<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:opensearch="http://a9.com/-/spec/opensearch/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/">
  <channel>
    <title>Αποτελέσματα για "Data Protection."</title>
    <description>Εμφανίζονται 1-50 από 69</description>
    <generator>Zend_Feed_Writer 2 (http://framework.zend.com)</generator>
    <link>http://195.251.227.5/Search/Results?lookfor=%22Data+Protection.%22&amp;type=Subject&amp;sort=last_indexed+desc&amp;limit=50</link>
    <opensearch:totalResults>69</opensearch:totalResults>
    <opensearch:startIndex>0</opensearch:startIndex>
    <opensearch:itemsPerPage>50</opensearch:itemsPerPage>
    <opensearch:Query role="request" searchTerms="&quot;Data Protection.&quot;" startIndex="0"/>
    <atom:link rel="first" type="application/rss+xml" href="http://195.251.227.5/Search/Results?lookfor=%22Data+Protection.%22&amp;type=Subject&amp;sort=last_indexed+desc&amp;limit=50&amp;view=rss"/>
    <atom:link rel="next" type="application/rss+xml" href="http://195.251.227.5/Search/Results?lookfor=%22Data+Protection.%22&amp;type=Subject&amp;sort=last_indexed+desc&amp;limit=50&amp;view=rss&amp;page=2"/>
    <atom:link rel="last" type="application/rss+xml" href="http://195.251.227.5/Search/Results?lookfor=%22Data+Protection.%22&amp;type=Subject&amp;sort=last_indexed+desc&amp;limit=50&amp;view=rss&amp;page=2"/>
    <atom:link rel="self" type="application/rss+xml" href="http://195.251.227.5/Search/Results?lookfor=%22Data+Protection.%22&amp;type=Subject&amp;sort=last_indexed+desc&amp;limit=50&amp;view=rss"/>
    <item>
      <title>Hacking exposed : network security secrets and solutions /</title>
      <pubDate>Fri, 01 Jan 1999 12:16:59 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F16820</link>
      <guid>http://195.251.227.5/Record/1%2F16820</guid>
      <author>McClure, Stuart.</author>
      <dc:format>Book</dc:format>
      <dc:date>1999</dc:date>
      <dc:creator>McClure, Stuart.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Cryptography and data security /</title>
      <pubDate>Fri, 01 Jan 1982 12:16:59 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F18348</link>
      <guid>http://195.251.227.5/Record/1%2F18348</guid>
      <author>Denning, Dorothy Elizabeth, 1945-</author>
      <dc:format>Book</dc:format>
      <dc:date>1982</dc:date>
      <dc:creator>Denning, Dorothy Elizabeth, 1945-</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Information security : proceedings of the IFIP TC11 Seventh International Conference on Information Security: Creating Confidence in Information Processing, IFIP/Sec '91, Brighton, UK, 15-17 May 1991 /</title>
      <pubDate>Tue, 01 Jan 1991 12:16:59 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F18440</link>
      <guid>http://195.251.227.5/Record/1%2F18440</guid>
      <dc:format>Book</dc:format>
      <dc:date>1991</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Digital watermarking /</title>
      <pubDate>Tue, 01 Jan 2002 12:16:59 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F19230</link>
      <guid>http://195.251.227.5/Record/1%2F19230</guid>
      <author>Cox, Ingemar J.</author>
      <dc:format>Book</dc:format>
      <dc:date>2002</dc:date>
      <dc:creator>Cox, Ingemar J.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>On-line services and data protection and the protection of privacy /</title>
      <pubDate>Thu, 01 Jan 1998 12:16:59 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F22264</link>
      <guid>http://195.251.227.5/Record/1%2F22264</guid>
      <dc:format>Book</dc:format>
      <dc:date>1998</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Handbook on cost-effective compliance with Directive 95/46/EC : annex to the annual report 1998 (XV D/5047/98) of the working party established by Article 29 of Directive 95/46/EC</title>
      <pubDate>Thu, 01 Jan 1998 12:16:59 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F22354</link>
      <guid>http://195.251.227.5/Record/1%2F22354</guid>
      <dc:format>Book</dc:format>
      <dc:date>1998</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Existing case-law on compliance with data protection laws and principles in the member states of the European Union /</title>
      <pubDate>Thu, 01 Jan 1998 12:16:59 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F22431</link>
      <guid>http://195.251.227.5/Record/1%2F22431</guid>
      <dc:format>Book</dc:format>
