<?xml version='1.0' encoding='utf-8' ?>



<rss version="2.0"
      xmlns:opensearch="http://a9.com/-/spec/opensearch/1.1/"
      xmlns:dc="http://purl.org/dc/elements/1.1/"
      xmlns:atom="http://www.w3.org/2005/Atom">
   <channel>
     <title><![CDATA[NUST Institutions Library Catalogue Search for 'kw,wrdl: (su-br:&quot;Computer networks--Security measures&quot;)']]></title>
     <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?idx=kw&amp;q=%28su-br%3A%22Computer%20networks--Security%20measures%22%29&amp;format=rss</link>
     <atom:link rel="self" type="application/rss+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?idx=kw&amp;q=%28su-br%3A%22Computer%20networks--Security%20measures%22%29&amp;sort_by=relevance_dsc&amp;format=atom"/>
     <description><![CDATA[ Search results for 'kw,wrdl: (su-br:&quot;Computer networks--Security measures&quot;)' at NUST Institutions Library Catalogue]]></description>
     <opensearch:totalResults>12</opensearch:totalResults>
     <opensearch:startIndex>0</opensearch:startIndex>
     
       <opensearch:itemsPerPage>50</opensearch:itemsPerPage>
     
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Secrets and lies : digital security in a networked world 






</title>
       <dc:identifier>ISBN:0471253111 | 0471453803 | 9780471453802</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=6653</link>
        
       <description><![CDATA[









	   <p>By Schneier, Bruce,. 
	   New York : Wiley Pub., 2000
                        . 412 p. :
                        , &quot;Wiley Computer Publishing.&quot; | Also issued in a 3-vol. box set under title: Schneier's cryptography classics library.
                        
                         0471253111 | 0471453803 | 9780471453802
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=6653">Place Hold on <em>Secrets and lies : digital security in a networked world </em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=6653</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Java network security /






</title>
       <dc:identifier>ISBN:0137615299</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=61888</link>
        
       <description><![CDATA[









	   <p>By Macgregor, Robert. 
	   Upper Saddle River, N.J. : Prentice Hall PTR, 1998
                        . xii, 232 p. :
                        , Includes Index
                         24 cm. . 
                         0137615299
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=61888">Place Hold on <em>Java network security /</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=61888</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    CISA--Certified Information Systems Auditor : (Include CD)


    study guide /





</title>
       <dc:identifier>ISBN:0782144381 (pbk.) | 9780782144383</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=190823</link>
        
       <description><![CDATA[









	   <p>By Cannon, David L.,. 
	   Indianapolis, Indiana : Wiley Pub., 2006
                        . xliii, 434 p. :
                        , Includes index. | Secretes a Successful IS Auditor (Page-1), Audit Process (Page-47), IT Governce (Page-89), Networking Technology (Page-143), Life Cycle Management (Page-197), IT Service Delivery (Page-277) Information Asset Protection (Page-277), Disaster Recovery and Business Countity (Page-339).
                         24 cm. +. 
                         0782144381 (pbk.) | 9780782144383
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=190823">Place Hold on <em>CISA--Certified Information Systems Auditor : (Include CD)</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=190823</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    The E-Privacy imperative :


    protect your customers' Internet privacy and ensure your company's survival in the electronic age /





</title>
       <dc:identifier>ISBN:0814406289</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=192194</link>
        
       <description><![CDATA[









	   <p>By Merkow, Mark S.. 
	   New York : AMACOM, 2002
                        . xi, 267 p. :
                        
                         23 cm.. 
                         0814406289
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=192194">Place Hold on <em>The E-Privacy imperative :</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=192194</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    The E-Privacy imperative (E-Book)


    protect your customers' Internet privacy and ensure your company's survival in the electronic age /





</title>
       <dc:identifier>ISBN:0814406289</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=192272</link>
        
       <description><![CDATA[









	   <p>By Merkow, Mark S.. 
	   New York : AMACOM, 2002
                        . xi, 267 p. :
                        
                         23 cm.. 
                         0814406289
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=192272">Place Hold on <em>The E-Privacy imperative (E-Book)</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=192272</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    The E-Privacy imperative (E-Book)


    protect your customers' Internet privacy and ensure your company's survival in the electronic age /





