<?xml version="1.0" encoding="utf-8" ?> <rss version="2.0" xmlns:opensearch="http://a9.com/-/spec/opensearch/1.1/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"> <channel> <title> <![CDATA[MKSSS's Union Search for 'Provider:Auerbach Publications ']]> </title> <!-- prettier-ignore-start --> <link> http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-search.pl?idx=&#38;q=Provider%3AAuerbach%20Publications%20&#38;sort_by=relevance&#38;format=rss </link> <!-- prettier-ignore-end --> <atom:link rel="self" type="application/rss+xml" href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-search.pl?idx=&#38;q=Provider%3AAuerbach%20Publications%20&#38;sort_by=relevance&#38;format=rss" /> <description> <![CDATA[ Search results for 'Provider:Auerbach Publications ' at MKSSS's Union]]> </description> <opensearch:totalResults>19</opensearch:totalResults> <opensearch:startIndex>0</opensearch:startIndex> <opensearch:itemsPerPage>20</opensearch:itemsPerPage> <atom:link rel="search" type="application/opensearchdescription+xml" href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-search.pl?idx=&#38;q=Provider%3AAuerbach%20Publications%20&#38;sort_by=relevance&#38;format=opensearchdescription" /> <opensearch:Query role="request" searchTerms="idx%3D%26q%3DProvider%253AAuerbach%2520Publications%2520" startPage="" /> <item> <title> Software Metrics A Guide To Planning, Analysis And, Application </title> <dc:identifier>ISBN:9780849316616</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=331321</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0849316618.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Pandian C. R..<br /> Auerbach Publications 2011 .<br /> 286 9780849316616 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=331321">Place hold on <em>Software Metrics</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=331321</guid> </item> <item> <title> Elements Of Compiler Design </title> <dc:identifier>ISBN:9781420063233</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=329692</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1420063235.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Meduna A..<br /> Auerbach Publications 2012 .<br /> 286 9781420063233 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=329692">Place hold on <em>Elements Of Compiler Design</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=329692</guid> </item> <item> <title> Elements Of Compiler Design </title> <dc:identifier>ISBN:9781420063233</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=329691</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1420063235.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Meduna A..<br /> Auerbach Publications 2012 .<br /> 286 9781420063233 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=329691">Place hold on <em>Elements Of Compiler Design</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=329691</guid> </item> <item> <title> Elements Of Compiler Design </title> <dc:identifier>ISBN:9781420063233</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=329492</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1420063235.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Meduna A..<br /> Auerbach Publications 2012 .<br /> 286 9781420063233 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=329492">Place hold on <em>Elements Of Compiler Design</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=329492</guid> </item> <item> <title> Information Security Design, Implementation, Measurement And Compliance </title> <dc:identifier>ISBN:9780849370878</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=329293</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0849370876.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Layton T.P..<br /> Auerbach Publications .<br /> 222 9780849370878 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=329293">Place hold on <em>Information Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=329293</guid> </item> <item> <title> Security In Distributed, Grid, Mobile And Pervasive Computing </title> <dc:identifier>ISBN:9780849379215</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=328646</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0849379210.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Xiao Y..<br /> Auerbach Publications 2007 .<br /> 420 9780849379215 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=328646">Place hold on <em>Security In Distributed, Grid, Mobile And Pervasive Computing</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=328646</guid> </item> <item> <title> Information Security Management Handbook Part-4 Operations Security Law, Compliance And Investigations </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=328520</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Tipton H.F..<br /> Auerbach Publications 2007 .<br /> 2569-3231 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=328520">Place hold on <em>Information Security Management Handbook Part-4</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=328520</guid> </item> <item> <title> Information Security Management Handbook Part-3 Business Continuity Planning And Disaster Recovery Planning Telecommunications And Network Secirity, Application Security </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=328519</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Tipton H.F..<br /> Auerbach Publications 2007 .<br /> 1695-2567 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=328519">Place hold on <em>Information Security Management Handbook Part-3</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=328519</guid> </item> <item> <title> Information Security Management Handbook Part-2 Cryptography Physical (Environment) Security, Security Architecture </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=328518</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Tipton H.F..<br /> Auerbach Publications 2007 .<br /> 1019-1691 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=328518">Place hold on <em>Information Security Management Handbook Part-2</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=328518</guid> </item> <item> <title> Information Security Management Handbook Part-1 Information Security And Risk Management Acess Control </title> <dc:identifier>ISBN:9780849374951</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=328517</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0849374952.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Tipton H.F..<br /> Auerbach Publications 2007 .<br /> 1017 9780849374951 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=328517">Place hold on <em>Information Security Management Handbook Part-1</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=328517</guid> </item> <item> <title> Principles Of Mobile Computing And Communications </title> <dc:identifier>ISBN:9781420061581</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=328383</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1420061585.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Othman M..<br /> Auerbach Publications 9781420061581 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=328383">Place hold on <em>Principles Of Mobile Computing And Communications</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=328383</guid> </item> <item> <title> Data Mining Methods And Applications </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=326071</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Lawrence K.D.(Editor).<br /> Auerbach Publications 2010 .<br /> 309 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=326071">Place hold on <em>Data Mining Methods And Applications</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=326071</guid> </item> <item> <title> Information Technology Control And Audit </title> <dc:identifier>ISBN:9781420065503</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=325068</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1420065505.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Senft S..<br /> CRC Press/Auerbach Publications 2010 .<br /> 264 728 pages.<br /> 9781420065503 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=325068">Place hold on <em>Information Technology Control And Audit</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=325068</guid> </item> <item> <title> Information Security Design, Implementation, Measurement And Compliance </title> <dc:identifier>ISBN:9780849370878</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=324538</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0849370876.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Layton T.P..<br /> Auerbach Publications .<br /> 222 9780849370878 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=324538">Place hold on <em>Information Security</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=324538</guid> </item> <item> <title> Successful Packaged Software Implementation </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=324334</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Tayntor C.B..<br /> Auerbach Publications 2006 .<br /> 313 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=324334">Place hold on <em>Successful Packaged Software Implementation</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=324334</guid> </item> <item> <title> Software Testing A Craftsman's Approach </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=323502</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Jorgensen P.C..<br /> Auerbach Publications 2010 .<br /> 416 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=323502">Place hold on <em>Software Testing</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=323502</guid> </item> <item> <title> Principles Of Mobile Computing And Communications </title> <dc:identifier>ISBN:9781420061581</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=318760</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1420061585.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Othman M..<br /> Auerbach Publications , 12 IT 9781420061581 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=318760">Place hold on <em>Principles Of Mobile Computing And Communications</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=318760</guid> </item> <item> <title> Antipatterns Identification Refactoring And Management </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=318512</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Laplante P.A..<br /> New Delhi Auerbach Publications , 1391 C </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=318512">Place hold on <em>Antipatterns</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=318512</guid> </item> <item> <title> Elements Of Compiler Design </title> <dc:identifier>ISBN:9780000000000</dc:identifier> <!-- prettier-ignore-start --> <link>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=205316</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Meduna A..<br /> Auerbach Publications 2012 .<br /> 286 9780000000000 </p> ]]> <![CDATA[ <p> <a href="http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-reserve.pl?biblionumber=205316">Place hold on <em>Elements Of Compiler Design</em></a> </p> ]]> </description> <guid>http://mksss.mapmyelibrary.com:8083/cgi-bin/koha/opac-detail.pl?biblionumber=205316</guid> </item> </channel> </rss>
