc:identifier>ISBN:0000333511786</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=22688</link>
       <description><![CDATA[








	   <p>By LONGLEY, D.:  SHAIN , M.:. 
	   Hants : Macmillan 1989
                        . 428 p.
                        
                        
                         0000333511786
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=22688">Place hold on <em>Data and computer security : DICTIONARY OF STANDARDS, CONCEPTS AND TERMS</em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=22688</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Database Security and Auditing 






</title>
       <dc:identifier>ISBN:0008131506657</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=28487</link>
       <description><![CDATA[








	   <p>By AFYOUNI,  Hassan A.. 
	   Canada : Course Technology 2007
                        . 348 p.
                        
                        
                         0008131506657
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=28487">Place hold on <em>Database Security and Auditing </em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=28487</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Datatheft computer fraud industrial espionage and information crime






</title>
       <dc:identifier>ISBN:0000434902659</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=25334</link>
       <description><![CDATA[








	   <p>By CORNWALLM, H. :. 
	   London : Heinemann 1987
                        . 371 p.
                        
                        
                         0000434902659
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=25334">Place hold on <em>Datatheft computer fraud industrial espionage and information crime</em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=25334</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    DESIGNING SECURE WEB-BASED APPLICATIONS FOR MICROSOFT WINDOWS 2000 :( With CD)






</title>
       <dc:identifier>ISBN:0000735609950</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=25863</link>
       <description><![CDATA[








	   <p>By HOWARD M.. 
	   MICROSOFT : WASHINGHTON 2000
                        . 504 p.
                        
                        
                         0000735609950
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=25863">Place hold on <em>DESIGNING SECURE WEB-BASED APPLICATIONS FOR MICROSOFT WINDOWS 2000 :( With CD)</em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=25863</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Digital Archaeology: The Art and Science of Digital Forensics






</title>
       <dc:identifier>ISBN:9780321803900</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=23329</link>
       <description><![CDATA[








	   <p>By GRAVES, MICHAEL W.. 
	   New York: Addison-Wesley 2014
                        . 570 p.
                        
                        
                         9780321803900
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=23329">Place hold on <em>Digital Archaeology: The Art and Science of Digital Forensics</em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=23329</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Digital Evidence and Computer Crime:Forensic Science,Computers and the Internet 






</title>
       <dc:identifier>ISBN:9780123742681</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=23333</link>
       <description><![CDATA[








	   <p>By CASEY,EOGHAN. 
	   Waltham:Academic Press 2011
                        . 807 p.
                        
                        
                         9780123742681
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=23333">Place hold on <em>Digital Evidence and Computer Crime:Forensic Science,Computers and the Internet </em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=23333</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    DIGITAL SIGNATURE : NETWORK SECURITY PRACTICES






</title>
       <dc:identifier>ISBN:0008120325990</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=22135</link>
       <description><![CDATA[








	   <p>By GUPTA, K. N. : AGRAWALA, K. N . : AGRAWALA, P. A. :. 
	   PRENTICE HALL INDIA 2005
                        . 209 p.
                        
                        
                         0008120325990
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=22135">Place hold on <em>DIGITAL SIGNATURE : NETWORK SECURITY PRACTICES</em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=22135</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Digital Watermarking and Steganography :Fundamentals and Techniques






</title>
       <dc:identifier>ISBN:0001420047574</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=29428</link>
       <description><![CDATA[








	   <p>By SHIH,FRANK.Y. 
	   Boca Raton:CRC Press 2008
                        . 180 p.
                        
                        
                         0001420047574
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=29428">Place hold on <em>Digital Watermarking and Steganography :Fundamentals and Techniques</em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=29428</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    DISAPPEARING CRYPTOGRAPHY : BEING AND NOTHINGNESS ON THE NET






</title>
       <dc:identifier>ISBN:0000127386718</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=24616</link>
       <description><![CDATA[








	   <p>By WAYNER P.. 
	   NEW YORK : AP PROFESSIONAL 1996
                        . 295 p.
                        
