<?xml version="1.0" encoding="utf-8" ?> <rss version="2.0" xmlns:opensearch="http://a9.com/-/spec/opensearch/1.1/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"> <channel> <title> <![CDATA[Cairo University Libraries portal Search for 'su:{Computer security}'with limit(s): 'suppress:false']]> </title> <!-- prettier-ignore-start --> <link> https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-search.pl?idx=&#38;q=su%3A%7BComputer%20security%7D&#38;sort_by=relevance&#38;format=rss </link> <!-- prettier-ignore-end --> <atom:link rel="self" type="application/rss+xml" href="https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-search.pl?idx=&#38;q=su%3A%7BComputer%20security%7D&#38;sort_by=relevance&#38;format=rss" /> <description> Search results for 'su:{Computer security}'with limit(s): 'suppress:false' at Cairo University Libraries portal </description> <opensearch:totalResults>30</opensearch:totalResults> <opensearch:startIndex>0</opensearch:startIndex> <opensearch:itemsPerPage>50</opensearch:itemsPerPage> <atom:link rel="search" type="application/opensearchdescription+xml" href="https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-search.pl?idx=&#38;q=su%3A%7BComputer%20security%7D&#38;sort_by=relevance&#38;format=opensearchdescription" /> <opensearch:Query role="request" searchTerms="idx%3D%26q%3Dsu%253A%257BComputer%2520security%257Dsuppress%3Afalse" startPage="" /> <item> <title> Management of information security / </title> <dc:identifier>ردمك: </dc:identifier> <!-- prettier-ignore-start --> <link>https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-detail.pl?biblionumber=113212</link> <!-- prettier-ignore-end --> <description> <img src="https://images-na.ssl-images-amazon.com/images/P/1423901304.01.TZZZZZZZ.jpg" alt="" /> <p> .<br /> xxiii, 576 p. : 24 cm..<br /> </p> <p> <a href="https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-reserve.pl?biblionumber=113212">Place hold on <em>Management of information security /</em></a> </p> </description> <guid>https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-detail.pl?biblionumber=113212</guid> </item> <item> <title> Security+ guide to network security fundamentals / </title> <dc:identifier>ردمك: </dc:identifier> <!-- prettier-ignore-start --> <link>https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-detail.pl?biblionumber=118975</link> <!-- prettier-ignore-end --> <description> <img src="https://images-na.ssl-images-amazon.com/images/P/1428340661.01.TZZZZZZZ.jpg" alt="" /> <p> .<br /> xxiv, 562 p. : 27 cm.+.<br /> </p> <p> <a href="https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-reserve.pl?biblionumber=118975">Place hold on <em>Security+ guide to network security fundamentals /</em></a> </p> </description> <guid>https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-detail.pl?biblionumber=118975</guid> </item> <item> <title> Managing information security / </title> <dc:identifier>ردمك: </dc:identifier> <!-- prettier-ignore-start --> <link>https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-detail.pl?biblionumber=159886</link> <!-- prettier-ignore-end --> <description> <img src="https://images-na.ssl-images-amazon.com/images/P/1597495336.01.TZZZZZZZ.jpg" alt="" /> <p> .<br /> 493 p. : 26 cm..<br /> </p> <p> <a href="https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-reserve.pl?biblionumber=159886">Place hold on <em>Managing information security / </em></a> </p> </description> <guid>https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-detail.pl?biblionumber=159886</guid> </item> <item> <title> Computer viruses and other malicious software : a threat to the Internet economy. </title> <dc:identifier>ردمك: </dc:identifier> <!-- prettier-ignore-start --> <link>https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-detail.pl?biblionumber=118652</link> <!-- prettier-ignore-end --> <description> <img src="https://images-na.ssl-images-amazon.com/images/P/9264056505.01.TZZZZZZZ.jpg" alt="" /> <p> .<br /> 244 p. : 23 cm..<br /> </p> <p> <a href="https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-reserve.pl?biblionumber=118652">Place hold on <em>Computer viruses and other malicious software :</em></a> </p> </description> <guid>https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-detail.pl?biblionumber=118652</guid> </item> <item> <title> Software security technologies : a programmatic approach / </title> <dc:identifier>ردمك: </dc:identifier> <!-- prettier-ignore-start --> <link>https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-detail.pl?biblionumber=113215</link> <!