<?xml version="1.0" encoding="utf-8" ?> <rss version="2.0" xmlns:opensearch="http://a9.com/-/spec/opensearch/1.1/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"> <channel> <title> <![CDATA[CSPC Library Search for 'su:&quot;Computer security&quot;']]> </title> <link> http://library.cspc.edu.ph/cgi-bin/koha/opac-search.pl?q=ccl=su%3A%22Computer%20security%22&#38;sort_by=relevance&#38;format=rss </link> <atom:link rel="self" type="application/rss+xml" href="http://library.cspc.edu.ph/cgi-bin/koha/opac-search.pl?q=ccl=su%3A%22Computer%20security%22&#38;sort_by=relevance&#38;format=rss"/> <description> <![CDATA[ Search results for 'su:&quot;Computer security&quot;' at CSPC Library]]> </description> <opensearch:totalResults>119</opensearch:totalResults> <opensearch:startIndex>0</opensearch:startIndex> <opensearch:itemsPerPage>50</opensearch:itemsPerPage> <atom:link rel="search" type="application/opensearchdescription+xml" href="http://library.cspc.edu.ph/cgi-bin/koha/opac-search.pl?q=ccl=su%3A%22Computer%20security%22&#38;sort_by=relevance&#38;format=opensearchdescription"/> <opensearch:Query role="request" searchTerms="q%3Dccl%3Dsu%253A%2522Computer%2520security%2522" startPage="" /> <item> <title> Guide to firewalls &amp; VPNs </title> <dc:identifier>ISBN:9781111308483</dc:identifier> <link>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=2345</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1111308489.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Whitman, Michael E.,.<br /> .<br /> 346 pages : , Includes Index. 26 cm..<br /> 9781111308483 </p> ]]> <![CDATA[ <p> <a href="http://library.cspc.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=2345">Place hold on <em>Guide to firewalls &amp; VPNs</em></a> </p> ]]> </description> <guid>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=2345</guid> </item> <item> <title> Security+ guide to network security fundamentals </title> <dc:identifier>ISBN:9781111640170</dc:identifier> <link>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=2370</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1111640173.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Ciampa, Mark.<br /> Australia : Cengage Learning. 2012 .<br /> 628 pages : , Includes Index. 26 cm..<br /> 9781111640170 </p> ]]> <![CDATA[ <p> <a href="http://library.cspc.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=2370">Place hold on <em>Security+ guide to network security fundamentals</em></a> </p> ]]> </description> <guid>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=2370</guid> </item> <item> <title> Hands-on ethical hacking and network defense </title> <dc:identifier>ISBN:9781133935612</dc:identifier> <link>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=2376</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1133935613.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Simpson, Michael T.,.<br /> Boston : Cengage Learning. 2015 .<br /> 435 pages : , Includes Index. 26 cm..<br /> 9781133935612 </p> ]]> <![CDATA[ <p> <a href="http://library.cspc.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=2376">Place hold on <em>Hands-on ethical hacking and network defense </em></a> </p> ]]> </description> <guid>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=2376</guid> </item> <item> <title> Guide to network defense and countermeasures </title> <dc:identifier>ISBN:9781133727941</dc:identifier> <link>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=2380</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1133727948.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Weaver, Randy.<br /> Australia : Cengage Learning. 2014 .<br /> 584 pages : , Includes Index. 26 cm..<br /> 9781133727941 </p> ]]> <![CDATA[ <p> <a href="http://library.cspc.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=2380">Place hold on <em>Guide to network defense and countermeasures</em></a> </p> ]]> </description> <guid>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=2380</guid> </item> <item> <title> Principles of information security </title> <dc:identifier>ISBN:9781111138233</dc:identifier> <link>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=2384</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1111138230.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Whitman, Michael E.,.<br /> Australia : Cengage Learning. 2012 .<br /> 619 pages : , Includes Index. 26 cm..<br /> 9781111138233 </p> ]]> <![CDATA[ <p> <a href="http://library.cspc.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=2384">Place hold on <em>Principles of information security</em></a> </p> ]]> </description> <guid>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=2384</guid> </item> <item> <title> Network intrusion analysis : methodologies, tools and techniques for incident analysis and response / </title> <dc:identifier>ISBN:9781597499620</dc:identifier> <link>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=3314</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1597499625.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Fichera, Joe.<br /> USA : Syngress, 2013 .