      <dc:date>1998</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Application of a methodology designed to assess the adequacy of the level of protection of individuals with regard to processing personal data : test of the method on several categories of transfer : final report /</title>
      <pubDate>Thu, 01 Jan 1998 12:16:59 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F22460</link>
      <guid>http://195.251.227.5/Record/1%2F22460</guid>
      <dc:format>Book</dc:format>
      <dc:date>1998</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Preparation of a methodology for evaluating the adequacy of the level of protection of individuals with regard to the processing of personal data : annex to the annual report (XV D/5047/98) of the working party established by Article 29 of Directive 95/46/EC</title>
      <pubDate>Thu, 01 Jan 1998 12:16:59 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F22461</link>
      <guid>http://195.251.227.5/Record/1%2F22461</guid>
      <dc:format>Book</dc:format>
      <dc:date>1998</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>The feasibility of a seamless system of data protection rules for the European Union : final report /</title>
      <pubDate>Thu, 01 Jan 1998 12:16:59 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F22512</link>
      <guid>http://195.251.227.5/Record/1%2F22512</guid>
      <author>Korff, Douwe.</author>
      <dc:format>Book</dc:format>
      <dc:date>1998</dc:date>
      <dc:creator>Korff, Douwe.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Les services en ligne et la protection des donnees et la vie privee. Volume 1</title>
      <pubDate>Thu, 01 Jan 1998 12:16:59 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F22514</link>
      <guid>http://195.251.227.5/Record/1%2F22514</guid>
      <dc:format>Book</dc:format>
      <dc:date>1998</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>IDA projects : a guide to data protection compliance ; final report ; annex to the annual report 1998 (XV d/5047/98) of the working party established by Article 29 of Directive 95/46/EC</title>
      <pubDate>Fri, 01 Jan 1999 12:16:59 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F22565</link>
      <guid>http://195.251.227.5/Record/1%2F22565</guid>
      <dc:format>Book</dc:format>
      <dc:date>1999</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Information security policies, procedures, and standards : guidelines for effective information security management /</title>
      <pubDate>Tue, 01 Jan 2002 12:16:59 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F19877</link>
      <guid>http://195.251.227.5/Record/1%2F19877</guid>
      <author>Peltier, Thomas R.</author>
      <dc:format>Book</dc:format>
      <dc:date>2002</dc:date>
      <dc:creator>Peltier, Thomas R.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Information hiding : Second International Workshop, IH'98 : Portland, Oregon, USA, April 14-17, 1998 : proceedings /</title>
      <pubDate>Thu, 01 Jan 1998 12:16:59 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F33940</link>
      <guid>http://195.251.227.5/Record/1%2F33940</guid>
      <dc:format>Book</dc:format>
      <dc:date>1998</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Information hiding : first international workshop, Cambridge, U.K., May 30-June 1, 1996 : proceedings /</title>
      <pubDate>Mon, 01 Jan 1996 12:16:59 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F33943</link>
      <guid>http://195.251.227.5/Record/1%2F33943</guid>
      <dc:format>Book</dc:format>
      <dc:date>1996</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Information security and privacy : 4th Australasian Conference, ACISP '99, Wollongong, NSW, Australia, April 7-9, 1999 : proceedings /</title>
      <pubDate>Fri, 01 Jan 1999 12:16:59 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F33947</link>
      <guid>http://195.251.227.5/Record/1%2F33947</guid>
      <dc:format>Book</dc:format>
      <dc:date>1999</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Information security and privacy : Third Australasian conference, ACISP '98, Brisbane, Australia, July 13-15, 1998 : proceedings /</title>
      <pubDate>Thu, 01 Jan 1998 12:16:59 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F33948</link>
      <guid>http://195.251.227.5/Record/1%2F33948</guid>
      <dc:format>Book</dc:format>
      <dc:date>1998</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Information hiding : steganography and watermarking : attacks and countermeasures /</title>
