<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="/themes/root/assets/xsl/rss.xsl"?>
<rss version="2.0" xmlns:opensearch="http://a9.com/-/spec/opensearch/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/">
  <channel>
    <title>Results for "computer network security"</title>
    <description>Showing 1 - 50 results of 92</description>
    <generator>Laminas_Feed_Writer 2 (https://getlaminas.org)</generator>
    <link>https://find.library.upatras.gr/Search/Results?sort=last_indexed+desc&amp;limit=50&amp;lookfor=%22computer+network+security%22&amp;type=Subject&amp;lng=en</link>
    <opensearch:totalResults>92</opensearch:totalResults>
    <opensearch:startIndex>0</opensearch:startIndex>
    <opensearch:itemsPerPage>50</opensearch:itemsPerPage>
    <opensearch:Query role="request" searchTerms="%22computer%20network%20security%22" startIndex="0"/>
    <atom:link rel="first" type="application/rss+xml" title="Go to First Page" href="https://find.library.upatras.gr/Search/Results?sort=last_indexed+desc&amp;limit=50&amp;view=rss&amp;lookfor=%22computer+network+security%22&amp;type=Subject&amp;lng=en"/>
    <atom:link rel="next" type="application/rss+xml" title="Go to Next Page" href="https://find.library.upatras.gr/Search/Results?sort=last_indexed+desc&amp;limit=50&amp;view=rss&amp;lookfor=%22computer+network+security%22&amp;type=Subject&amp;lng=en&amp;page=2"/>
    <atom:link rel="last" type="application/rss+xml" title="Go to Last Page" href="https://find.library.upatras.gr/Search/Results?sort=last_indexed+desc&amp;limit=50&amp;view=rss&amp;lookfor=%22computer+network+security%22&amp;type=Subject&amp;lng=en&amp;page=2"/>
    <item>
      <title>Advances in computers.</title>
      <pubDate>Fri, 01 Jan 2010 23:36:17 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/ocn568045821</link>
      <guid>https://find.library.upatras.gr/Record/ocn568045821</guid>
      <dc:format>eBook</dc:format>
      <dc:date>2010</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Advances in computers.</title>
      <pubDate>Fri, 01 Jan 2016 23:36:17 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/ocn941808781</link>
      <guid>https://find.library.upatras.gr/Record/ocn941808781</guid>
      <dc:format>eBook</dc:format>
      <dc:date>2016</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Advances in computers.</title>
      <pubDate>Sun, 01 Jan 2017 23:36:17 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/on1002066026</link>
      <guid>https://find.library.upatras.gr/Record/on1002066026</guid>
      <dc:format>eBook</dc:format>
      <dc:date>2017</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Advances in computers.</title>
      <pubDate>Sat, 01 Jan 2011 23:36:17 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/ocn731020034</link>
      <guid>https://find.library.upatras.gr/Record/ocn731020034</guid>
      <dc:format>eBook</dc:format>
      <dc:date>2011</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Information and Operational Technology Security Systems First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers /</title>
      <pubDate>Tue, 01 Jan 2019 23:36:17 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-030-12085-6</link>
      <guid>https://find.library.upatras.gr/Record/978-3-030-12085-6</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2019</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Cyber Security Cryptography and Machine Learning Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27-28, 2019, Proceedings /</title>
      <pubDate>Tue, 01 Jan 2019 23:36:17 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-030-20951-3</link>
      <guid>https://find.library.upatras.gr/Record/978-3-030-20951-3</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2019</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>E-Business and Telecommunications 14th International Joint Conference, ICETE 2017, Madrid, Spain, July 24-26, 2017, Revised Selected Paper /</title>
      <pubDate>Tue, 01 Jan 2019 23:36:17 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-030-11039-0</link>
      <guid>https://find.library.upatras.gr/Record/978-3-030-11039-0</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2019</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Information Security Theory and Practice 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10-11, 2018, Revised Selected Papers /</title>
      <pubDate>Tue, 01 Jan 2019 23:36:17 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-030-20074-9</link>
