<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:opensearch="http://a9.com/-/spec/opensearch/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/">
  <channel>
    <title>Αποτελέσματα για "Computer security"</title>
    <description>Εμφανίζονται 1-50 από 231</description>
    <generator>Zend_Feed_Writer 2 (http://framework.zend.com)</generator>
    <link>http://195.251.227.5/Search/Results?lookfor=%22Computer+security%22&amp;type=Subject&amp;sort=last_indexed+desc&amp;limit=50</link>
    <opensearch:totalResults>231</opensearch:totalResults>
    <opensearch:startIndex>0</opensearch:startIndex>
    <opensearch:itemsPerPage>50</opensearch:itemsPerPage>
    <opensearch:Query role="request" searchTerms="&quot;Computer security&quot;" startIndex="0"/>
    <atom:link rel="first" type="application/rss+xml" href="http://195.251.227.5/Search/Results?lookfor=%22Computer+security%22&amp;type=Subject&amp;sort=last_indexed+desc&amp;limit=50&amp;view=rss"/>
    <atom:link rel="next" type="application/rss+xml" href="http://195.251.227.5/Search/Results?lookfor=%22Computer+security%22&amp;type=Subject&amp;sort=last_indexed+desc&amp;limit=50&amp;view=rss&amp;page=2"/>
    <atom:link rel="last" type="application/rss+xml" href="http://195.251.227.5/Search/Results?lookfor=%22Computer+security%22&amp;type=Subject&amp;sort=last_indexed+desc&amp;limit=50&amp;view=rss&amp;page=5"/>
    <atom:link rel="self" type="application/rss+xml" href="http://195.251.227.5/Search/Results?lookfor=%22Computer+security%22&amp;type=Subject&amp;sort=last_indexed+desc&amp;limit=50&amp;view=rss"/>
    <item>
      <title>Maximum Linux security: a hacker's guide to protecting your Linux server and workstation</title>
      <pubDate>Sat, 01 Jan 2000 09:53:14 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F15223</link>
      <guid>http://195.251.227.5/Record/1%2F15223</guid>
      <dc:format>Book</dc:format>
      <dc:date>2000</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Windows NT security /</title>
      <pubDate>Fri, 01 Jan 1999 09:53:14 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F15552</link>
      <guid>http://195.251.227.5/Record/1%2F15552</guid>
      <author>McInerney, Michael.</author>
      <dc:format>Book</dc:format>
      <dc:date>1999</dc:date>
      <dc:creator>McInerney, Michael.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Maximum security : A hacker's guide to protecting your internet site and network /</title>
      <pubDate>Thu, 01 Jan 1998 09:53:14 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F15559</link>
      <guid>http://195.251.227.5/Record/1%2F15559</guid>
      <dc:format>Book</dc:format>
      <dc:date>1998</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Maximum security : A hacker's guide to protecting your internet site and network /</title>
      <pubDate>Mon, 01 Jan 2001 09:53:14 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F17936</link>
      <guid>http://195.251.227.5/Record/1%2F17936</guid>
      <dc:format>Book</dc:format>
      <dc:date>2001</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Maximum Linux security: a hacker's guide to protecting your Linux server and workstation</title>
      <pubDate>Mon, 01 Jan 2001 09:53:14 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F17937</link>
      <guid>http://195.251.227.5/Record/1%2F17937</guid>
      <dc:format>Book</dc:format>
      <dc:date>2001</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Corba security: an introduction to safe computing with objects /</title>
      <pubDate>Sat, 01 Jan 2000 09:53:14 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F17940</link>
      <guid>http://195.251.227.5/Record/1%2F17940</guid>
      <author>Blakley, Bob.</author>
      <dc:format>Book</dc:format>
      <dc:date>2000</dc:date>
      <dc:creator>Blakley, Bob.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Hack attacks denied: a complete guide to network lockdown /</title>
      <pubDate>Mon, 01 Jan 2001 09:53:14 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F18041</link>
      <guid>http://195.251.227.5/Record/1%2F18041</guid>
      <author>Chirillo, John, 1970-</author>
      <dc:format>Book</dc:format>
      <dc:date>2001</dc:date>
      <dc:creator>Chirillo, John, 1970-</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Cryptography and network security : principles and practice /</title>