      <pubDate>Mon, 01 Jan 2001 12:16:59 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F35429</link>
      <guid>http://195.251.227.5/Record/1%2F35429</guid>
      <author>Johnson, Neil F.</author>
      <dc:format>Book</dc:format>
      <dc:date>2001</dc:date>
      <dc:creator>Johnson, Neil F.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Συστήματα διαχείρισης ασφάλειας πληροφοριών ISO/IEC 27001:2005 /</title>
      <pubDate>Tue, 01 Jan 2008 12:16:59 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F35851</link>
      <guid>http://195.251.227.5/Record/1%2F35851</guid>
      <author>Μανωλέμης, Παύλος Ι.</author>
      <dc:format>Book</dc:format>
      <dc:date>2008</dc:date>
      <dc:creator>Μανωλέμης, Παύλος Ι.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Assessing and managing security risk in IT systems a structured methodology /</title>
      <pubDate>Sat, 01 Jan 2005 12:16:59 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F35954</link>
      <guid>http://195.251.227.5/Record/1%2F35954</guid>
      <author>McCumber, John, 1956-</author>
      <dc:format>Electronic</dc:format>
      <dc:date>2005</dc:date>
      <dc:creator>McCumber, John, 1956-</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Data protection for library and information services</title>
      <pubDate>Mon, 01 Jan 2001 12:16:59 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F36005</link>
      <guid>http://195.251.227.5/Record/1%2F36005</guid>
      <author>Ticher, Paul.</author>
      <dc:format>Electronic</dc:format>
      <dc:date>2001</dc:date>
      <dc:creator>Ticher, Paul.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Information security policies and procedures : a practitioner's reference /</title>
      <pubDate>Thu, 01 Jan 2004 12:16:59 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F36112</link>
      <guid>http://195.251.227.5/Record/1%2F36112</guid>
      <author>Peltier, Thomas R.</author>
      <dc:format>Book</dc:format>
      <dc:date>2004</dc:date>
      <dc:creator>Peltier, Thomas R.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Annual report : 2006 /</title>
      <pubDate>Mon, 01 Jan 2007 12:16:59 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F32681</link>
      <guid>http://195.251.227.5/Record/1%2F32681</guid>
      <dc:format>Book</dc:format>
      <dc:date>2007</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Annual report : 2007 /</title>
      <pubDate>Tue, 01 Jan 2008 12:16:59 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F34876</link>
      <guid>http://195.251.227.5/Record/1%2F34876</guid>
      <dc:format>Book</dc:format>
      <dc:date>2008</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>The shellcoder's handbook : discovering and exploiting security holes /</title>
      <pubDate>Mon, 01 Jan 2007 12:16:59 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F35339</link>
      <guid>http://195.251.227.5/Record/1%2F35339</guid>
      <dc:format>Book</dc:format>
      <dc:date>2007</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Sixth annual report on the situation regarding the protection of individuals with regard to the processing of personal data and privacy in the European Union and in third countries : covering the year 2001 ; adopted on 16th December 2003</title>
      <pubDate>Thu, 01 Jan 2004 12:16:59 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F23095</link>
      <guid>http://195.251.227.5/Record/1%2F23095</guid>
      <dc:format>Book</dc:format>
      <dc:date>2004</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Fifth annual report on the situation regarding the protection of individuals with regard to the processing of personal data and privacy in the European Union and in third countries : covering the year 2000 ; adopted on 6th March 2002</title>
      <pubDate>Tue, 01 Jan 2002 12:16:59 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F23102</link>
      <guid>http://195.251.227.5/Record/1%2F23102</guid>
      <dc:format>Book</dc:format>
      <dc:date>2002</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Malicious cryptography : exposing cryptovirology /</title>
      <pubDate>Thu, 01 Jan 2004 12:16:59 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F24299</link>
      <guid>http://195.251.227.5/Record/1%2F24299</guid>
      <author>Young, Adam, 1972-</author>
      <dc:format>Book</dc:format>
      <dc:date>2004</dc:date>
      <dc:creator>Young, Adam, 1972-</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Privacy preserving data mining /</title>