-- prettier-ignore-end --> <description> <img src="https://images-na.ssl-images-amazon.com/images/P/142831945X.01.TZZZZZZZ.jpg" alt="" /> <p> .<br /> xiv, 480 p. : , &quot;Preparing tomorrow's information security professionals&quot;--Cover. 24 cm..<br /> </p> <p> <a href="https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-reserve.pl?biblionumber=113215">Place hold on <em>Software security technologies :</em></a> </p> </description> <guid>https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-detail.pl?biblionumber=113215</guid> </item> <item> <title> UNIX network management tools / </title> <dc:identifier>ردمك: </dc:identifier> <!-- prettier-ignore-start --> <link>https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-detail.pl?biblionumber=104423</link> <!-- prettier-ignore-end --> <description> <img src="https://images-na.ssl-images-amazon.com/images/P/0079137881.01.TZZZZZZZ.jpg" alt="" /> <p> .<br /> xviii, 349 p. : 23 cm..<br /> </p> <p> <a href="https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-reserve.pl?biblionumber=104423">Place hold on <em>UNIX network management tools /</em></a> </p> </description> <guid>https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-detail.pl?biblionumber=104423</guid> </item> <item> <title> Computer &amp; security. </title> <dc:identifier>ردمك: </dc:identifier> <!-- prettier-ignore-start --> <link>https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-detail.pl?biblionumber=157649</link> <!-- prettier-ignore-end --> <description> <p> Amsterdam, the Netherlands North-Holland, 1982 .<br /> volume. : , Published: Oxford [England] : Elsevier Advanced Technology Publications, 1988- | available volumes/numbers:2000-2005 | Title from cover. 26 cm..<br /> </p> <p> <a href="https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-reserve.pl?biblionumber=157649">Place hold on <em>Computer &amp; security.</em></a> </p> </description> <guid>https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-detail.pl?biblionumber=157649</guid> </item> <item> <title> Guide to network defense and countermeasures / </title> <dc:identifier>ردمك: </dc:identifier> <!-- prettier-ignore-start --> <link>https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-detail.pl?biblionumber=114370</link> <!-- prettier-ignore-end --> <description> <img src="https://images-na.ssl-images-amazon.com/images/P/0619131241.01.TZZZZZZZ.jpg" alt="" /> <p> .<br /> xxi, 527 p. : , Includes index. 24 cm..<br /> </p> <p> <a href="https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-reserve.pl?biblionumber=114370">Place hold on <em>Guide to network defense and countermeasures /</em></a> </p> </description> <guid>https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-detail.pl?biblionumber=114370</guid> </item> <item> <title> Securing public web servers / </title> <dc:identifier>ردمك: </dc:identifier> <!-- prettier-ignore-start --> <link>https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-detail.pl?biblionumber=39521</link> <!-- prettier-ignore-end --> <description> <p> .<br /> 107 P. : 30cm.<br /> </p> <p> <a href="https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-reserve.pl?biblionumber=39521">Place hold on <em>Securing public web servers / </em></a> </p> </description> <guid>https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-detail.pl?biblionumber=39521</guid> </item> <item> <title> Computer networking from Lans to Wans : hardware, software, and security / </title> <dc:identifier>ردمك: </dc:identifier> <!-- prettier-ignore-start --> <link>https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-detail.pl?biblionumber=118633</link> <!-- prettier-ignore-end --> <description> <img src="https://images-na.ssl-images-amazon.com/images/P/1435496698.01.TZZZZZZZ.jpg" alt="" /> <p> .<br /> xxxi, 949 p.; , Includes index. 26 cm.+.<br /> </p> <p> <a href="https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-reserve.pl?biblionumber=118633">Place hold on <em>Computer networking from Lans to Wans : </em></a> </p> </description> <guid>https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-detail.pl?biblionumber=118633</guid> </item> <item> <title> Computers and security. </title> <dc:identifier>ردمك: </dc:identifier> <!-- prettier-ignore-start --> <link>https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-detail.pl?biblionumber=157672</link> <!-- prettier-ignore-end --> <description> <p> .<br /> volumes : , Title from cover. 28 cm.<br /> </p> <p> <a href="https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-reserve.pl?biblionumber=157672">Place hold on <em>Computers and security.