<?xml version="1.0" encoding="utf-8" ?> <rss version="2.0" xmlns:opensearch="http://a9.com/-/spec/opensearch/1.1/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"> <channel> <title> <![CDATA[MKSSS's Union Search for 'au:&quot;Pfleeger C.P.&quot;']]> </title> <!-- prettier-ignore-start --> <link> http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-search.pl?idx=&#38;q=au%3A%22Pfleeger%20C.P.%22&#38;sort_by=relevance&#38;format=rss </link> <!-- prettier-ignore-end --> <atom:link rel="self" type="application/rss+xml" href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-search.pl?idx=&#38;q=au%3A%22Pfleeger%20C.P.%22&#38;sort_by=relevance&#38;format=rss" /> <description> <![CDATA[ Search results for 'au:&quot;Pfleeger C.P.&quot;' at MKSSS's Union]]> </description> <opensearch:totalResults>51</opensearch:totalResults> <opensearch:startIndex>0</opensearch:startIndex> <opensearch:itemsPerPage>50</opensearch:itemsPerPage> <atom:link rel="search" type="application/opensearchdescription+xml" href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-search.pl?idx=&#38;q=au%3A%22Pfleeger%20C.P.%22&#38;sort_by=relevance&#38;format=opensearchdescription" /> <opensearch:Query role="request" searchTerms="idx%3D%26q%3Dau%253A%2522Pfleeger%2520C.P.%2522" startPage="" /> <item> <title> Security In Computing </title> <dc:identifier>ISBN:9789367135587</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=368917</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/9367135580.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Pfleeger C.P..<br /> Pearson 2025 9789367135587 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=368917">Place hold on <em>Security In Computing</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=368917</guid> </item> <item> <title> Analyzing Computer Security A Threat/Vulnerability/Countermeasure Approach </title> <dc:identifier>ISBN:9789332517424</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335851</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/9332517428.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Pfleeger C.P..<br /> Pearson 9789332517424 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=335851">Place hold on <em>Analyzing Computer Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335851</guid> </item> <item> <title> Analyzing Computer Security A Threat/Vulnerability/Countermeasure Approach </title> <dc:identifier>ISBN:9790000000000</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211476</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Pfleeger C.P..<br /> Pearson 9790000000000 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=211476">Place hold on <em>Analyzing Computer Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211476</guid> </item> <item> <title> Analyzing Computer Security A Threat/Vulnerability/Countermeasure Approach </title> <dc:identifier>ISBN:9790000000000</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211471</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Pfleeger C.P..<br /> Pearson 9790000000000 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=211471">Place hold on <em>Analyzing Computer Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211471</guid> </item> <item> <title> Analyzing Computer Security A Threat/Vulnerability/Countermeasure Approach </title> <dc:identifier>ISBN:9790000000000</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211468</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Pfleeger C.P..<br /> Pearson 9790000000000 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=211468">Place hold on <em>Analyzing Computer Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211468</guid> </item> <item> <title> Analyzing Computer Security A Threat/Vulnerability/Countermeasure Approach </title> <dc:identifier>ISBN:9790000000000</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211016</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Pfleeger C.P..<br /> Pearson 9790000000000 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=211016">Place hold on <em>Analyzing Computer Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211016</guid> </item> <item> <title> Analyzing Computer Security A Threat/Vulnerability/Countermeasure Approach </title> <dc:identifier>ISBN:9790000000000</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211015</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Pfleeger C.P..<br /> Pearson 9790000000000 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=211015">Place hold on <em>Analyzing Computer Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211015</guid> </item> <item> <title> Analyzing Computer Security A Threat/Vulnerability/Countermeasure Approach </title> <dc:identifier>ISBN:9789332517424</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335849</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/9332517428.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Pfleeger C.P..<br /> Pearson 9789332517424 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=335849">Place hold on <em>Analyzing Computer Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335849</guid> </item> <item> <title> Analyzing Computer Security A Threat/Vulnerability/Countermeasure Approach </title> <dc:identifier>ISBN:9789332517424</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335846</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/9332517428.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Pfleeger C.P..<br /> Pearson 9789332517424 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=335846">Place hold on <em>Analyzing Computer Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335846</guid> </item> <item> <title> Analyzing Computer Security A Threat/Vulnerability/Countermeasure Approach </title> <dc:identifier>ISBN:9789332517424</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335840</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/9332517428.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Pfleeger C.P..<br /> Pearson 9789332517424 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=335840">Place hold on <em>Analyzing Computer Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335840</guid> </item> <item> <title> Analyzing Computer Security A Threat/Vulnerability/Countermeasure Approach </title> <dc:identifier>ISBN:9789332517424</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335393</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/9332517428.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Pfleeger C.P..