<?xml version="1.0" encoding="UTF-8" ?>
<modsCollection xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" xmlns:slims="http://slims.web.id" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-3.xsd">
 <slims:resultInfo>
  <slims:modsResultNum>6520</slims:modsResultNum>
  <slims:modsResultPage>142</slims:modsResultPage>
  <slims:modsResultShowed>10</slims:modsResultShowed>
 </slims:resultInfo>
 <mods version="3.3" ID="5337">
  <titleInfo>
   <title>Hacking Secrets Revealed - Information and Instructional Guide</title>
  </titleInfo>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn"></identifier>
  <originInfo>
   <place>
    <placeTerm type="text"></placeTerm>
    <publisher>Production of  S&amp;C Enterprises</publisher>
    <dateIssued></dateIssued>
   </place>
  </originInfo>
  <slims:image>2.png.png</slims:image>
 </mods>
 <mods version="3.3" ID="5303">
  <titleInfo>
   <title>Inside Cyber Warfare</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Jeffrey Carr</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9781449310042</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">united states of america</placeTerm>
    <publisher>O’Reilly Media, Inc</publisher>
    <dateIssued>2011</dateIssued>
   </place>
  </originInfo>
  <slims:image>Capture1.JPG.JPG</slims:image>
 </mods>
 <mods version="3.3" ID="5299">
  <titleInfo>
   <title>Cyber Warfare -  A Multidisciplinary Analysis</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>James A. Green</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9781315761565</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">New York</placeTerm>
    <publisher>ROUTLEDGE</publisher>
    <dateIssued>2015</dateIssued>
   </place>
  </originInfo>
  <slims:image>Capture1.JPG.JPG</slims:image>
 </mods>
 <mods version="3.3" ID="5293">
  <titleInfo>
   <title>Machine Learning for Computer and Cyber Security (Principles, Algorithms, and Practices)</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Brij B. Gupta</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Michael Sheng</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9781138587304</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">New York</placeTerm>
    <publisher>CRC Press</publisher>
    <dateIssued>2019</dateIssued>
   </place>
  </originInfo>
  <slims:image>Capture1.JPG.JPG</slims:image>
 </mods>
 <mods version="3.3" ID="5304">
  <titleInfo>
   <title>Cyber-Physical Vehicle Systems - Methodology and Applications</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Chen Lv</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Yang Xing</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Junzhi Zhang</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Dongpu Cao</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9781681737324</identifier>
  <originInfo>
   <place>
    <placeTerm type="text"></placeTerm>
    <publisher>Morgan &amp; Claypool</publisher>
    <dateIssued>2020</dateIssued>
   </place>
  </originInfo>
  <slims:image>Capture1.JPG.JPG</slims:image>
 </mods>
 <mods version="3.3" ID="5275">
  <titleInfo>
   <title>Current and Emerging Trends in Cyber Operations - Policy, Strategy, and Practice</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Frederic Lemieux</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">978–1–137–45554–3</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">United Kingdom</placeTerm>
    <publisher>Palgrave Macmillan</publisher>
    <dateIssued>2015</dateIssued>
   </place>
  </originInfo>
  <slims:image>Capture1.JPG.JPG</slims:image>
 </mods>
 <mods version="3.3" ID="5274">
  <titleInfo>
   <title>Microsoft Excel 2013 For Dummies</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Greg Harvey, PhD</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9781118550120</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">CANADA</placeTerm>
    <publisher>John Wiley &amp; Sons, Inc</publisher>
    <dateIssued>2013</dateIssued>
   </place>
  </originInfo>
  <slims:image>Capture.JPG.JPG</slims:image>
 </mods>
 <mods version="3.3" ID="5267">
  <titleInfo>
   <title>Ethical Hacking - Student Guide</title>
  </titleInfo>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn"></identifier>
  <originInfo>
   <place>
    <placeTerm type="text"></placeTerm>
    <publisher>Internet Security Systems, Inc</publisher>
    <dateIssued>2000</dateIssued>
   </place>
  </originInfo>
  <slims:image>Capture1.JPG.JPG</slims:image>
 </mods>
 <mods version="3.3" ID="5260">
  <titleInfo>
   <title>Unilateral Remedies To Cyber Operations - Self-defence, Countermeasures, Necessity, And The Question Of Attribution</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Henning Lahmann</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9781108479868</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">United Kingdom</placeTerm>
    <publisher>Cambridge University Press</publisher>
    <dateIssued>2020</dateIssued>
   </place>
  </originInfo>
  <slims:image>Capture.JPG.JPG</slims:image>
 </mods>
 <mods version="3.3" ID="5279">
  <titleInfo>
   <title>Reinforcement Learning For Cyber-Physical Systems With Cybersecurity Case Studies</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Chong Li</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Meikang Qiu</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9781138543539</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">New York</placeTerm>
    <publisher>CRC Press</publisher>
    <dateIssued>2019</dateIssued>
   </place>
  </originInfo>
  <slims:image>Capture1.JPG.JPG</slims:image>
 </mods>
</modsCollection>
