Debug informatie:
ID=0310221997 ∙ extID=|library/marc/vlacc|10221997 ∙ BSID=library\m\vlacc\rest
material=zbbBook ∙ language=dut ∙ languageo=eng ∙ type=NonFictie ∙ targetaudience=ageAdults ∙ rose_rnk=333 ∙ hl_cnt=17 ∙ gl_hl_cnt=111 ∙ date_ent=20190610 ∙ date_mut=20201006 ∙ nbd_sum=true ∙ nbd_rev=true ∙ news_rev=false
idbrongevonden opmatch regel (debug)
1588144wise-limburg: rest
veldbevattoegevoegd van id
_ImportTime2019-06-24 13:18:25
marcleader00943aam a2200301 4500
cf00110221997
cf00520201006140129.0
cf008190610s2020 0 dut
df020## |a9789045356600 |9paperback
df035## |a9789045356600
df035## |aBBA000257029
df040## |aBoekenBank |bdut |cOpen Vlacc
df041## |heng
df084## |a521.5
df096## |9980 |aInformatica algemeen
df100## |aSteinberg, Joseph |4aut
df245#0 |aCybersecurity voor dummies |hBOEK
df260## |aAmersfoort |bBBNC Uitgevers |c2020
df300## |aXXIII, 349 p. |bill.
df365## |b32.99 |cEUR
df521## |avolwassenen
df534## |aCybersecurity for dummies
df650## |aInternetcriminaliteit |9vtr
df650## |aDatabeveiliging |9vtr
df650## |aComputerbeveiliging |9vtr
df693#2 |9COINBE |aWetenschap en techniek |xComputers |yInternet |zBeveiliging
df852 |a2000 |bVolwassenen informatief |cInternet: Beveiliging STEI |eBZV |hCOINBE |jSTEI |oVIN |p30004000022801 |wN |yB3 |1N |2BZV |613132966 |92020-07-13T00:00+0200 |id171588144 |nmrest1588144
df852 |a2040 |b1ste verdieping Informatief: wetenschap |cInternet: Beveiliging |eBZV |hCOINBE |oVIM |p30003017295285 |wN |yB3 |1N |2BZV |613149870 |92020-07-22T00:00+0200 |id171588144 |nmrest1588144
df852 |a2140 |b1ste verdieping Informatief: wetenschap |cInternet: Beveiliging STEI |eBZV |hCOINBE |jSTEI |oVIM |p30003002067529 |wN |xa2020 |yB3 |1N |2BZV |613168638 |92020-07-30T00:00+0200 |id171588144 |nmrest1588144
df852 |a2340 |bVolwassenen VW ZIZO: wetenschap |cInternet: Beveiliging |dVolwassenen ZIZO: wetenschap |eBZV |hCOINBE |oVIM |p30003005643659 |wN |yB3 |1N |2BZV |613172619 |92020-08-03T00:00+0200 |id171588144 |nmrest1588144
df852 |a2020 |b1ste verdieping Zizo Wetenschap en techniek |cInternet: Beveiliging STEI |d1ste verdieping Wetenschap en techniek |eBZV |hCOINBE |jSTEI |oZWT |p30003002180168 |wN |yB3 |1N |2BZV |613218349 |92020-08-25T00:00+0200 |id171588144 |nmrest1588144
df852 |a2050 |bInformatie (+2) Volwassenen informatief |c521.5 |eBSV |h521.5 |oVI0 |p30003006571503 |wN |yB3 |1N |2BSV |613252206 |92020-09-07T00:00+0200 |id171588144 |nmrest1588144
df852 |a2170 |bInformatief: wetenschap |cInternet: Beveiliging |eBZV |hCOINBE |oVIM |p30003006070548 |wN |yB3 |1N |2BZV |614066163 |92020-10-19T00:00+0200 |id171588144 |nmrest1588144
df852 |a2070 |bVolwassenen informatief |c521.5 |eBSV |h521.5 |oVI0 |p1180401 |wN |yB3 |1N |2BSV |614087191 |92020-09-25T00:00+0200 |id171588144 |nmrest1588144
df852 |a2240 |bVolwassenen informatief |cInternet: Beveiliging |eBZV |hCOINBE |oVI0 |p30003002426011 |wN |yB3 |1N |2BZV |614117132 |92020-10-06T00:00+0200 |id171588144 |nmrest1588144
df852 |a2210 |bVolwassenen informatief |cInternet: Beveiliging STEI |eBZV |hCOINBE |jSTEI |oVI0 |p30003004057342 |wN |yB3 |1N |2BZV |614121476 |92020-11-23T00:00+0100 |id171588144 |nmrest1588144
df852 |a2380 |bGelijkvloers Volwassenen informatief |cComputers # Internet: Beveiliging |dGelijkvloers volwassenen; informatief |e@ |hCOINBE |oVI0 |p30004000746619 |wN |yB3 |1N |2BZV |614360195 |92020-07-15T00:00+0200 |id171588144 |nmrest1588144
df852 |a2120 |bInformatie Wetenschappen |c521.5 |l521.5 |oIWE |p30003007063323 |wN |xa20 |yB3 |1N |614480619 |92020-11-09T00:00+0100 |id171588144 |nmrest1588144
df852 |a2310 |bBoven Volwassenen informatief |c521.5 STEI |dBoven Volwassenen informatieve boeken |eBSV |h521.5 |jSTEI |oVI0 |p30004000097923 |wN |yB3 |1N |2BSV |614591858 |92020-12-09T00:00+0100 |id171588144 |nmrest1588144
