Normal view MARC view

Entry Topical Term

Number of records used in: 2

001 - CONTROL NUMBER

  • control field: 74913

003 - CONTROL NUMBER IDENTIFIER

  • control field: OSt

005 - DATE AND TIME OF LATEST TRANSACTION

  • control field: 20191028105350.0

008 - FIXED-LENGTH DATA ELEMENTS

  • fixed length control field: 060313i| anannbabn |a ana

010 ## - LIBRARY OF CONGRESS CONTROL NUMBER

  • LC control number: sh2005003206

035 ## - SYSTEM CONTROL NUMBER

  • System control number: 323629
  • Canceled/invalid system control number: sh2005003206

040 ## - CATALOGING SOURCE

  • Original cataloging agency: DLC
  • Language of cataloging: eng
  • Transcribing agency: DLC
  • Modifying agency: ViU
  • Modifying agency: DLC

150 ## - HEADING--TOPICAL TERM

  • Topical term or geographic name entry element: Phishing

450 ## - SEE FROM TRACING--TOPICAL TERM

  • Topical term or geographic name entry element: Brand spoofing (Internet fraud)

450 ## - SEE FROM TRACING--TOPICAL TERM

  • Topical term or geographic name entry element: Carding (Internet fraud)

450 ## - SEE FROM TRACING--TOPICAL TERM

  • Topical term or geographic name entry element: Spoofing, Brand (Internet fraud)

550 ## - SEE ALSO FROM TRACING--TOPICAL TERM

  • Control subfield: g
  • Topical term or geographic name entry element: Internet fraud

670 ## - SOURCE DATA FOUND

  • Source citation: NY Times, Dec. 16, 2004
  • Information found: ("Q. What is phishing? A. ... Phishing, as it has come to be known, is the practice of sending counterfeit email messages that seem to be from an official source as bait in the hope that the recipient will supply personal information to a Web site."

670 ## - SOURCE DATA FOUND

  • Source citation: 2005010348: Lininger, R. Phishing: cutting the identity theft line, c2005.

670 ## - SOURCE DATA FOUND

  • Source citation: Phishing exposed, c2005:
  • Information found: p. 10 (Phising, also known as carding or brand spoofing)

680 ## - PUBLIC GENERAL NOTE

  • Explanatory text: Here are entered works on the practice of sending counterfeit email messages that seem to be from a legitimate establishment in order to entice recipients to supply personal information to a Web site for fraudulent use.

Powered by Koha