      <guid>https://find.library.upatras.gr/Record/978-3-030-20074-9</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2019</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Secure IT Systems 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18-20, 2019, Proceedings /</title>
      <pubDate>Tue, 01 Jan 2019 23:36:17 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-030-35055-0</link>
      <guid>https://find.library.upatras.gr/Record/978-3-030-35055-0</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2019</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Cybersecurity in Nigeria A Case Study of Surveillance and Prevention of Digital Crime /</title>
      <pubDate>Tue, 01 Jan 2019 23:36:17 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-030-15210-9</link>
      <guid>https://find.library.upatras.gr/Record/978-3-030-15210-9</guid>
      <author>Iorliam, Aamo</author>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2019</dc:date>
      <dc:creator>Iorliam, Aamo</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Security and Privacy Second ISEA International Conference, ISEA-ISAP 2018, Jaipur, India, January, 9-11, 2019, Revised Selected Papers /</title>
      <pubDate>Tue, 01 Jan 2019 23:36:17 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-981-13-7561-3</link>
      <guid>https://find.library.upatras.gr/Record/978-981-13-7561-3</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2019</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Cyberdanger Understanding and Guarding Against Cybercrime /</title>
      <pubDate>Tue, 01 Jan 2019 23:36:17 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-030-04531-9</link>
      <guid>https://find.library.upatras.gr/Record/978-3-030-04531-9</guid>
      <author>Willems, Eddy</author>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2019</dc:date>
      <dc:creator>Willems, Eddy</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Network Security /</title>
      <pubDate>Wed, 01 Jan 2014 23:36:17 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/ocn892044758</link>
      <guid>https://find.library.upatras.gr/Record/ocn892044758</guid>
      <author>Perez, Andre</author>
      <dc:format>eBook</dc:format>
      <dc:date>2014</dc:date>
      <dc:creator>Perez, Andre</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Bio-inspired routing protocols for vehicular ad-hoc networks /</title>
      <pubDate>Wed, 01 Jan 2014 23:36:17 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/ocn890720597</link>
      <guid>https://find.library.upatras.gr/Record/ocn890720597</guid>
      <author>Bitam, Salim</author>
      <dc:format>eBook</dc:format>
      <dc:date>2014</dc:date>
      <dc:creator>Bitam, Salim</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Risk centric threat modeling : process for attack simulation and threat analysis /</title>
      <pubDate>Thu, 01 Jan 2015 23:36:17 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/ocn904400187</link>
      <guid>https://find.library.upatras.gr/Record/ocn904400187</guid>
      <author>Morana, Marco M.</author>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <dc:creator>Morana, Marco M.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Security intelligence : a practitioner's guide to solving enterprise security challenges /</title>
      <pubDate>Thu, 01 Jan 2015 23:36:17 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/ocn906699046</link>
      <guid>https://find.library.upatras.gr/Record/ocn906699046</guid>
      <author>Li, Qing, 1971-</author>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <dc:creator>Li, Qing, 1971-</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Cyber threat! : how to manage the growing risk of cyber attacks /</title>
      <pubDate>Wed, 01 Jan 2014 23:36:17 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/ocn881387451</link>
      <guid>https://find.library.upatras.gr/Record/ocn881387451</guid>
      <author>Ulsch, N. MacDonnell, 1951-</author>
      <dc:format>eBook</dc:format>
      <dc:date>2014</dc:date>
      <dc:creator>Ulsch, N. MacDonnell, 1951-</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Smart Computing and Communication Third International Conference, SmartCom 2018, Tokyo, Japan, December 10-12, 2018, Proceedings /</title>
      <pubDate>Mon, 01 Jan 2018 23:36:17 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-030-05755-8</link>
      <guid>https://find.library.upatras.gr/Record/978-3-030-05755-8</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2018</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Wired/Wireless Internet Communications 16th IFIP WG 6.2 International Conference, WWIC 2018, Boston, MA, USA, June 18-20, 2018, Proceedings /</title>
