<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="/themes/root/assets/xsl/rss.xsl"?>
<rss version="2.0" xmlns:opensearch="http://a9.com/-/spec/opensearch/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/">
  <channel>
    <title>Results for "Computer security"</title>
    <description>Showing 1 - 15 results of 15</description>
    <generator>Laminas_Feed_Writer 2 (https://getlaminas.org)</generator>
    <link>https://eploes.lib2.uniwa.gr/Search/Results?sort=last_indexed+desc&amp;limit=50&amp;lookfor=%22Computer+security%22&amp;type=Subject&amp;lng=en</link>
    <opensearch:totalResults>15</opensearch:totalResults>
    <opensearch:startIndex>0</opensearch:startIndex>
    <opensearch:itemsPerPage>50</opensearch:itemsPerPage>
    <opensearch:Query role="request" searchTerms="%22Computer%20security%22" startIndex="0"/>
    <atom:link rel="first" type="application/rss+xml" title="Go to First Page" href="https://eploes.lib2.uniwa.gr/Search/Results?sort=last_indexed+desc&amp;limit=50&amp;view=rss&amp;lookfor=%22Computer+security%22&amp;type=Subject&amp;lng=en"/>
    <atom:link rel="last" type="application/rss+xml" title="Go to Last Page" href="https://eploes.lib2.uniwa.gr/Search/Results?sort=last_indexed+desc&amp;limit=50&amp;view=rss&amp;lookfor=%22Computer+security%22&amp;type=Subject&amp;lng=en"/>
    <atom:link rel="self" type="application/rss+xml" href="https://eploes.lib2.uniwa.gr/Search/Results?sort=last_indexed+desc&amp;limit=50&amp;view=rss&amp;lookfor=%22Computer+security%22&amp;type=Subject&amp;lng=en"/>
    <item>
      <title>UNIX system security tools</title>
      <pubDate>Sat, 01 Jan 2000 05:00:34 +0200</pubDate>
      <link>https://eploes.lib2.uniwa.gr/Record/lib2_1%2F13935</link>
      <guid>https://eploes.lib2.uniwa.gr/Record/lib2_1%2F13935</guid>
      <author>Ross Seth T.</author>
      <dc:format>Book</dc:format>
      <dc:date>2000</dc:date>
      <dc:creator>Ross Seth T.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Ασφάλεια δικτύων υπολογιστών</title>
      <pubDate>Wed, 01 Jan 2003 05:00:34 +0200</pubDate>
      <link>https://eploes.lib2.uniwa.gr/Record/lib2_1%2F14931</link>
      <guid>https://eploes.lib2.uniwa.gr/Record/lib2_1%2F14931</guid>
      <author>Πομπόρτσης Ανδρέας Σ.</author>
      <dc:format>Book</dc:format>
      <dc:date>2003</dc:date>
      <dc:creator>Πομπόρτσης Ανδρέας Σ.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Βασικές αρχές ασφάλειας δικτύων εφαρμογές και πρότυπα</title>
      <pubDate>Tue, 01 Jan 2008 05:00:34 +0200</pubDate>
      <link>https://eploes.lib2.uniwa.gr/Record/lib2_1%2F15089</link>
      <guid>https://eploes.lib2.uniwa.gr/Record/lib2_1%2F15089</guid>
      <author>Stallings William</author>
      <dc:format>Book</dc:format>
      <dc:date>2008</dc:date>
      <dc:creator>Stallings William</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Fighting computer crime A new framework for protecting information</title>
      <pubDate>Thu, 01 Jan 1998 05:00:34 +0200</pubDate>
      <link>https://eploes.lib2.uniwa.gr/Record/lib2_1%2F1991</link>
      <guid>https://eploes.lib2.uniwa.gr/Record/lib2_1%2F1991</guid>
      <author>Parker Donn B.</author>
      <dc:format>Book</dc:format>
      <dc:date>1998</dc:date>
      <dc:creator>Parker Donn B.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Computer security</title>
      <pubDate>Fri, 01 Jan 1999 05:00:34 +0200</pubDate>
      <link>https://eploes.lib2.uniwa.gr/Record/lib2_1%2F3024</link>
      <guid>https://eploes.lib2.uniwa.gr/Record/lib2_1%2F3024</guid>
      <author>Gollmann Dieter</author>
      <dc:format>Book</dc:format>
      <dc:date>1999</dc:date>
      <dc:creator>Gollmann Dieter</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Ασφάλεια υπολογιστών αρχές και πρακτικές</title>
      <pubDate>Fri, 01 Jan 2016 05:00:34 +0200</pubDate>
      <link>https://eploes.lib2.uniwa.gr/Record/lib2_1%2F387</link>
      <guid>https://eploes.lib2.uniwa.gr/Record/lib2_1%2F387</guid>
      <author>Stallings William</author>
      <dc:format>Book</dc:format>
      <dc:date>2016</dc:date>
      <dc:creator>Stallings William</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Practical UNIX and internet security</title>
