Normal view MARC view

Entry Topical Term

Number of records used in: 7

001 - CONTROL NUMBER

  • control field: 104303

003 - CONTROL NUMBER IDENTIFIER

  • control field: OSt

005 - DATE AND TIME OF LATEST TRANSACTION

  • control field: 20191028110141.0

008 - FIXED-LENGTH DATA ELEMENTS

  • fixed length control field: 090511i| anannbabn |a ana c

010 ## - LIBRARY OF CONGRESS CONTROL NUMBER

  • LC control number: sh2009005103

035 ## - SYSTEM CONTROL NUMBER

  • System control number: 444173
  • Canceled/invalid system control number: oca08142528

040 ## - CATALOGING SOURCE

  • Original cataloging agency: ABAU
  • Language of cataloging: eng
  • Transcribing agency: DLC

150 ## - HEADING--TOPICAL TERM

  • Topical term or geographic name entry element: Malware (Computer software)

450 ## - SEE FROM TRACING--TOPICAL TERM

  • Topical term or geographic name entry element: Computer code, Malicious

450 ## - SEE FROM TRACING--TOPICAL TERM

  • Topical term or geographic name entry element: Malevolent software

450 ## - SEE FROM TRACING--TOPICAL TERM

  • Topical term or geographic name entry element: Malicious computer code

450 ## - SEE FROM TRACING--TOPICAL TERM

  • Topical term or geographic name entry element: Malicious software

450 ## - SEE FROM TRACING--TOPICAL TERM

  • Topical term or geographic name entry element: Software, Malevolent

450 ## - SEE FROM TRACING--TOPICAL TERM

  • Topical term or geographic name entry element: Software, Malicious

550 ## - SEE ALSO FROM TRACING--TOPICAL TERM

  • Topical term or geographic name entry element: Computer software
  • Control subfield: g

670 ## - SOURCE DATA FOUND

  • Source citation: Work cat.: Computer viruses and other malicious software, 2009:
  • Information found: p. 11 (This report is a first step toward addressing the threat of malware in a comprehensive, global manner) p. 21 (Malware is a general term for a piece of software inserted into an information system to cause harm to that system or other systems, or to subvert them for use other than that intended by their owners)

670 ## - SOURCE DATA FOUND

  • Source citation: Mell, P. Guide to malware incident prevention and handling, 2005:
  • Information found: p. ES-1 (Malware, also known as malicious code and malicious software, refers to a program that is inserted into a system, usually covertly, with the intent of compromising the confidentiality, integrity, or availability of the victims data, applications, or operating system or otherwise annoying or disrupting the victim)

670 ## - SOURCE DATA FOUND

  • Source citation: Elektronika ir elektrotechnika, 2008:
  • Information found: no. 6(86), p. 23 ( ... almost 60% of all companies in the United Kingdom have faced different kinds of information security breaches in 2006, almost 50% of which were caused by malware, i.e. viruses, worms, Trojans, etc, i.e. software that was created with the aim to harm computer software or to infect it without the permission and knowledge of a legal user)

670 ## - SOURCE DATA FOUND

  • Source citation: Webopedia, May. 7, 2009
  • Information found: (malware -- Short for malicious software, software designed specifically to damage or disrupt a system, such as a virus or a Trojan horse)

670 ## - SOURCE DATA FOUND

  • Source citation: ITU study on the financial aspects of network security : malware and spam, via WWW, May 7, 2009:
  • Information found: p. i (Malware is a summary term for different forms of malevolent software that are designed to infiltrate and infect computers, typically without the knowledge of the owner)

Powered by Koha