<?xml version="1.0" encoding="utf-8" ?> <rss version="2.0" xmlns:opensearch="http://a9.com/-/spec/opensearch/1.1/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"> <channel> <title> <![CDATA[Home | UMDC Learning and Information Center Search for 'su:&quot;Computer networks&quot;']]> </title> <link> /cgi-bin/koha/opac-search.pl?q=ccl=su%3A%22Computer%20networks%22&#38;sort_by=relevance&#38;format=rss </link> <atom:link rel="self" type="application/rss+xml" href="/cgi-bin/koha/opac-search.pl?q=ccl=su%3A%22Computer%20networks%22&#38;sort_by=relevance&#38;format=rss"/> <description> <![CDATA[ Search results for 'su:&quot;Computer networks&quot;' at Home | UMDC Learning and Information Center]]> </description> <opensearch:totalResults>63</opensearch:totalResults> <opensearch:startIndex>0</opensearch:startIndex> <opensearch:itemsPerPage>50</opensearch:itemsPerPage> <atom:link rel="search" type="application/opensearchdescription+xml" href="/cgi-bin/koha/opac-search.pl?q=ccl=su%3A%22Computer%20networks%22&#38;sort_by=relevance&#38;format=opensearchdescription"/> <opensearch:Query role="request" searchTerms="q%3Dccl%3Dsu%253A%2522Computer%2520networks%2522" startPage="" /> <item> <title> Routing and switching essentials lab manual / </title> <dc:identifier>ISBN:1587133202 | 9781587133206</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=9</link> <description> <![CDATA[ <p> .<br /> 388 pages : 28 cm.<br /> 1587133202 | 9781587133206 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=9">Place hold on <em>Routing and switching essentials lab manual /</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=9</guid> </item> <item> <title> Connecting networks Companion guide/ </title> <dc:identifier>ISBN:978-981-4604-71-0</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=16</link> <description> <![CDATA[ <p> Indianapolis, Indiana Cisco Press 2014 .<br /> xxiii, 542p.; , Includes index. 978-981-4604-71-0 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=16">Place hold on <em>Connecting networks</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=16</guid> </item> <item> <title> Introduction to networks. Lab manual / </title> <dc:identifier>ISBN:9789814604758</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=90</link> <description> <![CDATA[ <p> .<br /> 417 pages: 27.5 cm..<br /> 9789814604758 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=90">Place hold on <em>Introduction to networks.</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=90</guid> </item> <item> <title> Introduction to Networks Companion Guide </title> <dc:identifier>ISBN:9.7898146047e+012</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=94</link> <description> <![CDATA[ <p> Singapore Pearson Education South Asia Pte Ltd 2014 .<br /> xxxii, 681 pages; 23 cm..<br /> 9.7898146047e+012 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=94">Place hold on <em>Introduction to Networks</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=94</guid> </item> <item> <title> Scaling Networks Lab Manual </title> <dc:identifier>ISBN:9.7198146047e+012</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=95</link> <description> <![CDATA[ <p> Singapore Pearson Education South Asia Pte Ltd 2014 .<br /> 256 pages; 27 cm..<br /> 9.7198146047e+012 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=95">Place hold on <em>Scaling Networks</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=95</guid> </item> <item> <title> Discovering computers &amp; microsoft office 2010: a fundamental combined approach/ </title> <dc:identifier>ISBN:13: 978-1-111-82487-7 | 10: 1-111-82487-8</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=97</link> <description> <![CDATA[ <p> By Shelly, Gary..<br /> Australia: Course Technology Cengage Learning, 2012 .<br /> xix, 1206 pages: , Includes index. 27 cm..<br /> 13: 978-1-111-82487-7 | 10: 1-111-82487-8 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=97">Place hold on <em>Discovering computers &amp; microsoft office 2010:</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=97</guid> </item> <item> <title> Computer Networks and Internets/ </title> <dc:identifier>ISBN:1292061170</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=122</link> <description> <![CDATA[ <p> By Comer, Douglas E..<br /> Boston: Pearson Education Limited, 2015 .<br /> 667 pages; 23 cm..