<div style='display:none;'> SELECT biblio.biblio_id, biblio.title, biblio.image, biblio.isbn_issn,
              biblio.publish_year, pbl.publisher_name AS `publisher`, pplc.place_name AS `publish_place`, biblio.labels, biblio.input_date FROM biblio  LEFT JOIN mst_publisher AS pbl ON biblio.publisher_id=pbl.publisher_id  LEFT JOIN mst_place AS pplc ON biblio.publish_place_id=pplc.place_id  WHERE opac_hide=0 AND (biblio.biblio_id IN (SELECT bt.biblio_id FROM biblio_topic AS bt LEFT JOIN mst_topic AS t ON bt.topic_id=t.topic_id WHERE topic LIKE '%COMPUTER NETWORKS%'))  ORDER BY biblio.publish_year DESC, biblio.title ASC LIMIT 0, 20 </div><?xml version="1.0" encoding="UTF-8" ?>
<modsCollection xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" xmlns:slims="http://slims.web.id" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-3.xsd">
<slims:resultInfo>
<slims:modsResultNum>61</slims:modsResultNum>
<slims:modsResultPage>1</slims:modsResultPage>
<slims:modsResultShowed>20</slims:modsResultShowed>
</slims:resultInfo>
<mods version="3.3" ID="1007488">
<titleInfo>
<title>Cybersecurity. Third Edition</title>
</titleInfo>
<name type="personal" authority="">
<namePart>Steinberg, Joseph, 1904-</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<identifier type="isbn">9781394318728</identifier>
<originInfo>
<place><placeTerm type="text">Hoboken, NJ</placeTerm></place>
<publisher>John Wiley &#38; Sons</publisher>
<dateIssued>2025</dateIssued>
</originInfo>
<slims:image>138980755669e9a66156ce38.03877588.jpg</slims:image>
</mods>
<mods version="3.3" ID="1007292">
<titleInfo>
<title>Digital business and E-commerce management :</title>
<subTitle>strategy, implementation and practice. Eighth Edition</subTitle>
</titleInfo>
<name type="personal" authority="">
<namePart>Chaffey, Dave, 1963-</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<name type="personal" authority="">
<namePart>Arturi, Tanya</namePart>
<role><roleTerm type="text">Additional Author</roleTerm></role>
</name>
<name type="personal" authority="">
<namePart>Edmundson-Bird, David</namePart>
<role><roleTerm type="text">Additional Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<identifier type="isbn">9781292725833</identifier>
<originInfo>
<place><placeTerm type="text">Harlow, Essex</placeTerm></place>
<publisher>Pearson</publisher>
<dateIssued>2024</dateIssued>
</originInfo>
<slims:image>68838633169ae2fb89d2784.36678761.jpg</slims:image>
</mods>
<mods version="3.3" ID="1006393">
<titleInfo>
<title>Cybersecurity All-in-One for Dummies</title>
</titleInfo>
<name type="personal" authority="">
<namePart>Beaver, Kevin</namePart>
<role><roleTerm type="text">Additional Author</roleTerm></role>
</name>
<name type="personal" authority="">
<namePart>Steinberg, Joseph, 1904-</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<name type="personal" authority="">
<namePart>Winkler, Ira, 1962-</namePart>
<role><roleTerm type="text">Additional Author</roleTerm></role>
</name>
<name type="personal" authority="">
<namePart>Coombs, Ted, 1945-</namePart>
<role><roleTerm type="text">Additional Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<identifier type="isbn">9781394152858</identifier>
<originInfo>
<place><placeTerm type="text">Hoboken, NJ</placeTerm></place>
<publisher>John Wiley &#38; Sons</publisher>
<dateIssued>2023</dateIssued>
</originInfo>
<slims:image>185395077368afdff5ddc6e0.35698687.jpg</slims:image>
</mods>
<mods version="3.3" ID="20916">
<titleInfo>
<title>Computer security :</title>
<subTitle>principles and practice. Fourth Edition</subTitle>
</titleInfo>
<name type="personal" authority="">
<namePart>Stallings, William</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<name type="personal" authority="">
<namePart>Brown, Lawrie</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<identifier type="isbn">9781292220611</identifier>
<originInfo>
<place><placeTerm type="text">New York</placeTerm></place>
<publisher>Pearson</publisher>
<dateIssued>2018</dateIssued>
</originInfo>
<slims:image>qwrewrerf.gif.gif</slims:image>
</mods>
<mods version="3.3" ID="20860">
<titleInfo>
<title>Big data analytics in cybersecurity</title>
</titleInfo>
<name type="personal" authority="">
<namePart>Savas, Onur</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<name type="personal" authority="">