df852 |a2120 |bInformatie Wetenschappen |c521.5 |l521.5 |oIWE |p30003007063770 |wN |xa21 |yB3 |1N |614606790 |92020-12-14T00:00+0100 |id171588144 |nmrest1588144
df852 |a2220 |bvolw. informatief |cInternet: Beveiliging |eBZV |hCOINBE |oVI0 |p30003006583070 |wN |yB3 |1N |2BZV |614627152 |92020-12-18T00:00+0100 |id171588144 |nmrest1588144
df852 |a2221 |bGelijkvloers volw. informatief |cInternet: Beveiliging |eBZV |hCOINBE |oVI0 |p30003006601256 |wN |yB3 |1N |2BZV |614627154 |92020-12-22T00:00+0100 |id171588144 |nmrest1588144
df852 |a2330 |bComputers - software |c521.5 |dEerste verdieping - computerlokaal |eBSV |h521.5 |oCOM |p30003007567815 |wN |yB3 |1N |2BSV |624158569 |92022-05-17T00:00+0200 |id171588144 |nmrest1588144
df999## |aInternet |bBeveiliging |cCO |d2020 |fSTEI |zVN ZIZO 2*9
df999## |c521.5 |d2020 |fSTEI |zVN SISO 2*4
meta_author |tpersonal |fJoseph |lSteinberg |rSteinberg, Joseph |caut |9Joseph Steinberg
meta_isbn9789045356600
meta_isbnyear97890453566002020
meta_subject |tInternetcriminaliteit |tDatabeveiliging |tComputerbeveiliging
meta_titleCybersecurity voor dummies
meta_vlaccid10221997
branches |aZBB |rss20201006
branches |a2000 |mInternet: Beveiliging STEI |zCOINBE |sVIN |b30004000022801 |wN |kB3 |rss20200713 |sVolwassenen informatief |id171588144 |nmrest1588144
branches |a2040 |mInternet: Beveiliging |zCOINBE |sVIM |b30003017295285 |wN |kB3 |rss20200722 |s1ste verdieping Informatief: wetenschap |id171588144 |nmrest1588144
branches |a2140 |mInternet: Beveiliging STEI |zCOINBE |sVIM |b30003002067529 |wN |kB3 |rss20200730 |s1ste verdieping Informatief: wetenschap |id171588144 |nmrest1588144
branches |a2340 |mInternet: Beveiliging |sVolwassenen ZIZO: wetenschap |zCOINBE |sVIM |b30003005643659 |wN |kB3 |rss20200803 |id171588144 |nmrest1588144
branches |a2020 |mInternet: Beveiliging STEI |s1ste verdieping Wetenschap en techniek |zCOINBE |sZWT |b30003002180168 |wN |kB3 |rss20200825 |id171588144 |nmrest1588144
branches |a2050 |m521.5 |z521.5 |sVI0 |b30003006571503 |wN |kB3 |rss20200907 |sInformatie (+2) Volwassenen informatief |id171588144 |nmrest1588144
branches |a2170 |mInternet: Beveiliging |zCOINBE |sVIM |b30003006070548 |wN |kB3 |rss20201019 |sInformatief: wetenschap |id171588144 |nmrest1588144
branches |a2070 |m521.5 |z521.5 |sVI0 |b1180401 |wN |kB3 |rss20200925 |sVolwassenen informatief |id171588144 |nmrest1588144
branches |a2240 |mInternet: Beveiliging |zCOINBE |sVI0 |b30003002426011 |wN |kB3 |rss20201006 |sVolwassenen informatief |id171588144 |nmrest1588144
branches |a2210 |mInternet: Beveiliging STEI |zCOINBE |sVI0 |b30003004057342 |wN |kB3 |rss20201123 |sVolwassenen informatief |id171588144 |nmrest1588144
branches |a2380 |mComputers # Internet: Beveiliging |sGelijkvloers volwassenen; informatief |zCOINBE |sVI0 |b30004000746619 |wN |kB3 |rss20200715 |id171588144 |nmrest1588144
branches |a2120 |m521.5 |sIWE |b30003007063323 |wN |kB3 |rss20201109 |sInformatie Wetenschappen |id171588144 |nmrest1588144
branches |a2310 |m521.5 STEI |sBoven Volwassenen informatieve boeken |z521.5 |sVI0 |b30004000097923 |wN |kB3 |rss20201209 |id171588144 |nmrest1588144
branches |a2120 |m521.5 |sIWE |b30003007063770 |wN |kB3 |rss20201214 |sInformatie Wetenschappen |id171588144 |nmrest1588144
branches |a2220 |mInternet: Beveiliging |zCOINBE |sVI0 |b30003006583070 |wN |kB3 |rss20201218 |svolw. informatief |id171588144 |nmrest1588144
branches |a2221 |mInternet: Beveiliging |zCOINBE |sVI0 |b30003006601256 |wN |kB3 |rss20201222 |sGelijkvloers volw. informatief |id171588144 |nmrest1588144
branches |a2330 |m521.5 |sEerste verdieping - computerlokaal |z521.5 |sCOM |b30003007567815 |wN |kB3 |rss20220517 |id171588144 |nmrest1588144
frabl
3B7CA2AC37F1ACA0
key1
cybersecurity for dummies
key2
steinberg,joseph
mat
zbbBook
lang
dut
geïndexeerde woorden (in freetext zoek index)
cybersecurity Voor dummies