<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Cybersecurity’s Maginot Line: A Real-World Assessment of the Defense-in-Depth Model</style></title><secondary-title><style face="normal" font="default" size="100%">Complimentary Report </style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2014</style></year><pub-dates><date><style  face="normal" font="default" size="100%">June 2014</style></date></pub-dates></dates><urls><web-urls><url><style face="normal" font="default" size="100%">www.iqpc.com/ media/1003877/33776.pdf.</style></url></web-urls></urls><publisher><style face="normal" font="default" size="100%">FireEye Inc.</style></publisher><pub-location><style face="normal" font="default" size="100%">Milpitas</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record></records></xml>