<br /> v, 239 pages : , Includes Index. 23 cm..<br /> 9781597499620 </p> ]]> <![CDATA[ <p> <a href="http://library.cspc.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=3314">Place hold on <em>Network intrusion analysis :</em></a> </p> ]]> </description> <guid>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=3314</guid> </item> <item> <title> Digital signatures </title> <dc:identifier>ISBN:0072194820</dc:identifier> <link>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=3848</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0072194820.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Atreya, Mohan.<br /> Osborne : McGraw Hill. 2002 .<br /> 368 pages : , Includes Index. 26 cm..<br /> 0072194820 </p> ]]> <![CDATA[ <p> <a href="http://library.cspc.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=3848">Place hold on <em>Digital signatures</em></a> </p> ]]> </description> <guid>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=3848</guid> </item> <item> <title> Protecting your pc </title> <dc:identifier>ISBN:9781584504863</dc:identifier> <link>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=3878</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1584504862.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Barile, Ian.<br /> Boston : Charles River Media 2006 .<br /> 364 pages : , Includes Index. 26 cm..<br /> 9781584504863 </p> ]]> <![CDATA[ <p> <a href="http://library.cspc.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=3878">Place hold on <em>Protecting your pc</em></a> </p> ]]> </description> <guid>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=3878</guid> </item> <item> <title> The basics of hacking and penetration testing : ethical hacking and penetration testing made easy </title> <dc:identifier>ISBN:9781597496551</dc:identifier> <link>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=4045</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1597496553.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Engebretson, Patrick.<br /> Amsterdam : Syngress Press. 2011 .<br /> 159 pages : , Includes Index. 25 cm..<br /> 9781597496551 </p> ]]> <![CDATA[ <p> <a href="http://library.cspc.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=4045">Place hold on <em>The basics of hacking and penetration testing :</em></a> </p> ]]> </description> <guid>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=4045</guid> </item> <item> <title> Network security : a hacker's perspective/ </title> <dc:identifier>ISBN:1598631632</dc:identifier> <link>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=4555</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1598631632.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Fadia, Ankit.<br /> Massachusetts : Thomson Course Technology, 2006 .<br /> vi, 415 pages : , Includes Index. 23 cm..<br /> 1598631632 </p> ]]> <![CDATA[ <p> <a href="http://library.cspc.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=4555">Place hold on <em>Network security :</em></a> </p> ]]> </description> <guid>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=4555</guid> </item> <item> <title> Securing the cloud : cloud computer security techniques and tactics / </title> <dc:identifier>ISBN:9781597495929</dc:identifier> <link>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=4784</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1597495921.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Winkler, Vic,.<br /> Amsterdam : Elsevier. 2011 .<br /> 290 pages : , Includes Index. 23 cm..<br /> 9781597495929 </p> ]]> <![CDATA[ <p> <a href="http://library.cspc.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=4784">Place hold on <em>Securing the cloud :</em></a> </p> ]]> </description> <guid>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=4784</guid> </item> <item> <title> Operating system forensics </title> <dc:identifier>ISBN:9780128019498</dc:identifier> <link>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=5034</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0128019492.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Messier, Ric.<br /> Massachussets Elsevier 2016 .<br /> xi, 374 pages, , Includes index. 23 cm..<br /> 9780128019498 </p> ]]> <![CDATA[ <p> <a href="http://library.cspc.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=5034">Place hold on <em>Operating system forensics</em></a> </p> ]]> </description> <guid>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=5034</guid> </item> <item> <title> Network security </title> <dc:identifier>ISBN:9781680954081</dc:identifier> <link>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=5055</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1680954083.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> United States of America : 3G E-Learning LLC, 2017 .<br /> xii, 281 pages : , Includes Index. 23 cm..<br /> 9781680954081 </p> ]]> <![CDATA[ <p> <a href="http://library.cspc.