<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="/themes/root/assets/xsl/rss.xsl"?>
<rss version="2.0" xmlns:opensearch="http://a9.com/-/spec/opensearch/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/">
  <channel>
    <title>Results for "internet security"</title>
    <description>Showing 1 - 26 results of 26</description>
    <generator>Laminas_Feed_Writer 2 (https://getlaminas.org)</generator>
    <link>https://find.library.upatras.gr/Search/Results?sort=last_indexed+desc&amp;limit=50&amp;lookfor=%22internet+security%22&amp;type=Subject&amp;lng=en</link>
    <opensearch:totalResults>26</opensearch:totalResults>
    <opensearch:startIndex>0</opensearch:startIndex>
    <opensearch:itemsPerPage>50</opensearch:itemsPerPage>
    <opensearch:Query role="request" searchTerms="%22internet%20security%22" startIndex="0"/>
    <atom:link rel="first" type="application/rss+xml" title="Go to First Page" href="https://find.library.upatras.gr/Search/Results?sort=last_indexed+desc&amp;limit=50&amp;view=rss&amp;lookfor=%22internet+security%22&amp;type=Subject&amp;lng=en"/>
    <atom:link rel="last" type="application/rss+xml" title="Go to Last Page" href="https://find.library.upatras.gr/Search/Results?sort=last_indexed+desc&amp;limit=50&amp;view=rss&amp;lookfor=%22internet+security%22&amp;type=Subject&amp;lng=en"/>
    <item>
      <title>Advances in computers.</title>
      <pubDate>Sat, 01 Jan 2011 06:08:54 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/ocn731020034</link>
      <guid>https://find.library.upatras.gr/Record/ocn731020034</guid>
      <dc:format>eBook</dc:format>
      <dc:date>2011</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Network Security /</title>
      <pubDate>Wed, 01 Jan 2014 06:08:54 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/ocn892044758</link>
      <guid>https://find.library.upatras.gr/Record/ocn892044758</guid>
      <author>Perez, Andre</author>
      <dc:format>eBook</dc:format>
      <dc:date>2014</dc:date>
      <dc:creator>Perez, Andre</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Chinese cybersecurity and defense /</title>
      <pubDate>Wed, 01 Jan 2014 06:08:54 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/ocn891396804</link>
      <guid>https://find.library.upatras.gr/Record/ocn891396804</guid>
      <dc:format>eBook</dc:format>
      <dc:date>2014</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Security intelligence : a practitioner's guide to solving enterprise security challenges /</title>
      <pubDate>Thu, 01 Jan 2015 06:08:54 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/ocn906699046</link>
      <guid>https://find.library.upatras.gr/Record/ocn906699046</guid>
      <author>Li, Qing, 1971-</author>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <dc:creator>Li, Qing, 1971-</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>The Wiley handbook of psychology, technology and society /</title>
      <pubDate>Thu, 01 Jan 2015 06:08:54 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/ocn900870020</link>
      <guid>https://find.library.upatras.gr/Record/ocn900870020</guid>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Ασφάλεια και παραβίαση προσωπικών δεδομένων στο διαδίκτυο : τι γνωρίζουν οι γονείς μαθητών Α/θμιας Εκπαίδευσης;</title>
      <pubDate>Sun, 01 Jan 2023 06:08:54 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/nemertes-10889-24616</link>
      <guid>https://find.library.upatras.gr/Record/nemertes-10889-24616</guid>
      <author>Λεοντή, Ιάνθη - Αγγελική</author>
      <dc:date>2023</dc:date>
      <dc:creator>Λεοντή, Ιάνθη - Αγγελική</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>The mobile application hacker's handbook /</title>
      <pubDate>Thu, 01 Jan 2015 06:08:54 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/ocn908032082</link>
      <guid>https://find.library.upatras.gr/Record/ocn908032082</guid>
      <author>Chell, Dominic</author>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <dc:creator>Chell, Dominic</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Auditing cloud computing : a security and privacy guide /</title>
      <pubDate>Sat, 01 Jan 2011 06:08:54 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/ocn747412460</link>
      <guid>https://find.library.upatras.gr/Record/ocn747412460</guid>
      <dc:format>eBook</dc:format>
      <dc:date>2011</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Engineering information security : the application of systems engineering concepts to achieve information assurance /</title>
      <pubDate>Sat, 01 Jan 2011 06:08:54 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/ocn747427270</link>
      <guid>https://find.library.upatras.gr/Record/ocn747427270</guid>
      <author>Jacobs, Stuart</author>
      <dc:format>eBook</dc:format>
      <dc:date>2011</dc:date>
      <dc:creator>Jacobs, Stuart</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Information security : principles and practice /</title>
      <pubDate>Sat, 01 Jan 2011 06:08:54 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/ocn748365383</link>
      <guid>https://find.library.upatras.gr/Record/ocn748365383</guid>
      <author>Stamp, Mark</author>
      <dc:format>eBook</dc:format>
      <dc:date>2011</dc:date>
      <dc:creator>Stamp, Mark</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Engineering information security : the application of systems engineering concepts to achieve information assurance /</title>
      <pubDate>Fri, 01 Jan 2016 06:08:54 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/ocn931699873</link>
      <guid>https://find.library.upatras.gr/Record/ocn931699873</guid>
      <author>Jacobs, Stuart</author>
      <dc:format>eBook</dc:format>
      <dc:date>2016</dc:date>
      <dc:creator>Jacobs, Stuart</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Wireless mobile internet security /</title>
      <pubDate>Tue, 01 Jan 2013 06:08:54 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/ocn823930433</link>
