<?xml version="1.0" encoding="UTF-8" ?>
<modsCollection xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" xmlns:slims="http://slims.web.id" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-3.xsd">
<slims:resultInfo>
<slims:modsResultNum>11</slims:modsResultNum>
<slims:modsResultPage>1</slims:modsResultPage>
<slims:modsResultShowed>10</slims:modsResultShowed>
</slims:resultInfo>
<mods version="3.3" ID="9750">
<titleInfo>
<title>Komputer Audit dan Sekuriti :</title>
<subTitle>Teknologi Digital dan Sistem Keamanan Komputer, System Development Life Cycle, Tinjauan Keamanan Fisisk, Persiapan Rencana Bencana, Computer Fraud, Non Technology Issues</subTitle>
</titleInfo>
<name type="personal" authority="">
<namePart>IBISA</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<identifier type="isbn">9786230135552</identifier>
<originInfo>
<place><placeTerm type="text">yogyakarta</placeTerm></place>
<publisher>Andi</publisher>
<dateIssued>2023</dateIssued>
</originInfo>
</mods>
<mods version="3.3" ID="9280">
<titleInfo>
<title>Belajar Security Jaringan Komputer Berbasis Certified Ethical Hacker (CEH) Edisi 2</title>
</titleInfo>
<name type="personal" authority="">
<namePart>Rifkie Primartha</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<identifier type="isbn">9786237131748</identifier>
<originInfo>
<place><placeTerm type="text">Bandung</placeTerm></place>
<publisher>Informatika Bandung</publisher>
<dateIssued>2023</dateIssued>
</originInfo>
</mods>
<mods version="3.3" ID="8453">
<titleInfo>
<title>Data and Cyber Security :</title>
<subTitle>Security, Use Case and Governance</subTitle>
</titleInfo>
<name type="personal" authority="">
<namePart>Rudi Rusdiah</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<name type="personal" authority="">
<namePart>Hammam Riza</namePart>
<role><roleTerm type="text">Additional Author</roleTerm></role>
</name>
<name type="personal" authority="">
<namePart>David Darmawan</namePart>
<role><roleTerm type="text">Additional Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<identifier type="isbn">9786239267223</identifier>
<originInfo>
<place><placeTerm type="text">Jakarta</placeTerm></place>
<publisher>Perkumpulan Basis Data Indonesia</publisher>
<dateIssued>2020</dateIssued>
</originInfo>
<slims:image>Data_and_Cyber_Security_-_Security%2C_Use_Case_and_Governance.jpg.jpg</slims:image>
</mods>
<mods version="3.3" ID="7888">
<titleInfo>
<title>Pencegahan Serangan SQL Injection Pada Web</title>
</titleInfo>
<name type="personal" authority="">
<namePart>Elni Enita Manurung</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<identifier type="isbn">9786022624936</identifier>
<originInfo>
<place><placeTerm type="text">yogyakarta</placeTerm></place>
<publisher>Graha Ilmu</publisher>
<dateIssued>2015</dateIssued>
</originInfo>
<slims:image>Pencegahan_Serangan_SQL_Injection_Pada_Web.jpg.jpg</slims:image>
</mods>
<mods version="3.3" ID="7887">
<titleInfo>
<title>Teknik Hacking Android</title>
</titleInfo>
<name type="personal" authority="">
<namePart>Dedik Kurniawan</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<identifier type="isbn">9786230000973</identifier>
<originInfo>
<place><placeTerm type="text">Jakarta</placeTerm></place>
<publisher>Elex Media Komputindo</publisher>
<dateIssued>2019</dateIssued>
</originInfo>
<slims:image>Teknik_Hacking_Android.jpg.jpg</slims:image>
</mods>
<mods version="3.3" ID="602">
<titleInfo>
<title>Trik Mudah Menangkal HAcker Cracker dan Virus</title>
</titleInfo>
<name type="personal" authority="">
<namePart>Sihombing,  Bram</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<name type="personal" authority="">
<namePart>Vandy Hidayat</namePart>
<role><roleTerm type="text">Editor</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<identifier type="isbn">9786029898835</identifier>
<originInfo>
<place><placeTerm type="text">yogyakarta</placeTerm></place>
<publisher>Aulya Publishing</publisher>
<dateIssued>2012</dateIssued>
</originInfo>
</mods>
<mods version="3.3" ID="603">
<titleInfo>
<title>Hacker &#38; Keamanan</title>
</titleInfo>
<name type="personal" authority="">
<namePart>Sitorus, Eryanto</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<identifier type="isbn">9799797315817</identifier>
<originInfo>
<place><placeTerm type="text">yogyakarta</placeTerm></place>
<publisher>Andi</publisher>
<dateIssued>2004</dateIssued>
</originInfo>
<slims:image>101-20150228134223-997030.jpg.jpg</slims:image>
</mods>
<mods version="3.3" ID="532">
<titleInfo>
<title>Protecting Your PC</title>
</titleInfo>
<name type="personal" authority="">
<namePart>Barile Ian</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<identifier type="isbn">9781584504863</identifier>
<originInfo>
<place><placeTerm type="text">Boston</placeTerm></place>
<publisher>Charles River Media</publisher>
<dateIssued>2006</dateIssued>
</originInfo>
</mods>
<mods version="3.3" ID="4796">
<titleInfo>
<title>Menanggulangi Virus Komputer di Perkantoran</title>
</titleInfo>
<name type="personal" authority="">
<namePart>Djarot Hadi</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<identifier type="isbn"></identifier>
<originInfo>
<place><placeTerm type="text">Jakarta</placeTerm></place>
<publisher>PT Elex Media Komputindo</publisher>
<dateIssued>1991</dateIssued>
</originInfo>
<slims:image>20130225124939.jpg.jpg</slims:image>
</mods>
<mods version="3.3" ID="3885">
<titleInfo>
<title>Wireless Hacking Ed. 3</title>
</titleInfo>
<name type="personal" authority="">
<namePart>Zam, Efvy Zamidra</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<identifier type="isbn">9786020236476</identifier>
<originInfo>
<place><placeTerm type="text">Jakarta</placeTerm></place>
<publisher>Elex Media Komputindo</publisher>
<dateIssued>2014</dateIssued>
</originInfo>
<slims:image>064de1cd3c9d37328ba62ff08c25472b.jpg.jpg</slims:image>
</mods>
</modsCollection>