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=5055">Place hold on <em>Network security</em></a> </p> ]]> </description> <guid>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=5055</guid> </item> <item> <title> Cognitive hack the new battleground in cybersecurity... the human mind/ </title> <dc:identifier>ISBN:9781498749817</dc:identifier> <link>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=7761</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/149874981X.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Bone, James.<br /> Boca Raton: CRC Press, 2017 .<br /> xxii, 181 pages: , Includes Index, 24 cm..<br /> 9781498749817 </p> ]]> <![CDATA[ <p> <a href="http://library.cspc.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=7761">Place hold on <em>Cognitive hack</em></a> </p> ]]> </description> <guid>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=7761</guid> </item> <item> <title> Hands-on ethical hacking and network defense </title> <dc:identifier>ISBN:9781285454672</dc:identifier> <link>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=7762</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1285454677.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Simpson, Michael T.,.<br /> USA: Cengage Learning, 2017 .<br /> xxii, 426 pages: , Includes Index. 24 cm. +.<br /> 9781285454672 </p> ]]> <![CDATA[ <p> <a href="http://library.cspc.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=7762">Place hold on <em>Hands-on ethical hacking and network defense</em></a> </p> ]]> </description> <guid>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=7762</guid> </item> <item> <title> Security+ guide to network security fundamentals </title> <dc:identifier>ISBN:9781337288781</dc:identifier> <link>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=7819</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1337288780.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Ciampa, Mark.<br /> USA : Cengage Learning, 2018 .<br /> iii, 756 pages : , Includes Index. 23 cm..<br /> 9781337288781 </p> ]]> <![CDATA[ <p> <a href="http://library.cspc.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=7819">Place hold on <em>Security+ guide to network security fundamentals</em></a> </p> ]]> </description> <guid>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=7819</guid> </item> <item> <title> Security awareness : applying practical security in your world / </title> <dc:identifier>ISBN:9781305500372</dc:identifier> <link>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=7821</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1305500377.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Ciampa, Mark.<br /> USA : Cengage Learning, 2017 .<br /> v, 229 pages : , Includes Index. 23 cm..<br /> 9781305500372 </p> ]]> <![CDATA[ <p> <a href="http://library.cspc.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=7821">Place hold on <em>Security awareness :</em></a> </p> ]]> </description> <guid>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=7821</guid> </item> <item> <title> Management of information security </title> <dc:identifier>ISBN:9781305501256</dc:identifier> <link>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=7853</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/130550125X.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Whitman, Michael E.,.<br /> USA : Cengage Learning, 2017 .<br /> iii, 650 pages : , Includes Index. 23 cm..<br /> 9781305501256 </p> ]]> <![CDATA[ <p> <a href="http://library.cspc.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=7853">Place hold on <em>Management of information security</em></a> </p> ]]> </description> <guid>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=7853</guid> </item> <item> <title> Information security principles and practices </title> <dc:identifier>ISBN:9781680956740</dc:identifier> <link>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=7928</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1680956744.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> New York : Delve Publishing LLC, 2017 .<br /> 255 pages : , Includes index. 26 cm..<br /> 9781680956740 </p> ]]> <![CDATA[ <p> <a href="http://library.cspc.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=7928">Place hold on <em>Information security</em></a> </p> ]]> </description> <guid>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=7928</guid> </item> <item> <title> Electronic access control </title> <dc:identifier>ISBN:9780128054659</dc:identifier> <link>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=9281</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0128054654.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Norman, Thomas L.,.<br /> Oxford : Elsevier, 2017 .<br /> xix, 544 pages : , Includes bibliographical references and index. 23 cm..<br /> 9780128054659 </p> ]]> <![CDATA[ <p> <a href="http://library.cspc.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=9281">Place hold on <em>Electronic access control</em></a> </p> ]]> </description> <guid>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=9281</guid> </item> <item> <title> 3GE collection on law cybersecurity </title> <dc:identifier>ISBN:9781680958119</dc:identifier> <link>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=9709</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1680958119.