<?xml version="1.0" encoding="UTF-8" ?>
<modsCollection xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" xmlns:slims="http://slims.web.id" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-3.xsd">
 <slims:resultInfo>
  <slims:modsResultNum>5564</slims:modsResultNum>
  <slims:modsResultPage>551</slims:modsResultPage>
  <slims:modsResultShowed>10</slims:modsResultShowed>
 </slims:resultInfo>
 <mods version="3.3" ID="5473">
  <titleInfo>
   <title>Multimedia Fingerprinting Forensics for Traitor Tracing</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>et.al</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Liu, K. J. Ray</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9775945186</identifier>
  <originInfo>
   <place>
    <placeTerm type="text"></placeTerm>
    <publisher>Hindawi Publishing Corporation</publisher>
    <dateIssued>2005</dateIssued>
   </place>
  </originInfo>
 </mods>
 <mods version="3.3" ID="5474">
  <titleInfo>
   <title>Metasploit Toolkit For Penetration Testing, Exploit Development and Vulnerability Research</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Maynor, David</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Mookhey, K. K.</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9781597490740</identifier>
  <originInfo>
   <place>
    <placeTerm type="text"></placeTerm>
    <publisher>Syngress Publishing, Inc</publisher>
    <dateIssued>2007</dateIssued>
   </place>
  </originInfo>
 </mods>
 <mods version="3.3" ID="5475">
  <titleInfo>
   <title>Malware Detection</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Christodorescu, Mihai</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">0387327207</identifier>
  <originInfo>
   <place>
    <placeTerm type="text"></placeTerm>
    <publisher>Springer Science+Business Media, LLC.</publisher>
    <dateIssued>2007</dateIssued>
   </place>
  </originInfo>
 </mods>
 <mods version="3.3" ID="5476">
  <titleInfo>
   <title>Insider Computer Fraud an In-Depth Framework for Detecting and Defending Against Insider IT Attacks</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Brancik, Kenneth C.</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9781420046595</identifier>
  <originInfo>
   <place>
    <placeTerm type="text"></placeTerm>
    <publisher>Taylor &amp; Francis Group, LLC</publisher>
    <dateIssued></dateIssued>
   </place>
  </originInfo>
 </mods>
 <mods version="3.3" ID="5477">
  <titleInfo>
   <title>Information Security</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Stamp, Mark</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">0471738484</identifier>
  <originInfo>
   <place>
    <placeTerm type="text"></placeTerm>
    <publisher>JohnWiley &amp; Sons, Inc.</publisher>
    <dateIssued>2006</dateIssued>
   </place>
  </originInfo>
 </mods>
 <mods version="3.3" ID="5478">
  <titleInfo>
   <title>Handbook of Biometrics</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Jain, Anil K.</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Flynn,  Patrick</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Ross, Arun A.</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9780387710402</identifier>
  <originInfo>
   <place>
    <placeTerm type="text"></placeTerm>
    <publisher>Springer Science+Business Media, LLC.</publisher>
    <dateIssued>2008</dateIssued>
   </place>
  </originInfo>
 </mods>
 <mods version="3.3" ID="5479">
  <titleInfo>
   <title>Hacking for Dummies</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Beaver, Kevin</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">076455784X</identifier>
  <originInfo>
   <place>
    <placeTerm type="text"></placeTerm>
    <publisher>Wiley Publishing, Inc.</publisher>
    <dateIssued>2004</dateIssued>
   </place>
  </originInfo>
 </mods>
 <mods version="3.3" ID="5480">
  <titleInfo>
   <title>Hacking Exposed Windows, Microsoft Windows Security Secrets and SolutionsEdition (Hacking</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>McClure, Stuart</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Scambray, Joel</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">007149426X.</identifier>
  <originInfo>
   <place>
    <placeTerm type="text"></placeTerm>
    <publisher>Joel Scambray.</publisher>
    <dateIssued>2008</dateIssued>
   </place>
  </originInfo>
 </mods>
 <mods version="3.3" ID="5481">
  <titleInfo>
   <title>Gray Hat Hacking, Second Edition</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Harris, Shon</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">0071495681.</identifier>
  <originInfo>
   <place>
    <placeTerm type="text"></placeTerm>
    <publisher>The McGraw-Hill Companies</publisher>
    <dateIssued>2008</dateIssued>
   </place>
  </originInfo>
 </mods>
 <mods version="3.3" ID="5482">
  <titleInfo>
   <title>Essential Computer Security, Everyone's Guide to Email, Internet, and Wireless Security</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Bradley, Tony</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Carvey, Harlan</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">1597491144</identifier>
  <originInfo>
   <place>
    <placeTerm type="text"></placeTerm>
    <publisher>Syngress Publishing, Inc.</publisher>
    <dateIssued></dateIssued>
   </place>
  </originInfo>
 </mods>
</modsCollection>