</em></a> </p> </description> <guid>https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-detail.pl?biblionumber=157672</guid> </item> <item> <title> Information security management handbook / </title> <dc:identifier>ردمك: </dc:identifier> <!-- prettier-ignore-start --> <link>https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-detail.pl?biblionumber=103392</link> <!-- prettier-ignore-end --> <description> <img src="https://images-na.ssl-images-amazon.com/images/P/0849398290.01.TZZZZZZZ.jpg" alt="" /> <p> .<br /> v. [1-4 ] : , Rev. ed. of: Handbook of information security management 1999. | Vol. 1 lacks numbering. 24 cm..<br /> </p> <p> <a href="https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-reserve.pl?biblionumber=103392">Place hold on <em>Information security management handbook /</em></a> </p> </description> <guid>https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-detail.pl?biblionumber=103392</guid> </item> <item> <title> IT Induction and Information Security Awareness : a pocket guide / </title> <dc:identifier>ردمك: </dc:identifier> <!-- prettier-ignore-start --> <link>https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-detail.pl?biblionumber=159957</link> <!-- prettier-ignore-end --> <description> <img src="https://images-na.ssl-images-amazon.com/images/P/1849280339.01.TZZZZZZZ.jpg" alt="" /> <p> .<br /> 41 p. : 20 cm..<br /> </p> <p> <a href="https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-reserve.pl?biblionumber=159957">Place hold on <em>IT Induction and Information Security Awareness :</em></a> </p> </description> <guid>https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-detail.pl?biblionumber=159957</guid> </item> <item> <title> An intelligent hybrid biometrics system / </title> <dc:identifier>ردمك: </dc:identifier> <!-- prettier-ignore-start --> <link>https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-detail.pl?biblionumber=49858</link> <!-- prettier-ignore-end --> <description> <p> .<br /> 112 P. : 30cm.<br /> </p> <p> <a href="https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-reserve.pl?biblionumber=49858">Place hold on <em>An intelligent hybrid biometrics system / </em></a> </p> </description> <guid>https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-detail.pl?biblionumber=49858</guid> </item> <item> <title> Cryptography for computer networks security / </title> <dc:identifier>ردمك: </dc:identifier> <!-- prettier-ignore-start --> <link>https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-detail.pl?biblionumber=4424</link> <!-- prettier-ignore-end --> <description> <p> .<br /> 111Leaves : 30cm.<br /> </p> <p> <a href="https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-reserve.pl?biblionumber=4424">Place hold on <em>Cryptography for computer networks security / </em></a> </p> </description> <guid>https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-detail.pl?biblionumber=4424</guid> </item> <item> <title> A packet filtering framework for open networks protection / </title> <dc:identifier>ردمك: </dc:identifier> <!-- prettier-ignore-start --> <link>https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-detail.pl?biblionumber=5653</link> <!-- prettier-ignore-end --> <description> <p> .<br /> 142Leaves. ; 30cm.<br /> </p> <p> <a href="https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-reserve.pl?biblionumber=5653">Place hold on <em>A packet filtering framework for open networks protection / </em></a> </p> </description> <guid>https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-detail.pl?biblionumber=5653</guid> </item> <item> <title> Mining biometrics data / </title> <dc:identifier>ردمك: </dc:identifier> <!-- prettier-ignore-start --> <link>https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-detail.pl?biblionumber=48519</link> <!-- prettier-ignore-end --> <description> <p> .<br /> 93 Leaves ; 30cm.<br /> </p> <p> <a href="https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-reserve.pl?biblionumber=48519">Place hold on <em>Mining biometrics data / </em></a> </p> </description> <guid>https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-detail.pl?biblionumber=48519</guid> </item> <item> <title> Security in the information society : visions and perspectives : IFIP TC11 17th International Conference on Information Security (SEC2002), May 7-9, 2002, Cairo, Egypt / </title> <dc:identifier>ردمك: </dc:identifier> <!-- prettier-ignore-start --> <link>https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-detail.pl?biblionumber=158145</link> <!-- prettier-ignore-end --> <description> <p> .<br /> 586 p. : 25 cm.