<?xml version="1.0" encoding="UTF-8" ?>
<modsCollection xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" xmlns:slims="http://slims.web.id" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-3.xsd">
 <slims:resultInfo>
  <slims:modsResultNum>64</slims:modsResultNum>
  <slims:modsResultPage>1</slims:modsResultPage>
  <slims:modsResultShowed>20</slims:modsResultShowed>
 </slims:resultInfo>
 <mods version="3.3" ID="7537">
  <titleInfo>
   <title>(Ebook) Essential cybersecurity science :</title>
   <subTitle>build, test, and evaluate secure system</subTitle>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Dykstra, Josiah</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9781491920947</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Sebastopol</placeTerm>
    <publisher>O'reilly Media</publisher>
    <dateIssued>2016</dateIssued>
   </place>
  </originInfo>
  <slims:digitals>
   <slims:digital_item id="812" url="https://drive.google.com/file/d/1JYD62uUMnAYtdaXRQRfzV5SngC3SLzsw/view?usp=sharing" path="/https://drive.google.com/file/d/1JYD62uUMnAYtdaXRQRfzV5SngC3SLzsw/view?usp=sharing" mimetype="text/uri-list"><![CDATA[Essential cybersecurity science : build, test, and evaluate secure system]]></slims:digital_item>
  </slims:digitals>
  <slims:image>EB21.jpg.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="16">
  <titleInfo>
   <title>Internet firewall</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Ariyus, Dony</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9789797561444</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Yogyakarta</placeTerm>
    <publisher>Graha Ilmu</publisher>
    <dateIssued>2006</dateIssued>
   </place>
  </originInfo>
  <slims:image>004012.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="350">
  <titleInfo>
   <title>Tip &amp; trik menyembunyikan file rahasia</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Amperiyanto, Tri</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9786020204628</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Jakarta</placeTerm>
    <publisher>Elex Media Komputindo</publisher>
    <dateIssued>2013</dateIssued>
   </place>
  </originInfo>
  <slims:image>005324.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="2321">
  <titleInfo>
   <title>Teknik menangkal kejahatan internet untuk pemula</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Juju, Dominikus</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <name type="corporate" authority="">
   <namePart>MataMaya Studio</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9789792733877</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Jakarta</placeTerm>
    <publisher>Elex Media Komputindo</publisher>
    <dateIssued>2008</dateIssued>
   </place>
  </originInfo>
  <slims:image>Teknik_Menangkal_Kejahatan_Internet.jpg.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="2645">
  <titleInfo>
   <title>The art of intrusion:</title>
   <subTitle>the real stories behind the exploits of hackers, intruders and deceivers</subTitle>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Mitnick, Kevin</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Simon, William L.</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9780471782667</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Indianapolis</placeTerm>
    <publisher>Wiley Publishing</publisher>
    <dateIssued>2006</dateIssued>
   </place>
  </originInfo>
  <slims:image>005.8_MIT_a.jpg.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="2307">
  <titleInfo>
   <title>Information security:</title>
   <subTitle>principles and practice</subTitle>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Stamp, Mark</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9780470626399</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Hoboken</placeTerm>
    <publisher>John Wiley &amp; Sons</publisher>
    <dateIssued>2011</dateIssued>
   </place>
  </originInfo>
  <slims:image>Information_security_Principles_and_practice.jpg.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="2028">
  <titleInfo>
   <title>Security jaringan komputer berbasis ceh</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Primartha, Rifkie</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9786026232571</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Bandung</placeTerm>
    <publisher>Penerbit Informatika</publisher>
    <dateIssued>2017</dateIssued>
   </place>
  </originInfo>
  <slims:image>SITI023.jpg.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="5427">
  <titleInfo>
   <title>Harmless hacking:</title>
   <subTitle>malware analysis dan vulnerability development</subTitle>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Perdhana, Mada R</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9789797567200</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Yogyakarta</placeTerm>
    <publisher>Graha Ilmu</publisher>
    <dateIssued>2015</dateIssued>
   </place>
  </originInfo>
  <slims:image>cover_harmless_hacking_malware_analysis_dan_vulnerability_development.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="2465">
  <titleInfo>
   <title>Information security fundamentals</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Peltier, Thomas</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Peltier, Justin</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Blackley, John</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9780471738480</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Boca Raton</placeTerm>
    <publisher>Auerbach Publications</publisher>
    <dateIssued>2005</dateIssued>
