<?xml version="1.0" encoding="UTF-8" ?>
<modsCollection xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" xmlns:slims="http://slims.web.id" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-3.xsd">
 <slims:resultInfo>
  <slims:modsResultNum>6520</slims:modsResultNum>
  <slims:modsResultPage>144</slims:modsResultPage>
  <slims:modsResultShowed>10</slims:modsResultShowed>
 </slims:resultInfo>
 <mods version="3.3" ID="5331">
  <titleInfo>
   <title>Hacking Exposed - Network Security Secrets &amp; Solutions</title>
  </titleInfo>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">0072193816</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">united states of america</placeTerm>
    <publisher>MCGRAW-HILL, INC</publisher>
    <dateIssued>2001</dateIssued>
   </place>
  </originInfo>
  <slims:image>Capture.JPG.JPG</slims:image>
 </mods>
 <mods version="3.3" ID="5330">
  <titleInfo>
   <title>Cyber-Physical Systems and Control - Lecture Notes in Networks and Systems</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Dmitry G. Arseniev</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Ludger Overmeyer</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Heikki Kälviäinen</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Branko Katalinić</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9783030349837</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Switzerland</placeTerm>
    <publisher>Springer Nature</publisher>
    <dateIssued>2020</dateIssued>
   </place>
  </originInfo>
  <slims:image>Capture1.JPG.JPG</slims:image>
 </mods>
 <mods version="3.3" ID="5329">
  <titleInfo>
   <title>Hacking and Securing iOS Applications</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Jonathan Zdziarski</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9781449318741</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">united states of america</placeTerm>
    <publisher>O’Reilly Media, Inc</publisher>
    <dateIssued>2012</dateIssued>
   </place>
  </originInfo>
  <slims:image>Capture.JPG.JPG</slims:image>
 </mods>
 <mods version="3.3" ID="5328">
  <titleInfo>
   <title>Adaptive Autonomous Secure Cyber Systems</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Sushil Jajodia</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Michael Wellman</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>George Cybenko V.S. Subrahmanian</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Vipin Swarup Cliff Wang</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9783030334321</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Switzerland</placeTerm>
    <publisher>Springer Nature</publisher>
    <dateIssued>2020</dateIssued>
   </place>
  </originInfo>
  <slims:image>Capture1.JPG.JPG</slims:image>
 </mods>
 <mods version="3.3" ID="5327">
  <titleInfo>
   <title>Hacker's Guide</title>
  </titleInfo>
  <name type="corporate" authority="">
   <namePart>Tiger</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn"></identifier>
  <originInfo>
   <place>
    <placeTerm type="text"></placeTerm>
    <publisher></publisher>
    <dateIssued></dateIssued>
   </place>
  </originInfo>
  <slims:image>Capture.JPG.JPG</slims:image>
 </mods>
 <mods version="3.3" ID="5326">
  <titleInfo>
   <title>National Cyber Summit (NCS) Research Track - Advances in Intelligent Systems and Computing</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Kim-Kwang Raymond Choo</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Thomas H. Morris</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Gilbert L. Peterson</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9783030312398</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Switzerland</placeTerm>
    <publisher>Springer Nature</publisher>
    <dateIssued>2020</dateIssued>
   </place>
  </originInfo>
  <slims:image>Capture1.JPG.JPG</slims:image>
 </mods>
 <mods version="3.3" ID="5325">
  <titleInfo>
   <title>Adversarial and Uncertain Reasoning for Adaptive Cyber Defense - Control- and Game-Theoretic Approaches to Cyber Security</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Sushil Jajodia</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>George Cybenko</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Peng Liu</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Cliff Wang</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Michael Wellman</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9783030307196</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Switzerland</placeTerm>
    <publisher>Springer Nature</publisher>
    <dateIssued>2019</dateIssued>
   </place>
  </originInfo>
  <slims:image>Capture1.JPG.JPG</slims:image>
 </mods>
 <mods version="3.3" ID="5324">
  <titleInfo>
   <title>Hackers Beware</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Eric Cole</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">0735710090</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">united states of america</placeTerm>
    <publisher>New Riders Publishing</publisher>
    <dateIssued>2001</dateIssued>
   </place>
  </originInfo>
  <slims:image>Capture.JPG.JPG</slims:image>
 </mods>
 <mods version="3.3" ID="5323">
  <titleInfo>
   <title>Hack Proofing Your Web Applications</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Julie Traxler</namePart>
   <role>
    <roleTerm type="text">Composer</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Darren Meiss</namePart>
   <role>
    <roleTerm type="text">Editor</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">1928994318</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">united states of america</placeTerm>
    <publisher>Syngress Publishing, Inc</publisher>
    <dateIssued>2001</dateIssued>
   </place>
  </originInfo>
  <slims:image>Capture.JPG.JPG</slims:image>
 </mods>
 <mods version="3.3" ID="5315">
  <titleInfo>
   <title>Hack Proofing Sun Solaris 8</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Wyman Miles</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Ed Mitchell</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>F. William Lynch</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Randy Cook</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">192899444X</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">united states of america</placeTerm>
    <publisher>Syngress Publishing, Inc</publisher>
    <dateIssued>2001</dateIssued>
   </place>
  </originInfo>
  <slims:image>Capture.JPG.JPG</slims:image>
 </mods>
</modsCollection>
