Entry Topical Term
001 - CONTROL NUMBER
- control field: 72934
003 - CONTROL NUMBER IDENTIFIER
- control field: OSt
005 - DATE AND TIME OF LATEST TRANSACTION
- control field: 20191028105317.0
008 - FIXED-LENGTH DATA ELEMENTS
- fixed length control field: 010221i| anannbabn |a ana c
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
- LC control number: sh 00001974
035 ## - SYSTEM CONTROL NUMBER
- System control number: 315640
- Canceled/invalid system control number: sh00001974
040 ## - CATALOGING SOURCE
- Original cataloging agency: ViNSC
- Language of cataloging: eng
- Transcribing agency: DLC
- Modifying agency: DLC
150 ## - HEADING--TOPICAL TERM
- Topical term or geographic name entry element: Cyberterrorism
450 ## - SEE FROM TRACING--TOPICAL TERM
- Topical term or geographic name entry element: Attacks on computers
450 ## - SEE FROM TRACING--TOPICAL TERM
- Topical term or geographic name entry element: Computer attacks
450 ## - SEE FROM TRACING--TOPICAL TERM
- Topical term or geographic name entry element: Cyber attacks
450 ## - SEE FROM TRACING--TOPICAL TERM
- Topical term or geographic name entry element: Cyber terrorism
550 ## - SEE ALSO FROM TRACING--TOPICAL TERM
- Control subfield: g
- Topical term or geographic name entry element: Computer crimes
550 ## - SEE ALSO FROM TRACING--TOPICAL TERM
- Control subfield: g
- Topical term or geographic name entry element: Terrorism
670 ## - SOURCE DATA FOUND
- Source citation: Work cat.: Ogren, J. Responding to the threat of cyberterrorism through information assurance, 2000.
670 ## - SOURCE DATA FOUND
- Source citation: Network news, March 3, 1999:
- Information found: p. 1 (Leyden, J. Britain battles IT terrorists)
670 ## - SOURCE DATA FOUND
- Source citation: United States. Congress. Senate. Committee on Governmental Affairs. Cyber attack : is the government safe? 2000, online:
- Information found: opening statement (cyber attacks; computer attacks; from international and domestic terrorists, to crime rings, to everyday hackers)
680 ## - PUBLIC GENERAL NOTE
- Explanatory text: Here are entered works on attacks or threats of attack against any portion of an information infrastructure.