<br /> 1292061170 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=122">Place hold on <em>Computer Networks and Internets/</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=122</guid> </item> <item> <title> Scaling Networks Lab Manual </title> <dc:identifier>ISBN:9.7198146047e+012</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=126</link> <description> <![CDATA[ <p> Singapore Pearson Education South Asia Pte Ltd 2014 .<br /> 256 pages; 27 cm..<br /> 9.7198146047e+012 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=126">Place hold on <em>Scaling Networks</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=126</guid> </item> <item> <title> Connecting networks: Lab manual/ </title> <dc:identifier>ISBN:9789814604727</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=499</link> <description> <![CDATA[ <p> Indiana: CISCO Press, 2014 .<br /> 138 pages: 28 cm..<br /> 9789814604727 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=499">Place hold on <em>Connecting networks:</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=499</guid> </item> <item> <title> CMS security handbook : the comprehensive guide for WordPress, Joomla!, Drupal, and Plone/ </title> <dc:identifier>ISBN:978-0-470-52274-6</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=1171</link> <description> <![CDATA[ <p> By Canavan, Tom.<br /> Indianapolis, IN : Wiley Pub., 2011 .<br /> xxvi, 406 pages : , Includes index. 24 cm..<br /> 978-0-470-52274-6 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=1171">Place hold on <em>CMS security handbook :</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=1171</guid> </item> <item> <title> Ethics and technology : controversies, questions, and strategies for ethical computing/ </title> <dc:identifier>ISBN:978-0-470-50950-0</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=1198</link> <description> <![CDATA[ <p> By Tavani, Herman T..<br /> Hoboken, N.J. : John Wiley and Sons, Inc. 2011 .<br /> xxvi, 406 pages : , Includes bibliographical references and index. 24 cm..<br /> 978-0-470-50950-0 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=1198">Place hold on <em>Ethics and technology : </em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=1198</guid> </item> <item> <title> Network administration. </title> <dc:identifier>ISBN:978-93-5115-239-2</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=1503</link> <description> <![CDATA[ <p> UAE: 3G Elearning FZ LLC, 2014 .<br /> vii, 339 pages: , Includes bibliographical references. 23 cm..<br /> 978-93-5115-239-2 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=1503">Place hold on <em>Network administration.</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=1503</guid> </item> <item> <title> Introduction to information security: A strategic-based approach/ </title> <dc:identifier>ISBN:9781597499699</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=1527</link> <description> <![CDATA[ <p> By Shimeall, Timothy J..<br /> Massachusetts: Syngress, 2014 .<br /> xxi, 360 pages: , Include index. 23.5 cm..<br /> 9781597499699 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=1527">Place hold on <em>Introduction to information security:</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=1527</guid> </item> <item> <title> An introduction to signal and system analysis/ </title> <dc:identifier>ISBN:13:978-0-495-24462-7 | 10: 0-495-24462-7</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=2852</link> <description> <![CDATA[ <p> By Gopalan K. 'Gopal'..<br /> Australia: Cengage, 2009 .<br /> xv, 655 pages; , Includes index. 23 cm..<br /> 13:978-0-495-24462-7 | 10: 0-495-24462-7 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=2852">Place hold on <em>An introduction to signal and system analysis/</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=2852</guid> </item> <item> <title> Computer networks: a systems approach/ </title> <dc:identifier>ISBN:0123705487</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=3069</link> <description> <![CDATA[ <p> By Peterson, Larry L..<br /> Amsterdam: Elsevier, 2007 .<br /> xxvii, 806 pages: , Includes bibliographical references and index. 24 cm..<br /> 0123705487 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=3069">Place hold on <em>Computer networks: </em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=3069</guid> </item> <item> <title> Computer networking: a top-down approach/ </title> <dc:identifier>ISBN:9780321513250</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=3071</link> <description> <![CDATA[ <p> By Kurose, James F..<br /> Boston: Pearson Education International, 2008 .<br /> 878 pages: , Includes bibliographical references and index. 23 cm..