<?xml version="1.0" encoding="utf-8" ?> <rss version="2.0" xmlns:opensearch="http://a9.com/-/spec/opensearch/1.1/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"> <channel> <title> <![CDATA[MKSSS's Union Search for 'au:&quot;Godbole N&quot;']]> </title> <!-- prettier-ignore-start --> <link> http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-search.pl?idx=&#38;q=au%3A%22Godbole%20N%22&#38;sort_by=relevance&#38;format=rss </link> <!-- prettier-ignore-end --> <atom:link rel="self" type="application/rss+xml" href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-search.pl?idx=&#38;q=au%3A%22Godbole%20N%22&#38;sort_by=relevance&#38;format=rss" /> <description> <![CDATA[ Search results for 'au:&quot;Godbole N&quot;' at MKSSS's Union]]> </description> <opensearch:totalResults>373</opensearch:totalResults> <opensearch:startIndex>0</opensearch:startIndex> <opensearch:itemsPerPage>50</opensearch:itemsPerPage> <atom:link rel="search" type="application/opensearchdescription+xml" href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-search.pl?idx=&#38;q=au%3A%22Godbole%20N%22&#38;sort_by=relevance&#38;format=opensearchdescription" /> <opensearch:Query role="request" searchTerms="idx%3D%26q%3Dau%253A%2522Godbole%2520N%2522" startPage="" /> <item> <title> Information Systems Security: Security Management, Metrics, Frameworks And Best Practices </title> <dc:identifier>ISBN:9788126564057</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=369375</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/8126564059.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Godbole N..<br /> Wiley 2024 9788126564057 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=369375">Place hold on <em>Information Systems Security: Security Management, Metrics, Frameworks And Best Practices</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=369375</guid> </item> <item> <title> Information Systems Security Security Management, Metrics, Frameworks And Best Practices </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=336246</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Godbole N..<br /> Wiley </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=336246">Place hold on <em>Information Systems Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=336246</guid> </item> <item> <title> Information Systems Security Security Management, Metrics, Frameworks And Best Practices </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=336034</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Godbole N..<br /> Wiley </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=336034">Place hold on <em>Information Systems Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=336034</guid> </item> <item> <title> Information Systems Security Security Management, Metrics, Frameworks And Best Practices </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=336023</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Godbole N..<br /> Wiley </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=336023">Place hold on <em>Information Systems Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=336023</guid> </item> <item> <title> Information Systems Security Security Management, Metrics, Frameworks And Best Practices </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=336022</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Godbole N..<br /> Wiley </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=336022">Place hold on <em>Information Systems Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=336022</guid> </item> <item> <title> Information Systems Security Security Management, Metrics, Frameworks And Best Practices </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=336020</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Godbole N..<br /> Wiley </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=336020">Place hold on <em>Information Systems Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=336020</guid> </item> <item> <title> Information Systems Security Security Management, Metrics, Frameworks And Best Practices </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=336016</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Godbole N..<br /> Wiley </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=336016">Place hold on <em>Information Systems Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=336016</guid> </item> <item> <title> Information Systems Security Security Management, Metrics, Frameworks And Best Practices </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=336014</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Godbole N..<br /> Wiley </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=336014">Place hold on <em>Information Systems Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=336014</guid> </item> <item> <title> Information Systems Security Security Management, Metrics, Frameworks And Best Practices </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=336007</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Godbole N..<br /> Wiley </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=336007">Place hold on <em>Information Systems Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=336007</guid> </item> <item> <title> Information Systems Security Security Management, Metrics, Frameworks And Best Practices </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=336005</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Godbole N..<br /> Wiley </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=336005">Place hold on <em>Information Systems Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=336005</guid> </item> <item> <title> Information Systems Security Security Management, Metrics, Frameworks And Best Practices </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335998</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Godbole N..<br /> Wiley </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=335998">Place hold on <em>Information Systems Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335998</guid> </item> <item> <title> Information Systems Security Security Management, Metrics, Frameworks And Best Practices </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335997</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Godbole N..<br /> Wiley </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=335997">Place hold on <em>Information Systems Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335997</guid> </item> <item> <title> Information Systems Security Security Management, Metrics, Frameworks And Best Practices </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335996</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Godbole N..<br /> Wiley </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=335996">Place hold on <em>Information Systems Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335996</guid> </item> <item> <title> Information Systems Security Security Management, Metrics, Frameworks And Best Practices </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335992</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Godbole N..<br /> Wiley </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=335992">Place hold on <em>Information Systems Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335992</guid> </item> <item> <title> Information Systems Security Security Management, Metrics, Frameworks And Best Practices </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335983</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Godbole N..