<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="/themes/root/assets/xsl/rss.xsl"?>
<rss version="2.0" xmlns:opensearch="http://a9.com/-/spec/opensearch/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/">
  <channel>
    <title>Results for "data protection"</title>
    <description>Showing 1 - 50 results of 245</description>
    <generator>Laminas_Feed_Writer 2 (https://getlaminas.org)</generator>
    <link>https://find.library.upatras.gr/Search/Results?sort=last_indexed+desc&amp;limit=50&amp;lookfor=%22data+protection%22&amp;type=Subject&amp;lng=en</link>
    <opensearch:totalResults>245</opensearch:totalResults>
    <opensearch:startIndex>0</opensearch:startIndex>
    <opensearch:itemsPerPage>50</opensearch:itemsPerPage>
    <opensearch:Query role="request" searchTerms="%22data%20protection%22" startIndex="0"/>
    <atom:link rel="first" type="application/rss+xml" title="Go to First Page" href="https://find.library.upatras.gr/Search/Results?sort=last_indexed+desc&amp;limit=50&amp;view=rss&amp;lookfor=%22data+protection%22&amp;type=Subject&amp;lng=en"/>
    <atom:link rel="next" type="application/rss+xml" title="Go to Next Page" href="https://find.library.upatras.gr/Search/Results?sort=last_indexed+desc&amp;limit=50&amp;view=rss&amp;lookfor=%22data+protection%22&amp;type=Subject&amp;lng=en&amp;page=2"/>
    <atom:link rel="last" type="application/rss+xml" title="Go to Last Page" href="https://find.library.upatras.gr/Search/Results?sort=last_indexed+desc&amp;limit=50&amp;view=rss&amp;lookfor=%22data+protection%22&amp;type=Subject&amp;lng=en&amp;page=5"/>
    <item>
      <title>Διαχείριση κινδύνου στις περιπτώσεις προστασίας προσωπικών δεδομένων</title>
      <pubDate>Tue, 01 Jan 2019 07:18:11 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/nemertes-10889-12798</link>
      <guid>https://find.library.upatras.gr/Record/nemertes-10889-12798</guid>
      <author>Μαγουλάς, Βασίλης</author>
      <dc:format>Thesis</dc:format>
      <dc:date>2019</dc:date>
      <dc:creator>Μαγουλάς, Βασίλης</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Η ιδιωτικότητα των δεδομένων σε φορητές συσκευές, εφαρμογών διαδικτυακής επικοινωνίας</title>
      <pubDate>Wed, 01 Jan 2020 07:18:11 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/nemertes-10889-13892</link>
      <guid>https://find.library.upatras.gr/Record/nemertes-10889-13892</guid>
      <author>Καλαπόδη, Αγγελική</author>
      <dc:date>2020</dc:date>
      <dc:creator>Καλαπόδη, Αγγελική</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Παράγοντες καταστρατήγησης του ιατρικού απορρήτου στην κλινική πρακτική</title>
      <pubDate>Wed, 01 Jan 2020 07:18:11 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/nemertes-10889-13049</link>
      <guid>https://find.library.upatras.gr/Record/nemertes-10889-13049</guid>
      <author>Σιμωτάς, Αθανάσιος</author>
      <dc:format>Thesis</dc:format>
      <dc:date>2020</dc:date>
      <dc:creator>Σιμωτάς, Αθανάσιος</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Ανάπτυξη και υλοποίηση συστήματος ασφαλών ηλεκτρονικών συναλλαγών για αγροτικές εφαρμογές με χρήση της τεχνολογίας blockchain</title>
      <pubDate>Sat, 01 Jan 2022 07:18:11 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/nemertes-10889-15739</link>
      <guid>https://find.library.upatras.gr/Record/nemertes-10889-15739</guid>
      <author>Δέδες, Αθηνογένης</author>
      <dc:date>2022</dc:date>
      <dc:creator>Δέδες, Αθηνογένης</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Η προστασία των προσωπικών δεδομένων στο πλαίσιο της κοινωνικής ασφάλισης. Η περίπτωση του e-ΕΦΚΑ</title>
      <pubDate>Sun, 01 Jan 2023 07:18:11 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/nemertes-10889-24991</link>
      <guid>https://find.library.upatras.gr/Record/nemertes-10889-24991</guid>
      <author>Βασιλείου, Σοφία</author>
      <dc:date>2023</dc:date>
      <dc:creator>Βασιλείου, Σοφία</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Digital Forensics and Cyber Crime 10th International EAI Conference, ICDF2C 2018, New Orleans, LA, USA, September 10-12, 2018, Proceedings /</title>
      <pubDate>Tue, 01 Jan 2019 07:18:11 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-030-05487-8</link>
      <guid>https://find.library.upatras.gr/Record/978-3-030-05487-8</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2019</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Networked Predictive Control of Systems with Communication Constraints and Cyber Attacks</title>
      <pubDate>Tue, 01 Jan 2019 07:18:11 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-981-13-0520-7</link>
      <guid>https://find.library.upatras.gr/Record/978-981-13-0520-7</guid>
