<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:opensearch="http://a9.com/-/spec/opensearch/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/">
  <channel>
    <title>Αποτελέσματα για "Electronic data processing departments Security measures."</title>
    <description>Εμφανίζονται 1-8 από 8</description>
    <generator>Zend_Feed_Writer 2 (http://framework.zend.com)</generator>
    <link>http://okeanos.lib.unipi.gr/Search/Results?lookfor=%22Electronic+data+processing+departments+Security+measures.%22&amp;type=Subject&amp;sort=last_indexed+desc&amp;limit=50</link>
    <opensearch:totalResults>8</opensearch:totalResults>
    <opensearch:startIndex>0</opensearch:startIndex>
    <opensearch:itemsPerPage>50</opensearch:itemsPerPage>
    <opensearch:Query role="request" searchTerms="&quot;Electronic data processing departments Security measures.&quot;" startIndex="0"/>
    <atom:link rel="first" type="application/rss+xml" href="http://okeanos.lib.unipi.gr/Search/Results?lookfor=%22Electronic+data+processing+departments+Security+measures.%22&amp;type=Subject&amp;sort=last_indexed+desc&amp;limit=50&amp;view=rss"/>
    <atom:link rel="last" type="application/rss+xml" href="http://okeanos.lib.unipi.gr/Search/Results?lookfor=%22Electronic+data+processing+departments+Security+measures.%22&amp;type=Subject&amp;sort=last_indexed+desc&amp;limit=50&amp;view=rss"/>
    <atom:link rel="self" type="application/rss+xml" href="http://okeanos.lib.unipi.gr/Search/Results?lookfor=%22Electronic+data+processing+departments+Security+measures.%22&amp;type=Subject&amp;sort=last_indexed+desc&amp;limit=50&amp;view=rss"/>
    <item>
      <title>On-line services and data protection and the protection of privacy /</title>
      <pubDate>Thu, 01 Jan 1998 08:40:15 +0200</pubDate>
      <link>http://okeanos.lib.unipi.gr/Record/1%2F22264</link>
      <guid>http://okeanos.lib.unipi.gr/Record/1%2F22264</guid>
      <dc:format>Book</dc:format>
      <dc:date>1998</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Corporate computer and network security /</title>
      <pubDate>Thu, 01 Jan 2004 08:40:15 +0200</pubDate>
      <link>http://okeanos.lib.unipi.gr/Record/1%2F31660</link>
      <guid>http://okeanos.lib.unipi.gr/Record/1%2F31660</guid>
      <author>Panko, R. R.</author>
      <dc:format>Book</dc:format>
      <dc:date>2004</dc:date>
      <dc:creator>Panko, R. R.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Managing the human factor in information security : how to win over staff and influence business managers /</title>
      <pubDate>Thu, 01 Jan 2009 08:40:15 +0200</pubDate>
      <link>http://okeanos.lib.unipi.gr/Record/1%2F38440</link>
      <guid>http://okeanos.lib.unipi.gr/Record/1%2F38440</guid>
      <author>Lacey, David.</author>
      <dc:format>Book</dc:format>
      <dc:date>2009</dc:date>
      <dc:creator>Lacey, David.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>The CISO handbook a practical guide to securing your company /</title>
      <pubDate>Sun, 01 Jan 2006 08:40:15 +0200</pubDate>
      <link>http://okeanos.lib.unipi.gr/Record/1%2F36470</link>
      <guid>http://okeanos.lib.unipi.gr/Record/1%2F36470</guid>
      <author>Gentile, Michael.</author>
      <dc:format>Electronic</dc:format>
      <dc:date>2006</dc:date>
      <dc:creator>Gentile, Michael.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Physical security for IT</title>
      <pubDate>Sat, 01 Jan 2005 08:40:15 +0200</pubDate>
      <link>http://okeanos.lib.unipi.gr/Record/1%2F45157</link>
      <guid>http://okeanos.lib.unipi.gr/Record/1%2F45157</guid>
      <author>Erbschloe, Michael, 1951-</author>
      <dc:format>Electronic</dc:format>
      <dc:date>2005</dc:date>
      <dc:creator>Erbschloe, Michael, 1951-</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Cyber security standards, practices and industrial applications : systems and methodologies /</title>
      <pubDate>Sun, 01 Jan 2012 08:40:15 +0200</pubDate>
      <link>http://okeanos.lib.unipi.gr/Record/1%2F43999</link>
      <guid>http://okeanos.lib.unipi.gr/Record/1%2F43999</guid>
      <dc:format>Book</dc:format>
      <dc:date>2012</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Computers &amp; security.</title>
      <pubDate>Fri, 01 Jan 1982 08:40:15 +0200</pubDate>
      <link>http://okeanos.lib.unipi.gr/Record/1%2F50942</link>
      <guid>http://okeanos.lib.unipi.gr/Record/1%2F50942</guid>
      <dc:format>Journal</dc:format>
      <dc:date>1982</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Security, accuracy, and privacy in computer systems.</title>
      <pubDate>Mon, 01 Jan 1973 08:40:15 +0200</pubDate>
      <link>http://okeanos.lib.unipi.gr/Record/1%2F6746</link>
      <guid>http://okeanos.lib.unipi.gr/Record/1%2F6746</guid>
      <author>Martin, James, 1933-</author>
      <dc:format>Book</dc:format>
      <dc:date>1973</dc:date>
      <dc:creator>Martin, James, 1933-</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
  </channel>
</rss>