<br /> Wiley </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=335983">Place hold on <em>Information Systems Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335983</guid> </item> <item> <title> Information Systems Security Security Management, Metrics, Frameworks And Best Practices </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=321144</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Godbole N..<br /> Wiley , 17 IT </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=321144">Place hold on <em>Information Systems Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=321144</guid> </item> <item> <title> Information Systems Security Security Management, Metrics, Frameworks And Best Practices </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=321142</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Godbole N..<br /> Wiley , 17 IT </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=321142">Place hold on <em>Information Systems Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=321142</guid> </item> <item> <title> Information Systems Security Security Management, Metrics, Frameworks And Best Practices </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211872</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Godbole N..<br /> Wiley </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=211872">Place hold on <em>Information Systems Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211872</guid> </item> <item> <title> Information Systems Security Security Management, Metrics, Frameworks And Best Practices </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211871</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Godbole N..<br /> Wiley </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=211871">Place hold on <em>Information Systems Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211871</guid> </item> <item> <title> Information Systems Security Security Management, Metrics, Frameworks And Best Practices </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211648</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Godbole N..<br /> Wiley </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=211648">Place hold on <em>Information Systems Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211648</guid> </item> <item> <title> Information Systems Security Security Management, Metrics, Frameworks And Best Practices </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211644</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Godbole N..<br /> Wiley </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=211644">Place hold on <em>Information Systems Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211644</guid> </item> <item> <title> Information Systems Security Security Management, Metrics, Frameworks And Best Practices </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211640</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Godbole N..<br /> Wiley </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=211640">Place hold on <em>Information Systems Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211640</guid> </item> <item> <title> Information Systems Security Security Management, Metrics, Frameworks And Best Practices </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211639</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Godbole N..<br /> Wiley </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=211639">Place hold on <em>Information Systems Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211639</guid> </item> <item> <title> Information Systems Security Security Management, Metrics, Frameworks And Best Practices </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211628</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Godbole N..<br /> Wiley </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=211628">Place hold on <em>Information Systems Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211628</guid> </item> <item> <title> Information Systems Security Security Management, Metrics, Frameworks And Best Practices </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211626</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Godbole N..<br /> Wiley </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=211626">Place hold on <em>Information Systems Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211626</guid> </item> <item> <title> Information Systems Security Security Management, Metrics, Frameworks And Best Practices </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211618</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Godbole N..<br /> Wiley </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=211618">Place hold on <em>Information Systems Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211618</guid> </item> <item> <title> Information Systems Security Security Management, Metrics, Frameworks And Best Practices </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211612</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Godbole N..<br /> Wiley </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=211612">Place hold on <em>Information Systems Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211612</guid> </item> <item> <title> Information Systems Security Security Management, Metrics, Frameworks And Best Practices </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211609</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Godbole N..<br /> Wiley </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=211609">Place hold on <em>Information Systems Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211609</guid> </item> <item> <title> Information Systems Security Security Management, Metrics, Frameworks And Best Practices </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=129415</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Godbole N..<br /> Wiley </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=129415">Place hold on <em>Information Systems Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=129415</guid> </item> <item> <title> Information Systems Security Security Management, Metrics, Frameworks And Best Practices </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=129414</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Godbole N..<br /> Wiley </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=129414">Place hold on <em>Information Systems Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=129414</guid> </item> <item> <title> Information Systems Security Security Management, Metrics, Frameworks And Best Practices </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=129412</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Godbole N..<br /> Wiley </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=129412">Place hold on <em>Information Systems Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=129412</guid> </item> <item> <title> Information Systems Security Security Management, Metrics, Frameworks And Best Practices </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=129406</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Godbole N..<br /> Wiley </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=129406">Place hold on <em>Information Systems Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=129406</guid> </item> <item> <title> Information Systems Security Security Management, Metrics, Frameworks And Best Practices </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=129405</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Godbole N..