<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Delivering Value through Process Solutions &#187; Information Security</title>
	<atom:link href="http://www.rgopinath.com/tag/information-security/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.rgopinath.com</link>
	<description>Pragmatic, Hands-on, Result-oriented                            Process Consulting and Training</description>
	<lastBuildDate>Wed, 14 Dec 2016 06:47:40 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.2.1</generator>
		<item>
		<title>The Myths of Security</title>
		<link>http://www.rgopinath.com/2011/10/17/the-myths-of-security/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-myths-of-security</link>
		<comments>http://www.rgopinath.com/2011/10/17/the-myths-of-security/#comments</comments>
		<pubDate>Mon, 17 Oct 2011 14:11:57 +0000</pubDate>
		<dc:creator>Gopinath</dc:creator>
				<category><![CDATA[Book Review]]></category>
		<category><![CDATA[Information Security]]></category>

		<guid isPermaLink="false">http://www.rgopinath.com/?p=421</guid>
		<description><![CDATA[Author: John Viega Published: 2009 Publisher: O&#8217;Reilly Media Inc. Buy from Flipkart Through 48 short yet interesting articles (4-5 pages average, 10 pages maximum.) , the author provides his perspectives on the security industry, identifies glaring problems, shows what the &#8230; <a href="http://www.rgopinath.com/2011/10/17/the-myths-of-security/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
		<wfw:commentRss>http://www.rgopinath.com/2011/10/17/the-myths-of-security/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The Code Book</title>
		<link>http://www.rgopinath.com/2011/10/17/the-code-book/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-code-book</link>
		<comments>http://www.rgopinath.com/2011/10/17/the-code-book/#comments</comments>
		<pubDate>Mon, 17 Oct 2011 13:59:18 +0000</pubDate>
		<dc:creator>Gopinath</dc:creator>
				<category><![CDATA[Book Review]]></category>
		<category><![CDATA[Information Security]]></category>

		<guid isPermaLink="false">http://www.rgopinath.com/?p=417</guid>
		<description><![CDATA[Author: Simon Singh Published: 1999 Publisher: Fourth Estate Limited The entire history of cryptography is the story of ongoing battle between Cryptographers (code makers) and Cryptanalysts (code breakers). And this story &#8211; right from the origin of ciphers in ancient &#8230; <a href="http://www.rgopinath.com/2011/10/17/the-code-book/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
		<wfw:commentRss>http://www.rgopinath.com/2011/10/17/the-code-book/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Information Security Management Principles</title>
		<link>http://www.rgopinath.com/2011/10/17/information-security-management-principles/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=information-security-management-principles</link>
		<comments>http://www.rgopinath.com/2011/10/17/information-security-management-principles/#comments</comments>
		<pubDate>Mon, 17 Oct 2011 10:47:44 +0000</pubDate>
		<dc:creator>Gopinath</dc:creator>
				<category><![CDATA[Book Review]]></category>
		<category><![CDATA[Information Security]]></category>

		<guid isPermaLink="false">http://www.rgopinath.com/?p=382</guid>
		<description><![CDATA[Authors: David Alexander, Amanda Finch, David Sutton Editor: Andy Taylor Published: 2009 Publisher: The British Computer Society This book is aligned to the syllabus of the CISMP (Certificate in Information Security Management Principles) exam conducted by the British Computer Society. &#8230; <a href="http://www.rgopinath.com/2011/10/17/information-security-management-principles/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
		<wfw:commentRss>http://www.rgopinath.com/2011/10/17/information-security-management-principles/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