      <pubDate>Mon, 01 Jan 1996 05:00:34 +0200</pubDate>
      <link>https://eploes.lib2.uniwa.gr/Record/lib2_1%2F4650</link>
      <guid>https://eploes.lib2.uniwa.gr/Record/lib2_1%2F4650</guid>
      <author>Garfinkel Simson</author>
      <dc:format>Book</dc:format>
      <dc:date>1996</dc:date>
      <dc:creator>Garfinkel Simson</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Windows NT security A practical guide to securing Windows NT servers and workstations</title>
      <pubDate>Wed, 01 Jan 1997 05:00:34 +0200</pubDate>
      <link>https://eploes.lib2.uniwa.gr/Record/lib2_1%2F4693</link>
      <guid>https://eploes.lib2.uniwa.gr/Record/lib2_1%2F4693</guid>
      <author>Rutstein Charles B.</author>
      <dc:format>Book</dc:format>
      <dc:date>1997</dc:date>
      <dc:creator>Rutstein Charles B.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>WWW. security How to build a secure World Wide Web connection</title>
      <pubDate>Mon, 01 Jan 1996 05:00:34 +0200</pubDate>
      <link>https://eploes.lib2.uniwa.gr/Record/lib2_1%2F5723</link>
      <guid>https://eploes.lib2.uniwa.gr/Record/lib2_1%2F5723</guid>
      <author>Macgregor Robert S.</author>
      <dc:format>Book</dc:format>
      <dc:date>1996</dc:date>
      <dc:creator>Macgregor Robert S.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Crash learning from the world's worst computer disasters</title>
      <pubDate>Thu, 01 Jan 1998 05:00:34 +0200</pubDate>
      <link>https://eploes.lib2.uniwa.gr/Record/lib2_1%2F5972</link>
      <guid>https://eploes.lib2.uniwa.gr/Record/lib2_1%2F5972</guid>
      <author>Collins Tony</author>
      <dc:format>Book</dc:format>
      <dc:date>1998</dc:date>
      <dc:creator>Collins Tony</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Network securiry essentials Applications and standards</title>
      <pubDate>Wed, 01 Jan 2003 05:00:34 +0200</pubDate>
      <link>https://eploes.lib2.uniwa.gr/Record/lib2_1%2F6468</link>
      <guid>https://eploes.lib2.uniwa.gr/Record/lib2_1%2F6468</guid>
      <author>Stallings William</author>
      <dc:format>Book</dc:format>
      <dc:date>2003</dc:date>
      <dc:creator>Stallings William</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Network security principles and practices</title>
      <pubDate>Wed, 01 Jan 2003 05:00:34 +0200</pubDate>
      <link>https://eploes.lib2.uniwa.gr/Record/lib2_1%2F8600</link>
      <guid>https://eploes.lib2.uniwa.gr/Record/lib2_1%2F8600</guid>
      <author>Malik Saadat</author>
      <dc:format>Book</dc:format>
      <dc:date>2003</dc:date>
      <dc:creator>Malik Saadat</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Internet security cryptographic principles, algorithms and protocols</title>
      <pubDate>Wed, 01 Jan 2003 05:00:34 +0200</pubDate>
      <link>https://eploes.lib2.uniwa.gr/Record/lib2_1%2F8633</link>
      <guid>https://eploes.lib2.uniwa.gr/Record/lib2_1%2F8633</guid>
      <author>Rhee Man Young</author>
      <dc:format>Book</dc:format>
      <dc:date>2003</dc:date>
      <dc:creator>Rhee Man Young</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Firewalls and internet security repelling the wily hacker</title>
      <pubDate>Wed, 01 Jan 2003 05:00:34 +0200</pubDate>
      <link>https://eploes.lib2.uniwa.gr/Record/lib2_1%2F9823</link>
      <guid>https://eploes.lib2.uniwa.gr/Record/lib2_1%2F9823</guid>
      <author>Cheswick William R.</author>
      <dc:format>Book</dc:format>
      <dc:date>2003</dc:date>
      <dc:creator>Cheswick William R.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Data protection in health information systems : where do we stand? : proceedings of the IFIP-IMIA WG 4 Working Conference on Data Protection in Health Information Systems, Kiel F.R.G., September 7-10, 1982 /</title>
      <pubDate>Sat, 01 Jan 1983 05:00:34 +0200</pubDate>
      <link>https://eploes.lib2.uniwa.gr/Record/lib3_1525</link>
      <guid>https://eploes.lib2.uniwa.gr/Record/lib3_1525</guid>
      <dc:format>Conference Proceeding</dc:format>
      <dc:format>Book</dc:format>
      <dc:date>1983</dc:date>
      <slash:comments>0</slash:comments>
    </item>
  </channel>
</rss>