</title>
       <dc:identifier>ISBN:0814406289</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=192276</link>
        
       <description><![CDATA[









	   <p>By Merkow, Mark S.. 
	   New York : AMACOM, 2002
                        . xi, 267 p. :
                        
                         23 cm.. 
                         0814406289
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=192276">Place Hold on <em>The E-Privacy imperative (E-Book)</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=192276</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Cyber infrastructure protection (E-Book)






</title>
       <dc:identifier>ISBN:1-58487-468-6 | 978-1-58487-468-3</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=196719</link>
        
       <description><![CDATA[









	   <p>
	   Carlisle, PA : Strategic Studies Institute, U.S. Army War College, 2011
                        . vi, 315 p. :
                        , &quot;May 2011.&quot;
                         23 cm.. 
                         1-58487-468-6 | 978-1-58487-468-3
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=196719">Place Hold on <em>Cyber infrastructure protection (E-Book)</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=196719</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    CISA: certified information systems auditor study guide (EBOOK)






</title>
       <dc:identifier>ISBN:9780470610107 (pbk.)</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=217063</link>
        
       <description><![CDATA[









	   <p>By Cannon, David L.,. 
	   Indianapolis, Ind. : Wiley Pub., 2011
                        . lxviii, 626 p. :
                        , Includes index.
                         24 cm. +. 
                         9780470610107 (pbk.)
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=217063">Place Hold on <em>CISA: certified information systems auditor study guide (EBOOK)</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=217063</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    The art of memory forensics :


    detecting malware and threats in Windows, Linux, and Mac memory /





</title>
       <dc:identifier>ISBN:9781118825099 (pbk.) | 1118825098 (pbk.) | 9781118825044 (ebk.) | 1118825047 (ebk.) | 9781118824993 (ebk.) | 1118824997 (ebk.)</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=527340</link>
        
       <description><![CDATA[









	   <p>By Ligh, Michael Hale.. 
	   
                        . xxiii, 886 pages :
                        
                         24 cm. 
                         9781118825099 (pbk.) | 1118825098 (pbk.) | 9781118825044 (ebk.) | 1118825047 (ebk.) | 9781118824993 (ebk.) | 1118824997 (ebk.)
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=527340">Place Hold on <em>The art of memory forensics :</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=527340</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Hacking the hacker :


    learn from the experts who take down hackers /





</title>
       <dc:identifier>ISBN:9781119396215 | 1119396212</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=591620</link>
        
       <description><![CDATA[









	   <p>By Grimes, Roger A.,. 
	   
                        . xxx, 286 pages ;
                        
                         23 cm. 
                         9781119396215 | 1119396212
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=591620">Place Hold on <em>Hacking the hacker :</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=591620</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Secrets of computer espionage :


    tactics and countermeasures /





</title>
       <dc:identifier>ISBN:0764537105 (pbk.) :</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=591938</link>
        
       <description><![CDATA[









	   <p>By McNamara, Joel.. 
	   New York : Wiley, 2003
                        . xxi, 362 p. :
                        
                         24 cm.. 
                         0764537105 (pbk.) :
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=591938">Place Hold on <em>Secrets of computer espionage :</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=591938</guid>
     </item>
	 
     <atom:link rel="search" type="application/opensearchdescription+xml" href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-search.pl?&amp;sort_by=&amp;format=opensearchdescription"/>
     <opensearch:Query role="request" searchTerms="" startPage="" />
     <item>
       <title>
    Computer security :


    principles and practice /





</title>
       <dc:identifier>ISBN:9780138091675 | 0138091676</dc:identifier>
        
        <link>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=612104</link>
        
       <description><![CDATA[









	   <p>By Stallings, William,. 
	   
                        . pages cm
                        
                        
                         9780138091675 | 0138091676
       </p>

<p><a href="http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-reserve.pl?biblionumber=612104">Place Hold on <em>Computer security :</em></a></p>

						]]></description>
       <guid>http://catalogue.nust.edu.pk:8081/cgi-bin/koha/opac-detail.pl?biblionumber=612104</guid>
     </item>
	 
   </channel>
</rss>





