<?xml version="1.0" encoding="UTF-8" ?>
<modsCollection xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" xmlns:slims="http://slims.web.id" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-3.xsd">
 <slims:resultInfo>
  <slims:modsResultNum>15</slims:modsResultNum>
  <slims:modsResultPage>1</slims:modsResultPage>
  <slims:modsResultShowed>50</slims:modsResultShowed>
 </slims:resultInfo>
 <mods version="3.3" ID="3836">
  <titleInfo>
   <title>Information technology Security and Risk Management</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Jill Slay</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Andy Koronios</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">0470805749</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Australia</placeTerm>
    <publisher>John Willey &amp; Sons</publisher>
    <dateIssued>2006</dateIssued>
   </place>
  </originInfo>
  <slims:image>scan0223.r.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="8552">
  <titleInfo>
   <title>Penanganan Keamanan Jaringan Komputer</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Bambang Kelana Simpony</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Kyla Salwa Putri Denilla</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Ratu Riqsa Aqidah Ridwan</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Muhammad Ikhsan</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9786236433188</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">YOGYAKARTA</placeTerm>
    <publisher>Teknosain</publisher>
    <dateIssued>2021</dateIssued>
   </place>
  </originInfo>
  <slims:image>230112.jpg.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="5794">
  <titleInfo>
   <title>Physical security mencegah serangan terhadap pendukung sistem informasi</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Ibisa</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9789792940558</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">YOGYAKARTA</placeTerm>
    <publisher>ANDI</publisher>
    <dateIssued>2013</dateIssued>
   </place>
  </originInfo>
  <slims:image>scan0501an.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="8300">
  <titleInfo>
   <title>Membangun dan menguji keamanan website :</title>
   <subTitle>Panduan praktis bagi developer dan tester</subTitle>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Onno W. Purbo</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Hartono</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9786230128073</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">YOGYAKARTA</placeTerm>
    <publisher>Andi Offset</publisher>
    <dateIssued>2022</dateIssued>
   </place>
  </originInfo>
  <slims:image>03.jpg.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="7697">
  <titleInfo>
   <title>Computer security:</title>
   <subTitle>principles and practice</subTitle>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>William Stallings</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Lawrie Brown</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9781292220611</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">England</placeTerm>
    <publisher>Pearson</publisher>
    <dateIssued>2018</dateIssued>
   </place>
  </originInfo>
  <slims:image>scan60.pa18.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="121">
  <titleInfo>
   <title>Tutorial 5 Hari:</title>
   <subTitle>Belajar Hacking Dari Nol</subTitle>
  </titleInfo>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9789792913309</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">YOGYAKARTA</placeTerm>
    <publisher>ANDI</publisher>
    <dateIssued>2010</dateIssued>
   </place>
  </originInfo>
  <slims:image>scan0478z.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="7338">
  <titleInfo>
   <title>Computer security fundamentals</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Chuck Easttom</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9780789757463</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Amerika</placeTerm>
    <publisher>Pearson</publisher>
    <dateIssued>2016</dateIssued>
   </place>
  </originInfo>
  <slims:image>scan131.pa17.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="7056">
  <titleInfo>
   <title>Kungfu hacking dengan Nmap (automatic vulnerability scanning)</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Mr.Doel</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9789792952667</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">YOGYAKARTA</placeTerm>
    <publisher>ANDI</publisher>
    <dateIssued>2016</dateIssued>
   </place>
  </originInfo>
  <slims:image>scan31ai16.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="7058">
  <titleInfo>
   <title>Melumpuhkan hacker dengan web application firewall (WAF)</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Girindro Pringgo Digdo</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9789792953091</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">YOGYAKARTA</placeTerm>
    <publisher>ANDI</publisher>
    <dateIssued>2016</dateIssued>
   </place>
  </originInfo>
  <slims:image>scan18ai16.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="7053">
  <titleInfo>
   <title>Komputer Forensik melacak kejahatan Digital</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Feri Sulianta</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9789792952971</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">YOGYAKARTA</placeTerm>
    <publisher>ANDI</publisher>
    <dateIssued>2016</dateIssued>
   </place>
  </originInfo>
  <slims:image>scan17ai16.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="7799">
  <titleInfo>
   <title>Keamanan Informasi dan Internet:</title>
   <subTitle>Modul pembelajaran berbasis Standar Kompetensi dan Kualifikasi Kerja No 6</subTitle>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Richardus Eko Indrajit</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9786026029652</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">YOGYAKARTA</placeTerm>
    <publisher>Preinexus</publisher>
    <dateIssued>2016</dateIssued>
   </place>
  </originInfo>
  <slims:image>scan01.inf18.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="7301">
  <titleInfo>
   <title>Security Intelligence :</title>
   <subTitle>A practitioner's guide to solving enterprise security challenges</subTitle>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Qing Li</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Gregory Clark</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9781118896693</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">USA</placeTerm>
    <publisher>Wiley</publisher>
    <dateIssued>2015</dateIssued>
   </place>
  </originInfo>
  <slims:image>scan114.pa17.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="7506">
  <titleInfo>
   <title>Panduan Audit Keamanan Komputer Bagi pemula</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Girindo Pringgo Digdo</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9786020401812</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">JAKARTA</placeTerm>
    <publisher>Elex Media Komputindo</publisher>
    <dateIssued>2017</dateIssued>
   </place>
  </originInfo>
  <slims:image>scan20.pa18.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="7326">
  <titleInfo>
   <title>Computer Security :</title>
   <subTitle>Principles Practice</subTitle>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>William Stallings</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Lawrie Brown</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9781292066172</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">England</placeTerm>
    <publisher>Pearson</publisher>
    <dateIssued>2015</dateIssued>
   </place>
  </originInfo>
  <slims:image>scan127.pa17.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="7336">
  <titleInfo>
   <title>Corporate Computer Security</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Raymond R. Panko</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Randall J. Boyle</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9781292060453</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Amerika</placeTerm>
    <publisher>Pearson</publisher>
    <dateIssued>2015</dateIssued>
   </place>
  </originInfo>
  <slims:image>scan135.pa17.jpg</slims:image>
 </mods>
</modsCollection>