<br /> Pearson 9789332517424 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=335393">Place hold on <em>Analyzing Computer Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335393</guid> </item> <item> <title> Analyzing Computer Security A Threat/Vulnerability/Countermeasure Approach </title> <dc:identifier>ISBN:9789332517424</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335391</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/9332517428.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Pfleeger C.P..<br /> Pearson 9789332517424 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=335391">Place hold on <em>Analyzing Computer Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335391</guid> </item> <item> <title> Analyzing Computer Security A Threat/Vulnerability/Countermeasure Approach </title> <dc:identifier>ISBN:9789332517424</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335388</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/9332517428.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Pfleeger C.P..<br /> Pearson 9789332517424 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=335388">Place hold on <em>Analyzing Computer Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335388</guid> </item> <item> <title> Analyzing Computer Security A Threat/Vulnerability/Countermeasure Approach </title> <dc:identifier>ISBN:9790000000000</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211478</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Pfleeger C.P..<br /> Pearson 9790000000000 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=211478">Place hold on <em>Analyzing Computer Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211478</guid> </item> <item> <title> Analyzing Computer Security A Threat/Vulnerability/Countermeasure Approach </title> <dc:identifier>ISBN:9790000000000</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211019</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Pfleeger C.P..<br /> Pearson 9790000000000 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=211019">Place hold on <em>Analyzing Computer Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211019</guid> </item> <item> <title> Analyzing Computer Security A Threat/Vulnerability/Countermeasure Approach </title> <dc:identifier>ISBN:9789332517424</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335852</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/9332517428.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Pfleeger C.P..<br /> Pearson 9789332517424 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=335852">Place hold on <em>Analyzing Computer Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335852</guid> </item> <item> <title> Analyzing Computer Security A Threat/Vulnerability/Countermeasure Approach </title> <dc:identifier>ISBN:9789332517424</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335850</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/9332517428.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Pfleeger C.P..<br /> Pearson 9789332517424 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=335850">Place hold on <em>Analyzing Computer Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335850</guid> </item> <item> <title> Analyzing Computer Security A Threat/Vulnerability/Countermeasure Approach </title> <dc:identifier>ISBN:9789332517424</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335847</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/9332517428.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Pfleeger C.P..<br /> Pearson 9789332517424 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=335847">Place hold on <em>Analyzing Computer Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335847</guid> </item> <item> <title> Analyzing Computer Security A Threat/Vulnerability/Countermeasure Approach </title> <dc:identifier>ISBN:9789332517424</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335844</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/9332517428.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Pfleeger C.P..<br /> Pearson 9789332517424 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=335844">Place hold on <em>Analyzing Computer Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335844</guid> </item> <item> <title> Analyzing Computer Security A Threat/Vulnerability/Countermeasure Approach </title> <dc:identifier>ISBN:9789332517424</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335843</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/9332517428.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Pfleeger C.P..<br /> Pearson 9789332517424 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=335843">Place hold on <em>Analyzing Computer Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335843</guid> </item> <item> <title> Analyzing Computer Security A Threat/Vulnerability/Countermeasure Approach </title> <dc:identifier>ISBN:9789332517424</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335841</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/9332517428.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Pfleeger C.P..<br /> Pearson 9789332517424 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=335841">Place hold on <em>Analyzing Computer Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335841</guid> </item> <item> <title> Analyzing Computer Security A Threat/Vulnerability/Countermeasure Approach </title> <dc:identifier>ISBN:9790000000000</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211472</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Pfleeger C.P..<br /> Pearson 9790000000000 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=211472">Place hold on <em>Analyzing Computer Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211472</guid> </item> <item> <title> Analyzing Computer Security A Threat/Vulnerability/Countermeasure Approach </title> <dc:identifier>ISBN:9790000000000</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211469</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Pfleeger C.P..<br /> Pearson 9790000000000 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=211469">Place hold on <em>Analyzing Computer Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211469</guid> </item> <item> <title> Analyzing Computer Security A Threat/Vulnerability/Countermeasure Approach </title> <dc:identifier>ISBN:9790000000000</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211467</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Pfleeger C.P..