<?xml version="1.0" encoding="UTF-8" ?>
<modsCollection xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" xmlns:slims="http://slims.web.id" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-3.xsd">
 <slims:resultInfo>
  <slims:modsResultNum>6520</slims:modsResultNum>
  <slims:modsResultPage>143</slims:modsResultPage>
  <slims:modsResultShowed>10</slims:modsResultShowed>
 </slims:resultInfo>
 <mods version="3.3" ID="5165">
  <titleInfo>
   <title>Ethical Hacking &amp; Countermeasures - Secure Network Infrastructures (EC-Council Press - Volume 5 of 5 mapping to Certified Ethical Hacker)</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>EC-Council</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9781435483651</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">USA</placeTerm>
    <publisher>Course Technology/Cengage Learning</publisher>
    <dateIssued>2010</dateIssued>
   </place>
  </originInfo>
  <slims:image>Capture.JPG.JPG</slims:image>
 </mods>
 <mods version="3.3" ID="5220">
  <titleInfo>
   <title>Cyber War Versus Cyber Realities - Cyber Conflict in the International System</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Brandon Valeriano</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Ryan C. Maness</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">978–0–19–020479–2</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">New York</placeTerm>
    <publisher>OXFORD UNIVERSITY PRESS</publisher>
    <dateIssued>2015</dateIssued>
   </place>
  </originInfo>
  <slims:image>Capture.JPG.JPG</slims:image>
 </mods>
 <mods version="3.3" ID="5248">
  <titleInfo>
   <title>Cyber Warfare and the Laws of War</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Heather Harrison Dinniss</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9781107011083</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">USA</placeTerm>
    <publisher>Cambridge University Press</publisher>
    <dateIssued>2012</dateIssued>
   </place>
  </originInfo>
  <slims:image>Capture.JPG.JPG</slims:image>
 </mods>
 <mods version="3.3" ID="5235">
  <titleInfo>
   <title>Machine Learning in Cyber Trust - Security, Privacy, and Reliability</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Jeffrey J.P. Tsai</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Philip S. Yu</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9780387887357</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">New York</placeTerm>
    <publisher>Springer</publisher>
    <dateIssued>2009</dateIssued>
   </place>
  </originInfo>
  <slims:image>Capture.JPG.JPG</slims:image>
 </mods>
 <mods version="3.3" ID="5231">
  <titleInfo>
   <title>The Nice Cyber Security Framework - Cyber Security Management</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Izzat Alsmadi</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Chuck Easttom</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Lo’ai Tawalbeh</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9783030419875</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Switzerland</placeTerm>
    <publisher>Springer</publisher>
    <dateIssued>2020</dateIssued>
   </place>
  </originInfo>
  <slims:image>Capture.JPG.JPG</slims:image>
 </mods>
 <mods version="3.3" ID="5224">
  <titleInfo>
   <title>Computer Network Security and Cyber Ethics</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Joseph Migga Kizza</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9781476615608</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">USA</placeTerm>
    <publisher>McFarland &amp; Company, Inc., Publishers</publisher>
    <dateIssued>2014</dateIssued>
   </place>
  </originInfo>
  <slims:image>Capture.JPG.JPG</slims:image>
 </mods>
 <mods version="3.3" ID="5335">
  <titleInfo>
   <title>Hacking for Dummies</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Kevin Beaver</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">076455784X</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">CANADA</placeTerm>
    <publisher>Wiley Publishing, Inc</publisher>
    <dateIssued>2004</dateIssued>
   </place>
  </originInfo>
  <slims:image>Capture.JPG.JPG</slims:image>
 </mods>
 <mods version="3.3" ID="5334">
  <titleInfo>
   <title>Cyber Defense and Situational Awareness - Advances in Information Security</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Cliff Wang</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Alexander Kott</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Robert F. Erbacher</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9783319113913</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">New York</placeTerm>
    <publisher>Springer</publisher>
    <dateIssued>2014</dateIssued>
   </place>
  </originInfo>
  <slims:image>Capture1.JPG.JPG</slims:image>
 </mods>
 <mods version="3.3" ID="5333">
  <titleInfo>
   <title>Hacking Exposed™ 6 - Network Security Secrets &amp; Solutions</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>STUART MCCLURE</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>JOEL SCAMBRAY</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>GEORGE KURTZ</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9780071613743</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">New York</placeTerm>
    <publisher>MCGRAW-HILL, INC</publisher>
    <dateIssued>2009</dateIssued>
   </place>
  </originInfo>
  <slims:image>Capture.JPG.JPG</slims:image>
 </mods>
 <mods version="3.3" ID="5332">
  <titleInfo>
   <title>Cyber Security Intelligence and Analytics - Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Zheng Xu</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Reza M. Parizi</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Mohammad Hammoudeh</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Octavio Loyola-González</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9783030433093</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Switzerland</placeTerm>
    <publisher>Springer Nature</publisher>
    <dateIssued>2020</dateIssued>
   </place>
  </originInfo>
  <slims:image>Capture1.JPG.JPG</slims:image>
 </mods>
</modsCollection>