                        
                         0000127386718
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=24616">Place hold on <em>DISAPPEARING CRYPTOGRAPHY : BEING AND NOTHINGNESS ON THE NET</em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=24616</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Ethics and Security Management on the Web






</title>
       <dc:identifier>ISBN:0008120324110</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=28201</link>
       <description><![CDATA[








	   <p>By NITT. 
	   New Delhi : Prentice  Hall  2003
                        . 289 p.
                        
                        
                         0008120324110
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=28201">Place hold on <em>Ethics and Security Management on the Web</em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=28201</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    FIREWALLS : A COMPLETE GUIDE :( With CD)






</title>
       <dc:identifier>ISBN:0000074639722</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=26985</link>
       <description><![CDATA[








	   <p>By GONCALVES , M.. 
	   NEW YORK : PRINTICE HALL 2000
                        . 678 p.
                        
                        
                         0000074639722
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=26985">Place hold on <em>FIREWALLS : A COMPLETE GUIDE :( With CD)</em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=26985</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Firewalls and Internet Security:Repelling the  Wily Hacker






</title>
       <dc:identifier>ISBN:812970207X</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=28207</link>
       <description><![CDATA[








	   <p>By CHESWICK, William  R. &amp; BELLOVIN,  Steven, M. &amp; RUBIN,  Aviel, D. 
	   New Delhi : Pearson Education 2003
                        . 433 p.
                        
                        
                         812970207X
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=28207">Place hold on <em>Firewalls and Internet Security:Repelling the  Wily Hacker</em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=28207</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    HACK ATTACKS DENIED : A COMPLETE GUIDE TO NETWORK LOCKDOWN : (With CD)






</title>
       <dc:identifier>ISBN:0000471416258</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=25489</link>
       <description><![CDATA[








	   <p>By CHIRILLO J.. 
	   NEW YORK : JOHN WILEY 2001
                        . 491 p.
                        
                        
                         0000471416258
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=25489">Place hold on <em>HACK ATTACKS DENIED : A COMPLETE GUIDE TO NETWORK LOCKDOWN : (With CD)</em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=25489</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    HACK ATTACKS REVEALED : A COMPLETE REFERENCE WITH CUSTOM SECURITY HACKING  TOOLKIT :( With CD)






</title>
       <dc:identifier>ISBN:047141624X</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=22731</link>
       <description><![CDATA[








	   <p>By CHIRILLO J.. 
	   NEW YORK : MC GRAW HILL 2001
                        . 944 p.
                        
                        
                         047141624X
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=22731">Place hold on <em>HACK ATTACKS REVEALED : A COMPLETE REFERENCE WITH CUSTOM SECURITY HACKING  TOOLKIT :( With CD)</em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=22731</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    HACK PROOFING YOUR E-COMMERCE SITE






</title>
       <dc:identifier>ISBN:192899427X</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=22890</link>
       <description><![CDATA[








	   <p>By RUSSELL R. (ET-AL). 
	   ROCKLAND : SYNGRESS 2001
                        . 650 p.
                        
                        
                         192899427X
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=22890">Place hold on <em>HACK PROOFING YOUR E-COMMERCE SITE</em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=22890</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    HACK PROOFING YOUR NETWORK : INTERNET  TRADECRAFT






</title>
       <dc:identifier>ISBN:0001928994156</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=22889</link>
       <description><![CDATA[








	   <p>By POULSEN K.L.. 
	   ROCKLAND : USA 2000
                        . 450 p.
                        
                        
                         0001928994156
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=22889">Place hold on <em>HACK PROOFING YOUR NETWORK : INTERNET  TRADECRAFT</em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=22889</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    HACKERS






</title>
       <dc:identifier>ISBN:0000415180724</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=25331</link>
       <description><![CDATA[








	   <p>By TAYLOR P.A.. 
	   ROUTLEDGE : NEWYORK 1999
                        . 198 p.
                        
                        
                         0000415180724
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=25331">Place hold on <em>HACKERS</em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=25331</guid>
     </item>
	 
   </channel>
</rss>





