Normal view MARC view

Entry Topical Term

Number of records used in: 1

001 - CONTROL NUMBER

  • control field: 3215

003 - CONTROL NUMBER IDENTIFIER

  • control field: DLC

005 - DATE AND TIME OF LATEST TRANSACTION

  • control field: 20220628145113.0

008 - FIXED-LENGTH DATA ELEMENTS

  • fixed length control field: 880810i| anannbabn |a ana

010 ## - LIBRARY OF CONGRESS CONTROL NUMBER

  • LC control number: sh 88004897

040 ## - CATALOGING SOURCE

  • Original cataloging agency: DLC
  • Transcribing agency: DLC
  • Modifying agency: ABAU

053 #0 - LC CLASSIFICATION NUMBER

  • Classification number element-single number or beginning number of span: QA76.76.C68

150 #0 - HEADING--TOPICAL TERM

  • Topical term or geographic name entry element: Computer viruses.

450 ## - SEE FROM TRACING--TOPICAL TERM

  • Topical term or geographic name entry element: Software viruses

450 ## - SEE FROM TRACING--TOPICAL TERM

  • Topical term or geographic name entry element: Viruses, Computer

550 ## - SEE ALSO FROM TRACING--TOPICAL TERM

  • Control subfield: g
  • Topical term or geographic name entry element: Computer crimes

550 ## - SEE ALSO FROM TRACING--TOPICAL TERM

  • Control subfield: g
  • Topical term or geographic name entry element: Malware (Computer software)

670 ## - SOURCE DATA FOUND

  • Source citation: Work cat.: Fites, P.E. Catching computer viruses, 1989.

670 ## - SOURCE DATA FOUND

  • Source citation: New York Times:
  • Information found: March 17, 1988, sec. D1 (a program, or a set of instructions to a computer, that is deliberately planted on a floppy disk meant to be used with the computer or introduced when the computer is communicating over telephone lines with other computers. The programs can copy themselves into computer's software causing the destruction of data in computer's memory)

670 ## - SOURCE DATA FOUND

  • Source citation: Webopedia, May 7, 2009
  • Information found: (malware - Short for malicious software, software designed specifically to damage or disrupt a system, such as a virus or a Trojan horse)

675 ## - SOURCE DATA NOT FOUND

  • Source citation: Computer dict.;
  • Source citation: IAC;
  • Source citation: Hennepin

Services:

Circulation (Check in – Check out)
References collection
Periodicals collection
Internet Services
On-line search using online catalog (OPAC)
Users education (How to use the library)
Query answering (Ask Librarian)
Current Awareness Services (CAS)

Follow Us:

Copyright © 2020 Universities of Canada in Egypt. All rights reserved