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> New York: 3G E-Learning LLC, 2018 .<br /> 271 pages: , Includes index. 27 cm..<br /> 9781680958119 </p> ]]> <![CDATA[ <p> <a href="http://library.cspc.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=9709">Place hold on <em>3GE collection on law</em></a> </p> ]]> </description> <guid>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=9709</guid> </item> <item> <title> Computer forensics </title> <dc:identifier>ISBN:9781680954135</dc:identifier> <link>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=11124</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/168095413X.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> USA : 3G E-Learning LLC, 2017 .<br /> xii, 250 pages : , Includes index, 25 cm..<br /> 9781680954135 </p> ]]> <![CDATA[ <p> <a href="http://library.cspc.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=11124">Place hold on <em>Computer forensics</em></a> </p> ]]> </description> <guid>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=11124</guid> </item> <item> <title> Cybersecurity essentials/ </title> <dc:identifier>ISBN:9781119362395</dc:identifier> <link>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=11132</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1119362393.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Brooks, Charles J.,.<br /> Canada : John Wiley &amp; Sons, Inc., 2018 .<br /> xxvi, 758 pages : , Includes index. 25 cm..<br /> 9781119362395 </p> ]]> <![CDATA[ <p> <a href="http://library.cspc.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=11132">Place hold on <em>Cybersecurity</em></a> </p> ]]> </description> <guid>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=11132</guid> </item> <item> <title> Mike Meyers' certification passport CompTIA security+ exam SYO-501/ </title> <dc:identifier>ISBN:9781260026566</dc:identifier> <link>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=11134</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1260026566.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Dunkerley, Dawn.<br /> New York : McGraw Hill- Education, 2018 .<br /> xxxiv, 557 pages : , Includes index. 24 cm. +.<br /> 9781260026566 </p> ]]> <![CDATA[ <p> <a href="http://library.cspc.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=11134">Place hold on <em>Mike Meyers' certification passport</em></a> </p> ]]> </description> <guid>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=11134</guid> </item> <item> <title> The basics of cyber safety : computer and mobile device safety made easy / </title> <dc:identifier>ISBN:9780124166509</dc:identifier> <link>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=11256</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0124166504.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Sammons, John,.<br /> Cambridge, Massachusetts : Elsevier, .<br /> xv, 237 pages : 25 cm..<br /> 9780124166509 </p> ]]> <![CDATA[ <p> <a href="http://library.cspc.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=11256">Place hold on <em>The basics of cyber safety : </em></a> </p> ]]> </description> <guid>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=11256</guid> </item> <item> <title> Cybersecurity for dummies </title> <dc:identifier>ISBN:9781119560326</dc:identifier> <link>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=11257</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1119560322.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Steinberg, Joseph.<br /> New Jersey : John Wiley &amp; Sons, 2020 .<br /> xvii, 346 pages : , Includes index. 25 cm..<br /> 9781119560326 </p> ]]> <![CDATA[ <p> <a href="http://library.cspc.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=11257">Place hold on <em>Cybersecurity for dummies</em></a> </p> ]]> </description> <guid>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=11257</guid> </item> <item> <title> Security fundamentals </title> <dc:identifier>ISBN:9781119650669</dc:identifier> <link>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=11258</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1119650666.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Panek, Crystal .<br /> Indiana: John Wiley &amp; Sons, 2020 .<br /> xx, 283 pages : , Includes index. 25 cm..<br /> 9781119650669 </p> ]]> <![CDATA[ <p> <a href="http://library.cspc.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=11258">Place hold on <em>Security fundamentals</em></a> </p> ]]> </description> <guid>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=11258</guid> </item> <item> <title> Computer and cyber security principles, algorithm, applications, and perspectives </title> <dc:identifier>ISBN:9780367656911</dc:identifier> <link>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=11260</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0367656914.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> Florida: CRC Press, 2019 .<br /> xxvii, 666 pages : , Includes index, 26 cm..<br /> 9780367656911 </p> ]]> <![CDATA[ <p> <a href="http://library.cspc.