<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="/themes/root/assets/xsl/rss.xsl"?>
<rss version="2.0" xmlns:opensearch="http://a9.com/-/spec/opensearch/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/">
  <channel>
    <title>Results for "Computer security."</title>
    <description>Showing 1 - 50 results of 717</description>
    <generator>Laminas_Feed_Writer 2 (https://getlaminas.org)</generator>
    <link>https://tuklas.up.edu.ph/Search/Results?sort=last_indexed+desc&amp;limit=50&amp;lookfor=%22Computer+security.%22&amp;type=Subject&amp;lng=en</link>
    <opensearch:totalResults>717</opensearch:totalResults>
    <opensearch:startIndex>0</opensearch:startIndex>
    <opensearch:itemsPerPage>50</opensearch:itemsPerPage>
    <opensearch:Query role="request" searchTerms="%22Computer%20security.%22" startIndex="0"/>
    <atom:link rel="first" type="application/rss+xml" title="Go to First Page" href="https://tuklas.up.edu.ph/Search/Results?sort=last_indexed+desc&amp;limit=50&amp;view=rss&amp;lookfor=%22Computer+security.%22&amp;type=Subject&amp;lng=en"/>
    <atom:link rel="next" type="application/rss+xml" title="Go to Next Page" href="https://tuklas.up.edu.ph/Search/Results?sort=last_indexed+desc&amp;limit=50&amp;view=rss&amp;lookfor=%22Computer+security.%22&amp;type=Subject&amp;lng=en&amp;page=2"/>
    <atom:link rel="last" type="application/rss+xml" title="Go to Last Page" href="https://tuklas.up.edu.ph/Search/Results?sort=last_indexed+desc&amp;limit=50&amp;view=rss&amp;lookfor=%22Computer+security.%22&amp;type=Subject&amp;lng=en&amp;page=15"/>
    <atom:link rel="self" type="application/rss+xml" href="https://tuklas.up.edu.ph/Search/Results?sort=last_indexed+desc&amp;limit=50&amp;view=rss&amp;lookfor=%22Computer+security.%22&amp;type=Subject&amp;lng=en"/>
    <item>
      <title>Java security</title>
      <pubDate>Mon, 01 Jan 2001 01:52:22 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-8027390931312395877</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-8027390931312395877</guid>
      <author>Oaks, Scott</author>
      <dc:format>Book</dc:format>
      <dc:date>2001</dc:date>
      <dc:creator>Oaks, Scott</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Computer security principles and practice</title>
      <pubDate>Sun, 01 Jan 2012 01:52:22 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-8027390931312409342</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-8027390931312409342</guid>
      <author>Stallings, William</author>
      <dc:format>Book</dc:format>
      <dc:date>2012</dc:date>
      <dc:creator>Stallings, William</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Data protection in health information systems considerations and guidelines</title>
      <pubDate>Tue, 01 Jan 1980 01:52:22 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-1685523046125274936</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-1685523046125274936</guid>
      <author>Griesser, Gerd</author>
      <dc:format>Book</dc:format>
      <dc:date>1980</dc:date>
      <dc:creator>Griesser, Gerd</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>iOS hacker's handbook</title>
      <pubDate>Sun, 01 Jan 2012 01:52:22 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-8027390931312424029</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-8027390931312424029</guid>
      <dc:format>Book</dc:format>
      <dc:date>2012</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>The basics of information security understanding the fundamentals of InfoSec in theory and practice</title>
      <pubDate>Sat, 01 Jan 2011 01:52:22 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-1685523046126268110</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-1685523046126268110</guid>
      <author>Andress, Jason</author>
      <dc:format>Book</dc:format>
      <dc:date>2011</dc:date>
      <dc:creator>Andress, Jason</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Virtual shadows your privacy in the information society</title>
      <pubDate>Thu, 01 Jan 2009 01:52:22 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-8027390931312436968</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-8027390931312436968</guid>
      <author>Oqvist, Karen Lawrence</author>
      <dc:format>Book</dc:format>
      <dc:date>2009</dc:date>
      <dc:creator>Oqvist, Karen Lawrence</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Principles of computer security</title>
      <pubDate>Fri, 01 Jan 2016 01:52:22 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-8027390931312486999</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-8027390931312486999</guid>
      <author>Conklin, Wm. Arthur (William Arthur)</author>
      <dc:format>Book</dc:format>
      <dc:date>2016</dc:date>
      <dc:creator>Conklin, Wm. Arthur (William Arthur)</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Hacking exposed computer forensics</title>
      <pubDate>Fri, 01 Jan 2010 01:52:22 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-8027390931312459287</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-8027390931312459287</guid>
      <author>Philipp, Aaron</author>
      <dc:format>Book</dc:format>
      <dc:date>2010</dc:date>
      <dc:creator>Philipp, Aaron</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Hacking exposed J2EE and Java developing secure applications with Java technology</title>
      <pubDate>Tue, 01 Jan 2002 01:52:22 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-8027390931312395837</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-8027390931312395837</guid>
      <author>Buege, Brian</author>
      <dc:format>Book</dc:format>
      <dc:date>2002</dc:date>