   </place>
  </originInfo>
  <slims:image>Information_security_fundamentals.jpg.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="6377">
  <titleInfo>
   <title>Niat perilaku generasi z dan milenial dalam menggunakan fitur pay later (SKRIPSI MB)</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Suparman, Michelle</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn"></identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Tangerang</placeTerm>
    <publisher>Universitas Pradita</publisher>
    <dateIssued>2024</dateIssued>
   </place>
  </originInfo>
  <slims:image>Cover_skripsi_Manajemen_Bisnis.JPG.JPG</slims:image>
 </mods>
 <mods version="3.3" ID="4979">
  <titleInfo>
   <title>Evaluasi keamanan penggunaan protokol lora pada aplikasi sistem iot:</title>
   <subTitle>studi kasus agrikultural (SKRIPSI TI)</subTitle>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Plaudo, Dennis Anthony</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn"></identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Tangerang</placeTerm>
    <publisher>Universitas Pradita</publisher>
    <dateIssued>2022</dateIssued>
   </place>
  </originInfo>
  <slims:image>Cover_skripsi.jpg.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="3806">
  <titleInfo>
   <title>Information and security assurance s14</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Kisworo, Marsudi Wahyu</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn"></identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Jakarta</placeTerm>
    <publisher>Kementerian Pertahanan RI</publisher>
    <dateIssued>n.p.</dateIssued>
   </place>
  </originInfo>
  <slims:image>005.8_KIS_i.jpg.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="3794">
  <titleInfo>
   <title>Security governance, risk and compliance management s3</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Kisworo, Marsudi Wahyu</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn"></identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Jakarta</placeTerm>
    <publisher>Kementerian Pertahanan RI</publisher>
    <dateIssued>n.p.</dateIssued>
   </place>
  </originInfo>
  <slims:image>005.8_KIS_s.jpg.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="3819">
  <titleInfo>
   <title>Security standards s23</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Kisworo, Marsudi Wahyu</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn"></identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Jakarta</placeTerm>
    <publisher>Kementerian Pertahanan RI</publisher>
    <dateIssued>n.p.</dateIssued>
   </place>
  </originInfo>
  <slims:image>005.8_KIS_s2.jpg.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="3823">
  <titleInfo>
   <title>Third party technology assurance s27</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Lukas</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn"></identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Jakarta</placeTerm>
    <publisher>Kementerian Pertahanan RI</publisher>
    <dateIssued>n.p.</dateIssued>
   </place>
  </originInfo>
  <slims:image>005.8_LUK_t.jpg.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="3797">
  <titleInfo>
   <title>Cyber security strategic planning s6</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Indrajit, Richardus Eko</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn"></identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Jakarta</placeTerm>
    <publisher>Kementerian Pertahanan RI</publisher>
    <dateIssued>n.p.</dateIssued>
   </place>
  </originInfo>
  <slims:image>005.8_IND_c.jpg.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="3814">
  <titleInfo>
   <title>Database and software security s18</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Indiarto, Budi</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn"></identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Jakarta</placeTerm>
    <publisher>Kementerian Pertahanan RI</publisher>
    <dateIssued>n.p.</dateIssued>
   </place>
  </originInfo>
  <slims:image>005.8_IND_d.jpg.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="3793">
  <titleInfo>
   <title>Internet and information security foundation s2</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Indrajit, Richardus Eko</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn"></identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Jakarta</placeTerm>
    <publisher>Kementerian Pertahanan RI</publisher>
    <dateIssued></dateIssued>
   </place>
  </originInfo>
  <slims:image>005.8_IND_i.jpg.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="3799">
  <titleInfo>
   <title>Cryptography and data protection s8</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Indiarto, Budi</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn"></identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Jakarta</placeTerm>
    <publisher>Kementerian Pertahanan RI</publisher>
    <dateIssued>n.p.</dateIssued>
   </place>
  </originInfo>
  <slims:image>005.8_IND_c2.jpg.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="3822">
  <titleInfo>
   <title>Physical security s26</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Fauzi, Muhamad</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Alfian, Tino</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn"></identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Jakarta</placeTerm>
    <publisher>Kementerian Pertahanan RI</publisher>
    <dateIssued>n.p.</dateIssued>
   </place>
  </originInfo>
  <slims:image>005.8_FAU_p.jpg.jpg</slims:image>
 </mods>
</modsCollection>
