<?xml version="1.0" encoding="UTF-8" ?>
<modsCollection xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" xmlns:slims="http://slims.web.id" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-3.xsd">
 <slims:resultInfo>
  <slims:modsResultNum>13</slims:modsResultNum>
  <slims:modsResultPage>1</slims:modsResultPage>
  <slims:modsResultShowed>10</slims:modsResultShowed>
 </slims:resultInfo>
 <mods version="3.3" ID="899">
  <titleInfo>
   <title>Sistem Alarm, Central Lock Dan Power Windows Pada Kendaraan</title>
  </titleInfo>
  <name type="Personal Name" authority="">
   <namePart>Arif Hidayatullah,</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <name type="Personal Name" authority="">
   <namePart>Safrodin</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9786028880534</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Yogyakarta</placeTerm>
    <publisher>Insania</publisher>
    <dateIssued>2012</dateIssued>
   </place>
  </originInfo>
  <slims:image>cover_sistem-alarm-central-lock-dan-power-windows-pada-kendaraan-20250815113229.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="688">
  <titleInfo>
   <title>Air Bag dan Safety Belt</title>
  </titleInfo>
  <name type="Personal Name" authority="">
   <namePart>Budi Maryono</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9786029122275</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Klaten</placeTerm>
    <publisher>Saka Mitra Kompetensi</publisher>
    <dateIssued>2011</dateIssued>
   </place>
  </originInfo>
  <slims:image>cover_air-bag-dan-safety-belt-20250808143502.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="1081">
  <titleInfo>
   <title>Keamanan Basis Data Relasional</title>
  </titleInfo>
  <name type="Personal Name" authority="">
   <namePart>Suwanto Raharjo</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <name type="Personal Name" authority="">
   <namePart>Ema Utami</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9786230125836</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Yogyakarta</placeTerm>
    <publisher>Andi</publisher>
    <dateIssued>2022</dateIssued>
   </place>
  </originInfo>
  <slims:image>cover_keamanan-basis-data-relasional-20250825105341.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="1089">
  <titleInfo>
   <title>Web Hacking:</title>
   <subTitle>Skenario &amp; Demo</subTitle>
  </titleInfo>
  <name type="Personal Name" authority="">
   <namePart>S'to</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9789791090223</identifier>
  <originInfo>
   <place>
    <placeTerm type="text"></placeTerm>
    <publisher>Jasakom</publisher>
    <dateIssued>2009</dateIssued>
   </place>
  </originInfo>
  <slims:image>cover_web-hacking-skenario-demo-20250825111953.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="1090">
  <titleInfo>
   <title>Tutorial 5 Hari:</title>
   <subTitle>Belajar Hacking dari Nol</subTitle>
  </titleInfo>
  <name type="Organizational Body" authority="">
   <namePart>Wahana Komputer</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9789792913309</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Yogyakarta dan Semarang</placeTerm>
    <publisher>Kerjasama Penerbit Andi dengan Wahana Komputer</publisher>
    <dateIssued>2010</dateIssued>
   </place>
  </originInfo>
  <slims:image>cover_tutorial-5-hari-belajar-hacking-dari-nol-20250825112329.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="1208">
  <titleInfo>
   <title>Cyberscurity For Dummies</title>
  </titleInfo>
  <name type="Personal Name" authority="">
   <namePart>Joseph Steinberg</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9781119867180</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">New Jersey</placeTerm>
    <publisher>John Wiley &amp; Sons</publisher>
    <dateIssued>2022</dateIssued>
   </place>
  </originInfo>
  <slims:image>cover_cyberscurity-for-dummies-20250918095743.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="1066">
  <titleInfo>
   <title>Keamanan Sistem Informasi</title>
  </titleInfo>
  <name type="Personal Name" authority="">
   <namePart>Ibisa</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9789792917925</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Yogyakarta</placeTerm>
    <publisher>Andi</publisher>
    <dateIssued>2011</dateIssued>
   </place>
  </originInfo>
  <slims:image>cover_keamanan-sistem-informasi-20250822113108.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="1216">
  <titleInfo>
   <title>Cloud Computing with Security</title>
  </titleInfo>
  <name type="Personal Name" authority="">
   <namePart>Naresh Kumar Sehgal</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <name type="Personal Name" authority="">
   <namePart>Pramod Chandra P. Bhatt</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <name type="Personal Name" authority="">
   <namePart>john M. Acken</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9783030246143</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Jerman</placeTerm>
    <publisher>Springer</publisher>
    <dateIssued>2021</dateIssued>
   </place>
  </originInfo>
  <slims:image>cover_cloud-computing-with-security-20250918105817.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="1239">
  <titleInfo>
   <title>Bongkar Rahasia E-bank Security dengan Teknik Hacking dan Carding</title>
  </titleInfo>
  <name type="Personal Name" authority="">
   <namePart>Vyctoria</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9789792934663</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Yogyakarta</placeTerm>
    <publisher>Andi</publisher>
    <dateIssued>2013</dateIssued>
   </place>
  </originInfo>
  <slims:image>cover_bongkar-rahasia-e-bank-security-dengan-teknik-hacking-dan-carding-20251028110757.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="942">
  <titleInfo>
   <title>Melumpuhkan Hacker dengan Web Application Firewall (WAF)</title>
  </titleInfo>
  <name type="Personal Name" authority="">
   <namePart>Pringgo Digdo Girindro</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9789792953091</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Yogyakarta</placeTerm>
    <publisher>Andi</publisher>
    <dateIssued>2016</dateIssued>
   </place>
  </originInfo>
  <slims:image>cover_melumpuhkan-hacker-dengan-web-application-firewall-waf-20250819104025.jpg</slims:image>
 </mods>
</modsCollection>
