<?xml version="1.0" encoding="UTF-8" ?>
<modsCollection xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" xmlns:slims="http://slims.web.id" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-3.xsd">
 <slims:resultInfo>
  <slims:modsResultNum>8</slims:modsResultNum>
  <slims:modsResultPage>1</slims:modsResultPage>
  <slims:modsResultShowed>10</slims:modsResultShowed>
 </slims:resultInfo>
 <mods version="3.3" ID="18902">
  <titleInfo>
   <title>TCL 8.5 Network programming :</title>
   <subTitle>Buil network-aware application using Tcl, a powerful dynamic programming language</subTitle>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Beltowski, Piotr</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Kocjan, Wojciech</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9781849510967</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Birmingham</placeTerm>
    <publisher>Packt Publishing</publisher>
    <dateIssued>2010</dateIssued>
   </place>
  </originInfo>
  <slims:image>cover_tcl_8_5_network_programming_buil_network_aware_application_using_tcl_a_powerful_dynamic_progra</slims:image>
 </mods>
 <mods version="3.3" ID="18800">
  <titleInfo>
   <title>Network:</title>
   <subTitle>Tweaking dan Hacking: trik menjelajahi jaringan yang jarang diungkapkan</subTitle>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Efvy, Zam</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9786020497082</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Jakarta</placeTerm>
    <publisher>PT Elex Media Komputindo</publisher>
    <dateIssued>2019</dateIssued>
   </place>
  </originInfo>
  <slims:image>cover_network_tweaking_dan_hacking_trik_menjelajahi_jaringan_yang_jarang_diungkapkan.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="18790">
  <titleInfo>
   <title>Network Hacking Dengan Linux BackTrack</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Wahana Komputer</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9789792932379</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">semarang</placeTerm>
    <publisher>Andi</publisher>
    <dateIssued>2012</dateIssued>
   </place>
  </originInfo>
  <slims:image>cover_network_hacking_dengan_linux_backtrack.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="18982">
  <titleInfo>
   <title>Network Security dan Cyber Security :</title>
   <subTitle>Teori dan praktik CISNO CCNA, Linux, Windows, Amazon AWS, Android</subTitle>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Rifkie,  Primartha</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Iwan, Sofana</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9786237131038</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Bandung</placeTerm>
    <publisher>Informatka</publisher>
    <dateIssued>2019</dateIssued>
   </place>
  </originInfo>
  <slims:image>cover_network_security_dan_cyber_security_teori_dan_praktik_cisno_ccna_linux_windows_amazon_aws_andr</slims:image>
 </mods>
 <mods version="3.3" ID="19538">
  <titleInfo>
   <title>Network forensic :</title>
   <subTitle>Panduan analisis &amp; investigasi paket data jaringan menggunakan wireshark</subTitle>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Agus, Kurniawan</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9789792933369</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Yogyakarta</placeTerm>
    <publisher>Andi</publisher>
    <dateIssued>2012</dateIssued>
   </place>
  </originInfo>
  <slims:image>cover_network_forensic_panduan_analisis_investigasi_paket_data_jaringan_menggunakan_wireshark.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="19537">
  <titleInfo>
   <title>Konfigurasi wireless RouterBoard mikrotik</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Ino, Irvantino</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Hardana</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">0789792917895</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Yogyakarta</placeTerm>
    <publisher>Andi</publisher>
    <dateIssued>2011</dateIssued>
   </place>
  </originInfo>
  <slims:image>cover_konfigurasi_wireless_routerboard_mikrotik.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="20159">
  <titleInfo>
   <title>Cryptography And Network Security  :</title>
   <subTitle>Principless And Practice</subTitle>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Stallings, William</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9780136097044</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">USA</placeTerm>
    <publisher>Pearson</publisher>
    <dateIssued>2011</dateIssued>
   </place>
  </originInfo>
  <slims:image>cover_cryptography_and_network_security_principless_and_practice.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="19193">
  <titleInfo>
   <title>Network programming</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Murty, Katta Gopalakrishna</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn"></identifier>
  <originInfo>
   <place>
    <placeTerm type="text">USA</placeTerm>
    <publisher></publisher>
    <dateIssued>2006</dateIssued>
   </place>
  </originInfo>
 </mods>
</modsCollection>