      <pubDate>Thu, 01 Jan 1998 09:53:14 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F18042</link>
      <guid>http://195.251.227.5/Record/1%2F18042</guid>
      <author>Stallings, William.</author>
      <dc:format>Book</dc:format>
      <dc:date>1998</dc:date>
      <dc:creator>Stallings, William.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Cryptography decrypted /</title>
      <pubDate>Sat, 01 Jan 2000 09:53:14 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F18058</link>
      <guid>http://195.251.227.5/Record/1%2F18058</guid>
      <author>Mel, H.X., 1948-</author>
      <dc:format>Book</dc:format>
      <dc:date>2000</dc:date>
      <dc:creator>Mel, H.X., 1948-</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Tangled web : tales of digital crime from the shadows of cyberspace /</title>
      <pubDate>Sat, 01 Jan 2000 09:53:14 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F18074</link>
      <guid>http://195.251.227.5/Record/1%2F18074</guid>
      <author>Power, Richard, 1953-</author>
      <dc:format>Book</dc:format>
      <dc:date>2000</dc:date>
      <dc:creator>Power, Richard, 1953-</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Computer security policies and SunScreen firewalls /</title>
      <pubDate>Thu, 01 Jan 1998 09:53:14 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F18075</link>
      <guid>http://195.251.227.5/Record/1%2F18075</guid>
      <author>Walker, Kathryn M.</author>
      <dc:format>Book</dc:format>
      <dc:date>1998</dc:date>
      <dc:creator>Walker, Kathryn M.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Network security /</title>
      <pubDate>Fri, 01 Jan 1993 09:53:14 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F18137</link>
      <guid>http://195.251.227.5/Record/1%2F18137</guid>
      <author>Devargas, Mario.</author>
      <dc:format>Book</dc:format>
      <dc:date>1993</dc:date>
      <dc:creator>Devargas, Mario.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Hacking exposed : network security secrets and solutions /</title>
      <pubDate>Fri, 01 Jan 1999 09:53:14 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F16820</link>
      <guid>http://195.251.227.5/Record/1%2F16820</guid>
      <author>McClure, Stuart.</author>
      <dc:format>Book</dc:format>
      <dc:date>1999</dc:date>
      <dc:creator>McClure, Stuart.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Defending your digital assets : against hackers, crackers, spies and thieves /</title>
      <pubDate>Sat, 01 Jan 2000 09:53:14 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F16824</link>
      <guid>http://195.251.227.5/Record/1%2F16824</guid>
      <author>Nichols, Randall K.</author>
      <dc:format>Book</dc:format>
      <dc:date>2000</dc:date>
      <dc:creator>Nichols, Randall K.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Applied cryptography : protocols, algorithms, and source code in C /</title>
      <pubDate>Mon, 01 Jan 1996 09:53:14 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F16871</link>
      <guid>http://195.251.227.5/Record/1%2F16871</guid>
      <author>Schneier, Bruce.</author>
      <dc:format>Book</dc:format>
      <dc:date>1996</dc:date>
      <dc:creator>Schneier, Bruce.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Check point firewall-1 :badministration quide /</title>
      <pubDate>Fri, 01 Jan 1999 09:53:14 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F16990</link>
      <guid>http://195.251.227.5/Record/1%2F16990</guid>
      <author>Concalves, Marcus.</author>
      <dc:format>Book</dc:format>
      <dc:date>1999</dc:date>
      <dc:creator>Concalves, Marcus.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Building linux and openBSD firewalls /</title>
      <pubDate>Fri, 01 Jan 1999 09:53:14 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F17275</link>
      <guid>http://195.251.227.5/Record/1%2F17275</guid>
      <author>Sonnenreich, Wes, 1974-</author>
      <dc:format>Book</dc:format>
      <dc:date>1999</dc:date>
      <dc:creator>Sonnenreich, Wes, 1974-</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Programming Windows security /</title>
      <pubDate>Sat, 01 Jan 2000 09:53:14 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F17276</link>
      <guid>http://195.251.227.5/Record/1%2F17276</guid>
      <author>Brown, Keith C.</author>
      <dc:format>Book</dc:format>
      <dc:date>2000</dc:date>
