<?xml version="1.0" encoding="UTF-8" ?>
<modsCollection xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" xmlns:slims="http://slims.web.id" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-3.xsd">
 <slims:resultInfo>
  <slims:modsResultNum>10</slims:modsResultNum>
  <slims:modsResultPage>1</slims:modsResultPage>
  <slims:modsResultShowed>10</slims:modsResultShowed>
 </slims:resultInfo>
 <mods version="3.3" ID="5134">
  <titleInfo>
   <title>International Relations in the Cyber Age :</title>
   <subTitle>the Co-evolution Dilemma</subTitle>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Choucri, Nazli</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Clark, David D.</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9780262038911</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Cambridge</placeTerm>
    <publisher>The MIT Press</publisher>
    <dateIssued>2018</dateIssued>
   </place>
  </originInfo>
  <slims:image>International_relations_in_the_cyber_age_the_co-evolution_dilemma.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="5055">
  <titleInfo>
   <title>Cyberspace and International Relations:</title>
   <subTitle>Theory, Prospects and Challenges</subTitle>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Kremer, Jan-Frederik</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Müller, Benedikt</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9783642374807</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Berlin</placeTerm>
    <publisher>Springer</publisher>
    <dateIssued>2014</dateIssued>
   </place>
  </originInfo>
  <slims:image>0745662285_No16_CaIR270522.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="4356">
  <titleInfo>
   <title>Hadoop Security</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Spivey, Ben</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Echeverria, Joey</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9781491900987</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">California</placeTerm>
    <publisher>OReilly</publisher>
    <dateIssued>2015</dateIssued>
   </place>
  </originInfo>
  <slims:image>Hadoop_Security.jpg.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="4100">
  <titleInfo>
   <title>Computer security :</title>
   <subTitle>principles and practice</subTitle>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Stallings, William</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Brown, Lawrie</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9781292220611</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">New York</placeTerm>
    <publisher>Pearson</publisher>
    <dateIssued>2018</dateIssued>
   </place>
  </originInfo>
  <slims:image>Computer_security%2C_principles_and_practice.jpg.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="3886">
  <titleInfo>
   <title>Cybersecurity :</title>
   <subTitle>geopolitics, law, and policy</subTitle>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Guiora, Amos N.</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">978113803329</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Oxon</placeTerm>
    <publisher>Routledge</publisher>
    <dateIssued>2017</dateIssued>
   </place>
  </originInfo>
  <slims:image>Cybersecurity.jpeg.jpeg</slims:image>
 </mods>
 <mods version="3.3" ID="3615">
  <titleInfo>
   <title>Cryptography and Network Security :</title>
   <subTitle>principles and practice</subTitle>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Stallings, William</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9781292158587</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Essex</placeTerm>
    <publisher>Pearson</publisher>
    <dateIssued>2017</dateIssued>
   </place>
  </originInfo>
  <slims:image>Cryptography_and_Network_Security.jpg.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="2513">
  <titleInfo>
   <title>Electronic Commerce :</title>
   <subTitle>security, risk management and control</subTitle>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Greenstein, Marilyn</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Feinman, Todd M.</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9780072292893</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Boston</placeTerm>
    <publisher>McGraw Hill</publisher>
    <dateIssued>2000</dateIssued>
   </place>
  </originInfo>
  <slims:image>Electronic_Commerce_security_%2C_risk_management_and_control.jpg.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="1737">
  <titleInfo>
   <title>Computer And Information Security Handbook</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Vacca, John R.</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9780123943972</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Massachusetts</placeTerm>
    <publisher>Morgan Kaufmann</publisher>
    <dateIssued>2013</dateIssued>
   </place>
  </originInfo>
  <slims:image>Computer_And_Information_Security_Handbook.jpg.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="1062">
  <titleInfo>
   <title>ICT Systems Security and Privacy Protection :</title>
   <subTitle>30 th IFIP TC 11 international conference, SEC 2015, Hamburg, Germany, May 26-28, 2015 : proceedings</subTitle>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Federrath, Hannes</namePart>
   <role>
    <roleTerm type="text">Editor</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Gollmann, Dieter</namePart>
   <role>
    <roleTerm type="text">Editor</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9783319184661</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">New York</placeTerm>
    <publisher>Springer</publisher>
    <dateIssued>2015</dateIssued>
   </place>
  </originInfo>
  <slims:image>ICT_Systems_Security_and_Privacy_Protection.jpg.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="733">
  <titleInfo>
   <title>Trust, Privacy, and Security in Digital Business :</title>
   <subTitle>11th international conference, TrustBus 2014 Munich, Germany, September 2-3, 2014, proceedings</subTitle>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Eckert, Claudia</namePart>
   <role>
    <roleTerm type="text">Editor</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Katsikas, Sokratis K.</namePart>
   <role>
    <roleTerm type="text">Editor</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Pernul, Gunther</namePart>
   <role>
    <roleTerm type="text">Editor</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9783319097695</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Switzerland</placeTerm>
    <publisher>Springer</publisher>
    <dateIssued>2014</dateIssued>
   </place>
  </originInfo>
  <slims:image>Trust%2C_Privacy%2C_and_Security_in_Digital_Business%2C_11th_international_conference.jpg.jpg</slims:image>
 </mods>
</modsCollection>
