<?xml version="1.0" encoding="UTF-8" ?>
<modsCollection xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" xmlns:slims="http://slims.web.id" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-3.xsd">
<slims:resultInfo>
<slims:modsResultNum>4</slims:modsResultNum>
<slims:modsResultPage>1</slims:modsResultPage>
<slims:modsResultShowed>10</slims:modsResultShowed>
</slims:resultInfo>
<mods version="3.3" ID="1338">
<titleInfo>
<title>Architecting secure software systems</title>
</titleInfo>
<name type="personal" authority="">
<namePart>Talukder, Asoke K</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<name type="personal" authority="">
<namePart>Chaitanya, Manish</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<identifier type="isbn"></identifier>
<originInfo>
<place><placeTerm type="text">Boca Raton</placeTerm></place>
<publisher>Taylor &#38; Francis Group, LLC</publisher>
<dateIssued>2009</dateIssued>
</originInfo>
<slims:image>cover_Architecting_secure_software_systems.PNG.PNG</slims:image>
</mods>
<mods version="3.3" ID="1329">
<titleInfo>
<title>Endpoint security</title>
</titleInfo>
<name type="personal" authority="">
<namePart>Kadrich,Mark</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<identifier type="isbn"></identifier>
<originInfo>
<place><placeTerm type="text">New York</placeTerm></place>
<publisher>Pearson Education Ltd</publisher>
<dateIssued>2007</dateIssued>
</originInfo>
<slims:image>cover_Endpoint_security.PNG.PNG</slims:image>
</mods>
<mods version="3.3" ID="1229">
<titleInfo>
<title>Information security fundamentals</title>
</titleInfo>
<name type="personal" authority="">
<namePart>Peltier, Thomas R</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<name type="personal" authority="">
<namePart>Peltier, Justin</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<name type="personal" authority="">
<namePart>Blackley, John A</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<identifier type="isbn"></identifier>
<originInfo>
<place><placeTerm type="text"></placeTerm></place>
<publisher>CRC Press LLC</publisher>
<dateIssued>2005</dateIssued>
</originInfo>
</mods>
<mods version="3.3" ID="971">
<titleInfo>
<title>Analyzing computer security :</title>
<subTitle>a Threat/vulnerability/countermeasure approach</subTitle>
</titleInfo>
<name type="personal" authority="">
<namePart>Pfleeger, Charles P</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<name type="personal" authority="">
<namePart>Pfleeger, Shari Lawrence</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<identifier type="isbn"></identifier>
<originInfo>
<place><placeTerm type="text">Upper Saddle River, NJ</placeTerm></place>
<publisher>Prentice Hall</publisher>
<dateIssued>2012</dateIssued>
</originInfo>
<slims:image>cover_Analyzing_computer_security.PNG.PNG</slims:image>
</mods>
</modsCollection>