<?xml version="1.0" encoding="UTF-8" ?>
<modsCollection xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" xmlns:slims="http://slims.web.id" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-3.xsd">
 <slims:resultInfo>
  <slims:modsResultNum>1499</slims:modsResultNum>
  <slims:modsResultPage>59</slims:modsResultPage>
  <slims:modsResultShowed>10</slims:modsResultShowed>
 </slims:resultInfo>
 <mods version="3.3" ID="1968">
  <titleInfo>
   <title>JavaFX 8 Step By Step Volume I:</title>
   <subTitle>Image Viewer in Java 8</subTitle>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Shufen Kuo</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Bing-Chao Huang</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn"></identifier>
  <originInfo>
   <place>
    <placeTerm type="text"></placeTerm>
    <publisher></publisher>
    <dateIssued>2016</dateIssued>
   </place>
  </originInfo>
  <slims:digitals/>
  <slims:image>cover_javafx_8_step_by_step_volume_i_image_viewer_in_java_8.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="2138">
  <titleInfo>
   <title>Deep Learning:</title>
   <subTitle>Fundamentals, Theory and Applications</subTitle>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Kaizhu Huang</namePart>
   <role>
    <roleTerm type="text">Editor</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Amir Hussain</namePart>
   <role>
    <roleTerm type="text">Editor</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Qiu-Feng Wang</namePart>
   <role>
    <roleTerm type="text">Editor</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Rui Zhang</namePart>
   <role>
    <roleTerm type="text">Editor</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9783030060732</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Cham</placeTerm>
    <publisher>Springer</publisher>
    <dateIssued>2019</dateIssued>
   </place>
  </originInfo>
  <slims:digitals/>
  <slims:image>cover_deep_learning_fundamentals_theory_and_applications.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="2137">
  <titleInfo>
   <title>Security in Computer and Information Sciences:</title>
   <subTitle>First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers</subTitle>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Erol Gelenbe</namePart>
   <role>
    <roleTerm type="text">Editor</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Paolo Campegiani</namePart>
   <role>
    <roleTerm type="text">Editor</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Tadeusz Czachórski</namePart>
   <role>
    <roleTerm type="text">Editor</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Sokratis K. Katsikas</namePart>
   <role>
    <roleTerm type="text">Editor</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Ioannis Komnios</namePart>
   <role>
    <roleTerm type="text">Editor</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Luigi Romano</namePart>
   <role>
    <roleTerm type="text">Editor</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Dimitrios Tzovaras</namePart>
   <role>
    <roleTerm type="text">Editor</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9783319951898</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Cham</placeTerm>
    <publisher>Springer</publisher>
    <dateIssued>2018</dateIssued>
   </place>
  </originInfo>
  <slims:digitals/>
  <slims:image>cover_security_in_computer_and_information_sciences.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="2136">
  <titleInfo>
   <title>Transportation Analytics in the Era of Big Data</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Satish V. Ukkusuri</namePart>
   <role>
    <roleTerm type="text">Editor</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Chao Yang</namePart>
   <role>
    <roleTerm type="text">Editor</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9783319758626</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Cham</placeTerm>
    <publisher>Springer</publisher>
    <dateIssued>2018</dateIssued>
   </place>
  </originInfo>
  <slims:digitals/>
  <slims:image>cover_transportation_analytics_in_the_era_of_big_data.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="2135">
  <titleInfo>
   <title>Network Traffic Anomaly Detection and Prevention:</title>
   <subTitle>Concepts, Techniques, and Tools</subTitle>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Monowar H. Bhuyan</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Dhruba K. Bhattacharyya</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Jugal K. Kalita</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9783319651880</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Cham</placeTerm>
    <publisher>Springer</publisher>
    <dateIssued>2017</dateIssued>
   </place>
  </originInfo>
  <slims:digitals/>
  <slims:image>cover_network_traffic_anomaly_detection_and_prevention_concepts_techniques_and_tools.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="2133">
  <titleInfo>
   <title>History of Cryptography and Cryptanalysis:</title>
   <subTitle>Codes, Ciphers, and Their Algorithms</subTitle>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>John F. Dooley</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9783319904436</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Cham</placeTerm>
    <publisher>Springer</publisher>
    <dateIssued>2018</dateIssued>
   </place>
  </originInfo>
  <slims:digitals/>
  <slims:image>cover_history_of_cryptography_and_cryptanalysis_codes_ciphers_and_their_algorithms.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="2129">
  <titleInfo>
   <title>Introduction to Coding Theory</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Jürgen Bierbrauer</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9781482299809</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Boca Raton</placeTerm>
    <publisher>CRC Press</publisher>
    <dateIssued>2017</dateIssued>
   </place>
  </originInfo>
  <slims:digitals/>
  <slims:image>cover_introduction_to_coding_theory.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="2132">
  <titleInfo>
   <title>Network Data Analytics:</title>
   <subTitle>A Hands-On Approach for Application Development</subTitle>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>K. G. Srinivasa</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Siddesh G. M</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <name type="personal" authority="">
   <namePart>Srinidhi H</namePart>
   <role>
    <roleTerm type="text">Additional Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9783319778006</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Cham</placeTerm>
    <publisher>Springer</publisher>
    <dateIssued>2018</dateIssued>
   </place>
  </originInfo>
  <slims:digitals/>
  <slims:image>cover_network_data_analytics_a_hands_on_approach_for_application_development.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="2131">
  <titleInfo>
   <title>Computational Network Science:</title>
   <subTitle>An Algorithmic Approach</subTitle>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Henry Hexmoor</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9780128008911</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Burlington</placeTerm>
    <publisher>Morgan Kaufmann</publisher>
    <dateIssued>2014</dateIssued>
   </place>
  </originInfo>
  <slims:digitals/>
  <slims:image>cover_computational_network_science_an_algorithmic_approach.jpg</slims:image>
 </mods>
 <mods version="3.3" ID="2130">
  <titleInfo>
   <title>Elements of Stochastic Calculus and Analysis</title>
  </titleInfo>
  <name type="personal" authority="">
   <namePart>Daniel W. Stroock</namePart>
   <role>
    <roleTerm type="text">Primary Author</roleTerm>
   </role>
  </name>
  <typeOfResource collection="yes">mixed material</typeOfResource>
  <identifier type="isbn">9783319770383</identifier>
  <originInfo>
   <place>
    <placeTerm type="text">Cham</placeTerm>
    <publisher>Springer</publisher>
    <dateIssued>2018</dateIssued>
   </place>
  </originInfo>
  <slims:digitals/>
  <slims:image>cover_elements_of_stochastic_calculus_and_analysis.jpg</slims:image>
 </mods>
</modsCollection>