      <pubDate>Sat, 01 Jan 2005 12:16:59 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F30119</link>
      <guid>http://195.251.227.5/Record/1%2F30119</guid>
      <author>Vaidya, Jaideep.</author>
      <dc:format>Book</dc:format>
      <dc:date>2005</dc:date>
      <dc:creator>Vaidya, Jaideep.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>A practical quide to security assessments /</title>
      <pubDate>Sat, 01 Jan 2005 12:16:59 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F28885</link>
      <guid>http://195.251.227.5/Record/1%2F28885</guid>
      <author>Kairab, Sudhanshu.</author>
      <dc:format>Book</dc:format>
      <dc:date>2005</dc:date>
      <dc:creator>Kairab, Sudhanshu.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Writing information security policies /</title>
      <pubDate>Tue, 01 Jan 2002 12:16:59 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F29229</link>
      <guid>http://195.251.227.5/Record/1%2F29229</guid>
      <author>Barman, Scott.</author>
      <dc:format>Book</dc:format>
      <dc:date>2002</dc:date>
      <dc:creator>Barman, Scott.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Information security management metrics : a definitive guide to effective security monitoring and measurement /</title>
      <pubDate>Thu, 01 Jan 2009 12:16:59 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F39796</link>
      <guid>http://195.251.227.5/Record/1%2F39796</guid>
      <author>Brotby, W. Krag.</author>
      <dc:format>Book</dc:format>
      <dc:date>2009</dc:date>
      <dc:creator>Brotby, W. Krag.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Information security policies and procedures : a practitioner's reference /</title>
      <pubDate>Thu, 01 Jan 2004 12:16:59 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F39797</link>
      <guid>http://195.251.227.5/Record/1%2F39797</guid>
      <author>Peltier, Thomas R.</author>
      <dc:format>Book</dc:format>
      <dc:date>2004</dc:date>
      <dc:creator>Peltier, Thomas R.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Information security policies and procedures : a practitioner's reference /</title>
      <pubDate>Thu, 01 Jan 2004 12:16:59 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F39798</link>
      <guid>http://195.251.227.5/Record/1%2F39798</guid>
      <author>Peltier, Thomas R.</author>
      <dc:format>Book</dc:format>
      <dc:date>2004</dc:date>
      <dc:creator>Peltier, Thomas R.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Αυτονομία και πολιτική ανυπακοή στον κυβερνοχώρο : η κοινωνία της πληροφορίας στην εποχή της αβεβαιότητας :πληροφοριακός καπιταλισμός, τεχνοκρατικός ελιτισμός, μετανεωτερικός λουδισμός, κοινωνικά κινήματα και επιστροφή της πολιτικής /</title>
      <pubDate>Thu, 01 Jan 2004 12:16:59 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F40167</link>
      <guid>http://195.251.227.5/Record/1%2F40167</guid>
      <author>Γκρίτζαλης, Δημήτρης Α.</author>
      <dc:format>Book</dc:format>
      <dc:date>2004</dc:date>
      <dc:creator>Γκρίτζαλης, Δημήτρης Α.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Digital watermarking</title>
      <pubDate>Mon, 01 Jan 2001 12:16:59 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F37715</link>
      <guid>http://195.251.227.5/Record/1%2F37715</guid>
      <author>Cox, I. J.</author>
      <dc:format>Electronic</dc:format>
      <dc:date>2001</dc:date>
      <dc:creator>Cox, I. J.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Intrusion prevention and active response deploying network and host IPS /</title>
      <pubDate>Sat, 01 Jan 2005 12:16:59 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F37991</link>
      <guid>http://195.251.227.5/Record/1%2F37991</guid>
      <dc:format>Electronic</dc:format>
      <dc:date>2005</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Advances in enterprise information technology security</title>
      <pubDate>Mon, 01 Jan 2007 12:16:59 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F38573</link>
      <guid>http://195.251.227.5/Record/1%2F38573</guid>
      <dc:format>Electronic</dc:format>
      <dc:date>2007</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>General report 2007.</title>
      <pubDate>Mon, 01 Jan 2007 12:16:59 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F38762</link>
      <guid>http://195.251.227.5/Record/1%2F38762</guid>
      <dc:format>Book</dc:format>
      <dc:date>2007</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>The CISO handbook a practical guide to securing your company /</title>
