<?xml version="1.0" encoding="utf-8" ?> <rss version="2.0" xmlns:opensearch="http://a9.com/-/spec/opensearch/1.1/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"> <channel> <title> <![CDATA[Indian Institute Of Management, Shillong Search for 'su:{Computer crimes.}']]> </title> <!-- prettier-ignore-start --> <link> /cgi-bin/koha/opac-search.pl?q=ccl=su%3A%7BComputer%20crimes.%7D&#38;sort_by=relevance&#38;format=rss </link> <!-- prettier-ignore-end --> <atom:link rel="self" type="application/rss+xml" href="/cgi-bin/koha/opac-search.pl?q=ccl=su%3A%7BComputer%20crimes.%7D&#38;sort_by=relevance&#38;format=rss" /> <description> <![CDATA[ Search results for 'su:{Computer crimes.}' at Indian Institute Of Management, Shillong]]> </description> <opensearch:totalResults>3</opensearch:totalResults> <opensearch:startIndex>0</opensearch:startIndex> <opensearch:itemsPerPage>50</opensearch:itemsPerPage> <atom:link rel="search" type="application/opensearchdescription+xml" href="/cgi-bin/koha/opac-search.pl?q=ccl=su%3A%7BComputer%20crimes.%7D&#38;sort_by=relevance&#38;format=opensearchdescription" /> <opensearch:Query role="request" searchTerms="q%3Dccl%3Dsu%253A%257BComputer%2520crimes.%257D" startPage="" /> <item> <title> Netspionage : the global threat to information / </title> <dc:identifier>ISBN:0750672579 (paper : alk. paper)</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=757</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/0750672579.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Boni, William C..<br /> Boston : Butterworth-Heinemann, 2000 .<br /> xx, 260 p. : , Includes index. 24 cm..<br /> 0750672579 (paper : alk. paper) </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=757">Place hold on <em>Netspionage :</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=757</guid> </item> <item> <title> Cyber Crimes : A primer on Internet Threats and Email Abuses / </title> <dc:identifier>ISBN:9788130913858</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=3880</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/8130913852.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Kumar, G. Ram.<br /> New Delhi : Viva Books, 2006 .<br /> xx, 156p. 21 cm..<br /> 9788130913858 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=3880">Place hold on <em>Cyber Crimes :</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=3880</guid> </item> <item> <title> The second economy : the race for trust, treasure and time in the cybersecurity war / </title> <dc:identifier>ISBN:9781484222287</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=5148</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1484222288.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Grobman, Steve .<br /> [United States] : Apress, 2016 .<br /> xxviii, 200 pages : 24 cm.<br /> 9781484222287 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=5148">Place hold on <em>The second economy :</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=5148</guid> </item> </channel> </rss>
