<?xml version="1.0" encoding="UTF-8" ?>
<modsCollection xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" xmlns:slims="http://slims.web.id" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-3.xsd">
 <slims:resultInfo>
  <slims:modsResultNum>11</slims:modsResultNum>
  <slims:modsResultPage>1</slims:modsResultPage>
  <slims:modsResultShowed>10</slims:modsResultShowed>
 </slims:resultInfo>
 <mods version="3.3" ID="132119">
  <titleInfo>
   <title>Hacking untuk pemula</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>RAFIKA</namePart>
   <role>
    <roleTerm type="text">Editor</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>DEDIK KURNIAWAN</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9786230059094</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Jakarta</placeTerm>
    <publisher>ELEX MEDIA KOMPUTINDO</publisher>
    <dateIssued>2024</dateIssued>
   </place>
  </originInfo>
  <slims:image>bd4bb5ed577e7d8a3123ca2fa9d7c8e3.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="34072">
  <titleInfo>
   <title>Microsoft encyclopedia of security</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>TULLOCH, MITCH</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">0735618771</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">America</placeTerm>
    <publisher>Microsoft Press</publisher>
    <dateIssued>2003</dateIssued>
   </place>
  </originInfo>
 </mods>
 <mods version="3.3" ID="122472">
  <titleInfo>
   <title>Menghapus virus secara manual</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>SYAIFUL KABIR</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9786029784260</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Jogjakarta</placeTerm>
    <publisher>FlashBooks</publisher>
    <dateIssued>2011</dateIssued>
   </place>
  </originInfo>
  <slims:image>122472.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="86088">
  <titleInfo>
   <title>Virus pergi tak kembali selamanya dari laptop dan komputer</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>SHOLECHUL AZIS</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>SAHRUL IVANI</namePart>
   <role>
    <roleTerm type="text">Editor</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">6027751738</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Jawa Tengah</placeTerm>
    <publisher>Kunci Komunikasi</publisher>
    <dateIssued>2013</dateIssued>
   </place>
  </originInfo>
  <slims:image>86088.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="85311">
  <titleInfo>
   <title>Evaluasi pengontrolan sistem informasi</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>IRWAN ISA</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9789797568467</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Yogyakarta</placeTerm>
    <publisher>Graha Ilmu</publisher>
    <dateIssued>2012</dateIssued>
   </place>
  </originInfo>
  <slims:image>85311.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="85317">
  <titleInfo>
   <title>Konsep dan strategi keamanan informasi di dunia cyber</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>RICHARDUS EKO INDRAJIT</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9786022622345</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Yogyakarta</placeTerm>
    <publisher>Graha Ilmu</publisher>
    <dateIssued>2014</dateIssued>
   </place>
  </originInfo>
  <slims:image>85317.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="83733">
  <titleInfo>
   <title>Physical security:</title>
   <subTitle>mencegah serangan terhadap pendukung sistem informasi</subTitle>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>IBISA</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>THERESIA ARIE PROBAWATI</namePart>
   <role>
    <roleTerm type="text">Editor</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9789792940558</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Yogyakarta</placeTerm>
    <publisher>Andi Yogyakarta</publisher>
    <dateIssued>2013</dateIssued>
   </place>
  </originInfo>
  <slims:image>83733.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="75768">
  <titleInfo>
   <title>Sistem Keamanan Informasi pada Pusat Teknologi Informasi dan Komunikasi Universitas Syiah Kuala</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>AMRI</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>SAYUTHI</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn"></identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Banda Aceh</placeTerm>
    <publisher>Fakultas Ekonomi Jurusan Akuntansi</publisher>
    <dateIssued>2012</dateIssued>
   </place>
  </originInfo>
 </mods>
 <mods version="3.3" ID="23720">
  <titleInfo>
   <title>Information Security Governance :</title>
   <subTitle>A Parctical Development and Implementation Approach</subTitle>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>BROTBY, KRAG</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9780470131183</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Canada</placeTerm>
    <publisher>John Wiley &amp; Sons</publisher>
    <dateIssued>2009</dateIssued>
   </place>
  </originInfo>
 </mods>
 <mods version="3.3" ID="24283">
  <titleInfo>
   <title>Internet fraud casebook:</title>
   <subTitle>The world wide web of deceit</subTitle>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>WELLS, JOSEPH T.</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9780470643631</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">New Jersey</placeTerm>
    <publisher>John Wiley and Sons, Inc.</publisher>
    <dateIssued>2010</dateIssued>
   </place>
  </originInfo>
 </mods>
</modsCollection>