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=11260">Place hold on <em>Computer and cyber security</em></a> </p> ]]> </description> <guid>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=11260</guid> </item> <item> <title> Darkweb cyber threat intelligence mining </title> <dc:identifier>ISBN:9781107185777</dc:identifier> <link>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=11261</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1107185777.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Robertson, John .<br /> New York : Cambridge University Press, 2017 .<br /> ix, 137 pages : , Includes index, 25 cm..<br /> 9781107185777 </p> ]]> <![CDATA[ <p> <a href="http://library.cspc.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=11261">Place hold on <em>Darkweb cyber threat intelligence mining</em></a> </p> ]]> </description> <guid>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=11261</guid> </item> <item> <title> Asset attack vectors building effective vulnerability management strategies to protect organizations </title> <dc:identifier>ISBN:9781484236260</dc:identifier> <link>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=11266</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1484236262.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Haber, Morey J.,.<br /> New York : Springer, 2018 .<br /> xxxvii, 371 pages : , Includes index. 25 cm..<br /> 9781484236260 </p> ]]> <![CDATA[ <p> <a href="http://library.cspc.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=11266">Place hold on <em>Asset attack vectors</em></a> </p> ]]> </description> <guid>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=11266</guid> </item> <item> <title> Principles of information security </title> <dc:identifier>ISBN:9781337102063</dc:identifier> <link>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=11271</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1337102067.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Whitman, Michael E.,.<br /> Massachusetts: Cengage Learning, 2018 .<br /> xx, 728 pages : , Includes index. 24 cm..<br /> 9781337102063 </p> ]]> <![CDATA[ <p> <a href="http://library.cspc.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=11271">Place hold on <em>Principles of information security</em></a> </p> ]]> </description> <guid>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=11271</guid> </item> <item> <title> Cybersecurity law </title> <dc:identifier>ISBN:9781119231509</dc:identifier> <link>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=11273</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1119231507.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Kosseff, Jeff.<br /> New Jersey : John Wiley &amp; Sons, 2017 .<br /> xxvii, 496 pages : , Includes index. 25 cm..<br /> 9781119231509 </p> ]]> <![CDATA[ <p> <a href="http://library.cspc.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=11273">Place hold on <em>Cybersecurity law</em></a> </p> ]]> </description> <guid>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=11273</guid> </item> <item> <title> Information security and cyber laws </title> <dc:identifier>ISBN:9789350145647</dc:identifier> <link>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=11277</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/9350145642.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Sharma, Pankaj.<br /> New Delhi : S.K. Kataria &amp; Sons, 2015 .<br /> 204 pages : , Includes index. 26 cm..<br /> 9789350145647 </p> ]]> <![CDATA[ <p> <a href="http://library.cspc.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=11277">Place hold on <em>Information security and cyber laws</em></a> </p> ]]> </description> <guid>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=11277</guid> </item> <item> <title> Computer security </title> <dc:identifier>ISBN:9780470741153</dc:identifier> <link>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=11281</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0470741155.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Gollman, Dieter.<br /> United Kingdom : John Wiley &amp; Sons, 2011 .<br /> xix, 436 pages : , Includes index, 25 cm..<br /> 9780470741153 </p> ]]> <![CDATA[ <p> <a href="http://library.cspc.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=11281">Place hold on <em>Computer security</em></a> </p> ]]> </description> <guid>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=11281</guid> </item> <item> <title> Build your own cybersecurity testing lab : low-cost solutions for testing in virtual and cloud-based environments / </title> <dc:identifier>ISBN:9781260458312</dc:identifier> <link>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=11293</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1260458318.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Messier, Ric.<br /> New York : McGraw Hill Education, .<br /> xi, 308 pages : , Includes index. 24 cm..<br /> 9781260458312 </p> ]]> <![CDATA[ <p> <a href="http://library.cspc.