<namePart>Deng, Julia</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<identifier type="isbn">9781498772129</identifier>
<originInfo>
<place><placeTerm type="text">Boca Raton</placeTerm></place>
<publisher>CRC Press</publisher>
<dateIssued>2017</dateIssued>
</originInfo>
<slims:image>qwerty.jpeg.jpeg</slims:image>
</mods>
<mods version="3.3" ID="18540">
<titleInfo>
<title>Computer networking :</title>
<subTitle>a top-down approach featuring the Internet. Seventh Edition</subTitle>
</titleInfo>
<name type="personal" authority="">
<namePart>Kurose, James F</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<name type="personal" authority="">
<namePart>Ross, Keith W., 1956-</namePart>
<role><roleTerm type="text">Additional Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<identifier type="isbn">9781292153599</identifier>
<originInfo>
<place><placeTerm type="text">Boston</placeTerm></place>
<publisher>Pearson</publisher>
<dateIssued>2017</dateIssued>
</originInfo>
<slims:image>cd.jpg.jpg</slims:image>
</mods>
<mods version="3.3" ID="22863">
<titleInfo>
<title>Network forensics</title>
</titleInfo>
<name type="personal" authority="">
<namePart>Messier, Ric</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<identifier type="isbn">9781119328285</identifier>
<originInfo>
<place><placeTerm type="text">New York</placeTerm></place>
<publisher>John Wiley &#38; Sons</publisher>
<dateIssued>2017</dateIssued>
</originInfo>
<slims:image>396784745620dded77da910.17404089.jpg</slims:image>
</mods>
<mods version="3.3" ID="17102">
<titleInfo>
<title>Discovering computers 2016 :</title>
<subTitle>tools, apps, devices, and the impact of technology</subTitle>
</titleInfo>
<name type="personal" authority="">
<namePart>Vermaat, Misty</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<identifier type="isbn">9781305391857</identifier>
<originInfo>
<place><placeTerm type="text">Boston</placeTerm></place>
<publisher>Cengage Learning</publisher>
<dateIssued>2016</dateIssued>
</originInfo>
<slims:image>232e3a6cdfe4936218878da1dc95c67b.jpg.jpg</slims:image>
</mods>
<mods version="3.3" ID="13096">
<titleInfo>
<title>Black Hat Python :</title>
<subTitle>Python programming for hackers and pentesters</subTitle>
</titleInfo>
<name type="personal" authority="">
<namePart>Seitz, Justin</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<identifier type="isbn">9781593276553</identifier>
<originInfo>
<place><placeTerm type="text">San Francisco</placeTerm></place>
<publisher>No Starch Press</publisher>
<dateIssued>2015</dateIssued>
</originInfo>
<slims:image>Black_Hat_Python.jpg.jpg</slims:image>
</mods>
<mods version="3.3" ID="13152">
<titleInfo>
<title>Multinetics :</title>
<subTitle>jurnal multimedia networking informatics Vol. 1, No. 1, Mei 2015</subTitle>
</titleInfo>
<name type="corporate" authority="">
<namePart>Jurusan Teknik Informatika dan Komputer</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<identifier type="isbn">24432245</identifier>
<originInfo>
<place><placeTerm type="text">Jakarta</placeTerm></place>
<publisher>Politeknik Negeri Jakarta</publisher>
<dateIssued>2015</dateIssued>
</originInfo>
<slims:image>coverimg_13152.jpg</slims:image>
</mods>
<mods version="3.3" ID="13203">
<titleInfo>
<title>The hacker playbook 2 :</title>
<subTitle>practical guide to penetration testing</subTitle>
</titleInfo>
<name type="personal" authority="">
<namePart>Kim, Peter</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<identifier type="isbn">9781512214567</identifier>
<originInfo>
<place><placeTerm type="text">South Carolina</placeTerm></place>
<publisher>Secure Planet</publisher>
<dateIssued>2015</dateIssued>
</originInfo>
<slims:image>51AGeJy4HvL._SX348_BO1%2C204%2C203%2C200_.jpg.jpg</slims:image>
</mods>
<mods version="3.3" ID="14972">
<titleInfo>
<title>Crytography  and network security:</title>
<subTitle>principles and practice. Sixth Global Edition</subTitle>
</titleInfo>
<name type="personal" authority="">
<namePart>Stallings, William</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<identifier type="isbn">9780273793359</identifier>
<originInfo>
<place><placeTerm type="text">United States of America</placeTerm></place>
<publisher>Pearson Education Limited</publisher>
<dateIssued>2014</dateIssued>
</originInfo>
<slims:image>9780273793359-us.jpg.jpg</slims:image>
</mods>
<mods version="3.3" ID="5510">
