<?xml version="1.0" encoding="UTF-8" ?>
<modsCollection xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" xmlns:slims="http://slims.web.id" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-3.xsd">
 <slims:resultInfo>
  <slims:modsResultNum>6520</slims:modsResultNum>
  <slims:modsResultPage>129</slims:modsResultPage>
  <slims:modsResultShowed>10</slims:modsResultShowed>
 </slims:resultInfo>
 <mods version="3.3" ID="5438">
  <titleInfo>
   <title>International Conference on Applications and Techniques in Cyber Security and Intelligence -  Applications and Techniques in Cyber Security and Intelligence</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Jemal Abawajy, dkk.</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9783319670713</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">USA</placeTerm>
    <publisher>Springer</publisher>
    <dateIssued>2018</dateIssued>
   </place>
  </originInfo>
  <slims:image>1.png.png</slims:image>
 </mods>
 <mods version="3.3" ID="5437">
  <titleInfo>
   <title>Insider Attack &amp; Cyber Security - Beyond the Hacker</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Salvatore J. Stolfo, dkk.</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9780387773223</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">New York</placeTerm>
    <publisher>Springer</publisher>
    <dateIssued>2008</dateIssued>
   </place>
  </originInfo>
  <slims:image>download.png.png</slims:image>
 </mods>
 <mods version="3.3" ID="5435">
  <titleInfo>
   <title>Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems -  7th IFIP WG 11.2 International Workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013. Proceedings</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Lorenzo Cavallaro</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Dieter Gollmann</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9783642385308</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">London</placeTerm>
    <publisher>Springer</publisher>
    <dateIssued>2013</dateIssued>
   </place>
  </originInfo>
  <slims:image>download.png.png</slims:image>
 </mods>
 <mods version="3.3" ID="5434">
  <titleInfo>
   <title>Hacking - Computer Hacking, Security Testing,Penetration Testing, and Basic Security</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Gary Hall &amp; Erin Watson</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn"></identifier>
  <originInfo>
   <place>
    <placeTerm type="text"></placeTerm>
    <publisher>Gary Hall &amp; Erin Watson</publisher>
    <dateIssued>2016</dateIssued>
   </place>
  </originInfo>
  <slims:image>1.png.png</slims:image>
 </mods>
 <mods version="3.3" ID="5433">
  <titleInfo>
   <title>Hacking exposed malware &amp; rootkits -  malware &amp; rootkits security secrets &amp; solutions</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Michael Davis, dkk</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9780071591195</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">USA</placeTerm>
    <publisher>Mc Graw Hill</publisher>
    <dateIssued>2010</dateIssued>
   </place>
  </originInfo>
  <slims:image>download.png.png</slims:image>
 </mods>
 <mods version="3.3" ID="5431">
  <titleInfo>
   <title>Global Security, Safety and Sustainability -  Tomorrow's Challenges of Cyber Security_10th International Conference, ICGS3 2015, London, UK, September 15-17, 2015. Proceedings</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Hamid Jahankhani, dkk</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9783319232768</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Switzerland</placeTerm>
    <publisher>Springer</publisher>
    <dateIssued>2015</dateIssued>
   </place>
  </originInfo>
  <slims:image>1.png.png</slims:image>
 </mods>
 <mods version="3.3" ID="5430">
  <titleInfo>
   <title>From Hacking to Report Writing -  An Introduction to Security and Penetration Testing</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Robert Svensson</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9781484222836</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">german</placeTerm>
    <publisher>Apress</publisher>
    <dateIssued>2016</dateIssued>
   </place>
  </originInfo>
  <slims:image>download.png.png</slims:image>
 </mods>
 <mods version="3.3" ID="5428">
  <titleInfo>
   <title>Electrician's Guide to Control and Monitoring Systems - Installation, Troubleshooting, and Maintenance</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Albert F. Cutter, Sr</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9780071700603</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">USA</placeTerm>
    <publisher>MCGRAW-HILL, INC</publisher>
    <dateIssued>2016</dateIssued>
   </place>
  </originInfo>
  <slims:image>1.png.png</slims:image>
 </mods>
 <mods version="3.3" ID="5427">
  <titleInfo>
   <title>Digital Security -  Cyber Terror and Cyber Security (The Digital World)</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Ananda Mitra, Ph.D.</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9781438133638</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">New York</placeTerm>
    <publisher>Chelsea House</publisher>
    <dateIssued>2010</dateIssued>
   </place>
  </originInfo>
  <slims:image>download.png.png</slims:image>
 </mods>
 <mods version="3.3" ID="5426">
  <titleInfo>
   <title>Deterring Russia in Europe - Defence Strategies for Neighbouring States</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Nora Vanaga and Toms Rostok</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9781351250641</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">New York</placeTerm>
    <publisher>ROUTLEDGE</publisher>
    <dateIssued>2019</dateIssued>
   </place>
  </originInfo>
  <slims:image>1.png.png</slims:image>
 </mods>
</modsCollection>
