<?xml version='1.0' encoding='utf-8' ?>







<rss version="2.0"
      xmlns:opensearch="http://a9.com/-/spec/opensearch/1.1/"
      xmlns:dc="http://purl.org/dc/elements/1.1/"
      xmlns:atom="http://www.w3.org/2005/Atom">
   <channel>
     <title><![CDATA[UCSC Library Search for '(su:&quot;Security&quot;)']]></title>
     <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?q=ccl=%28su%3A%22Security%22%29&amp;format=rss</link>
     <atom:link rel="self" type="application/rss+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?q=ccl=%28su%3A%22Security%22%29&amp;sort_by=title_asc&amp;format=atom"/>
     <description><![CDATA[ Search results for '(su:&quot;Security&quot;)' at UCSC Library]]></description>
     <opensearch:totalResults>121</opensearch:totalResults>
     <opensearch:startIndex>0</opensearch:startIndex>
     
       <opensearch:itemsPerPage>20</opensearch:itemsPerPage>
     
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    ACTUALLY USEFUL INTERNET SECURITY TECHNIQUES






</title>
       <dc:identifier>ISBN:0001562055089</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=23752</link>
       <description><![CDATA[








	   <p>By HUGHES L.J.. 
	   INDIANA : NEWRIDERS 1995
                        . 378 p.
                        
                        
                         0001562055089
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=23752">Place hold on <em>ACTUALLY USEFUL INTERNET SECURITY TECHNIQUES</em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=23752</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Applied Cryptography and Network Security:14th International Conference,ACNS 2016 Guildford,UK,June 19-22,2016 Proceedings






</title>
       <dc:identifier>ISBN:9783319395548</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=29531</link>
       <description><![CDATA[








	   <p>By Ed: MANULIS,MARK;SADEGHI,AHMAD-REZA;SCHNEIDER,STEVE. 
	   Switzerland: Springer International Publishing AG 2016
                        . 668 p.
                        
                        
                         9783319395548
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=29531">Place hold on <em>Applied Cryptography and Network Security:14th International Conference,ACNS 2016 Guildford,UK,June 19-22,2016 Proceedings</em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=29531</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    APPLIED CRYPTOGRAPHY : PROTOCOLS, ALGORITHMS, AND SOURCE CODE IN C






</title>
       <dc:identifier>ISBN:997151348X</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=21873</link>
       <description><![CDATA[








	   <p>By SCHNEIER, B.. 
	   John Wiley &amp; Sons Inc. 2005
                        . 758 p.
                        
                        
                         997151348X
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=21873">Place hold on <em>APPLIED CRYPTOGRAPHY : PROTOCOLS, ALGORITHMS, AND SOURCE CODE IN C</em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=21873</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    APPLIED CRYPTOGRAPHY : PROTOCOLS, ALGORITHMS, &amp; SOURCE CODE IN C






</title>
       <dc:identifier>ISBN:0000471117099</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=22070</link>
       <description><![CDATA[








	   <p>By SCHNEIER B.;. 
	   JOHN WILEY : NEW YORK 1996
                        . 758 p.
                        
                        
                         0000471117099
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=22070">Place hold on <em>APPLIED CRYPTOGRAPHY : PROTOCOLS, ALGORITHMS, &amp; SOURCE CODE IN C</em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=22070</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    BIOMETRICS FOR NETWORK SECURITY






</title>
       <dc:identifier>ISBN:0008131716007</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=23128</link>
       <description><![CDATA[








	   <p>By REID, P.:. 
	   PEARSON EDUCATION INDIA 2004
                        . 252 p.
                        
                        
                         0008131716007
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=23128">Place hold on <em>BIOMETRICS FOR NETWORK SECURITY</em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=23128</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Building a secure computer system






</title>
       <dc:identifier>ISBN:0000442230222</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=25345</link>
       <description><![CDATA[








	   <p>By GASSER, Morrie. 
	   New York : Van Nostrand 1988
                        . 288 p.
                        
                        
                         0000442230222
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=25345">Place hold on <em>Building a secure computer system</em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=25345</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    BUILDING INTERNET FIREWALLS






</title>
       <dc:identifier>ISBN:0001565921240</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=26508</link>
       <description><![CDATA[








	   <p>By CHAPMAN D. B. &amp; ZWICKY E. D.. 
	   CALIFORNIA : O'REILLY 1995
                        . 517 p.
                        