<br /> </p> <p> <a href="https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-reserve.pl?biblionumber=158145">Place hold on <em>Security in the information society : </em></a> </p> </description> <guid>https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-detail.pl?biblionumber=158145</guid> </item> <item> <title> Networked RFID systems and lightweight cryptography : raising barriers to product counterfeiting / </title> <dc:identifier>ردمك: </dc:identifier> <!-- prettier-ignore-start --> <link>https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-detail.pl?biblionumber=118635</link> <!-- prettier-ignore-end --> <description> <img src="https://images-na.ssl-images-amazon.com/images/P/3540716408.01.TZZZZZZZ.jpg" alt="" /> <p> .<br /> viii, 355 p. : 24 cm..<br /> </p> <p> <a href="https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-reserve.pl?biblionumber=118635">Place hold on <em>Networked RFID systems and lightweight cryptography :</em></a> </p> </description> <guid>https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-detail.pl?biblionumber=118635</guid> </item> <item> <title> VHDL implementation for image encryption using spectrum fusion technique / </title> <dc:identifier>ردمك: </dc:identifier> <!-- prettier-ignore-start --> <link>https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-detail.pl?biblionumber=45251</link> <!-- prettier-ignore-end --> <description> <p> .<br /> 145 P. : 30cm.<br /> </p> <p> <a href="https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-reserve.pl?biblionumber=45251">Place hold on <em>VHDL implementation for image encryption using spectrum fusion technique / </em></a> </p> </description> <guid>https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-detail.pl?biblionumber=45251</guid> </item> <item> <title> Computer-mediated communication across cultures : international interactions in online environments / </title> <dc:identifier>ردمك: </dc:identifier> <!-- prettier-ignore-start --> <link>https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-detail.pl?biblionumber=124976</link> <!-- prettier-ignore-end --> <description> <img src="https://images-na.ssl-images-amazon.com/images/P/160960833X.01.TZZZZZZZ.jpg" alt="" /> <p> .<br /> xxiv, 542 p. : , &quot;Premier reference source&quot;--Cover. 30 cm..<br /> </p> <p> <a href="https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-reserve.pl?biblionumber=124976">Place hold on <em>Computer-mediated communication across cultures :</em></a> </p> </description> <guid>https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-detail.pl?biblionumber=124976</guid> </item> <item> <title> Data security and authentication over computer communication networks and the internet / </title> <dc:identifier>ردمك: </dc:identifier> <!-- prettier-ignore-start --> <link>https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-detail.pl?biblionumber=14147</link> <!-- prettier-ignore-end --> <description> <p> .<br /> 181P : 30cm.<br /> </p> <p> <a href="https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-reserve.pl?biblionumber=14147">Place hold on <em>Data security and authentication over computer communication networks and the internet / </em></a> </p> </description> <guid>https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-detail.pl?biblionumber=14147</guid> </item> <item> <title> Enhancing intrusion detection system performance using machine learning approaches / </title> <dc:identifier>ردمك: </dc:identifier> <!-- prettier-ignore-start --> <link>https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-detail.pl?biblionumber=73913</link> <!-- prettier-ignore-end --> <description> <p> .<br /> 110 Leaves : 30cm .<br /> </p> <p> <a href="https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-reserve.pl?biblionumber=73913">Place hold on <em>Enhancing intrusion detection system performance using machine learning approaches / </em></a> </p> </description> <guid>https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-detail.pl?biblionumber=73913</guid> </item> <item> <title> The Review of radio science, 1993-1996 / </title> <dc:identifier>ردمك: </dc:identifier> <!-- prettier-ignore-start --> <link>https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-detail.pl?biblionumber=106297</link> <!-- prettier-ignore-end --> <description> <img src="https://images-na.ssl-images-amazon.com/images/P/0198565313.01.TZZZZZZZ.jpg" alt="" /> <p> .<br /> xxiv, 1008 p. : , &quot;Published for the International Union of Radio Scientists by IEEE Prees.&quot; | CD-ROM contains full text of Review of radio science, 1993-1996, including colored figures that were in color in the original text. 26 cm.+.