Entry Topical Term
001 - CONTROL NUMBER
- control field: 3672
003 - CONTROL NUMBER IDENTIFIER
- control field: DLC
005 - DATE AND TIME OF LATEST TRANSACTION
- control field: 20250109091338.0
008 - FIXED-LENGTH DATA ELEMENTS
- fixed length control field: 900417i| anannbabn |a ana |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
- LC control number: sh 90001862
040 ## - CATALOGING SOURCE
- Original cataloging agency: DLC
- Transcribing agency: DLC
- Modifying agency: DLC
- Modifying agency: CtY
- Modifying agency: DLC
053 #0 - LC CLASSIFICATION NUMBER
- Classification number element--single number or beginning number of span: QA76.9.A25
150 ## - HEADING--TOPICAL TERM
- Topical term or geographic name entry element: Computer security
360 ## - COMPLEX SEE ALSO REFERENCE--SUBJECT
- Explanatory text: subdivision
- Heading referred to: Security measures
- Explanatory text: under names of individual and types of computers, networks, and systems, e.g.
- Heading referred to: IBM computers--Security measures
450 ## - SEE FROM TRACING--TOPICAL TERM
- Topical term or geographic name entry element: Computer privacy
450 ## - SEE FROM TRACING--TOPICAL TERM
- Topical term or geographic name entry element: Computer system security
450 ## - SEE FROM TRACING--TOPICAL TERM
- Topical term or geographic name entry element: Computer systems
- General subdivision: Protection
450 ## - SEE FROM TRACING--TOPICAL TERM
- Topical term or geographic name entry element: Computer systems
- General subdivision: Security measures
450 ## - SEE FROM TRACING--TOPICAL TERM
- Topical term or geographic name entry element: Computers
- General subdivision: Protection
450 ## - SEE FROM TRACING--TOPICAL TERM
- Topical term or geographic name entry element: Computers
- General subdivision: Security measures
450 ## - SEE FROM TRACING--TOPICAL TERM
- Topical term or geographic name entry element: Cyber security
450 ## - SEE FROM TRACING--TOPICAL TERM
- Topical term or geographic name entry element: Cybersecurity
450 ## - SEE FROM TRACING--TOPICAL TERM
- Topical term or geographic name entry element: Electronic digital computers
- General subdivision: Security measures
450 ## - SEE FROM TRACING--TOPICAL TERM
- Topical term or geographic name entry element: Protection of computer systems
450 ## - SEE FROM TRACING--TOPICAL TERM
- Topical term or geographic name entry element: Security of computer systems
550 ## - SEE ALSO FROM TRACING--TOPICAL TERM
- Control subfield: g
- Topical term or geographic name entry element: Data protection
550 ## - SEE ALSO FROM TRACING--TOPICAL TERM
- Control subfield: g
- Topical term or geographic name entry element: Security systems
550 ## - SEE ALSO FROM TRACING--TOPICAL TERM
- Topical term or geographic name entry element: Hacking
670 ## - SOURCE DATA FOUND
- Source citation: Work cat.: Muftic, S. Security in IBM systems, 1990.
670 ## - SOURCE DATA FOUND
- Source citation: Computer, Jan. 1990.
670 ## - SOURCE DATA FOUND
- Source citation: Computer dict.
- Information found: (Security, Network)
670 ## - SOURCE DATA FOUND
- Source citation: IEEE Stnd. glossary of software engineering terminology.
670 ## - SOURCE DATA FOUND
- Source citation: Stnd. of computer terminology.
670 ## - SOURCE DATA FOUND
- Source citation: LC database, April 6, 1990.
670 ## - SOURCE DATA FOUND
- Source citation: UMI business vocab.
670 ## - SOURCE DATA FOUND
- Source citation: Landau, Susan Eva. Listening in : cybersecurity in an insecure age, 2017.
680 ## - PUBLIC GENERAL NOTE
- Explanatory text: Here are entered general works on protecting computer hardware and software from accidental or malicious access, use, modification, disclosure, or destruction.