      <pubDate>Mon, 01 Jan 2018 23:36:17 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-030-02931-9</link>
      <guid>https://find.library.upatras.gr/Record/978-3-030-02931-9</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2018</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Security in Computing and Communications 6th International Symposium, SSCC 2018, Bangalore, India, September 19-22, 2018, Revised Selected Papers /</title>
      <pubDate>Tue, 01 Jan 2019 23:36:17 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-981-13-5826-5</link>
      <guid>https://find.library.upatras.gr/Record/978-981-13-5826-5</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2019</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Selected Areas in Cryptography - SAC 2018 25th International Conference, Calgary, AB, Canada, August 15-17, 2018, Revised Selected Papers /</title>
      <pubDate>Tue, 01 Jan 2019 23:36:17 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-030-10970-7</link>
      <guid>https://find.library.upatras.gr/Record/978-3-030-10970-7</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2019</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Information Systems Security and Privacy 4th International Conference, ICISSP 2018, Funchal - Madeira, Portugal, January 22-24, 2018, Revised Selected Papers /</title>
      <pubDate>Tue, 01 Jan 2019 23:36:17 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-030-25109-3</link>
      <guid>https://find.library.upatras.gr/Record/978-3-030-25109-3</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2019</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Innovations and Interdisciplinary Solutions for Underserved Areas Third EAI International Conference, InterSol 2019, Cairo, Egypt, February 14-15, 2019, Proceedings /</title>
      <pubDate>Tue, 01 Jan 2019 23:36:17 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-030-34863-2</link>
      <guid>https://find.library.upatras.gr/Record/978-3-030-34863-2</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2019</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Applied Cryptography and Network Security Workshops ACNS 2019 Satellite Workshops, SiMLA, Cloud S&amp;P, AIBlock, and AIoTS, Bogota, Colombia, June 5-7, 2019, Proceedings /</title>
      <pubDate>Tue, 01 Jan 2019 23:36:17 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-030-29729-9</link>
      <guid>https://find.library.upatras.gr/Record/978-3-030-29729-9</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2019</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Security and Privacy in Social Networks and Big Data 5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019, Revised Selected Papers /</title>
      <pubDate>Tue, 01 Jan 2019 23:36:17 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-981-15-0758-8</link>
      <guid>https://find.library.upatras.gr/Record/978-981-15-0758-8</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2019</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Information Security 22nd International Conference, ISC 2019, New York City, NY, USA, September 16-18, 2019, Proceedings /</title>
      <pubDate>Tue, 01 Jan 2019 23:36:17 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-030-30215-3</link>
      <guid>https://find.library.upatras.gr/Record/978-3-030-30215-3</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2019</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Smart Computing and Communication 4th International Conference, SmartCom 2019, Birmingham, UK, October 11-13, 2019, Proceedings /</title>
      <pubDate>Tue, 01 Jan 2019 23:36:17 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-030-34139-8</link>
      <guid>https://find.library.upatras.gr/Record/978-3-030-34139-8</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2019</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Jurnal Teknologi Komputer dan Sistem Informasi</title>
      <pubDate>Sat, 01 Jan 2022 23:36:17 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/oai:doaj.org-journal:06f79f9bf0994f88bd2898567dbbdbd2</link>
      <guid>https://find.library.upatras.gr/Record/oai:doaj.org-journal:06f79f9bf0994f88bd2898567dbbdbd2</guid>
      <dc:format>journal</dc:format>
      <dc:date>2022</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Jurnal TAM</title>
      <pubDate>Sun, 01 Jan 2017 23:36:17 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/oai:doaj.org-journal:d21c38beed46483ba9d3932bb5177918</link>
