Normal view MARC view

Entry Topical Term

Number of records used in: 8

001 - CONTROL NUMBER

  • control field: 72934

003 - CONTROL NUMBER IDENTIFIER

  • control field: OSt

005 - DATE AND TIME OF LATEST TRANSACTION

  • control field: 20191028105317.0

008 - FIXED-LENGTH DATA ELEMENTS

  • fixed length control field: 010221i| anannbabn |a ana c

010 ## - LIBRARY OF CONGRESS CONTROL NUMBER

  • LC control number: sh 00001974

035 ## - SYSTEM CONTROL NUMBER

  • System control number: 315640
  • Canceled/invalid system control number: sh00001974

040 ## - CATALOGING SOURCE

  • Original cataloging agency: ViNSC
  • Language of cataloging: eng
  • Transcribing agency: DLC
  • Modifying agency: DLC

150 ## - HEADING--TOPICAL TERM

  • Topical term or geographic name entry element: Cyberterrorism

450 ## - SEE FROM TRACING--TOPICAL TERM

  • Topical term or geographic name entry element: Attacks on computers

450 ## - SEE FROM TRACING--TOPICAL TERM

  • Topical term or geographic name entry element: Computer attacks

450 ## - SEE FROM TRACING--TOPICAL TERM

  • Topical term or geographic name entry element: Cyber attacks

450 ## - SEE FROM TRACING--TOPICAL TERM

  • Topical term or geographic name entry element: Cyber terrorism

550 ## - SEE ALSO FROM TRACING--TOPICAL TERM

  • Control subfield: g
  • Topical term or geographic name entry element: Computer crimes

550 ## - SEE ALSO FROM TRACING--TOPICAL TERM

  • Control subfield: g
  • Topical term or geographic name entry element: Terrorism

670 ## - SOURCE DATA FOUND

  • Source citation: Work cat.: Ogren, J. Responding to the threat of cyberterrorism through information assurance, 2000.

670 ## - SOURCE DATA FOUND

  • Source citation: Network news, March 3, 1999:
  • Information found: p. 1 (Leyden, J. Britain battles IT terrorists)

670 ## - SOURCE DATA FOUND

  • Source citation: United States. Congress. Senate. Committee on Governmental Affairs. Cyber attack : is the government safe? 2000, online:
  • Information found: opening statement (cyber attacks; computer attacks; from international and domestic terrorists, to crime rings, to everyday hackers)

680 ## - PUBLIC GENERAL NOTE

  • Explanatory text: Here are entered works on attacks or threats of attack against any portion of an information infrastructure.

Powered by Koha