<?xml version="1.0" encoding="UTF-8" ?>
<modsCollection xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" xmlns:slims="http://slims.web.id" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-3.xsd">
<slims:resultInfo>
<slims:modsResultNum>8</slims:modsResultNum>
<slims:modsResultPage>1</slims:modsResultPage>
<slims:modsResultShowed>10</slims:modsResultShowed>
</slims:resultInfo>
<mods version="3.3" ID="14166">
<titleInfo>
<title>Computer Forensics :</title>
<subTitle>Investigating Network Intrusion And Cybercrime ( Teknologi Informasi )</subTitle>
</titleInfo>
<name type="personal" authority="">
<namePart>EC Council</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<identifier type="isbn">9781305883505</identifier>
<originInfo>
<place><placeTerm type="text">Boston</placeTerm></place>
<publisher>Macdonald</publisher>
<dateIssued>2017</dateIssued>
</originInfo>
<slims:image>index16.jpg</slims:image>
</mods>
<mods version="3.3" ID="14164">
<titleInfo>
<title>Computer Forensics :</title>
<subTitle>Investigation Procedures and Response ( Teknologi Informasi )</subTitle>
</titleInfo>
<name type="personal" authority="">
<namePart>EC Council</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<identifier type="isbn">9781305883475</identifier>
<originInfo>
<place><placeTerm type="text">Boston</placeTerm></place>
<publisher>Macdonald</publisher>
<dateIssued>2017</dateIssued>
</originInfo>
<slims:image>index14.jpg</slims:image>
</mods>
<mods version="3.3" ID="14162">
<titleInfo>
<title>Ethical Hacking And Countermeasures:</title>
<subTitle>Web Applications And Data Servers ( Teknologi Informasi )</subTitle>
</titleInfo>
<name type="personal" authority="">
<namePart>EC Council</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<identifier type="isbn">9781305883451</identifier>
<originInfo>
<place><placeTerm type="text">Boston</placeTerm></place>
<publisher>Macdonald</publisher>
<dateIssued>2017</dateIssued>
</originInfo>
<slims:image>index12.jpg</slims:image>
</mods>
<mods version="3.3" ID="14161">
<titleInfo>
<title>Ethical Hacking And Countermeasures:</title>
<subTitle>Treats And Defense Mechanisms ( Teknologi Informasi )</subTitle>
</titleInfo>
<name type="personal" authority="">
<namePart>EC Council</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<identifier type="isbn">9781305883444</identifier>
<originInfo>
<place><placeTerm type="text">Boston</placeTerm></place>
<publisher>Marcel Dekker</publisher>
<dateIssued>2017</dateIssued>
</originInfo>
<slims:image>index11.jpg</slims:image>
</mods>
<mods version="3.3" ID="14160">
<titleInfo>
<title>Ethical Hacking And Countermeasures:</title>
<subTitle>Attack Phases ( Teknologi Informasi )</subTitle>
</titleInfo>
<name type="personal" authority="">
<namePart>EC Council</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<identifier type="isbn">9781305883437</identifier>
<originInfo>
<place><placeTerm type="text">Boston</placeTerm></place>
<publisher>Marcel Dekker</publisher>
<dateIssued>2017</dateIssued>
</originInfo>
<slims:image>index10.jpg</slims:image>
</mods>
<mods version="3.3" ID="14165">
<titleInfo>
<title>Computer Forensics :</title>
<subTitle>Investigating Data and Image files ( Teknologi Informasi )</subTitle>
</titleInfo>
<name type="personal" authority="">
<namePart>EC Council</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<identifier type="isbn">9781305883499</identifier>
<originInfo>
<place><placeTerm type="text">Boston</placeTerm></place>
<publisher>Macdonald</publisher>
<dateIssued>2017</dateIssued>
</originInfo>
<slims:image>index15.JPG</slims:image>
</mods>
<mods version="3.3" ID="14159">
<titleInfo>
<title>Ethical Hacking And Countermeasures:</title>
<subTitle>Secure Network Operating Systems and Infrastructures ( Teknologi Informasi )</subTitle>
</titleInfo>
<name type="corporate" authority="">
<namePart>EC Council</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<identifier type="isbn">9781305883468</identifier>
<originInfo>
<place><placeTerm type="text">Boston</placeTerm></place>
<publisher>Cengage Learning</publisher>
<dateIssued>2017</dateIssued>
</originInfo>
<slims:image>index9.jpg</slims:image>
</mods>
<mods version="3.3" ID="14163">
<titleInfo>
<title>Computer Forensics :</title>
<subTitle>Investigating File and Operating systems, Wireless networks, and Storage ( Teknologi Informasi )</subTitle>
</titleInfo>
<name type="personal" authority="">
<namePart>EC Council</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<identifier type="isbn">9781305883482</identifier>
<originInfo>
<place><placeTerm type="text">Boston</placeTerm></place>
<publisher>Macdonald</publisher>
<dateIssued>2017</dateIssued>
</originInfo>
<slims:image>index13.jpg</slims:image>
</mods>
</modsCollection>