<br /> 9780321513250 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=3071">Place hold on <em>Computer networking:</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=3071</guid> </item> <item> <title> Introduction to network security/ </title> <dc:identifier>ISBN:978-1-58488-543-6</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=3123</link> <description> <![CDATA[ <p> By Jacobson, Douglas.<br /> Boca Raton: CRC Press, 2009 .<br /> xxi,478 pages: , Includes appendices and index. 24 cm..<br /> 978-1-58488-543-6 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=3123">Place hold on <em>Introduction to network security/</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=3123</guid> </item> <item> <title> Computer security and penetration testing/ </title> <dc:identifier>ISBN:9781418048266</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=3200</link> <description> <![CDATA[ <p> By Basta, Alfred.<br /> Australia: Thomson Course Technology, 2008 .<br /> xi, 414 pages: , Includes glossary and index. 23 cm..<br /> 9781418048266 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=3200">Place hold on <em>Computer security and penetration testing/</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=3200</guid> </item> <item> <title> E-finance: the future is here/ </title> <dc:identifier>ISBN:978-81-321-0245-8</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=3631</link> <description> <![CDATA[ <p> By Joshi, V. C..<br /> Los Angeles: Response Books, 2010 .<br /> xvi, 189 pages; , Includes bibliographical references and index. 978-81-321-0245-8 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=3631">Place hold on <em>E-finance:</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=3631</guid> </item> <item> <title> Understanding data communications and networks / </title> <dc:identifier>ISBN:0-534-38317-3</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=4127</link> <description> <![CDATA[ <p> By Shay, William A..<br /> Australia ; | Belmont, Calif. : Thomson Brooks/Cole, 2004 .<br /> xxv, 766 pages : 25 cm..<br /> 0-534-38317-3 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=4127">Place hold on <em>Understanding data communications and networks /</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=4127</guid> </item> <item> <title> Finance and e-commerce: the online legal environment/ </title> <dc:identifier>ISBN:0-324-12277-2</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=4477</link> <description> <![CDATA[ <p> By Miller, Roger LeRoy.<br /> Australia: Thomson Learning, 2002 .<br /> xv, 202 pages: , Includes bibliographical references and index. 25 cm..<br /> 0-324-12277-2 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=4477">Place hold on <em>Finance and e-commerce:</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=4477</guid> </item> <item> <title> Mobility is a double edged sword. </title> <dc:identifier>ISBN:</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=4849</link> <description> <![CDATA[ <p> Quezon City: Hardware Zone Phils. Corp., 2015 .<br /> v11 i8, pages 14-15; , HWM Philippines. 30 cm. .<br /> </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=4849">Place hold on <em>Mobility is a double edged sword.</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=4849</guid> </item> <item> <title> Entrepreneurship.com/ </title> <dc:identifier>ISBN:1574101366</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=5117</link> <description> <![CDATA[ <p> By Burns, Tim,.<br /> Chicago, IL: Dearborn Trade, 2001 .<br /> xv, 300 pages: , Includes index. 23 cm..<br /> 1574101366 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=5117">Place hold on <em>Entrepreneurship.com/</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=5117</guid> </item> <item> <title> Computer network fundamentals/ </title> <dc:identifier>ISBN:9718210105</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=5286</link> <description> <![CDATA[ <p> By Adsuara, Marvin J..<br /> Valenzuela City: Mutya Pub. House, 2000 .<br /> x, 226 pages: , Includes bibliographical references 25 cm..<br /> 9718210105 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=5286">Place hold on <em>Computer network fundamentals/</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=5286</guid> </item> <item> <title> Hackers [videorecording] : outlaws and angels/ </title> <dc:identifier>ISBN:</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=6442</link> <description> <![CDATA[ <p> By Smith, Mike.<br /> Princeton, N.J. : Films for the Humanities and Sciences, 2004 .