<?xml version="1.0" encoding="UTF-8" ?>
<modsCollection xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" xmlns:slims="http://slims.web.id" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-3.xsd">
 <slims:resultInfo>
  <slims:modsResultNum>5564</slims:modsResultNum>
  <slims:modsResultPage>394</slims:modsResultPage>
  <slims:modsResultShowed>10</slims:modsResultShowed>
 </slims:resultInfo>
 <mods version="3.3" ID="3861">
  <titleInfo>
   <title>Enterprise Java TM Security :</title>
   <subTitle>Building Secure J2EE Applications</subTitle>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Marco Pistoia</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">0321118898</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Boston</placeTerm>
    <publisher>Addison Wesley</publisher>
    <dateIssued>2006</dateIssued>
   </place>
  </originInfo>
  <slims:image>enterprise_java.jpg.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="3862">
  <titleInfo>
   <title>Internet Security Made Easy :</title>
   <subTitle>A Plain-English Guide To Protecting Yourself And Your Company Online</subTitle>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Schweitzer, Douglas</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">0814471420</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">New York</placeTerm>
    <publisher>AMACOM</publisher>
    <dateIssued>2002</dateIssued>
   </place>
  </originInfo>
  <slims:image>internet_security.jpg.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="3863">
  <titleInfo>
   <title>Network Security :</title>
   <subTitle>Private Communication In A Public World. 2nd Edition</subTitle>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Kaufman, Charlie</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">0130460192</identifier>
  <originInfo>
   <place>
    <placeTerm type="text"></placeTerm>
    <publisher>Prentice Hall</publisher>
    <dateIssued>2002</dateIssued>
   </place>
  </originInfo>
  <slims:image>network_security.kaufman.2e.jpg.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="3864">
  <titleInfo>
   <title>Counter Hack Reloaded :</title>
   <subTitle>a Step by Step guide to Computer Attacks and Effective Defensed. 2nd Edition</subTitle>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Skoudis, Edward</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Liston, Tom</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">0131481045</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">New Jersey</placeTerm>
    <publisher>Prentice Hall</publisher>
    <dateIssued>2006</dateIssued>
   </place>
  </originInfo>
  <slims:image>counter_hack.jpg.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="3865">
  <titleInfo>
   <title>Beginning Sql Server 2005 Programming</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Vieira, Robert</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">0764584332</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Indiana</placeTerm>
    <publisher>Wiley Publisher Inc.</publisher>
    <dateIssued>2006</dateIssued>
   </place>
  </originInfo>
  <slims:image>beginning_sql.jpg.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="3866">
  <titleInfo>
   <title>Security In Computing. 2nd Edition</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Pfleeger, Charles P.</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">0131857940</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">New Jersey</placeTerm>
    <publisher>Prentice Hall</publisher>
    <dateIssued>1997</dateIssued>
   </place>
  </originInfo>
  <slims:image>security_in_computing.jpg.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="3867">
  <titleInfo>
   <title>The Security Development Lifecycle:</title>
   <subTitle>Sdl A Process For Developing Demonstrably More Secure Software</subTitle>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Howard, Michael</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Lipner, Steve</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">0735622140</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Washington D.C.</placeTerm>
    <publisher>Microsoft Press</publisher>
    <dateIssued>2006</dateIssued>
   </place>
  </originInfo>
  <slims:image>the_security.jpg.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="3868">
  <titleInfo>
   <title>Modern Cryptograpy theory and practice</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Mao, Wenbo</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">0130669431</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">New Jersey</placeTerm>
    <publisher>Pearson Education</publisher>
    <dateIssued>2004</dateIssued>
   </place>
  </originInfo>
  <slims:image>Modern_Cryptography.JPG.JPG</slims:image>
 </mods>
 <mods version="3.3" ID="3869">
  <titleInfo>
   <title>Hacking Exposed :</title>
   <subTitle>Network Security Secrets &amp; Solutions. 5th Edition</subTitle>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Scambray, Joel</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>McClure, Stuart</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Kurt, George</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">0072260815</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">California</placeTerm>
    <publisher>McGraw Hill</publisher>
    <dateIssued>2005</dateIssued>
   </place>
  </originInfo>
  <slims:image>hacking_exposed.5e.jpg.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="3870">
  <titleInfo>
   <title>Mobile Broadband :</title>
   <subTitle>Tren Teknologi Wireless Saat ini dan Masa Datang</subTitle>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Wibisono, Gunawan</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Hantoro, Gunadi Dwi</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">7989791153423</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Bandung</placeTerm>
    <publisher>Penerbit Nuansa</publisher>
    <dateIssued>2008</dateIssued>
   </place>
  </originInfo>
  <slims:image>Mobile_Broadband.JPG.JPG</slims:image>
 </mods>
</modsCollection>
