NMC Library
Normal view MARC view

Entry Topical Term

Number of records used in: 18

001 - CONTROL NUMBER

  • control field: 3672

003 - CONTROL NUMBER IDENTIFIER

  • control field: DLC

005 - DATE AND TIME OF LATEST TRANSACTION

  • control field: 20250109091338.0

008 - FIXED-LENGTH DATA ELEMENTS

  • fixed length control field: 900417i| anannbabn |a ana |

010 ## - LIBRARY OF CONGRESS CONTROL NUMBER

  • LC control number: sh 90001862

040 ## - CATALOGING SOURCE

  • Original cataloging agency: DLC
  • Transcribing agency: DLC
  • Modifying agency: DLC
  • Modifying agency: CtY
  • Modifying agency: DLC

053 #0 - LC CLASSIFICATION NUMBER

  • Classification number element--single number or beginning number of span: QA76.9.A25

150 ## - HEADING--TOPICAL TERM

  • Topical term or geographic name entry element: Computer security

360 ## - COMPLEX SEE ALSO REFERENCE--SUBJECT

  • Explanatory text: subdivision
  • Heading referred to: Security measures
  • Explanatory text: under names of individual and types of computers, networks, and systems, e.g.
  • Heading referred to: IBM computers--Security measures

450 ## - SEE FROM TRACING--TOPICAL TERM

  • Topical term or geographic name entry element: Computer privacy

450 ## - SEE FROM TRACING--TOPICAL TERM

  • Topical term or geographic name entry element: Computer system security

450 ## - SEE FROM TRACING--TOPICAL TERM

  • Topical term or geographic name entry element: Computer systems
  • General subdivision: Protection

450 ## - SEE FROM TRACING--TOPICAL TERM

  • Topical term or geographic name entry element: Computer systems
  • General subdivision: Security measures

450 ## - SEE FROM TRACING--TOPICAL TERM

  • Topical term or geographic name entry element: Computers
  • General subdivision: Protection

450 ## - SEE FROM TRACING--TOPICAL TERM

  • Topical term or geographic name entry element: Computers
  • General subdivision: Security measures

450 ## - SEE FROM TRACING--TOPICAL TERM

  • Topical term or geographic name entry element: Cyber security

450 ## - SEE FROM TRACING--TOPICAL TERM

  • Topical term or geographic name entry element: Cybersecurity

450 ## - SEE FROM TRACING--TOPICAL TERM

  • Topical term or geographic name entry element: Electronic digital computers
  • General subdivision: Security measures

450 ## - SEE FROM TRACING--TOPICAL TERM

  • Topical term or geographic name entry element: Protection of computer systems

450 ## - SEE FROM TRACING--TOPICAL TERM

  • Topical term or geographic name entry element: Security of computer systems

550 ## - SEE ALSO FROM TRACING--TOPICAL TERM

  • Control subfield: g
  • Topical term or geographic name entry element: Data protection

550 ## - SEE ALSO FROM TRACING--TOPICAL TERM

  • Control subfield: g
  • Topical term or geographic name entry element: Security systems

550 ## - SEE ALSO FROM TRACING--TOPICAL TERM

  • Topical term or geographic name entry element: Hacking

670 ## - SOURCE DATA FOUND

  • Source citation: Work cat.: Muftic, S. Security in IBM systems, 1990.

670 ## - SOURCE DATA FOUND

  • Source citation: Computer, Jan. 1990.

670 ## - SOURCE DATA FOUND

  • Source citation: Computer dict.
  • Information found: (Security, Network)

670 ## - SOURCE DATA FOUND

  • Source citation: IEEE Stnd. glossary of software engineering terminology.

670 ## - SOURCE DATA FOUND

  • Source citation: Stnd. of computer terminology.

670 ## - SOURCE DATA FOUND

  • Source citation: LC database, April 6, 1990.

670 ## - SOURCE DATA FOUND

  • Source citation: UMI business vocab.

670 ## - SOURCE DATA FOUND

  • Source citation: Landau, Susan Eva. Listening in : cybersecurity in an insecure age, 2017.

680 ## - PUBLIC GENERAL NOTE

  • Explanatory text: Here are entered general works on protecting computer hardware and software from accidental or malicious access, use, modification, disclosure, or destruction.

Powered by Koha