<div style='display:none;'> SELECT biblio.biblio_id, biblio.title, biblio.image, biblio.isbn_issn,
              biblio.publish_year, pbl.publisher_name AS `publisher`, pplc.place_name AS `publish_place`, biblio.labels, biblio.input_date FROM biblio  LEFT JOIN mst_publisher AS pbl ON biblio.publisher_id=pbl.publisher_id  LEFT JOIN mst_place AS pplc ON biblio.publish_place_id=pplc.place_id  WHERE opac_hide=0 AND (biblio.biblio_id IN (SELECT bt.biblio_id FROM biblio_topic AS bt LEFT JOIN mst_topic AS t ON bt.topic_id=t.topic_id WHERE topic LIKE '%COMPUTER SECURITY, COMPUTER ACCESS CONTROL%'))  ORDER BY biblio.publish_year DESC, biblio.title ASC LIMIT 0, 20 </div><?xml version="1.0" encoding="UTF-8" ?>
<modsCollection xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" xmlns:slims="http://slims.web.id" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-3.xsd">
<slims:resultInfo>
<slims:modsResultNum>18</slims:modsResultNum>
<slims:modsResultPage>1</slims:modsResultPage>
<slims:modsResultShowed>20</slims:modsResultShowed>
</slims:resultInfo>
<mods version="3.3" ID="18553">
<titleInfo>
<title>Cryptography and network security :</title>
<subTitle>principles and practice. Seventh Global Edition</subTitle>
</titleInfo>
<name type="personal" authority="">
<namePart>Stallings, William</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<identifier type="isbn">9781292158587</identifier>
<originInfo>
<place><placeTerm type="text">Indianapolis</placeTerm></place>
<publisher>Pearson</publisher>
<dateIssued>2017</dateIssued>
</originInfo>
<slims:image>9781292158587-us.jpg.jpg</slims:image>
</mods>
<mods version="3.3" ID="6868">
<titleInfo>
<title>Pengamanan PC dari segala ancaman</title>
</titleInfo>
<name type="personal" authority="">
<namePart>Winarno, Edy</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<identifier type="isbn">9786020243740</identifier>
<originInfo>
<place><placeTerm type="text">Jakarta</placeTerm></place>
<publisher>Elex Media Komputindo</publisher>
<dateIssued>2014</dateIssued>
</originInfo>
<slims:image>51W3oQHwFtL.jpg.jpg</slims:image>
</mods>
<mods version="3.3" ID="5928">
<titleInfo>
<title>Network Security Essentials:</title>
<subTitle>Applications and Standards. Fourth Edition</subTitle>
</titleInfo>
<name type="personal" authority="">
<namePart>Stallings, William</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<identifier type="isbn">9780137067923</identifier>
<originInfo>
<place><placeTerm type="text">Harlow</placeTerm></place>
<publisher>Pearson</publisher>
<dateIssued>2011</dateIssued>
</originInfo>
<slims:image>coverimg_5928.jpg</slims:image>
</mods>
<mods version="3.3" ID="1298">
<titleInfo>
<title>Applied Oracle Security :</title>
<subTitle>Developing Secure Database and Middleware Environments</subTitle>
</titleInfo>
<name type="personal" authority="">
<namePart>Knox, David</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<identifier type="isbn">9780071613705</identifier>
<originInfo>
<place><placeTerm type="text">New York</placeTerm></place>
<publisher>Oracle Press</publisher>
<dateIssued>2010</dateIssued>
</originInfo>
</mods>
<mods version="3.3" ID="5675">
<titleInfo>
<title>Messenger &#38; Mail Hacking :</title>
<subTitle>Fell Secured?</subTitle>
</titleInfo>
<name type="personal" authority="">
<namePart>Sulianta, Feri</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<identifier type="isbn">9789792750409</identifier>
<originInfo>
<place><placeTerm type="text">Jakarta</placeTerm></place>
<publisher>Elex Media Komputindo</publisher>
<dateIssued>2009</dateIssued>
</originInfo>
<slims:image>20741_f.jpg.jpg</slims:image>
</mods>
<mods version="3.3" ID="5927">
<titleInfo>
<title>Network Security. Second Edition</title>
</titleInfo>
<name type="personal" authority="">
<namePart>Cole, Eric</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<identifier type="isbn">9780470502495</identifier>
<originInfo>
<place><placeTerm type="text">Canada</placeTerm></place>
<publisher>Wiley</publisher>
<dateIssued>2009</dateIssued>
</originInfo>
<slims:image>%2B-%2B6285431866_70.gif.gif</slims:image>
</mods>
<mods version="3.3" ID="8650">
<titleInfo>
<title>Principles of Information Security. Third Edition</title>
</titleInfo>
<name type="personal" authority="">
<namePart>Mattord, Herbert J</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<name type="personal" authority="">
<namePart>Whitman, Michael E</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<identifier type="isbn">9781423901778</identifier>
<originInfo>
<place><placeTerm type="text">Boston, Mass.</placeTerm></place>
<publisher>Course Technology</publisher>
<dateIssued>2009</dateIssued>
</originInfo>
<slims:image>coverimg_8650.jpg</slims:image>
</mods>
<mods version="3.3" ID="11443">
<titleInfo>
<title>VoIP Deployment for DUMMIES</title>
</titleInfo>
<name type="personal" authority="">
<namePart>Olejniczak, Stephen P.</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<identifier type="isbn">9780470385432</identifier>
<originInfo>
<place><placeTerm type="text">Canada</placeTerm></place>
<publisher>Wiley</publisher>
<dateIssued>2009</dateIssued>
</originInfo>
<slims:image>51uL%2B5Oo7qL._SX398_BO1%2C204%2C203%2C200_.jpg.jpg</slims:image>
