<?xml version="1.0" encoding="UTF-8" ?>
<modsCollection xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" xmlns:slims="http://slims.web.id" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-3.xsd">
 <slims:resultInfo>
  <slims:modsResultNum>4</slims:modsResultNum>
  <slims:modsResultPage>1</slims:modsResultPage>
  <slims:modsResultShowed>10</slims:modsResultShowed>
 </slims:resultInfo>
 <mods version="3.3" ID="1044">
  <titleInfo>
   <title>Cloud security:</title>
   <subTitle>a comprehensive guide to secure cloud computing</subTitle>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Krutz, Ronald L</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Vines, Russell Dean</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9780470589878</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Indianapolis, IN</placeTerm>
    <publisher>Wiley Publishing, Inc.</publisher>
    <dateIssued>2010</dateIssued>
   </place>
  </originInfo>
  <slims:image>Cloud_Security.jpg.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="2119">
  <titleInfo>
   <title>Keamanan Sistem Informasi</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>IBISA</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9789792917925</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Yogyakarta</placeTerm>
    <publisher>Andi Offset</publisher>
    <dateIssued>2011</dateIssued>
   </place>
  </originInfo>
  <slims:image>Keamanan_Sistem_Inf..JPG.JPG</slims:image>
 </mods>
 <mods version="3.3" ID="2120">
  <titleInfo>
   <title>Belajar hacking dari nol:</title>
   <subTitle>tutorial 5 hari</subTitle>
  </titleInfo>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9789792913309</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Yogyakarta</placeTerm>
    <publisher>Andi dan Wahana Komputer</publisher>
    <dateIssued>2010</dateIssued>
   </place>
  </originInfo>
  <slims:image>Belajar_hacking_dari_nol.jpg.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="4242">
  <titleInfo>
   <title>Forensic Discovery</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Farmer, Dan</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Venema, Wietse</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">020163497x</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">New Jersey</placeTerm>
    <publisher>Pearson Education</publisher>
    <dateIssued>2005</dateIssued>
   </place>
  </originInfo>
  <slims:image>Forensic_Discovery.JPG.JPG</slims:image>
 </mods>
</modsCollection>