      <guid>https://find.library.upatras.gr/Record/oai:doaj.org-journal:d21c38beed46483ba9d3932bb5177918</guid>
      <dc:format>journal</dc:format>
      <dc:date>2017</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>The mobile application hacker's handbook /</title>
      <pubDate>Thu, 01 Jan 2015 23:36:17 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/ocn908032082</link>
      <guid>https://find.library.upatras.gr/Record/ocn908032082</guid>
      <author>Chell, Dominic</author>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <dc:creator>Chell, Dominic</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>The antivirus hacker's handbook /</title>
      <pubDate>Thu, 01 Jan 2015 23:36:17 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/ocn919122975</link>
      <guid>https://find.library.upatras.gr/Record/ocn919122975</guid>
      <author>Koret, Joxean</author>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <dc:creator>Koret, Joxean</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Auditing cloud computing : a security and privacy guide /</title>
      <pubDate>Sat, 01 Jan 2011 23:36:17 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/ocn747412460</link>
      <guid>https://find.library.upatras.gr/Record/ocn747412460</guid>
      <dc:format>eBook</dc:format>
      <dc:date>2011</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Engineering information security : the application of systems engineering concepts to achieve information assurance /</title>
      <pubDate>Sat, 01 Jan 2011 23:36:17 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/ocn747427270</link>
      <guid>https://find.library.upatras.gr/Record/ocn747427270</guid>
      <author>Jacobs, Stuart</author>
      <dc:format>eBook</dc:format>
      <dc:date>2011</dc:date>
      <dc:creator>Jacobs, Stuart</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Information security : principles and practice /</title>
      <pubDate>Sat, 01 Jan 2011 23:36:17 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/ocn748365383</link>
      <guid>https://find.library.upatras.gr/Record/ocn748365383</guid>
      <author>Stamp, Mark</author>
      <dc:format>eBook</dc:format>
      <dc:date>2011</dc:date>
      <dc:creator>Stamp, Mark</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Cybersecurity for executives : a practical guide /</title>
      <pubDate>Wed, 01 Jan 2014 23:36:17 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/ocn876900980</link>
      <guid>https://find.library.upatras.gr/Record/ocn876900980</guid>
      <author>Touhill, Gregory J.</author>
      <dc:format>eBook</dc:format>
      <dc:date>2014</dc:date>
      <dc:creator>Touhill, Gregory J.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Introduction to network security : theory and practice /</title>
      <pubDate>Thu, 01 Jan 2015 23:36:17 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/ocn911135225</link>
      <guid>https://find.library.upatras.gr/Record/ocn911135225</guid>
      <author>Wang, Jie, 1961-</author>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <dc:creator>Wang, Jie, 1961-</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Engineering information security : the application of systems engineering concepts to achieve information assurance /</title>
      <pubDate>Fri, 01 Jan 2016 23:36:17 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/ocn931699873</link>
      <guid>https://find.library.upatras.gr/Record/ocn931699873</guid>
      <author>Jacobs, Stuart</author>
      <dc:format>eBook</dc:format>
      <dc:date>2016</dc:date>
      <dc:creator>Jacobs, Stuart</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Risk propagation assessment for network security : application to airport communication network design /</title>
      <pubDate>Tue, 01 Jan 2013 23:36:17 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/ocn842919752</link>
      <guid>https://find.library.upatras.gr/Record/ocn842919752</guid>
      <author>Ben Mahmoud, Mohamed Slim</author>
      <dc:format>eBook</dc:format>
      <dc:date>2013</dc:date>
      <dc:creator>Ben Mahmoud, Mohamed Slim</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Cybercrime and cyberwarfare /</title>
      <pubDate>Wed, 01 Jan 2014 23:36:17 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/ocn875885762</link>
      <guid>https://find.library.upatras.gr/Record/ocn875885762</guid>
      <author>Bernik, Igor</author>
      <dc:format>eBook</dc:format>
      <dc:date>2014</dc:date>