      <dc:creator>Brown, Keith C.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Hacker proof : the ultimate guide to network security /</title>
      <pubDate>Wed, 01 Jan 1997 09:53:14 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F15583</link>
      <guid>http://195.251.227.5/Record/1%2F15583</guid>
      <author>Klander, Lars M.</author>
      <dc:format>Book</dc:format>
      <dc:date>1997</dc:date>
      <dc:creator>Klander, Lars M.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Contemporary cryptology : the science of information integrity /</title>
      <pubDate>Wed, 01 Jan 1992 09:53:14 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F18300</link>
      <guid>http://195.251.227.5/Record/1%2F18300</guid>
      <dc:format>Book</dc:format>
      <dc:date>1992</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Cyberpunk : outlaws and hackers on the computer frontier /</title>
      <pubDate>Tue, 01 Jan 1991 09:53:14 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F123</link>
      <guid>http://195.251.227.5/Record/1%2F123</guid>
      <author>Hafner, Katie.</author>
      <dc:format>Book</dc:format>
      <dc:date>1991</dc:date>
      <dc:creator>Hafner, Katie.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Information security : proceedings of the IFIP TC11 Seventh International Conference on Information Security: Creating Confidence in Information Processing, IFIP/Sec '91, Brighton, UK, 15-17 May 1991 /</title>
      <pubDate>Tue, 01 Jan 1991 09:53:14 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F18440</link>
      <guid>http://195.251.227.5/Record/1%2F18440</guid>
      <dc:format>Book</dc:format>
      <dc:date>1991</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Commonsense computer security : your practical guide to information protection /</title>
      <pubDate>Fri, 01 Jan 1993 09:53:14 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F18472</link>
      <guid>http://195.251.227.5/Record/1%2F18472</guid>
      <author>Smith, Martin R.</author>
      <dc:format>Book</dc:format>
      <dc:date>1993</dc:date>
      <dc:creator>Smith, Martin R.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Incident response : investigating computer crime /</title>
      <pubDate>Mon, 01 Jan 2001 09:53:14 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F18774</link>
      <guid>http://195.251.227.5/Record/1%2F18774</guid>
      <author>Proside, Chris.</author>
      <dc:format>Book</dc:format>
      <dc:date>2001</dc:date>
      <dc:creator>Proside, Chris.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Cryptography and e-commerce : a wiley tech brief /</title>
      <pubDate>Mon, 01 Jan 2001 09:53:14 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F18827</link>
      <guid>http://195.251.227.5/Record/1%2F18827</guid>
      <author>Graff, Jon.</author>
      <dc:format>Book</dc:format>
      <dc:date>2001</dc:date>
      <dc:creator>Graff, Jon.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Surviving security : how to integrate people, process and technology /</title>
      <pubDate>Tue, 01 Jan 2002 09:53:14 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F18843</link>
      <guid>http://195.251.227.5/Record/1%2F18843</guid>
      <author>Andress, Mandy.</author>
      <dc:format>Book</dc:format>
      <dc:date>2002</dc:date>
      <dc:creator>Andress, Mandy.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Active defense : a comprehensive guide to network security /</title>
      <pubDate>Mon, 01 Jan 2001 09:53:14 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F18844</link>
      <guid>http://195.251.227.5/Record/1%2F18844</guid>
      <author>Brenton, Chris.</author>
      <dc:format>Book</dc:format>
      <dc:date>2001</dc:date>
      <dc:creator>Brenton, Chris.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Security technologies for the World Wide Web /</title>
      <pubDate>Sat, 01 Jan 2000 09:53:14 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F18981</link>
      <guid>http://195.251.227.5/Record/1%2F18981</guid>
      <author>Oppliger, Rolf.</author>
      <dc:format>Book</dc:format>
      <dc:date>2000</dc:date>
      <dc:creator>Oppliger, Rolf.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Χάκερ : επίθεση και άμυνα /</title>
      <pubDate>Mon, 01 Jan 2001 09:53:14 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F19059</link>
      <guid>http://195.251.227.5/Record/1%2F19059</guid>