<br /> </p> <p> <a href="https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-reserve.pl?biblionumber=106297">Place hold on <em>The Review of radio science, 1993-1996 /</em></a> </p> </description> <guid>https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-detail.pl?biblionumber=106297</guid> </item> <item> <title> Network protection against DDoS attacks using IPSEC protocol and mobile agents / </title> <dc:identifier>ردمك: </dc:identifier> <!-- prettier-ignore-start --> <link>https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-detail.pl?biblionumber=1698</link> <!-- prettier-ignore-end --> <description> <p> .<br /> 146P. : 30Cm.<br /> </p> <p> <a href="https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-reserve.pl?biblionumber=1698">Place hold on <em>Network protection against DDoS attacks using IPSEC protocol and mobile agents / </em></a> </p> </description> <guid>https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-detail.pl?biblionumber=1698</guid> </item> <item> <title> A security model for solving cryptographic flaws of WEP protocol of the IEEE 802.11b wireless lan standard / </title> <dc:identifier>ردمك: </dc:identifier> <!-- prettier-ignore-start --> <link>https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-detail.pl?biblionumber=34267</link> <!-- prettier-ignore-end --> <description> <p> .<br /> 119P : 30cm.<br /> </p> <p> <a href="https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-reserve.pl?biblionumber=34267">Place hold on <em>A security model for solving cryptographic flaws of WEP protocol of the IEEE 802.11b wireless lan standard / </em></a> </p> </description> <guid>https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-detail.pl?biblionumber=34267</guid> </item> <item> <title> Recent advances in intrusion detection : 12th international symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009. proceedings / </title> <dc:identifier>ردمك: </dc:identifier> <!-- prettier-ignore-start --> <link>https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-detail.pl?biblionumber=121622</link> <!-- prettier-ignore-end --> <description> <img src="https://images-na.ssl-images-amazon.com/images/P/3642043410.01.TZZZZZZZ.jpg" alt="" /> <p> .<br /> p. cm. </p> <p> <a href="https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-reserve.pl?biblionumber=121622">Place hold on <em>Recent advances in intrusion detection :</em></a> </p> </description> <guid>https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-detail.pl?biblionumber=121622</guid> </item> <item> <title> Emergent web intelligence : advanced information retrieval / </title> <dc:identifier>ردمك: </dc:identifier> <!-- prettier-ignore-start --> <link>https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-detail.pl?biblionumber=137548</link> <!-- prettier-ignore-end --> <description> <img src="https://images-na.ssl-images-amazon.com/images/P/1849960739.01.TZZZZZZZ.jpg" alt="" /> <p> .<br /> xix, 487 p. : 24 cm..<br /> </p> <p> <a href="https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-reserve.pl?biblionumber=137548">Place hold on <em>Emergent web intelligence :</em></a> </p> </description> <guid>https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-detail.pl?biblionumber=137548</guid> </item> <item> <title> Securing the GCC in cyberspace / </title> <dc:identifier>ردمك: </dc:identifier> <!-- prettier-ignore-start --> <link>https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-detail.pl?biblionumber=141404</link> <!-- prettier-ignore-end --> <description> <img src="https://images-na.ssl-images-amazon.com/images/P/9948143469.01.TZZZZZZZ.jpg" alt="" /> <p> .<br /> 42 p. : 21 cm..<br /> </p> <p> <a href="https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-reserve.pl?biblionumber=141404">Place hold on <em>Securing the GCC in cyberspace /</em></a> </p> </description> <guid>https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-detail.pl?biblionumber=141404</guid> </item> <item> <title> Detecting web application attacks using an intelligent technique / </title> <dc:identifier>ردمك: </dc:identifier> <!-- prettier-ignore-start --> <link>https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-detail.pl?biblionumber=177425</link> <!-- prettier-ignore-end --> <description> <p> 2025 .<br /> 84 Leaves : 30 cm. + .<br /> </p> <p> <a href="https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-reserve.pl?biblionumber=177425">Place hold on <em>Detecting web application attacks using an intelligent technique /</em></a> </p> </description> <guid>https://lis.cl.cu.edu.eg/cgi-bin/koha/opac-detail.pl?biblionumber=177425</guid> </item> </channel> </rss>