      <author>Pang, Zhong-Hua</author>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2019</dc:date>
      <dc:creator>Pang, Zhong-Hua</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Security, Privacy, and Anonymity in Computation, Communication, and Storage SpaCCS 2019 International Workshops, Atlanta, GA, USA, July 14-17, 2019, Proceedings /</title>
      <pubDate>Tue, 01 Jan 2019 07:18:11 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-030-24900-7</link>
      <guid>https://find.library.upatras.gr/Record/978-3-030-24900-7</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2019</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Security and Privacy for Next-Generation Wireless Networks</title>
      <pubDate>Tue, 01 Jan 2019 07:18:11 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-030-01150-5</link>
      <guid>https://find.library.upatras.gr/Record/978-3-030-01150-5</guid>
      <author>Zhong, Sheng</author>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2019</dc:date>
      <dc:creator>Zhong, Sheng</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Computational Intelligence, Communications, and Business Analytics Second International Conference, CICBA 2018, Kalyani, India, July 27-28, 2018, Revised Selected Papers, Part II /</title>
      <pubDate>Tue, 01 Jan 2019 07:18:11 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-981-13-8581-0</link>
      <guid>https://find.library.upatras.gr/Record/978-981-13-8581-0</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2019</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Smart Cities of Today and Tomorrow Better Technology, Infrastructure and Security /</title>
      <pubDate>Tue, 01 Jan 2019 07:18:11 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-95822-4</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-95822-4</guid>
      <author>Pelton, Joseph N.</author>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2019</dc:date>
      <dc:creator>Pelton, Joseph N.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Cybersecurity in the Electricity Sector Managing Critical Infrastructure /</title>
      <pubDate>Tue, 01 Jan 2019 07:18:11 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-030-19538-0</link>
      <guid>https://find.library.upatras.gr/Record/978-3-030-19538-0</guid>
      <author>Leszczyna, Rafał</author>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2019</dc:date>
      <dc:creator>Leszczyna, Rafał</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Industrial Control Systems Security and Resiliency Practice and Theory /</title>
      <pubDate>Tue, 01 Jan 2019 07:18:11 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-030-18214-4</link>
      <guid>https://find.library.upatras.gr/Record/978-3-030-18214-4</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2019</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Information Technology - New Generations 15th International Conference on Information Technology /</title>
      <pubDate>Mon, 01 Jan 2018 07:18:11 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-77028-4</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-77028-4</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2018</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Enhancing CBRNE Safety &amp; Security: Proceedings of the SICC 2017 Conference Science as the first countermeasure for CBRNE and Cyber threats /</title>
      <pubDate>Mon, 01 Jan 2018 07:18:11 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-91791-7</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-91791-7</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2018</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Pro iOS Security and Forensics Enterprise iPhone and iPad Safety /</title>
      <pubDate>Mon, 01 Jan 2018 07:18:11 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-1-4842-3757-1</link>
      <guid>https://find.library.upatras.gr/Record/978-1-4842-3757-1</guid>
      <author>Butow, Eric</author>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2018</dc:date>
      <dc:creator>Butow, Eric</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Introductory Computer Forensics A Hands-on Practical Approach /</title>
      <pubDate>Mon, 01 Jan 2018 07:18:11 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-030-00581-8</link>
      <guid>https://find.library.upatras.gr/Record/978-3-030-00581-8</guid>
      <author>Lin, Xiaodong</author>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2018</dc:date>
      <dc:creator>Lin, Xiaodong</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Smart Blockchain First International Conference, SmartBlock 2018, Tokyo, Japan, December 10-12, 2018, Proceedings /</title>