      <guid>https://find.library.upatras.gr/Record/ocn823930433</guid>
      <author>Rhee, Man Young</author>
      <dc:format>eBook</dc:format>
      <dc:date>2013</dc:date>
      <dc:creator>Rhee, Man Young</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Beyond cybersecurity : protecting your digital business /</title>
      <pubDate>Thu, 01 Jan 2015 06:08:54 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/ocn907675774</link>
      <guid>https://find.library.upatras.gr/Record/ocn907675774</guid>
      <author>Kaplan, James M.</author>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <dc:creator>Kaplan, James M.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>The death of the internet /</title>
      <pubDate>Sun, 01 Jan 2012 06:08:54 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/ocn799768467</link>
      <guid>https://find.library.upatras.gr/Record/ocn799768467</guid>
      <dc:format>eBook</dc:format>
      <dc:date>2012</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Mobile access safety : beyond BYOD /</title>
      <pubDate>Tue, 01 Jan 2013 06:08:54 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/ocn828198483</link>
      <guid>https://find.library.upatras.gr/Record/ocn828198483</guid>
      <author>Assing, Dominique</author>
      <dc:format>eBook</dc:format>
      <dc:date>2013</dc:date>
      <dc:creator>Assing, Dominique</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Understanding Bitcoin : Cryptography, Engineering and Economics /</title>
      <pubDate>Thu, 01 Jan 2015 06:08:54 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/ocn898086636</link>
      <guid>https://find.library.upatras.gr/Record/ocn898086636</guid>
      <author>Franco, Pedro</author>
      <dc:format>eBook</dc:format>
      <dc:date>2015</dc:date>
      <dc:creator>Franco, Pedro</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Journal of Internet Services and Applications</title>
      <pubDate>Tue, 01 Jan 2013 06:08:54 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/oai:doaj.org-journal:0670b730e08143dd84af6a9120ac502f</link>
      <guid>https://find.library.upatras.gr/Record/oai:doaj.org-journal:0670b730e08143dd84af6a9120ac502f</guid>
      <dc:format>journal</dc:format>
      <dc:date>2013</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>SpamAssassin /</title>
      <pubDate>Thu, 01 Jan 2004 06:08:54 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/150838</link>
      <guid>https://find.library.upatras.gr/Record/150838</guid>
      <author>Schwartz, Alan</author>
      <dc:format>Book</dc:format>
      <dc:date>2004</dc:date>
      <dc:creator>Schwartz, Alan</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Internet security : a jumpstart for systems administrators and IT managers /</title>
      <pubDate>Wed, 01 Jan 2003 06:08:54 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/151252</link>
      <guid>https://find.library.upatras.gr/Record/151252</guid>
      <author>Speed, Tim</author>
      <dc:format>Book</dc:format>
      <dc:date>2003</dc:date>
      <dc:creator>Speed, Tim</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Designing network security /</title>
      <pubDate>Thu, 01 Jan 2004 06:08:54 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/151370</link>
      <guid>https://find.library.upatras.gr/Record/151370</guid>
      <author>Kaeo, Merike</author>
      <dc:format>Book</dc:format>
      <dc:date>2004</dc:date>
      <dc:creator>Kaeo, Merike</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Internet and Intranet security /</title>
      <pubDate>Thu, 01 Jan 1998 06:08:54 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/171148</link>
      <guid>https://find.library.upatras.gr/Record/171148</guid>
      <dc:format>Book</dc:format>
      <dc:date>1998</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Professional pen testing for Web applications /</title>
      <pubDate>Sun, 01 Jan 2006 06:08:54 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/158085</link>
      <guid>https://find.library.upatras.gr/Record/158085</guid>
      <author>Andreu, Andres, 1968-</author>
      <dc:format>Book</dc:format>
      <dc:date>2006</dc:date>
      <dc:creator>Andreu, Andres, 1968-</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Network intrusion detection /</title>
      <pubDate>Wed, 01 Jan 2003 06:08:54 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/151194</link>
      <guid>https://find.library.upatras.gr/Record/151194</guid>
      <author>Northcutt, Stephen</author>
      <dc:format>Book</dc:format>
      <dc:date>2003</dc:date>
      <dc:creator>Northcutt, Stephen</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>AAA and network security for mobile access : radius , diameter, EAP , PKI , and  IP mobility /</title>
      <pubDate>Sat, 01 Jan 2005 06:08:54 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/151214</link>
      <guid>https://find.library.upatras.gr/Record/151214</guid>
      <author>Nakjiri, Madjid</author>
      <dc:format>Book</dc:format>
      <dc:date>2005</dc:date>
      <dc:creator>Nakjiri, Madjid</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Google hacking the penetration testers /</title>
      <pubDate>Sat, 01 Jan 2005 06:08:54 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/177572</link>
      <guid>https://find.library.upatras.gr/Record/177572</guid>
      <author>Long, Johnny</author>
      <dc:format>Book</dc:format>
      <dc:date>2005</dc:date>
      <dc:creator>Long, Johnny</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Cybersecurity for beginners/</title>
      <pubDate>Thu, 01 Jan 2015 06:08:54 +0200</pubDate>
      <link>https://find.library.upatras.gr/Record/181166</link>
      <guid>https://find.library.upatras.gr/Record/181166</guid>
      <author>Meeuwisse, Raef</author>
      <dc:format>Book</dc:format>
      <dc:date>2015</dc:date>
      <dc:creator>Meeuwisse, Raef</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
  </channel>
</rss>