<br /> Pearson 9790000000000 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=211467">Place hold on <em>Analyzing Computer Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211467</guid> </item> <item> <title> Analyzing Computer Security A Threat/Vulnerability/Countermeasure Approach </title> <dc:identifier>ISBN:9790000000000</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211466</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Pfleeger C.P..<br /> Pearson 9790000000000 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=211466">Place hold on <em>Analyzing Computer Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211466</guid> </item> <item> <title> Analyzing Computer Security A Threat/Vulnerability/Countermeasure Approach </title> <dc:identifier>ISBN:9790000000000</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211465</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Pfleeger C.P..<br /> Pearson 9790000000000 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=211465">Place hold on <em>Analyzing Computer Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211465</guid> </item> <item> <title> Analyzing Computer Security A Threat/Vulnerability/Countermeasure Approach </title> <dc:identifier>ISBN:9790000000000</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211013</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Pfleeger C.P..<br /> Pearson 9790000000000 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=211013">Place hold on <em>Analyzing Computer Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211013</guid> </item> <item> <title> Analyzing Computer Security A Threat/Vulnerability/Countermeasure Approach </title> <dc:identifier>ISBN:9790000000000</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211012</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Pfleeger C.P..<br /> Pearson 9790000000000 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=211012">Place hold on <em>Analyzing Computer Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211012</guid> </item> <item> <title> Analyzing Computer Security A Threat/Vulnerability/Countermeasure Approach </title> <dc:identifier>ISBN:9789332517424</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335856</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/9332517428.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Pfleeger C.P..<br /> Pearson 9789332517424 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=335856">Place hold on <em>Analyzing Computer Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335856</guid> </item> <item> <title> Analyzing Computer Security A Threat/Vulnerability/Countermeasure Approach </title> <dc:identifier>ISBN:9789332517424</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335855</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/9332517428.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Pfleeger C.P..<br /> Pearson 9789332517424 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=335855">Place hold on <em>Analyzing Computer Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335855</guid> </item> <item> <title> Analyzing Computer Security A Threat/Vulnerability/Countermeasure Approach </title> <dc:identifier>ISBN:9789332517424</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335853</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/9332517428.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Pfleeger C.P..<br /> Pearson 9789332517424 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=335853">Place hold on <em>Analyzing Computer Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335853</guid> </item> <item> <title> Analyzing Computer Security A Threat/Vulnerability/Countermeasure Approach </title> <dc:identifier>ISBN:9789332517424</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335848</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/9332517428.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Pfleeger C.P..<br /> Pearson 9789332517424 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=335848">Place hold on <em>Analyzing Computer Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335848</guid> </item> <item> <title> Analyzing Computer Security A Threat/Vulnerability/Countermeasure Approach </title> <dc:identifier>ISBN:9789332517424</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335842</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/9332517428.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Pfleeger C.P..<br /> Pearson 9789332517424 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=335842">Place hold on <em>Analyzing Computer Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335842</guid> </item> <item> <title> Analyzing Computer Security A Threat/Vulnerability/Countermeasure Approach </title> <dc:identifier>ISBN:9789332517424</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335395</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/9332517428.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Pfleeger C.P..<br /> Pearson 9789332517424 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=335395">Place hold on <em>Analyzing Computer Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335395</guid> </item> <item> <title> Analyzing Computer Security A Threat/Vulnerability/Countermeasure Approach </title> <dc:identifier>ISBN:9789332517424</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335392</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/9332517428.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Pfleeger C.P..<br /> Pearson 9789332517424 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=335392">Place hold on <em>Analyzing Computer Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335392</guid> </item> <item> <title> Analyzing Computer Security A Threat/Vulnerability/Countermeasure Approach </title> <dc:identifier>ISBN:9789332517424</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335390</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/9332517428.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Pfleeger C.P..<br /> Pearson 9789332517424 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=335390">Place hold on <em>Analyzing Computer Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335390</guid> </item> <item> <title> Analyzing Computer Security A Threat/Vulnerability/Countermeasure Approach </title> <dc:identifier>ISBN:9789332517424</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335387</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/9332517428.