      <pubDate>Mon, 01 Jan 2018 07:18:11 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-030-05764-0</link>
      <guid>https://find.library.upatras.gr/Record/978-3-030-05764-0</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2018</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Privacy-Enhancing Fog Computing and Its Applications</title>
      <pubDate>Mon, 01 Jan 2018 07:18:11 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-030-02113-9</link>
      <guid>https://find.library.upatras.gr/Record/978-3-030-02113-9</guid>
      <author>Lin, Xiaodong</author>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2018</dc:date>
      <dc:creator>Lin, Xiaodong</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Cyber Criminology</title>
      <pubDate>Mon, 01 Jan 2018 07:18:11 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-97181-0</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-97181-0</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2018</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Intelligent Data Processing 11th International Conference, IDP 2016, Barcelona, Spain, October 10-14, 2016, Revised Selected Papers /</title>
      <pubDate>Tue, 01 Jan 2019 07:18:11 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-030-35400-8</link>
      <guid>https://find.library.upatras.gr/Record/978-3-030-35400-8</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2019</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Security in Smart Cities: Models, Applications, and Challenges</title>
      <pubDate>Tue, 01 Jan 2019 07:18:11 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-030-01560-2</link>
      <guid>https://find.library.upatras.gr/Record/978-3-030-01560-2</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2019</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Database Systems for Advanced Applications DASFAA 2019 International Workshops: BDMS, BDQM, and GDMA, Chiang Mai, Thailand, April 22-25, 2019, Proceedings /</title>
      <pubDate>Tue, 01 Jan 2019 07:18:11 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-030-18590-9</link>
      <guid>https://find.library.upatras.gr/Record/978-3-030-18590-9</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2019</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Digital Forensics Basics A Practical Guide Using Windows OS  /</title>
      <pubDate>Tue, 01 Jan 2019 07:18:11 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-1-4842-3838-7</link>
      <guid>https://find.library.upatras.gr/Record/978-1-4842-3838-7</guid>
      <author>Hassan, Nihad A.</author>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2019</dc:date>
      <dc:creator>Hassan, Nihad A.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>System Administration Ethics Ten Commandments for Security and Compliance in a Modern Cyber World /</title>
      <pubDate>Tue, 01 Jan 2019 07:18:11 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-1-4842-4988-8</link>
      <guid>https://find.library.upatras.gr/Record/978-1-4842-4988-8</guid>
      <author>Ljubuncic, Igor</author>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2019</dc:date>
      <dc:creator>Ljubuncic, Igor</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Machine Learning and Knowledge Discovery in Databases European Conference, ECML PKDD 2018, Dublin, Ireland, September 10-14, 2018, Proceedings, Part II /</title>
      <pubDate>Tue, 01 Jan 2019 07:18:11 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-030-10928-8</link>
      <guid>https://find.library.upatras.gr/Record/978-3-030-10928-8</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2019</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Information Systems Security 15th International Conference, ICISS 2019, Hyderabad, India, December 16-20, 2019, Proceedings /</title>
      <pubDate>Tue, 01 Jan 2019 07:18:11 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-030-36945-3</link>
      <guid>https://find.library.upatras.gr/Record/978-3-030-36945-3</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2019</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Ubiquitous Computing and Computing Security of IoT</title>
      <pubDate>Tue, 01 Jan 2019 07:18:11 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-030-01566-4</link>
      <guid>https://find.library.upatras.gr/Record/978-3-030-01566-4</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2019</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Practical Cryptography in Python Learning Correct Cryptography by Example /</title>
      <pubDate>Tue, 01 Jan 2019 07:18:11 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-1-4842-4900-0</link>
