<?xml version="1.0" encoding="utf-8" ?> <rss version="2.0" xmlns:opensearch="http://a9.com/-/spec/opensearch/1.1/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"> <channel> <title> <![CDATA[Air University Central Library Search for 'au:&quot;Thompson, Eric C.&quot;']]> </title> <!-- prettier-ignore-start --> <link> /cgi-bin/koha/opac-search.pl?q=ccl=au%3A%22Thompson%2C%20Eric%20C.%22&#38;sort_by=relevance&#38;format=rss </link> <!-- prettier-ignore-end --> <atom:link rel="self" type="application/rss+xml" href="/cgi-bin/koha/opac-search.pl?q=ccl=au%3A%22Thompson%2C%20Eric%20C.%22&#38;sort_by=relevance&#38;format=rss" /> <description> <![CDATA[ Search results for 'au:&quot;Thompson, Eric C.&quot;' at Air University Central Library]]> </description> <opensearch:totalResults>3</opensearch:totalResults> <opensearch:startIndex>0</opensearch:startIndex> <opensearch:itemsPerPage>50</opensearch:itemsPerPage> <atom:link rel="search" type="application/opensearchdescription+xml" href="/cgi-bin/koha/opac-search.pl?q=ccl=au%3A%22Thompson%2C%20Eric%20C.%22&#38;sort_by=relevance&#38;format=opensearchdescription" /> <opensearch:Query role="request" searchTerms="q%3Dccl%3Dau%253A%2522Thompson%252C%2520Eric%2520C.%2522" startPage="" /> <item> <title> Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents </title> <dc:identifier>ISBN:9781484238691</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=24129</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1484238699.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Thompson, Eric C..<br /> Ampress 2018 .<br /> 176 p. 23 cm.<br /> 9781484238691 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=24129">Place hold on <em>Cybersecurity Incident Response: </em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=24129</guid> </item> <item> <title> Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents </title> <dc:identifier>ISBN:9781484238691</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=25223</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1484238699.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Thompson, Eric C..<br /> Ampress 2018 .<br /> 176 p. 23 cm.<br /> 9781484238691 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=25223">Place hold on <em>Cybersecurity Incident Response: </em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=25223</guid> </item> <item> <title> Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents </title> <dc:identifier>ISBN:9781484238691</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=25352</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1484238699.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Thompson, Eric C..<br /> Ampress 2018 .<br /> 176 p. 9781484238691 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=25352">Place hold on <em>Cybersecurity Incident Response:</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=25352</guid> </item> </channel> </rss>