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Pfleeger C.P..<br /> Pearson 9789332517424 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=335387">Place hold on <em>Analyzing Computer Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335387</guid> </item> <item> <title> Analyzing Computer Security A Threat/Vulnerability/Countermeasure Approach </title> <dc:identifier>ISBN:9790000000000</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211475</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Pfleeger C.P..<br /> Pearson 9790000000000 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=211475">Place hold on <em>Analyzing Computer Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211475</guid> </item> <item> <title> Analyzing Computer Security A Threat/Vulnerability/Countermeasure Approach </title> <dc:identifier>ISBN:9790000000000</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211474</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Pfleeger C.P..<br /> Pearson 9790000000000 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=211474">Place hold on <em>Analyzing Computer Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211474</guid> </item> <item> <title> Analyzing Computer Security A Threat/Vulnerability/Countermeasure Approach </title> <dc:identifier>ISBN:9790000000000</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211473</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Pfleeger C.P..<br /> Pearson 9790000000000 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=211473">Place hold on <em>Analyzing Computer Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211473</guid> </item> <item> <title> Analyzing Computer Security A Threat/Vulnerability/Countermeasure Approach </title> <dc:identifier>ISBN:9790000000000</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211470</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Pfleeger C.P..<br /> Pearson 9790000000000 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=211470">Place hold on <em>Analyzing Computer Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211470</guid> </item> <item> <title> Analyzing Computer Security A Threat/Vulnerability/Countermeasure Approach </title> <dc:identifier>ISBN:9790000000000</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211014</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Pfleeger C.P..<br /> Pearson 9790000000000 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=211014">Place hold on <em>Analyzing Computer Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211014</guid> </item> <item> <title> Analyzing Computer Security A Threat/Vulnerability/Countermeasure Approach </title> <dc:identifier>ISBN:9789332517424</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335854</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/9332517428.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Pfleeger C.P..<br /> Pearson 9789332517424 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=335854">Place hold on <em>Analyzing Computer Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335854</guid> </item> <item> <title> Analyzing Computer Security A Threat/Vulnerability/Countermeasure Approach </title> <dc:identifier>ISBN:9789332517424</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335845</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/9332517428.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Pfleeger C.P..<br /> Pearson 9789332517424 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=335845">Place hold on <em>Analyzing Computer Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335845</guid> </item> <item> <title> Analyzing Computer Security A Threat/Vulnerability/Countermeasure Approach </title> <dc:identifier>ISBN:9789332517424</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335394</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/9332517428.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Pfleeger C.P..<br /> Pearson 9789332517424 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=335394">Place hold on <em>Analyzing Computer Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335394</guid> </item> <item> <title> Analyzing Computer Security A Threat/Vulnerability/Countermeasure Approach </title> <dc:identifier>ISBN:9789332517424</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335389</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/9332517428.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Pfleeger C.P..<br /> Pearson 9789332517424 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=335389">Place hold on <em>Analyzing Computer Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=335389</guid> </item> <item> <title> Analyzing Computer Security A Threat/Vulnerability/Countermeasure Approach </title> <dc:identifier>ISBN:9790000000000</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211480</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Pfleeger C.P..<br /> Pearson 9790000000000 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=211480">Place hold on <em>Analyzing Computer Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211480</guid> </item> <item> <title> Analyzing Computer Security A Threat/Vulnerability/Countermeasure Approach </title> <dc:identifier>ISBN:9790000000000</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211479</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Pfleeger C.P..<br /> Pearson 9790000000000 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=211479">Place hold on <em>Analyzing Computer Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211479</guid> </item> <item> <title> Analyzing Computer Security A Threat/Vulnerability/Countermeasure Approach </title> <dc:identifier>ISBN:9790000000000</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211477</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Pfleeger C.P..<br /> Pearson 9790000000000 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=211477">Place hold on <em>Analyzing Computer Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211477</guid> </item> <item> <title> Analyzing Computer Security A Threat/Vulnerability/Countermeasure Approach </title> <dc:identifier>ISBN:9790000000000</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211018</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Pfleeger C.P..<br /> Pearson 9790000000000 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=211018">Place hold on <em>Analyzing Computer Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=211018</guid> </item> </channel> </rss>