</mods>
<mods version="3.3" ID="2185">
<titleInfo>
<title>Computer Forensics for Dummies</title>
</titleInfo>
<name type="personal" authority="">
<namePart>Volonino, Linda</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<identifier type="isbn">9780470457832</identifier>
<originInfo>
<place><placeTerm type="text">Canada</placeTerm></place>
<publisher>Wiley</publisher>
<dateIssued>2008</dateIssued>
</originInfo>
<slims:image>51kOLXvaaCL._SX396_BO1%2C204%2C203%2C200_.jpg.jpg</slims:image>
</mods>
<mods version="3.3" ID="2200">
<titleInfo>
<title>Computer security :</title>
<subTitle>principles and practice</subTitle>
</titleInfo>
<name type="personal" authority="">
<namePart>Stallings, William</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<name type="personal" authority="">
<namePart>Brown, Lawrie</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<identifier type="isbn">9780135137116</identifier>
<originInfo>
<place><placeTerm type="text">Upper Saddle River</placeTerm></place>
<publisher>Pearson Prentice hall</publisher>
<dateIssued>2008</dateIssued>
</originInfo>
<slims:image>51YdUjTF1SL._SX373_BO1%2C204%2C203%2C200_.jpg.jpg</slims:image>
</mods>
<mods version="3.3" ID="5819">
<titleInfo>
<title>Modern Cryptanalysis Techniques For Advanced Code Breaking</title>
</titleInfo>
<name type="personal" authority="">
<namePart>Swenson, Christopher</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<identifier type="isbn">9780470135938</identifier>
<originInfo>
<place><placeTerm type="text">Canada</placeTerm></place>
<publisher>Wiley</publisher>
<dateIssued>2008</dateIssued>
</originInfo>
<slims:image>%2B-%2B858154936_70_%281%29.gif.gif</slims:image>
</mods>
<mods version="3.3" ID="9743">
<titleInfo>
<title>Security In Computing. Forth Edition</title>
</titleInfo>
<name type="personal" authority="">
<namePart>Pfleeger, Charles</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<identifier type="isbn">9780132390774</identifier>
<originInfo>
<place><placeTerm type="text">Upper Saddle River, NJ</placeTerm></place>
<publisher>Prentice Hall</publisher>
<dateIssued>2007</dateIssued>
</originInfo>
<slims:image>51IkFqqYGkL._SX361_BO1%2C204%2C203%2C200_.jpg.jpg</slims:image>
</mods>
<mods version="3.3" ID="2340">
<titleInfo>
<title>Cryptography and Network Security:</title>
<subTitle>Principles and Practices. Fourth Edition</subTitle>
</titleInfo>
<name type="personal" authority="">
<namePart>Stallings, William</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<identifier type="isbn">9780131873162</identifier>
<originInfo>
<place><placeTerm type="text">New Jersey</placeTerm></place>
<publisher>Pearson</publisher>
<dateIssued>2006</dateIssued>
</originInfo>
<slims:image>coverimg_2340.jpg</slims:image>
</mods>
<mods version="3.3" ID="2199">
<titleInfo>
<title>Computer security :</title>
<subTitle>20 things every employee should know</subTitle>
</titleInfo>
<name type="personal" authority="">
<namePart>Rothke, Ben</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<identifier type="isbn">9780072230833</identifier>
<originInfo>
<place><placeTerm type="text">New York</placeTerm></place>
<publisher>McGraw-Hill</publisher>
<dateIssued>2004</dateIssued>
</originInfo>
<slims:image>coverimg_2199.jpg</slims:image>
</mods>
<mods version="3.3" ID="2345">
<titleInfo>
<title>Cryptography and network security :</title>
<subTitle>principles and practice. Third Edition</subTitle>
</titleInfo>
<name type="personal" authority="">
<namePart>Stallings, William</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<identifier type="isbn">0131115022</identifier>
<originInfo>
<place><placeTerm type="text">Upper Saddle River</placeTerm></place>
<publisher>Prentice Hall</publisher>
<dateIssued>2003</dateIssued>
</originInfo>
<slims:image>9780130914293-us-300.jpg.jpg</slims:image>
</mods>
<mods version="3.3" ID="5930">
<titleInfo>
<title>Network Security; Private Communication In a Public World. Second Edition</title>
</titleInfo>
<name type="personal" authority="">
<namePart>Kaufmann, Charlie</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<identifier type="isbn">9780130460196</identifier>
<originInfo>
<place><placeTerm type="text">New Jersey</placeTerm></place>
<publisher>Prentice Hall</publisher>
<dateIssued>2002</dateIssued>
</originInfo>
<slims:image>51UCHHL0LvL._SX358_BO1%2C204%2C203%2C200_.jpg.jpg</slims:image>
</mods>
<mods version="3.3" ID="5674">
<titleInfo>
<title>Messenger &#38; Mail Hacking :</title>
<subTitle>fell secured?</subTitle>
</titleInfo>
<name type="personal" authority="">
<namePart>Feri Sulianta</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<identifier type="isbn">9789792750409</identifier>
<originInfo>
<place><placeTerm type="text"></placeTerm></place>
<publisher>Elex Media Komputindo</publisher>
<dateIssued></dateIssued>
</originInfo>
</mods>
<mods version="3.3" ID="148">
<titleInfo>
<title>20 Aplikasi Sekuriti</title>
</titleInfo>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<identifier type="isbn"></identifier>
<originInfo>
<place><placeTerm type="text"></placeTerm></place>
<publisher>AVI</publisher>
<dateIssued></dateIssued>
</originInfo>
</mods>
</modsCollection>