      <dc:creator>Buege, Brian</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Hacking exposed Web applications</title>
      <pubDate>Tue, 01 Jan 2002 01:52:22 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-8027390931312395847</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-8027390931312395847</guid>
      <author>Scambray, Joel</author>
      <dc:format>Book</dc:format>
      <dc:date>2002</dc:date>
      <dc:creator>Scambray, Joel</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Hacking exposed network security secrets &amp; solutions</title>
      <pubDate>Wed, 01 Jan 2003 01:52:22 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-8027390931312395848</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-8027390931312395848</guid>
      <author>McClure, Stuart</author>
      <dc:format>Book</dc:format>
      <dc:date>2003</dc:date>
      <dc:creator>McClure, Stuart</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Mission critical! Internet security</title>
      <pubDate>Mon, 01 Jan 2001 01:52:22 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-8027390931312395850</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-8027390931312395850</guid>
      <dc:format>Book</dc:format>
      <dc:date>2001</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Introduction to cryptography with Java applets</title>
      <pubDate>Wed, 01 Jan 2003 01:52:22 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-8027390931312395861</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-8027390931312395861</guid>
      <author>Bishop, David 1963-</author>
      <dc:format>Book</dc:format>
      <dc:date>2003</dc:date>
      <dc:creator>Bishop, David 1963-</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Information security for managers</title>
      <pubDate>Tue, 01 Jan 2013 01:52:22 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-8027390931312424093</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-8027390931312424093</guid>
      <author>Workman, Michael D. 1957-</author>
      <dc:format>Book</dc:format>
      <dc:date>2013</dc:date>
      <dc:creator>Workman, Michael D. 1957-</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Elementary information security</title>
      <pubDate>Tue, 01 Jan 2013 01:52:22 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-8027390931312424097</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-8027390931312424097</guid>
      <author>Smith, Richard E. 1952-</author>
      <dc:format>Book</dc:format>
      <dc:date>2013</dc:date>
      <dc:creator>Smith, Richard E. 1952-</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Public key cryptosystem in finite field (GF(2^n)) utilizing digital signal processors and fast fourier transform techniques</title>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217602381521</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217602381521</guid>
      <author>Ortiz, Noli E.</author>
      <dc:format>Thesis</dc:format>
      <dc:creator>Ortiz, Noli E.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Firewall architecture for the enterprise</title>
      <pubDate>Tue, 01 Jan 2002 01:52:22 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217602363821</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217602363821</guid>
      <author>Pohlmann, Norbert</author>
      <dc:format>Book</dc:format>
      <dc:date>2002</dc:date>
      <dc:creator>Pohlmann, Norbert</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Digital fortress</title>
      <pubDate>Thu, 01 Jan 2004 01:52:22 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217602698176</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217602698176</guid>
      <author>Brown, Danielle 1964-</author>
      <dc:format>Book</dc:format>
      <dc:date>2004</dc:date>
      <dc:creator>Brown, Danielle 1964-</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Evaluation of the unified modeling language for security requirements analysis</title>
      <pubDate>Sat, 01 Jan 2005 01:52:22 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217608175389</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217608175389</guid>
      <author>Ontua, Marife G.</author>
      <dc:format>Thesis</dc:format>
      <dc:date>2005</dc:date>
      <dc:creator>Ontua, Marife G.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Customer data Designing for transparency and trust.</title>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217611848052</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217611848052</guid>
      <author>Morey, Timothy</author>
      <dc:format>Article</dc:format>
      <dc:creator>Morey, Timothy</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Computer security</title>
      <pubDate>Fri, 01 Jan 1999 01:52:22 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217602580109</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217602580109</guid>
      <author>Gollmann, Dieter</author>
      <dc:format>Book</dc:format>
      <dc:date>1999</dc:date>
      <dc:creator>Gollmann, Dieter</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Risky business protect your business from being stalked, conned, or blackmailed on the web</title>
      <pubDate>Thu, 01 Jan 1998 01:52:22 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217602595507</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217602595507</guid>
      <author>Janal, Daniel S.</author>
      <dc:format>Book</dc:format>
      <dc:date>1998</dc:date>
      <dc:creator>Janal, Daniel S.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>The danger from within.</title>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217611560453</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217611560453</guid>