<br /> Wiley </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=129405">Place hold on <em>Information Systems Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=129405</guid> </item> <item> <title> Information Systems Security Security Management, Metrics, Frameworks And Best Practices </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=129402</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Godbole N..<br /> Wiley </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=129402">Place hold on <em>Information Systems Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=129402</guid> </item> <item> <title> Information Systems Security Security Management, Metrics, Frameworks And Best Practices </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=129399</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Godbole N..<br /> Wiley </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=129399">Place hold on <em>Information Systems Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=129399</guid> </item> <item> <title> Information Systems Security Security Management, Metrics, Frameworks And Best Practices </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=129396</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Godbole N..<br /> Wiley </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=129396">Place hold on <em>Information Systems Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=129396</guid> </item> <item> <title> Information Systems Security Security Management, Metrics, Frameworks And Best Practices </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=129393</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Godbole N..<br /> Wiley </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=129393">Place hold on <em>Information Systems Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=129393</guid> </item> <item> <title> Information Systems Security Security Management, Metrics, Frameworks And Best Practices </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=129390</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Godbole N..<br /> Wiley </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=129390">Place hold on <em>Information Systems Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=129390</guid> </item> <item> <title> Information Systems Security Security Management, Metrics, Frameworks And Best Practices </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=129388</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Godbole N..<br /> Wiley </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=129388">Place hold on <em>Information Systems Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=129388</guid> </item> <item> <title> Information Systems Security Security Management, Metrics, Frameworks And Best Practices </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=129385</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Godbole N..<br /> Wiley </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=129385">Place hold on <em>Information Systems Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=129385</guid> </item> <item> <title> Information Systems Security Security Management, Metrics, Frameworks And Best Practices </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=129383</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Godbole N..<br /> Wiley </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=129383">Place hold on <em>Information Systems Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=129383</guid> </item> <item> <title> Information Systems Security Security Management, Metrics, Frameworks And Best Practices </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=129380</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Godbole N..<br /> Wiley , 17 IT </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=129380">Place hold on <em>Information Systems Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=129380</guid> </item> <item> <title> Information Systems Security Security Management, Metrics, Frameworks And Best Practices </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=129378</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Godbole N..<br /> Wiley , 17 IT </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=129378">Place hold on <em>Information Systems Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=129378</guid> </item> <item> <title> Software Quality Assurance Principal Pratice </title> <dc:identifier>ISBN:8173195501</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=366735</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/8173195501.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Godbole N..<br /> New Delhi Narosa Publishing 2004 .<br /> 419pp, 8173195501 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=366735">Place hold on <em>Software Quality Assurance</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=366735</guid> </item> <item> <title> Information Systems Security Security Management, Metrics, Frameworks And Best Practices </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=336248</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Godbole N..<br /> Wiley </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=336248">Place hold on <em>Information Systems Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=336248</guid> </item> <item> <title> Information Systems Security Security Management, Metrics, Frameworks And Best Practices </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=336247</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Godbole N..<br /> Wiley </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=336247">Place hold on <em>Information Systems Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=336247</guid> </item> <item> <title> Information Systems Security Security Management, Metrics, Frameworks And Best Practices </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=336033</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Godbole N..<br /> Wiley </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=336033">Place hold on <em>Information Systems Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=336033</guid> </item> <item> <title> Information Systems Security Security Management, Metrics, Frameworks And Best Practices </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=336030</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Godbole N..<br /> Wiley </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=336030">Place hold on <em>Information Systems Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=336030</guid> </item> <item> <title> Information Systems Security Security Management, Metrics, Frameworks And Best Practices </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=336019</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Godbole N..<br /> Wiley </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=336019">Place hold on <em>Information Systems Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=336019</guid> </item> <item> <title> Information Systems Security Security Management, Metrics, Frameworks And Best Practices </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=336010</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Godbole N..<br /> Wiley </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=336010">Place hold on <em>Information Systems Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=336010</guid> </item> </channel> </rss>