<br /> 1 videodisc : 4 3/4 in..<br /> </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=6442">Place hold on <em>Hackers [videorecording] : </em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=6442</guid> </item> <item> <title> Computer networks / </title> <dc:identifier>ISBN:97789813076464</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=8155</link> <description> <![CDATA[ <p> By Tanenbaum, Andrew S.,author..<br /> Singapore : Prentice Hall International, Inc., 1997 .<br /> xvii, 814 pages : , Includes bibliographical references and index. 24 cm..<br /> 97789813076464 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=8155">Place hold on <em>Computer networks / </em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=8155</guid> </item> <item> <title> Digital logic and microprocessor design with interfacing/ </title> <dc:identifier>ISBN:978-1-305-85945-6</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=9597</link> <description> <![CDATA[ <p> By Hwang, Enoch O..<br /> Australia: Cengage Learning, 2018 .<br /> xxiii, 583 pages: , Includes index. 25 cm..<br /> 978-1-305-85945-6 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=9597">Place hold on <em>Digital logic and microprocessor design with interfacing/</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=9597</guid> </item> <item> <title> Business Communication: developing leaders for a networked world / </title> <dc:identifier>ISBN:978-1-259-06041-0</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=10436</link> <description> <![CDATA[ <p> By Cardon, Peter W..<br /> New York: McGraw-Hill Education, 2014 .<br /> xxxvii,556 pages ; , Includes appendix and index 978-1-259-06041-0 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=10436">Place hold on <em>Business Communication:</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=10436</guid> </item> <item> <title> The cyber risk handbook : creating and measuring effective cybersecurity capabilities / </title> <dc:identifier>ISBN:1119308801 | 978-1-119-30880-5</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=10809</link> <description> <![CDATA[ <p> By Antonucci, Domenic,.<br /> New Jersey : John Wiley &amp; Sons, Inc., 2017 .<br /> xxxv, 412 pages : 24 cm..<br /> 1119308801 | 978-1-119-30880-5 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=10809">Place hold on <em>The cyber risk handbook :</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=10809</guid> </item> <item> <title> Hacker techniques, tools, and incident handling / </title> <dc:identifier>ISBN:978-1-284-14780-3</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=14447</link> <description> <![CDATA[ <p> By Oriyano, Sean-Philip,.<br /> Burlington, MA : Jones &amp; Bartlett Learning, 2020 .<br /> xvi, 407 pages ; 24 cm.<br /> 978-1-284-14780-3 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=14447">Place hold on <em>Hacker techniques, tools, and incident handling /</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=14447</guid> </item> <item> <title> Human-computer interaction and cybersecurity handbook / </title> <dc:identifier>ISBN:978-1-138-73916-1</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=14574</link> <description> <![CDATA[ <p> Boca Raton, FL : CRC Press, Taylor and Francis Group, 2019 .<br /> xxxv, 422 pages : , Includes glossary and index. 26 cm.<br /> 978-1-138-73916-1 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=14574">Place hold on <em>Human-computer interaction and cybersecurity handbook /</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=14574</guid> </item> <item> <title> CompTIA Network+ guide to networks / </title> <dc:identifier>ISBN:978-1-337-56933-0</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=14594</link> <description> <![CDATA[ <p> By West, Jill.<br /> Australia : Cengage Learning, 2019 .<br /> xxx, 847 pages : , Earlier editions are published as: Network+ guide to networks / Tamara Dean. | Registered trademark symbol appears after CompTIA in title. | Includes index. 24 cm..<br /> 978-1-337-56933-0 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=14594">Place hold on <em>CompTIA Network+ guide to networks /</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=14594</guid> </item> <item> <title> Network security and cryptography : a self-teaching introduction / </title> <dc:identifier>ISBN:978-1-942270-83-6</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=14752</link> <description> <![CDATA[ <p> By Musa, Sarhan M..<br /> Dulles : Mercury Learning and Information. 