<?xml version="1.0" encoding="UTF-8" ?>
<modsCollection xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" xmlns:slims="http://slims.web.id" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-3.xsd">
 <slims:resultInfo>
  <slims:modsResultNum>5564</slims:modsResultNum>
  <slims:modsResultPage>330</slims:modsResultPage>
  <slims:modsResultShowed>10</slims:modsResultShowed>
 </slims:resultInfo>
 <mods version="3.3" ID="3211">
  <titleInfo>
   <title>XTML for the World Wide Web :</title>
   <subTitle>Visual Quickstart Guide</subTitle>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Castro, Elizabeth</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">0201710986</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Berkeley</placeTerm>
    <publisher>Peachpit Press</publisher>
    <dateIssued>2001</dateIssued>
   </place>
  </originInfo>
  <slims:image>xml.castro.jpg.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="3212">
  <titleInfo>
   <title>Photoshop Restoration and Retouching.2nd Ed.</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Eismann, Katrin</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">0735713502</identifier>
  <originInfo>
   <place>
    <placeTerm type="text"></placeTerm>
    <publisher>New Riders</publisher>
    <dateIssued></dateIssued>
   </place>
  </originInfo>
 </mods>
 <mods version="3.3" ID="3213">
  <titleInfo>
   <title>Curves and Surfaces for CAGD:</title>
   <subTitle>A Practical Guide 5th Ed.</subTitle>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Farin, Gerald</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">1558607374</identifier>
  <originInfo>
   <place>
    <placeTerm type="text"></placeTerm>
    <publisher>Academic Press</publisher>
    <dateIssued>2002</dateIssued>
   </place>
  </originInfo>
 </mods>
 <mods version="3.3" ID="3214">
  <titleInfo>
   <title>Visual Basic 2008 Recipes:</title>
   <subTitle>A Problem-Solution Approach</subTitle>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Todd Herman, (et.al)</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn"></identifier>
  <originInfo>
   <place>
    <placeTerm type="text"></placeTerm>
    <publisher>Apress</publisher>
    <dateIssued>2008</dateIssued>
   </place>
  </originInfo>
 </mods>
 <mods version="3.3" ID="3215">
  <titleInfo>
   <title>Pro VB 2008 and the.NET 3.5 Platform</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Troelsen, Andrew</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn"></identifier>
  <originInfo>
   <place>
    <placeTerm type="text"></placeTerm>
    <publisher>Apress</publisher>
    <dateIssued>2008</dateIssued>
   </place>
  </originInfo>
 </mods>
 <mods version="3.3" ID="3216">
  <titleInfo>
   <title>Machine Learning and Data Mining for Computer Security Methods and Applications</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Maloof, Marcus A.</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">184628029X</identifier>
  <originInfo>
   <place>
    <placeTerm type="text"></placeTerm>
    <publisher>Springer-Verlag London Limited 2006</publisher>
    <dateIssued>2006</dateIssued>
   </place>
  </originInfo>
 </mods>
 <mods version="3.3" ID="3217">
  <titleInfo>
   <title>Information Security Management Handbook Volume II 6th Ed.</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Tipton, Harold F.</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Krause, Micky</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9781420067088</identifier>
  <originInfo>
   <place>
    <placeTerm type="text"></placeTerm>
    <publisher>CRC Press LLC</publisher>
    <dateIssued>2008</dateIssued>
   </place>
  </originInfo>
 </mods>
 <mods version="3.3" ID="3218">
  <titleInfo>
   <title>Information Security Management Handbook 6th Ed.</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Tipton, Harold F.</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Krause, Micky</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">0849374952</identifier>
  <originInfo>
   <place>
    <placeTerm type="text"></placeTerm>
    <publisher>CRC Press LLC</publisher>
    <dateIssued>2007</dateIssued>
   </place>
  </originInfo>
 </mods>
 <mods version="3.3" ID="3219">
  <titleInfo>
   <title>Information Security Management Handbook 5th Ed.</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Tipton, Harold F.</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Krause, Micky</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">0849319978</identifier>
  <originInfo>
   <place>
    <placeTerm type="text"></placeTerm>
    <publisher>CRC Press LLC</publisher>
    <dateIssued>2004</dateIssued>
   </place>
  </originInfo>
 </mods>
 <mods version="3.3" ID="3220">
  <titleInfo>
   <title>Hacking Exposed:</title>
   <subTitle>Network Security Secrets and Solutions 3rd Ed.</subTitle>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>McClure, Stuart</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Scambray, Stuart</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Kurtz, George</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">0072193816</identifier>
  <originInfo>
   <place>
    <placeTerm type="text"></placeTerm>
    <publisher>The McGraw-Hill Companies.</publisher>
    <dateIssued>2004</dateIssued>
   </place>
  </originInfo>
 </mods>
</modsCollection>