                        
                         0001565921240
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=26508">Place hold on <em>BUILDING INTERNET FIREWALLS</em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=26508</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    BUILDING SET APPLICATIONS FOR SECURE TRANSACTIONS






</title>
       <dc:identifier>ISBN:0000471283053</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=25444</link>
       <description><![CDATA[








	   <p>By MERKOW M.S. : BREITHAUPT J. : WHEELER K.L.. 
	   JOHN WILEY : NEW YORK 1998
                        . 403 p.
                        
                        
                         0000471283053
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=25444">Place hold on <em>BUILDING SET APPLICATIONS FOR SECURE TRANSACTIONS</em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=25444</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Bulletproofing Web Applications :( With CD)






</title>
       <dc:identifier>ISBN:0000764548602</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=27851</link>
       <description><![CDATA[








	   <p>By Kolawa,A.:  Hicken,W.: Dunlop,C.:. 
	   Original USA Com. Book 2002
                        . 544 p.
                        
                        
                         0000764548602
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=27851">Place hold on <em>Bulletproofing Web Applications :( With CD)</em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=27851</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Cloud Security:A Comprehensive Guide to Secure Cloud Computing






</title>
       <dc:identifier>ISBN:9788126528097</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=29310</link>
       <description><![CDATA[








	   <p>By KRUTZ,RONALD L.;VINES,RUSSELL DEAN. 
	   New Delhi:Wiley India 2010
                        . 358 p.
                        
                        
                         9788126528097
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=29310">Place hold on <em>Cloud Security:A Comprehensive Guide to Secure Cloud Computing</em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=29310</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Computer Forensics:Principles and Practices






</title>
       <dc:identifier>ISBN:0000131547275</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=23336</link>
       <description><![CDATA[








	   <p>By VOLONINO,LINDA;ANZALDUA,REYNALDO;GODWIN,JANA. 
	   New Jersey:Pearson Education 2007
                        . 534 p.
                        
                        
                         0000131547275
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=23336">Place hold on <em>Computer Forensics:Principles and Practices</em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=23336</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Computer Incident Response and Forensics Team Management:Conducting a Successful Incident Response






</title>
       <dc:identifier>ISBN:9781597499965</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=23334</link>
       <description><![CDATA[








	   <p>By JOHNSON,LEIGHTON R.. 
	   Waltham:Elsevier 2014
                        . 334 p.
                        
                        
                         9781597499965
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=23334">Place hold on <em>Computer Incident Response and Forensics Team Management:Conducting a Successful Incident Response</em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=23334</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    COMPUTER SECURITY






</title>
       <dc:identifier>ISBN:0000471978442</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=22749</link>
       <description><![CDATA[








	   <p>By GOLLMANN D.. 
	   NEW YORK : JOHN WILEY 1999
                        . 320 p.
                        
                        
                         0000471978442
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=22749">Place hold on <em>COMPUTER SECURITY</em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=22749</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    COMPUTER SECURITY BASICS






</title>
       <dc:identifier>ISBN:0000937175714</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=22354</link>
       <description><![CDATA[








	   <p>By RUSSELL D. : GANGEMI S.. 
	   TOKYO : OREILLY 1991
                        . 448 p.
                        
                        
                         0000937175714
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=22354">Place hold on <em>COMPUTER SECURITY BASICS</em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=22354</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    The computer virus handbook






</title>
       <dc:identifier>ISBN:0000078816475</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=24564</link>
       <description><![CDATA[








	   <p>By LEVIN, Richard B.. 
	   Berkeley : Osborne McGraw-Hill 1990
                        . 411 p.
                        
                        
                         0000078816475
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=24564">Place hold on <em>The computer virus handbook</em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=24564</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Computer viruses : A high-tech disease






</title>
       <dc:identifier>ISBN:0001557550433</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=22858</link>
       <description><![CDATA[








	   <p>By BURGER, Ralf. 
	   Grand Rapids, MI : Abacus 1988
                        . 276 p.
                        
                        
                         0001557550433
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=22858">Place hold on <em>Computer viruses : A high-tech disease</em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=22858</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Computers Under Attack : intruders, worms, and viruses






</title>
       <dc:identifier>ISBN:0000201530678</dc:identifier>
        <link>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=27229</link>
       <description><![CDATA[








	   <p>By Denning, P.J (et.al). 
	   Addison-wesley: Tokyo 1990
                        . 113 p.
                        
                        
                         0000201530678
       </p>

<p><a href="https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-reserve.pl?biblionumber=27229">Place hold on <em>Computers Under Attack : intruders, worms, and viruses</em></a></p>

						]]></description>
       <guid>https://opac.lib.ucsc.cmb.ac.lk/cgi-bin/koha/opac-detail.pl?biblionumber=27229</guid>
     </item>
	 
   </channel>
</rss>





