<?xml version="1.0" encoding="utf-8" ?> <rss version="2.0" xmlns:opensearch="http://a9.com/-/spec/opensearch/1.1/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"> <channel> <title> <![CDATA[GAM Central Library Search for 'su:{Computer security. }']]> </title> <!-- prettier-ignore-start --> <link> https://library.ammancity.gov.jo/cgi-bin/koha/opac-search.pl?q=ccl=su%3A%7BComputer%20security.%20%7D&#38;sort_by=relevance&#38;format=rss </link> <!-- prettier-ignore-end --> <atom:link rel="self" type="application/rss+xml" href="https://library.ammancity.gov.jo/cgi-bin/koha/opac-search.pl?q=ccl=su%3A%7BComputer%20security.%20%7D&#38;sort_by=relevance&#38;format=rss" /> <description> Search results for 'su:{Computer security. }' at GAM Central Library </description> <opensearch:totalResults>3</opensearch:totalResults> <opensearch:startIndex>0</opensearch:startIndex> <opensearch:itemsPerPage>50</opensearch:itemsPerPage> <atom:link rel="search" type="application/opensearchdescription+xml" href="https://library.ammancity.gov.jo/cgi-bin/koha/opac-search.pl?q=ccl=su%3A%7BComputer%20security.%20%7D&#38;sort_by=relevance&#38;format=opensearchdescription" /> <opensearch:Query role="request" searchTerms="q%3Dccl%3Dsu%253A%257BComputer%2520security.%2520%257D" startPage="" /> <item> <title> Secrets and Lies : Digital Security in A Networked World / </title> <dc:identifier>ردمك: 0471253111</dc:identifier> <!-- prettier-ignore-start --> <link>https://library.ammancity.gov.jo/cgi-bin/koha/opac-detail.pl?biblionumber=83163</link> <!-- prettier-ignore-end --> <description> <p> By Schneier, Burce.<br /> .<br /> 412 pages. 0471253111 </p> <p> <a href="https://library.ammancity.gov.jo/cgi-bin/koha/opac-reserve.pl?biblionumber=83163">Place hold on <em>Secrets and Lies : </em></a> </p> </description> <guid>https://library.ammancity.gov.jo/cgi-bin/koha/opac-detail.pl?biblionumber=83163</guid> </item> <item> <title> The Modelling and analysis of security protocols: The CSP approach / </title> <dc:identifier>ردمك: </dc:identifier> <!-- prettier-ignore-start --> <link>https://library.ammancity.gov.jo/cgi-bin/koha/opac-detail.pl?biblionumber=83339</link> <!-- prettier-ignore-end --> <description> <p> By Ryan, P.Y.A.<br /> .<br /> 300p </p> <p> <a href="https://library.ammancity.gov.jo/cgi-bin/koha/opac-reserve.pl?biblionumber=83339">Place hold on <em>The Modelling and analysis of security protocols: The CSP approach / </em></a> </p> </description> <guid>https://library.ammancity.gov.jo/cgi-bin/koha/opac-detail.pl?biblionumber=83339</guid> </item> <item> <title> The Practical intrusion detection handbook : The Definitive Guide to Understanding, selecting, and deploying intrusion Detection in the enterprise / </title> <dc:identifier>ردمك: 0130259608</dc:identifier> <!-- prettier-ignore-start --> <link>https://library.ammancity.gov.jo/cgi-bin/koha/opac-detail.pl?biblionumber=83476</link> <!-- prettier-ignore-end --> <description> <p> By .Proctor, Poul E. .<br /> .<br /> 359 pages. 0130259608 </p> <p> <a href="https://library.ammancity.gov.jo/cgi-bin/koha/opac-reserve.pl?biblionumber=83476">Place hold on <em>The Practical intrusion detection handbook : </em></a> </p> </description> <guid>https://library.ammancity.gov.jo/cgi-bin/koha/opac-detail.pl?biblionumber=83476</guid> </item> </channel> </rss>