<titleInfo>
<title>Membuat jaringan komputer di Windows dan Linux</title>
</titleInfo>
<name type="personal" authority="">
<namePart>Winarno, Edy</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<identifier type="isbn">9786020245959</identifier>
<originInfo>
<place><placeTerm type="text">Jakarta</placeTerm></place>
<publisher>Elex Media Komputindo</publisher>
<dateIssued>2014</dateIssued>
</originInfo>
<slims:image>51xHPRGCuyL.jpg.jpg</slims:image>
</mods>
<mods version="3.3" ID="5932">
<titleInfo>
<title>Networking+ illegal</title>
</titleInfo>
<name type="personal" authority="">
<namePart>Sto</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<identifier type="isbn">9789791090896</identifier>
<originInfo>
<place><placeTerm type="text">Jakarta</placeTerm></place>
<publisher>Jasakom</publisher>
<dateIssued>2014</dateIssued>
</originInfo>
<slims:image>73946_f.jpg.jpg</slims:image>
</mods>
<mods version="3.3" ID="11856">
<titleInfo>
<title>Computer networking :</title>
<subTitle>a top-down approach. Sixth International Edition</subTitle>
</titleInfo>
<name type="personal" authority="">
<namePart>Kurose, James F.</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<identifier type="isbn">9780273768968</identifier>
<originInfo>
<place><placeTerm type="text">Boston</placeTerm></place>
<publisher>Pearson</publisher>
<dateIssued>2013</dateIssued>
</originInfo>
<slims:image>%2B-%2B073832342_140.jpg.jpg</slims:image>
</mods>
<mods version="3.3" ID="2197">
<titleInfo>
<title>Computer networking:</title>
<subTitle>A top-down approach. Sixth Edition</subTitle>
</titleInfo>
<name type="personal" authority="">
<namePart>Kurose, James F.</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<name type="personal" authority="">
<namePart>Ross, Keith W., 1956-</namePart>
<role><roleTerm type="text">Additional Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<identifier type="isbn">9780132856201</identifier>
<originInfo>
<place><placeTerm type="text">Boston</placeTerm></place>
<publisher>Pearson</publisher>
<dateIssued>2013</dateIssued>
</originInfo>
<slims:image>0132856204.jpg.jpg</slims:image>
</mods>
<mods version="3.3" ID="4264">
<titleInfo>
<title>Jaringan mesh :</title>
<subTitle>Solusi jitu membangun jaringan wireless gotong royong tanpa access point</subTitle>
</titleInfo>
<name type="personal" authority="">
<namePart>Purbo, Onno,W</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<identifier type="isbn">9789792934298</identifier>
<originInfo>
<place><placeTerm type="text">Yogyakarta</placeTerm></place>
<publisher>STKIP Surya</publisher>
<dateIssued>2013</dateIssued>
</originInfo>
<slims:image>coverimg_4264.jpg</slims:image>
</mods>
<mods version="3.3" ID="4756">
<titleInfo>
<title>Konsep &#38; implementasi routing dengan router mikrotik</title>
</titleInfo>
<name type="personal" authority="">
<namePart>Towidjojo, Rendra</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<identifier type="isbn">9789791090803</identifier>
<originInfo>
<place><placeTerm type="text">Not Found</placeTerm></place>
<publisher>Jasakom</publisher>
<dateIssued>2013</dateIssued>
</originInfo>
<slims:image>KONSEP-%26%2338%3B-IMPLEMENTASI-ROUTING-DENGAN-MIKROTIK-200_3249.jpg.jpg</slims:image>
</mods>
<mods version="3.3" ID="18067">
<titleInfo>
<title>Web Penetration Testing with Kali Linux</title>
</titleInfo>
<name type="personal" authority="">
<namePart>Muniz, Joseph</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<name type="personal" authority="">
<namePart>Lakhani, Aamir</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<identifier type="isbn">9781782163169</identifier>
<originInfo>
<place><placeTerm type="text">Brimingham</placeTerm></place>
<publisher>Packt Publishing</publisher>
<dateIssued>2013</dateIssued>
</originInfo>
<slims:image>coverimg_18067.jpg</slims:image>
</mods>
<mods version="3.3" ID="2072">
<titleInfo>
<title>Cisco CCNA &#38; jaringan komputer</title>
</titleInfo>
<name type="personal" authority="">
<namePart>Sofana, Iwan</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<identifier type="isbn">9786028758772</identifier>
<originInfo>
<place><placeTerm type="text">Bandung</placeTerm></place>
<publisher>Informatika</publisher>
<dateIssued>2012</dateIssued>
</originInfo>
<slims:image>cisco-cnna_3169.jpg.jpg</slims:image>
</mods>
</modsCollection>