      <author>Upton, David M.</author>
      <dc:format>Article</dc:format>
      <dc:creator>Upton, David M.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Protecting business information a manager's guide</title>
      <pubDate>Mon, 01 Jan 1996 01:52:22 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217602548000</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217602548000</guid>
      <author>Schweitzer, James A. 1929-</author>
      <dc:format>Book</dc:format>
      <dc:date>1996</dc:date>
      <dc:creator>Schweitzer, James A. 1929-</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Fundamentals of computer security technology</title>
      <pubDate>Sat, 01 Jan 1994 01:52:22 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217602548051</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217602548051</guid>
      <author>Amoroso, Edward G.</author>
      <dc:format>Book</dc:format>
      <dc:date>1994</dc:date>
      <dc:creator>Amoroso, Edward G.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Network-Generative Architecture a net-resilient paradigm for critical information infrastructure</title>
      <link>https://tuklas.up.edu.ph/Record/UP-8027390931311559128</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-8027390931311559128</guid>
      <author>Abes, Pocholo Alfonso M.</author>
      <dc:format>Thesis</dc:format>
      <dc:creator>Abes, Pocholo Alfonso M.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Security in computing</title>
      <pubDate>Sun, 01 Jan 1989 01:52:22 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-1685523046125191704</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-1685523046125191704</guid>
      <author>Pfleeger, Charles P. 1948-</author>
      <dc:format>Book</dc:format>
      <dc:date>1989</dc:date>
      <dc:creator>Pfleeger, Charles P. 1948-</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Applied cryptography protocols, algorithms, and source code in C</title>
      <pubDate>Mon, 01 Jan 1996 01:52:22 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-1685523046126268272</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-1685523046126268272</guid>
      <author>Schneier, Bruce 1963-</author>
      <dc:format>Book</dc:format>
      <dc:date>1996</dc:date>
      <dc:creator>Schneier, Bruce 1963-</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Survey spotlights need for data and security strategies.</title>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217611543615</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217611543615</guid>
      <author>Drew, Jeff</author>
      <dc:format>Article</dc:format>
      <dc:creator>Drew, Jeff</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Current issues national security.</title>
      <link>https://tuklas.up.edu.ph/Record/UP-99849408841470603</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99849408841470603</guid>
      <dc:format>Book</dc:format>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>The Cybersecurity Guide to Governance, Risk, and Compliance</title>
      <link>https://tuklas.up.edu.ph/Record/UP-8027390931316356938</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-8027390931316356938</guid>
      <author>Edwards, Jason</author>
      <dc:format>Book</dc:format>
      <dc:creator>Edwards, Jason</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>E-policy how to develop computer, E-mail, and Internet guidelines to protect your company and its assets</title>
      <pubDate>Fri, 01 Jan 1999 01:52:22 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217607122617</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217607122617</guid>
      <author>Overly, Michael R.</author>
      <dc:format>Book</dc:format>
      <dc:date>1999</dc:date>
      <dc:creator>Overly, Michael R.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Access contested security, identity, and resistance in Asian cyberspace</title>
      <pubDate>Sun, 01 Jan 2012 01:52:22 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217610288490</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217610288490</guid>
      <dc:format>Book</dc:format>
      <dc:date>2012</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Fundamentals of Brooks-Iyengar distributed sensing algorithm trends, advances, and future prospects</title>
      <pubDate>Wed, 01 Jan 2020 01:52:22 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217613998588</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217613998588</guid>
      <author>Sniatala, Pawel</author>
      <dc:format>Electronic Resource</dc:format>
      <dc:date>2020</dc:date>
      <dc:creator>Sniatala, Pawel</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Selected papers from the 12th international networking conference INC 2020</title>
      <pubDate>Fri, 01 Jan 2021 01:52:22 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-8027295163992837693</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-8027295163992837693</guid>
      <dc:format>Electronic Resource</dc:format>
      <dc:date>2021</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Speech enhancement techniques for digital hearing aids</title>
      <pubDate>Tue, 01 Jan 2019 01:52:22 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217613727341</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217613727341</guid>
      <author>Borisagar, Komal R.</author>
      <dc:format>Electronic Resource</dc:format>
      <dc:date>2019</dc:date>
      <dc:creator>Borisagar, Komal R.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Cyber security in India education, research and training</title>