      <guid>https://find.library.upatras.gr/Record/978-1-4842-4900-0</guid>
      <author>Nielson, Seth James</author>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2019</dc:date>
      <dc:creator>Nielson, Seth James</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Autonomous Cyber Deception Reasoning, Adaptive Planning, and Evaluation of HoneyThings /</title>
      <pubDate>Tue, 01 Jan 2019 07:18:11 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-030-02110-8</link>
      <guid>https://find.library.upatras.gr/Record/978-3-030-02110-8</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2019</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Cloud Computing - CLOUD 2019 12th International Conference, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25-30, 2019, Proceedings /</title>
      <pubDate>Tue, 01 Jan 2019 07:18:11 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-030-23502-4</link>
      <guid>https://find.library.upatras.gr/Record/978-3-030-23502-4</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2019</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Critical Infrastructure Security and Resilience Theories, Methods, Tools and Technologies /</title>
      <pubDate>Tue, 01 Jan 2019 07:18:11 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-030-00024-0</link>
      <guid>https://find.library.upatras.gr/Record/978-3-030-00024-0</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2019</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Engineering Secure Software and Systems 10th International Symposium, ESSoS 2018, Paris, France, June 26-27, 2018, Proceedings /</title>
      <pubDate>Mon, 01 Jan 2018 07:18:11 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-94496-8</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-94496-8</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2018</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Emerging Technologies for Developing Countries First International EAI Conference, AFRICATEK 2017, Marrakech, Morocco, March 27-28, 2017 Proceedings /</title>
      <pubDate>Mon, 01 Jan 2018 07:18:11 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-67837-5</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-67837-5</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2018</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Future Network Systems and Security 4th International Conference, FNSS 2018, Paris, France, July 9-11, 2018, Proceedings /</title>
      <pubDate>Mon, 01 Jan 2018 07:18:11 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-94421-0</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-94421-0</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2018</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Enterprise Cybersecurity Study Guide How to Build a Successful Cyberdefense Program Against Advanced Threats /</title>
      <pubDate>Mon, 01 Jan 2018 07:18:11 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-1-4842-3258-3</link>
      <guid>https://find.library.upatras.gr/Record/978-1-4842-3258-3</guid>
      <author>Donaldson, Scott E.</author>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2018</dc:date>
      <dc:creator>Donaldson, Scott E.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Open Source Intelligence Methods and Tools A Practical Guide to Online Intelligence /</title>
      <pubDate>Mon, 01 Jan 2018 07:18:11 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-1-4842-3213-2</link>
      <guid>https://find.library.upatras.gr/Record/978-1-4842-3213-2</guid>
      <author>Hassan, Nihad A.</author>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2018</dc:date>
      <dc:creator>Hassan, Nihad A.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Advanced Monitoring in P2P Botnets A Dual Perspective /</title>
      <pubDate>Mon, 01 Jan 2018 07:18:11 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-981-10-9050-9</link>
      <guid>https://find.library.upatras.gr/Record/978-981-10-9050-9</guid>
      <author>Karuppayah, Shankar</author>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2018</dc:date>
      <dc:creator>Karuppayah, Shankar</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Security with Intelligent Computing and Big-data Services</title>
      <pubDate>Mon, 01 Jan 2018 07:18:11 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-76451-1</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-76451-1</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2018</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Artificial Intelligence Tools for Cyber Attribution</title>
      <pubDate>Mon, 01 Jan 2018 07:18:11 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-73788-1</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-73788-1</guid>