      <dc:creator>Bernik, Igor</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Beyond cybersecurity : protecting your digital business /</title>
      <pubDate>Thu, 01 Jan 2015 23:36:17 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/ocn907675774</link>
      <guid>https://find.library.upatras.gr/Record/ocn907675774</guid>
      <author>Kaplan, James M.</author>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <dc:creator>Kaplan, James M.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Network attacks and exploitation : a framework /</title>
      <pubDate>Thu, 01 Jan 2015 23:36:17 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/ocn913742234</link>
      <guid>https://find.library.upatras.gr/Record/ocn913742234</guid>
      <author>Monte, Matthew</author>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <dc:creator>Monte, Matthew</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>The network security test lab : a step-by-step guide /</title>
      <pubDate>Thu, 01 Jan 2015 23:36:17 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/ocn918135837</link>
      <guid>https://find.library.upatras.gr/Record/ocn918135837</guid>
      <author>Gregg, Michael (Michael C.)</author>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <dc:creator>Gregg, Michael (Michael C.)</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>The death of the internet /</title>
      <pubDate>Sun, 01 Jan 2012 23:36:17 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/ocn799768467</link>
      <guid>https://find.library.upatras.gr/Record/ocn799768467</guid>
      <dc:format>eBook</dc:format>
      <dc:date>2012</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Cyber conflict : competing national perspectives /</title>
      <pubDate>Sun, 01 Jan 2012 23:36:17 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/ocn828423696</link>
      <guid>https://find.library.upatras.gr/Record/ocn828423696</guid>
      <dc:format>eBook</dc:format>
      <dc:date>2012</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Arithmetic of Finite Fields 7th International Workshop, WAIFI 2018, Bergen, Norway, June 14-16, 2018, Revised Selected Papers /</title>
      <pubDate>Mon, 01 Jan 2018 23:36:17 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-030-05153-2</link>
      <guid>https://find.library.upatras.gr/Record/978-3-030-05153-2</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2018</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Mobile access safety : beyond BYOD /</title>
      <pubDate>Tue, 01 Jan 2013 23:36:17 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/ocn828198483</link>
      <guid>https://find.library.upatras.gr/Record/ocn828198483</guid>
      <author>Assing, Dominique</author>
      <dc:format>eBook</dc:format>
      <dc:date>2013</dc:date>
      <dc:creator>Assing, Dominique</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Security management of next generation telecommunications networks and services /</title>
      <pubDate>Wed, 01 Jan 2014 23:36:17 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/ocn862114228</link>
      <guid>https://find.library.upatras.gr/Record/ocn862114228</guid>
      <author>Jacobs, Stuart</author>
      <dc:format>eBook</dc:format>
      <dc:date>2014</dc:date>
      <dc:creator>Jacobs, Stuart</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Understanding Bitcoin : Cryptography, Engineering and Economics /</title>
      <pubDate>Thu, 01 Jan 2015 23:36:17 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/ocn898086636</link>
      <guid>https://find.library.upatras.gr/Record/ocn898086636</guid>
      <author>Franco, Pedro</author>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <dc:creator>Franco, Pedro</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Jurnal Teknologi dan Sistem Informasi</title>
      <pubDate>Fri, 01 Jan 2016 23:36:17 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/oai:doaj.org-journal:ece059fd5e8c429ba192012a5b561fe1</link>
      <guid>https://find.library.upatras.gr/Record/oai:doaj.org-journal:ece059fd5e8c429ba192012a5b561fe1</guid>
      <dc:format>journal</dc:format>
      <dc:date>2016</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Cryptography and network security /</title>
      <pubDate>Tue, 01 Jan 2008 23:36:17 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/149020</link>
      <guid>https://find.library.upatras.gr/Record/149020</guid>
      <author>Forouzan, Behrouz A.</author>
      <dc:format>Book</dc:format>
      <dc:date>2008</dc:date>
      <dc:creator>Forouzan, Behrouz A.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
  </channel>
</rss>