2018 .<br /> xxiii, 556 pages : 23 cm.<br /> 978-1-942270-83-6 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=14752">Place hold on <em>Network security and cryptography :</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=14752</guid> </item> <item> <title> CSS and networking : Guide for CCNA and CSS (NC 11)/ </title> <dc:identifier>ISBN:978-621-427-046-0</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=14954</link> <description> <![CDATA[ <p> By Sarmiento, Marygin E..<br /> Manila: Unlimited Books Library Services and Publishing, Inc., 2019 .<br /> iv, 366 pages: , Includes bibliographical references. 26 cm..<br /> 978-621-427-046-0 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=14954">Place hold on <em>CSS and networking : </em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=14954</guid> </item> <item> <title> The issue of cyber risk disclosure/ </title> <dc:identifier>ISBN:</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=15881</link> <description> <![CDATA[ <p> By Afterman, Allan B..<br /> New York: The New York State Society of CPA, 2015 .<br /> v85 n11, pages 52-54: </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=15881">Place hold on <em>The issue of cyber risk disclosure/</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=15881</guid> </item> <item> <title> Implementing cryptography using python / &lt;br&gt; </title> <dc:identifier>ISBN:9781119612209</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=16680</link> <description> <![CDATA[ <p> By Bray, Shannon,.<br /> Indianapolis : John Wiley &amp; Sons, Inc., ; 2020 .<br /> xix, 284 pages : , Includes index. 23 cm..<br /> 9781119612209 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=16680">Place hold on <em>Implementing cryptography using python /</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=16680</guid> </item> <item> <title> Collaboration vendors join for interoperability: the unified communications interoperability forum includes Microsoft and HP but no Cisco or Avaya, yet/ </title> <dc:identifier>ISBN:</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=16834</link> <description> <![CDATA[ <p> By Lawson, Stephen..<br /> Philippines: Schneider Electric, 2010 .<br /> v20 n3, page 17: , Computer world. 27 cm..<br /> </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=16834">Place hold on <em>Collaboration vendors join for interoperability:</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=16834</guid> </item> <item> <title> Dreaming of the cloud/ </title> <dc:identifier>ISBN:</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=16837</link> <description> <![CDATA[ <p> By Tuazon, John Mark V..<br /> Philippines: Schneider Electric, 2010 .<br /> v20 n3, page 20: , Computer world. 27 cm..<br /> </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=16837">Place hold on <em>Dreaming of the cloud/</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=16837</guid> </item> <item> <title> Aiming for the right cloud/ </title> <dc:identifier>ISBN:</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=16838</link> <description> <![CDATA[ <p> By Tuazon, John Mark V..<br /> Philippines: Schneider Electric, 2010 .<br /> v20 n3, pages 22-23: , Computer world. 27 cm..<br /> </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=16838">Place hold on <em>Aiming for the right cloud/</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=16838</guid> </item> <item> <title> Umbrella for the cloud/ </title> <dc:identifier>ISBN:</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=16839</link> <description> <![CDATA[ <p> By Tuazon, John Mark V..<br /> Philippines: Schneider Electric, 2010 .<br /> v20 n3, page 24: , Computer world. 27 cm..<br /> </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=16839">Place hold on <em>Umbrella for the cloud/</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=16839</guid> </item> <item> <title> Lawrence Hughes and the second internet/ </title> <dc:identifier>ISBN:</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=16843</link> <description> <![CDATA[ <p> By Amador, Emmanual..<br /> Philippines: Schneider Electric, 2010 .<br /> v20 n3, pages 36-37: , Computer world. 27 cm..<br /> </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=16843">Place hold on <em>Lawrence Hughes and the second internet/</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=16843</guid> </item> <item> <title> New ePLDT CEO: </title> <dc:identifier>ISBN:</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=16844</link> <description> <![CDATA[ <p> Philippines: Schneider Electric, 2010 .