      <pubDate>Sun, 01 Jan 2006 12:16:59 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F36470</link>
      <guid>http://195.251.227.5/Record/1%2F36470</guid>
      <author>Gentile, Michael.</author>
      <dc:format>Electronic</dc:format>
      <dc:date>2006</dc:date>
      <dc:creator>Gentile, Michael.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Digital watermarking and steganography</title>
      <pubDate>Tue, 01 Jan 2008 12:16:59 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F44778</link>
      <guid>http://195.251.227.5/Record/1%2F44778</guid>
      <dc:format>Electronic</dc:format>
      <dc:date>2008</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Implementing database security and auditing a guide for DBAs, information security administrators and auditors /</title>
      <pubDate>Sat, 01 Jan 2005 12:16:59 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F44923</link>
      <guid>http://195.251.227.5/Record/1%2F44923</guid>
      <author>Ben-Natan, Ron.</author>
      <dc:format>Electronic</dc:format>
      <dc:date>2005</dc:date>
      <dc:creator>Ben-Natan, Ron.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Infosecurity 2008 threat analysis</title>
      <pubDate>Tue, 01 Jan 2008 12:16:59 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F44933</link>
      <guid>http://195.251.227.5/Record/1%2F44933</guid>
      <dc:format>Electronic</dc:format>
      <dc:date>2008</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Insider threat protecting the enterprise from sabotage, spying, and theft /</title>
      <pubDate>Sun, 01 Jan 2006 12:16:59 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F44935</link>
      <guid>http://195.251.227.5/Record/1%2F44935</guid>
      <author>Cole, Eric.</author>
      <dc:format>Electronic</dc:format>
      <dc:date>2006</dc:date>
      <dc:creator>Cole, Eric.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Managing catastrophic loss of sensitive data a guide for IT and security professionals /</title>
      <pubDate>Tue, 01 Jan 2008 12:16:59 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F45010</link>
      <guid>http://195.251.227.5/Record/1%2F45010</guid>
      <author>Photopoulos, Constantine.</author>
      <dc:format>Electronic</dc:format>
      <dc:date>2008</dc:date>
      <dc:creator>Photopoulos, Constantine.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Netcat power tools</title>
      <pubDate>Tue, 01 Jan 2008 12:16:59 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F45082</link>
      <guid>http://195.251.227.5/Record/1%2F45082</guid>
      <dc:format>Electronic</dc:format>
      <dc:date>2008</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Cyber security standards, practices and industrial applications : systems and methodologies /</title>
      <pubDate>Sun, 01 Jan 2012 12:16:59 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F43999</link>
      <guid>http://195.251.227.5/Record/1%2F43999</guid>
      <dc:format>Book</dc:format>
      <dc:date>2012</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>The security risk assessment handbook : a complete guide for performing security risk assessments /</title>
      <pubDate>Fri, 01 Jan 2010 12:16:59 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F44097</link>
      <guid>http://195.251.227.5/Record/1%2F44097</guid>
      <author>Landoll, Douglas J.</author>
      <dc:format>Book</dc:format>
      <dc:date>2010</dc:date>
      <dc:creator>Landoll, Douglas J.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Εφαρμογή του προτύπου ISO/IEC 27001:2005 στη διαχείριση κρίσιμων πληροφοριών της υπηρεσίας πολιτικής αεροπορίας /</title>
      <pubDate>Sat, 01 Jan 2011 12:16:59 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F41926</link>
      <guid>http://195.251.227.5/Record/1%2F41926</guid>
      <author>Κάρδαρη, Βασιλική Μ.</author>
      <dc:format>Book</dc:format>
      <dc:date>2011</dc:date>
      <dc:creator>Κάρδαρη, Βασιλική Μ.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Hacking exposed 6 : network security secrets &amp; solutions /</title>
      <pubDate>Thu, 01 Jan 2009 12:16:59 +0200</pubDate>
      <link>http://195.251.227.5/Record/1%2F41761</link>
      <guid>http://195.251.227.5/Record/1%2F41761</guid>
      <author>McClure, Stuart.</author>
      <dc:format>Book</dc:format>
      <dc:date>2009</dc:date>
      <dc:creator>McClure, Stuart.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
  </channel>
</rss>