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=11293">Place hold on <em>Build your own cybersecurity testing lab :</em></a> </p> ]]> </description> <guid>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=11293</guid> </item> <item> <title> Gray hat hacking the ethical hacker's handbook </title> <dc:identifier>ISBN:9781260108415</dc:identifier> <link>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=11296</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1260108414.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Harper, Allen.<br /> New York: McGraw Hill Education, 2018 .<br /> xxxi, 602 pages : , Includes index. 24 cm..<br /> 9781260108415 </p> ]]> <![CDATA[ <p> <a href="http://library.cspc.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=11296">Place hold on <em>Gray hat hacking</em></a> </p> ]]> </description> <guid>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=11296</guid> </item> <item> <title> Cyber security </title> <dc:identifier>ISBN:9781682514207</dc:identifier> <link>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=11298</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/168251420X.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> New York : 3G E-Learning LLC, 2018 .<br /> x, 285 pages : , Includes index, 25 cm..<br /> 9781682514207 </p> ]]> <![CDATA[ <p> <a href="http://library.cspc.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=11298">Place hold on <em>Cyber security</em></a> </p> ]]> </description> <guid>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=11298</guid> </item> <item> <title> Cybersecurity incident response how to contain, eradicate, and recover from incidents </title> <dc:identifier>ISBN:9781484238691</dc:identifier> <link>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=11300</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1484238699.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Thompson, Eric C.,.<br /> New York : Springer, 2018 .<br /> xv, 176 pages : , Includes index. 27 cm..<br /> 9781484238691 </p> ]]> <![CDATA[ <p> <a href="http://library.cspc.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=11300">Place hold on <em>Cybersecurity incident response</em></a> </p> ]]> </description> <guid>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=11300</guid> </item> <item> <title> Operations in cybersecurity </title> <dc:identifier>ISBN:9781984636225</dc:identifier> <link>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=11307</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1984636227.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> New York : 3G E-Learning LLC, 2020 .<br /> xiv, 343 pages : , Includes index, 27 cm..<br /> 9781984636225 </p> ]]> <![CDATA[ <p> <a href="http://library.cspc.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=11307">Place hold on <em>Operations in cybersecurity</em></a> </p> ]]> </description> <guid>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=11307</guid> </item> <item> <title> Cyber security </title> <dc:identifier>ISBN:9781984636997</dc:identifier> <link>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=11308</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1984636995.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> New York : 3G E-Learning LLC, 2018 .<br /> xiv, 338 pages : , Includes index, 25 cm..<br /> 9781984636997 </p> ]]> <![CDATA[ <p> <a href="http://library.cspc.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=11308">Place hold on <em>Cyber security</em></a> </p> ]]> </description> <guid>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=11308</guid> </item> <item> <title> Computer networks and security </title> <dc:identifier>ISBN:9781984638496</dc:identifier> <link>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=11330</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1984638491.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> New York : 3G E-Learning LLC, 2020 .<br /> xiv, 325 pages : 27 cm..<br /> 9781984638496 </p> ]]> <![CDATA[ <p> <a href="http://library.cspc.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=11330">Place hold on <em>Computer networks and security</em></a> </p> ]]> </description> <guid>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=11330</guid> </item> <item> <title> Staying safe online: digital footprint/ </title> <dc:identifier>ISBN:</dc:identifier> <link>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=11987</link> <description> <![CDATA[ <p> .<br /> 1 videodisc (21 min.) : , Closed-captioned. 4 3/4 inches..<br /> </p> ]]> <![CDATA[ <p> <a href="http://library.cspc.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=11987">Place hold on <em>Staying safe online:</em></a> </p> ]]> </description> <guid>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=11987</guid> </item> <item> <title> Advanced penetration testing : hacking the world's most secure networks / </title> <dc:identifier>ISBN:9781119367680</dc:identifier> <link>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=12237</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1119367689.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Allsopp, Wil.