Normal view
MARC view
Entry Topical Term
001 - CONTROL NUMBER
- control field: 28
003 - CONTROL NUMBER IDENTIFIER
- control field: OSt
005 - DATE AND TIME OF LATEST TRANSACTION
- control field: 20191028103220.0
008 - FIXED-LENGTH DATA ELEMENTS
- fixed length control field: 880810i| anannbab| |a ana
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
- LC control number: sh 88004897
035 ## - SYSTEM CONTROL NUMBER
- System control number: 119
- Canceled/invalid system control number: sh88004897
040 ## - CATALOGING SOURCE
- Original cataloging agency: DLC
- Transcribing agency: DLC
053 ## - LC CLASSIFICATION NUMBER
- Classification number element--single number or beginning number of span: QA76.76.C68
150 ## - HEADING--TOPICAL TERM
- Topical term or geographic name entry element: Computer viruses
450 00 - SEE FROM TRACING--TOPICAL TERM
- Topical term or geographic name entry element: Software viruses
450 00 - SEE FROM TRACING--TOPICAL TERM
- Topical term or geographic name entry element: Viruses, Computer
550 ## - SEE ALSO FROM TRACING--TOPICAL TERM
- Control subfield: g
- Topical term or geographic name entry element: Computer crimes
550 ## - SEE ALSO FROM TRACING--TOPICAL TERM
- Control subfield: g
- Topical term or geographic name entry element: Computer software
670 ## - SOURCE DATA FOUND
- Source citation: Work cat.: Fites, P.E. Catching computer viruses, 1989.
670 ## - SOURCE DATA FOUND
- Source citation: New York Times:
- Information found: 3/17/88, sec. D1 (a program, or a set of instructions to a computer, that is deliberately planted on a floppy disk meant to be used with the computer or introduced when the computer is communicating over telephone lines with other computers. The programs can copy themselves into computer's software causing the destruction of data in computer's memory)
675 ## - SOURCE DATA NOT FOUND
- Source citation: Computer dict.;
- Source citation: IAC;
- Source citation: Hennepin