<?xml version="1.0" encoding="utf-8" ?> <rss version="2.0" xmlns:opensearch="http://a9.com/-/spec/opensearch/1.1/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"> <channel> <title> <![CDATA[ Search for 'au:&quot;Godbole, Nina&quot;']]> </title> <!-- prettier-ignore-start --> <link> /cgi-bin/koha/opac-search.pl?q=ccl=au%3A%22Godbole%2C%20%20Nina%22&#38;sort_by=relevance&#38;format=rss </link> <!-- prettier-ignore-end --> <atom:link rel="self" type="application/rss+xml" href="/cgi-bin/koha/opac-search.pl?q=ccl=au%3A%22Godbole%2C%20%20Nina%22&#38;sort_by=relevance&#38;format=rss" /> <description> <![CDATA[ Search results for 'au:&quot;Godbole, Nina&quot;' at ]]> </description> <opensearch:totalResults>10</opensearch:totalResults> <opensearch:startIndex>0</opensearch:startIndex> <opensearch:itemsPerPage>50</opensearch:itemsPerPage> <atom:link rel="search" type="application/opensearchdescription+xml" href="/cgi-bin/koha/opac-search.pl?q=ccl=au%3A%22Godbole%2C%20%20Nina%22&#38;sort_by=relevance&#38;format=opensearchdescription" /> <opensearch:Query role="request" searchTerms="q%3Dccl%3Dau%253A%2522Godbole%252C%2520%2520Nina%2522" startPage="" /> <item> <title> Cyber security : understanding cyber crimes, computer forensics and legal perspectives / </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=31663</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Godbole, Nina.<br /> </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=31663">Place hold on <em>Cyber security :</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=31663</guid> </item> <item> <title> Cyber security : understanding cyber crimes, computer forensics and legal perspectives / </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=31664</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Godbole, Nina.<br /> </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=31664">Place hold on <em>Cyber security :</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=31664</guid> </item> <item> <title> Cyber security : understanding cyber crimes, computer forensics and legal perspectives / </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=32166</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Godbole, Nina.<br /> </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=32166">Place hold on <em>Cyber security :</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=32166</guid> </item> <item> <title> Cyber security : understanding cyber crimes, computer forensics and legal perspectives / </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=32167</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Godbole, Nina.<br /> </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=32167">Place hold on <em>Cyber security :</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=32167</guid> </item> <item> <title> Cyber security : understanding cyber crimes, computer forensics and legal perspectives / </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=32504</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Godbole, Nina.<br /> </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=32504">Place hold on <em>Cyber security :</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=32504</guid> </item> <item> <title> Cyber security : understanding cyber crimes, computer forensics and legal perspectives / </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=32505</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Godbole, Nina.<br /> </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=32505">Place hold on <em>Cyber security :</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=32505</guid> </item> <item> <title> Cyber security : understanding cyber crimes, computer forensics and legal perspectives / </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=33684</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Godbole, Nina.<br /> </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=33684">Place hold on <em>Cyber security :</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=33684</guid> </item> <item> <title> Cyber security : understanding cyber crimes, computer forensics and legal perspectives / </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=33685</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Godbole, Nina.<br /> </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=33685">Place hold on <em>Cyber security :</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=33685</guid> </item> <item> <title> Information systems security : security management, metrics, frameworks and best practices / </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=33765</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Godbole, Nina.<br /> </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=33765">Place hold on <em>Information systems security :</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=33765</guid> </item> <item> <title> Information systems security : security management, metrics, frameworks and best practices / </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=33766</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Godbole, Nina.<br /> </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=33766">Place hold on <em>Information systems security :</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=33766</guid> </item> </channel> </rss>