      <author>Scambray, Joel.</author>
      <dc:format>Book</dc:format>
      <dc:date>2001</dc:date>
      <dc:creator>Scambray, Joel.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Mastering Web services security /</title>
      <pubDate>Wed, 01 Jan 2003 09:53:14 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F20420</link>
      <guid>http://195.251.227.5/Record/1%2F20420</guid>
      <author>Hartman, Bret.</author>
      <dc:format>Book</dc:format>
      <dc:date>2003</dc:date>
      <dc:creator>Hartman, Bret.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Writing secure code /</title>
      <pubDate>Wed, 01 Jan 2003 09:53:14 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F20765</link>
      <guid>http://195.251.227.5/Record/1%2F20765</guid>
      <author>Howard, Michael 1965-</author>
      <dc:format>Book</dc:format>
      <dc:date>2003</dc:date>
      <dc:creator>Howard, Michael 1965-</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Security for mobility /</title>
      <pubDate>Thu, 01 Jan 2004 09:53:14 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F20828</link>
      <guid>http://195.251.227.5/Record/1%2F20828</guid>
      <dc:format>Book</dc:format>
      <dc:date>2004</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Load balancing servers firewalls, and caches /</title>
      <pubDate>Tue, 01 Jan 2002 09:53:14 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F20858</link>
      <guid>http://195.251.227.5/Record/1%2F20858</guid>
      <author>Kopparapu, Chandra.</author>
      <dc:format>Book</dc:format>
      <dc:date>2002</dc:date>
      <dc:creator>Kopparapu, Chandra.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Les services en ligne et la protection des donnees et la vie privee. Volume 1</title>
      <pubDate>Thu, 01 Jan 1998 09:53:14 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F22514</link>
      <guid>http://195.251.227.5/Record/1%2F22514</guid>
      <dc:format>Book</dc:format>
      <dc:date>1998</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>IDA projects : a guide to data protection compliance ; final report ; annex to the annual report 1998 (XV d/5047/98) of the working party established by Article 29 of Directive 95/46/EC</title>
      <pubDate>Fri, 01 Jan 1999 09:53:14 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F22565</link>
      <guid>http://195.251.227.5/Record/1%2F22565</guid>
      <dc:format>Book</dc:format>
      <dc:date>1999</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Information security policies, procedures, and standards : guidelines for effective information security management /</title>
      <pubDate>Tue, 01 Jan 2002 09:53:14 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F19877</link>
      <guid>http://195.251.227.5/Record/1%2F19877</guid>
      <author>Peltier, Thomas R.</author>
      <dc:format>Book</dc:format>
      <dc:date>2002</dc:date>
      <dc:creator>Peltier, Thomas R.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Secure computers and networks : analysis, design, and implementation /</title>
      <pubDate>Sat, 01 Jan 2000 09:53:14 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F19879</link>
      <guid>http://195.251.227.5/Record/1%2F19879</guid>
      <author>Fisch, Eric A.</author>
      <dc:format>Book</dc:format>
      <dc:date>2000</dc:date>
      <dc:creator>Fisch, Eric A.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Hack attacks revealed : a complete reference for UNIX, Windows, and Linux with custom security toolkit /</title>
      <pubDate>Tue, 01 Jan 2002 09:53:14 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F19880</link>
      <guid>http://195.251.227.5/Record/1%2F19880</guid>
      <author>Chirillo, John, 1970-</author>
      <dc:format>Book</dc:format>
      <dc:date>2002</dc:date>
      <dc:creator>Chirillo, John, 1970-</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Information security architecture : an integrated approach to security in the organization /</title>
      <pubDate>Mon, 01 Jan 2001 09:53:14 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F20162</link>
      <guid>http://195.251.227.5/Record/1%2F20162</guid>
      <author>Tudor, Jan Killmeyer.</author>
      <dc:format>Book</dc:format>
      <dc:date>2001</dc:date>
      <dc:creator>Tudor, Jan Killmeyer.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Advances in cryptology-CRYPTO '99 : 19th Annual International Cryptology Conference, Santa Barbara, California, USA August 15-19, 1999 proceedings /</title>