      <author>Nunes, Eric</author>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2018</dc:date>
      <dc:creator>Nunes, Eric</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Bug Bounty Hunting for Web Security Find and Exploit Vulnerabilities in Web sites and Applications /</title>
      <pubDate>Tue, 01 Jan 2019 07:18:11 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-1-4842-5391-5</link>
      <guid>https://find.library.upatras.gr/Record/978-1-4842-5391-5</guid>
      <author>Sinha, Sanjib</author>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2019</dc:date>
      <dc:creator>Sinha, Sanjib</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Handbook of Big Data and IoT Security</title>
      <pubDate>Tue, 01 Jan 2019 07:18:11 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-030-10543-3</link>
      <guid>https://find.library.upatras.gr/Record/978-3-030-10543-3</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2019</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>The IoT Hacker's Handbook A Practical Guide to Hacking the Internet of Things  /</title>
      <pubDate>Tue, 01 Jan 2019 07:18:11 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-1-4842-4300-8</link>
      <guid>https://find.library.upatras.gr/Record/978-1-4842-4300-8</guid>
      <author>Gupta, Aditya</author>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2019</dc:date>
      <dc:creator>Gupta, Aditya</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Risk centric threat modeling : process for attack simulation and threat analysis /</title>
      <pubDate>Thu, 01 Jan 2015 07:18:11 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/ocn904400187</link>
      <guid>https://find.library.upatras.gr/Record/ocn904400187</guid>
      <author>Morana, Marco M.</author>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <dc:creator>Morana, Marco M.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Advanced Hybrid Information Processing Third EAI International Conference, ADHIP 2019, Nanjing, China, September 21-22, 2019, Proceedings, Part I /</title>
      <pubDate>Tue, 01 Jan 2019 07:18:11 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-030-36402-1</link>
      <guid>https://find.library.upatras.gr/Record/978-3-030-36402-1</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2019</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>PowerShell and Python Together Targeting Digital Investigations  /</title>
      <pubDate>Tue, 01 Jan 2019 07:18:11 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-1-4842-4504-0</link>
      <guid>https://find.library.upatras.gr/Record/978-1-4842-4504-0</guid>
      <author>Hosmer, Chet</author>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2019</dc:date>
      <dc:creator>Hosmer, Chet</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Honeypot Frameworks and Their Applications: A New Framework</title>
      <pubDate>Mon, 01 Jan 2018 07:18:11 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-981-10-7739-5</link>
      <guid>https://find.library.upatras.gr/Record/978-981-10-7739-5</guid>
      <author>NG, Chee Keong</author>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2018</dc:date>
      <dc:creator>NG, Chee Keong</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Oracle Incident Response and Forensics Preparing for and Responding to Data Breaches /</title>
      <pubDate>Mon, 01 Jan 2018 07:18:11 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-1-4842-3264-4</link>
      <guid>https://find.library.upatras.gr/Record/978-1-4842-3264-4</guid>
      <author>Finnigan, Pete</author>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2018</dc:date>
      <dc:creator>Finnigan, Pete</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Firewalls Don't Stop Dragons A Step-by-Step Guide to Computer Security for Non-Techies /</title>
      <pubDate>Mon, 01 Jan 2018 07:18:11 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-1-4842-3852-3</link>
      <guid>https://find.library.upatras.gr/Record/978-1-4842-3852-3</guid>
      <author>Parker, Carey</author>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2018</dc:date>
      <dc:creator>Parker, Carey</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Smart Micro-Grid Systems Security and Privacy</title>
      <pubDate>Mon, 01 Jan 2018 07:18:11 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/978-3-319-91427-5</link>
      <guid>https://find.library.upatras.gr/Record/978-3-319-91427-5</guid>
      <dc:format>Electronic</dc:format>
      <dc:format>eBook</dc:format>
      <dc:date>2018</dc:date>
      <slash:comments>0</slash:comments>
    </item>
  </channel>
</rss>