<br /> Indianapolis, IN : John Wiley &amp; Sons, 2017 .<br /> xxxiii, 248 pages : , Includes index. 24 cm..<br /> 9781119367680 </p> ]]> <![CDATA[ <p> <a href="http://library.cspc.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=12237">Place hold on <em>Advanced penetration testing :</em></a> </p> ]]> </description> <guid>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=12237</guid> </item> <item> <title> Computer security : principles and practice / </title> <dc:identifier>ISBN:9781292066172</dc:identifier> <link>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=12246</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1292066172.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Stallings, William,.<br /> Boston, MA : Pearson, 2015 .<br /> 840 pages : , Includes index. 23 cm..<br /> 9781292066172 </p> ]]> <![CDATA[ <p> <a href="http://library.cspc.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=12246">Place hold on <em>Computer security :</em></a> </p> ]]> </description> <guid>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=12246</guid> </item> <item> <title> Introduction to cryptography : principles and applications / </title> <dc:identifier>ISBN:9783662499665</dc:identifier> <link>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=12247</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/3662499665.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Delfs, Hans,.<br /> Berlin, Heidelberg : Springer, 2015 .<br /> xx, 508 pages : , Includes index. 24 cm..<br /> 9783662499665 </p> ]]> <![CDATA[ <p> <a href="http://library.cspc.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=12247">Place hold on <em>Introduction to cryptography :</em></a> </p> ]]> </description> <guid>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=12247</guid> </item> <item> <title> Fundamentals of information systems security / </title> <dc:identifier>ISBN:9781284116458</dc:identifier> <link>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=12313</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/128411645X.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Kim, David.<br /> Burlington, Massachusetts : Jones &amp; Bartlett Learning, .<br /> xxii, 548 pages : 24 cm..<br /> 9781284116458 </p> ]]> <![CDATA[ <p> <a href="http://library.cspc.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=12313">Place hold on <em>Fundamentals of information systems security /</em></a> </p> ]]> </description> <guid>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=12313</guid> </item> <item> <title> Computer security : principles and practice / </title> <dc:identifier>ISBN:9781682856598</dc:identifier> <link>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=13210</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1682856593.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> Forest Hills, New York : Willford Press, .<br /> vii, 274 pages : 26 cm..<br /> 9781682856598 </p> ]]> <![CDATA[ <p> <a href="http://library.cspc.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=13210">Place hold on <em>Computer security :</em></a> </p> ]]> </description> <guid>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=13210</guid> </item> <item> <title> Hacker techniques, tools, and incident handling / </title> <dc:identifier>ISBN:9781284147803</dc:identifier> <link>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=13214</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1284147800.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Oriyano, Sean-Philip,.<br /> Burlington, Massachusetts : Jones and Barlett Learning, 2020 .<br /> xvi, 407 pages : 23 cm. .<br /> 9781284147803 </p> ]]> <![CDATA[ <p> <a href="http://library.cspc.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=13214">Place hold on <em>Hacker techniques, tools, and incident handling / </em></a> </p> ]]> </description> <guid>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=13214</guid> </item> <item> <title> Computer networks and security. </title> <dc:identifier>ISBN:9781984658937</dc:identifier> <link>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=13227</link> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/198465893X.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> New York : 3G E-Learning, .<br /> xiii, 430 pages : 26 cm..<br /> 9781984658937 </p> ]]> <![CDATA[ <p> <a href="http://library.cspc.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=13227">Place hold on <em>Computer networks and security.</em></a> </p> ]]> </description> <guid>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=13227</guid> </item> <item> <title> Terminal Compromise </title> <dc:identifier>ISBN:</dc:identifier> <link>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=13454</link> <description> <![CDATA[ <p> By Schwartau, Winn.<br /> Project Gutenberg, 1993 </p> ]]> <![CDATA[ <p> <a href="http://library.cspc.edu.ph/cgi-bin/koha/opac-reserve.pl?biblionumber=13454">Place hold on <em>Terminal Compromise </em></a> </p> ]]> </description> <guid>http://library.cspc.edu.ph/cgi-bin/koha/opac-detail.pl?biblionumber=13454</guid> </item> </channel> </rss>