      <pubDate>Wed, 01 Jan 2020 01:52:22 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217614019391</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217614019391</guid>
      <dc:format>Electronic Resource</dc:format>
      <dc:date>2020</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Advances in cyber security analytics and decision systems</title>
      <pubDate>Wed, 01 Jan 2020 01:52:22 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217613998500</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217613998500</guid>
      <dc:format>Electronic Resource</dc:format>
      <dc:date>2020</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Information fusion in distributed sensor networks with Byzantines</title>
      <pubDate>Fri, 01 Jan 2021 01:52:22 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-1685594773860416114</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-1685594773860416114</guid>
      <author>Abrardo, Andrea</author>
      <dc:format>Electronic Resource</dc:format>
      <dc:date>2021</dc:date>
      <dc:creator>Abrardo, Andrea</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Ethical hacking techniques, tools, and countermeasures</title>
      <pubDate>Mon, 01 Jan 2024 01:52:22 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-8027390931316420693</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-8027390931316420693</guid>
      <author>Solomon, Michael (Michael G.)</author>
      <dc:format>Book</dc:format>
      <dc:date>2024</dc:date>
      <dc:creator>Solomon, Michael (Michael G.)</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Security incidents &amp; response against cyber attacks</title>
      <pubDate>Fri, 01 Jan 2021 01:52:22 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-8027390931311813993</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-8027390931311813993</guid>
      <dc:format>Electronic Resource</dc:format>
      <dc:date>2021</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>People count contact-tracing apps and public health</title>
      <pubDate>Fri, 01 Jan 2021 01:52:22 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-8027390931311870773</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-8027390931311870773</guid>
      <author>Landau, Susan Eva</author>
      <dc:format>Electronic Resource</dc:format>
      <dc:date>2021</dc:date>
      <dc:creator>Landau, Susan Eva</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Principles of incident response and disaster recovery</title>
      <pubDate>Wed, 01 Jan 2014 01:52:22 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217611646278</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217611646278</guid>
      <author>Whitman, Michael E.</author>
      <dc:format>Book</dc:format>
      <dc:date>2014</dc:date>
      <dc:creator>Whitman, Michael E.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>The mathematics of secrets cryptography from Caesar ciphers to digital encryption</title>
      <pubDate>Tue, 01 Jan 2019 01:52:22 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-8027390931312095176</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-8027390931312095176</guid>
      <author>Holden, Joshua 1970-</author>
      <dc:format>Electronic Resource</dc:format>
      <dc:date>2019</dc:date>
      <dc:creator>Holden, Joshua 1970-</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Decrypted secrets methods and maxims of cryptology</title>
      <pubDate>Wed, 01 Jan 1997 01:52:22 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217603001383</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217603001383</guid>
      <author>Bauer, Friedrich Ludwig 1924-</author>
      <dc:format>Book</dc:format>
      <dc:date>1997</dc:date>
      <dc:creator>Bauer, Friedrich Ludwig 1924-</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Design of hashing algorithms</title>
      <pubDate>Fri, 01 Jan 1993 01:52:22 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217603100610</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217603100610</guid>
      <author>Pieprzyk, Josef 1949-</author>
      <dc:format>Book</dc:format>
      <dc:date>1993</dc:date>
      <dc:creator>Pieprzyk, Josef 1949-</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Comelec dares hackers to crack computer software.</title>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217608835235</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217608835235</guid>
      <author>Alave, Kristine L.</author>
      <dc:format>Article</dc:format>
      <dc:creator>Alave, Kristine L.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Information technology security &amp; risk management</title>
      <pubDate>Sun, 01 Jan 2006 01:52:22 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217608699693</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217608699693</guid>
      <author>Slay, Jill</author>
      <dc:format>Book</dc:format>
      <dc:date>2006</dc:date>
      <dc:creator>Slay, Jill</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>RP gov't websites vulnerable to hacking.</title>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217608977476</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217608977476</guid>
      <author>Olchondra, Riza T.</author>
      <dc:format>Article</dc:format>
      <dc:creator>Olchondra, Riza T.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Guide to computer forensics and investigations</title>
      <pubDate>Tue, 01 Jan 2008 01:52:22 +0800</pubDate>
      <link>https://tuklas.up.edu.ph/Record/UP-99796217608727102</link>
      <guid>https://tuklas.up.edu.ph/Record/UP-99796217608727102</guid>
      <dc:format>Book</dc:format>
      <dc:date>2008</dc:date>
      <slash:comments>0</slash:comments>
    </item>
  </channel>
</rss>