      <pubDate>Fri, 01 Jan 1999 09:53:14 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F33904</link>
      <guid>http://195.251.227.5/Record/1%2F33904</guid>
      <dc:format>Book</dc:format>
      <dc:date>1999</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>State of the art in applied cryptography : course on computer security and industrial cryptography, Leuven, Belgium, June 3-6, 1997 : revised lectures /</title>
      <pubDate>Thu, 01 Jan 1998 09:53:14 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F33907</link>
      <guid>http://195.251.227.5/Record/1%2F33907</guid>
      <dc:format>Book</dc:format>
      <dc:date>1998</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Lectures on data security : modern cryptology in theory and practice /</title>
      <pubDate>Fri, 01 Jan 1999 09:53:14 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F33933</link>
      <guid>http://195.251.227.5/Record/1%2F33933</guid>
      <dc:format>Book</dc:format>
      <dc:date>1999</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Information hiding : Second International Workshop, IH'98 : Portland, Oregon, USA, April 14-17, 1998 : proceedings /</title>
      <pubDate>Thu, 01 Jan 1998 09:53:14 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F33940</link>
      <guid>http://195.251.227.5/Record/1%2F33940</guid>
      <dc:format>Book</dc:format>
      <dc:date>1998</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Information hiding : first international workshop, Cambridge, U.K., May 30-June 1, 1996 : proceedings /</title>
      <pubDate>Mon, 01 Jan 1996 09:53:14 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F33943</link>
      <guid>http://195.251.227.5/Record/1%2F33943</guid>
      <dc:format>Book</dc:format>
      <dc:date>1996</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Information security and privacy : 4th Australasian Conference, ACISP '99, Wollongong, NSW, Australia, April 7-9, 1999 : proceedings /</title>
      <pubDate>Fri, 01 Jan 1999 09:53:14 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F33947</link>
      <guid>http://195.251.227.5/Record/1%2F33947</guid>
      <dc:format>Book</dc:format>
      <dc:date>1999</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Information security and privacy : Third Australasian conference, ACISP '98, Brisbane, Australia, July 13-15, 1998 : proceedings /</title>
      <pubDate>Thu, 01 Jan 1998 09:53:14 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F33948</link>
      <guid>http://195.251.227.5/Record/1%2F33948</guid>
      <dc:format>Book</dc:format>
      <dc:date>1998</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Public key cryptography : 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001, Cheju Island, Korea, February 13-15, 2001 : proceedings /</title>
      <pubDate>Mon, 01 Jan 2001 09:53:14 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F33949</link>
      <guid>http://195.251.227.5/Record/1%2F33949</guid>
      <dc:format>Book</dc:format>
      <dc:date>2001</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Public key cryptography : second International Workshop on Practice and Theory in Public Key Cryptography, PKC'99, Kamakura, Japan, March 1-3, 1999 : proceedings /</title>
      <pubDate>Fri, 01 Jan 1999 09:53:14 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F33950</link>
      <guid>http://195.251.227.5/Record/1%2F33950</guid>
      <dc:format>Book</dc:format>
      <dc:date>1999</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Secure Internet programming : security issues for mobile and distributed objects /</title>
      <pubDate>Fri, 01 Jan 1999 09:53:14 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F33959</link>
      <guid>http://195.251.227.5/Record/1%2F33959</guid>
      <dc:format>Book</dc:format>
      <dc:date>1999</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Google hacking for penetration testers /</title>
      <pubDate>Tue, 01 Jan 2008 09:53:14 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F35427</link>
      <guid>http://195.251.227.5/Record/1%2F35427</guid>
      <author>Long, Johnny.</author>
      <dc:format>Book</dc:format>
      <dc:date>2008</dc:date>
      <dc:creator>Long, Johnny.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
  </channel>
</rss>