<br /> v20 n3, pages 38-39: , Computer world. 27 cm..<br /> </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=16844">Place hold on <em>New ePLDT CEO:</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=16844</guid> </item> <item> <title> RP has vast potentials in cloud servicing/ </title> <dc:identifier>ISBN:</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=16853</link> <description> <![CDATA[ <p> By Tuazon, John Mark V..<br /> Philippines: Schneider Electric, 2010 .<br /> v20 n4, page 6; , Computer world. 27 cm..<br /> </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=16853">Place hold on <em>RP has vast potentials in cloud servicing/</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=16853</guid> </item> <item> <title> Local IT group grapples with fraud attempt/ </title> <dc:identifier>ISBN:</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=16897</link> <description> <![CDATA[ <p> By Tuazon, John Mark V..<br /> Philippines: Schneider Electric, 2010 .<br /> v20 n5, page 7; , Computer world. 27 cm..<br /> </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=16897">Place hold on <em>Local IT group grapples with fraud attempt/</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=16897</guid> </item> <item> <title> Expanding business reach/ </title> <dc:identifier>ISBN:</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=16904</link> <description> <![CDATA[ <p> By Tuazon, John Mark V..<br /> Philippines: Schneider Electric, 2010 .<br /> v20 n5, page 19: , Computer world. 27 cm..<br /> </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=16904">Place hold on <em>Expanding business reach/</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=16904</guid> </item> <item> <title> Ways to cut data center energy costs/ </title> <dc:identifier>ISBN:</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=16939</link> <description> <![CDATA[ <p> By Washburn, Doug..<br /> Philippines: Schneider Electric, 2010 .<br /> v20 n6, pages 45-46: , Computer world. 27 cm..<br /> </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=16939">Place hold on <em>Ways to cut data center energy costs/</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=16939</guid> </item> <item> <title> Dynamic resource management with virtualization/ </title> <dc:identifier>ISBN:</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=16962</link> <description> <![CDATA[ <p> By Tuazon, John Mark V..<br /> Philippines: Schneider Electric, 2010 .<br /> v20 n7, page 26: , Computer world. 27 cm..<br /> </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=16962">Place hold on <em>Dynamic resource management with virtualization/</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=16962</guid> </item> <item> <title> VMware to virtualize android smartphones for business/ </title> <dc:identifier>ISBN:</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=16968</link> <description> <![CDATA[ <p> By Brodkin, Jon..<br /> Philippines: Schneider Electric, 2010 .<br /> v20 n7, page 40: , Computer world. 27 cm..<br /> </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=16968">Place hold on <em>VMware to virtualize android smartphones for business/</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=16968</guid> </item> <item> <title> Forrester's 2011 security strategy recommendations: how to take a more systematic approach to governance and data protection even as the computing landscape continues to change/ </title> <dc:identifier>ISBN:</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=16983</link> <description> <![CDATA[ <p> By Kark, Khalid..<br /> Philippines: Schneider Electric, 2010 .<br /> v20 n8, page 22-23: , Computer world. 27 cm..<br /> </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=16983">Place hold on <em>Forrester's 2011 security strategy recommendations:</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=16983</guid> </item> <item> <title> 5 new online security threats to avoid/ </title> <dc:identifier>ISBN:</dc:identifier> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=16984</link> <description> <![CDATA[ <p> By Snyder, Bill..<br /> Philippines: Schneider Electric, 2010 .<br /> v20 n8, page 24: , Computer world. 27 cm..<br /> </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=16984">Place hold on <em>5 new online security threats to avoid/</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=16984</guid> </item> </channel> </rss>
