_ImportTime | 2017-06-26 23:01:53 | |
marcleader | 01110aam a2200313 4500 | |
cf001 | 10092921 | |
cf005 | 20190218115556.0 | |
cf008 | 170623s2018 0 dut | |
df020 | ##
|a9789045214658
|9paperback | |
df035 | ##
|a9789045214658 | |
df035 | ##
|aBBA000200991 | |
df040 | ##
|aBoekenBank
|bdut
|cOpen Vlacc | |
df041 | ##
|heng | |
df084 | ##
|a520.72 | |
df096 | ##
|9600
|aNon-fictie informatief/professioneel algemeen | |
df100 | ##
|aGoodman, Marc
|4aut | |
df245 | #0
|aCybercrime en cyberwar
|bde toekomst van de misdaad in een wereld die altijd online is
|hBOEK | |
df260 | ##
|aUithoorn
|bKarakter Uitgevers B.V.
|c© 2018 | |
df300 | ##
|a573 p. | |
df365 | ##
|b39.99
|cEUR | |
df521 | ##
|avolwassenen | |
df534 | ##
|aFuture crimes : everything is connected, everyone is vulnerable and what we can do about it | |
df650 | ##
|aComputercriminaliteit
|9vtr | |
df650 | ##
|aInternetcriminaliteit
|9vtr | |
df650 | ##
|aHacken
|9vtr | |
df650 | ##
|aDarknet
|9vtr | |
df693 | #2
|9COINBE
|aWetenschap en techniek
|xComputers
|yInternet
|zBeveiliging | |
df852 |
|a4000
|bVolwassenen Informatica [kast 16-17]
|c520.72 GOOD
|e@
|l520.72 GOOD
|oN12
|pOS5250811
|wN
|yB3
|1N
|2BSV
|67046476
|92018-03-01T00:00+0100
|id191269610
|nmrest | 1269610 |
df852 |
|a4060
|bGROTE BIB : 3e VERDIEPING ZVWT - Info: wetenschap
|cComputers # Internet: Beveiliging
|dGROTE BIB : 3e VERDIEPING WERELD
|e@
|hCOINBE
|oVIM
|pBB1943634
|wN
|yB3
|1N
|2BZV
|610887035
|92018-02-20T00:00+0100
|id191269610
|nmrest | 1269610 |
df852 |
|a4230
|bVolwassenen informatief
|c520.72/GOOD
|dVOLWASSENEN : NON-FICTIE
|e@
|l520.72/GOOD
|oVI0
|pIP5031281
|wN
|xSeq: 2
|yB3
|1N
|2BSV
|610887036
|92018-02-14T00:00+0100
|id191269610
|nmrest | 1269610 |
df852 |
|a4260
|bVolwassenen informatief
|c520.72
|dNon-fictie
|e@
|l520.72
|oVI0
|pIZ2103354
|wN
|xST Seq: 3
|yB3
|1N
|2BSV
|610887037
|92018-06-14T00:00+0200
|id191269610
|nmrest | 1269610 |
df852 |
|a4281
|bVolwassenen informatief
|c520.72
|dVolwassenen Non-Fictie
|e@
|l520.72
|oVI0
|pKN6689167
|wN
|xSeq: 5
|yB3
|1N
|2BSV
|610887039
|92018-02-20T00:00+0100
|id191269610
|nmrest | 1269610 |
df852 |
|a4300
|bInformatief: wetenschap
|cComputers # Internet: Beveiliging
|dInfo: Wetenschap en techniek
|e@
|hCOINBE
|oVIM
|pKS1735780
|wN
|xaanw 2018 rk 007 Seq: 6
|yB3
|1N
|2BZV
|610887040
|92018-02-15T00:00+0100
|id191269610
|nmrest | 1269610 |
df852 |
|a4360
|bVolwassenen informatief
|c520.72 GOOD
|dZone volwassenen INFORMATIE
|eBSV
|h520.72
|jGOOD
|oVI0
|pLM2729458
|wN
|xRL Seq: 7
|yB3
|1N
|2BSV
|610887041
|92018-02-26T00:00+0100
|id191269610
|nmrest | 1269610 |
df852 |
|a4430
|bInformatief: wetenschap
|cComputers # Internet: Beveiliging
|dInfo: Wetenschap en techniek
|e@
|hCOINBE
|oVIM
|pMI248380
|wN
|xSeq: 8
|yB3
|1N
|2BZV
|610887042
|92018-04-09T00:00+0200
|id191269610
|nmrest | 1269610 |
df852 |
|a4530
|bVERDIEPING 2 : DUIVELSHOEK : Informatica
|c520.72 GOOD
|dVERDIEPING 2 : DUIVELSHOEK : INFORMATICA : Kast 16
|eBSV
|l520.72 GOOD
|oNIN
|pRL7314906
|wN
|xSeq: 9 [S 39.99]
|yB3
|1N
|2BSV
|610887043
|92018-02-14T00:00+0100
|id191269610
|nmrest | 1269610 |
df852 |
|a4590
|bVolwassenen informatief
|c520.72
|dInformatief volwassenen
|e@
|l520.72
|oVI0
|p38790004140762
|wN
|xSeq: 10
|yB3
|1N
|2BSV
|610887044
|92018-02-05T00:00+0100
|id191269610
|nmrest | 1269610 |
df852 |
|a4630
|bInformatief: wetenschap
|cComputers # Internet: Beveiliging
|dInfo: Wetenschap en techniek
|e@
|hCOINBE
|oVIM
|pWN1178687
|wN
|xSeq: 11
|yB3
|1N
|2BZV
|610887045
|92018-03-22T00:00+0100
|id191269610
|nmrest | 1269610 |
df852 |
|a4600
|bInformatief: wetenschap
|cComputers # Internet: Beveiliging
|dInfo: Wetenschap en techniek
|e@
|hCOINBE
|oVIM
|pWR2087308
|wN
|xSeq: 12
|yB3
|1N
|2BZV
|610887046
|92018-02-08T00:00+0100
|id191269610
|nmrest | 1269610 |
df852 |
|a4610
|bInformatief: wetenschap
|cComputers # Internet: Beveiliging GOOD
|dInfo: Wetenschap en techniek
|e@
|hCOINBE
|lGOOD
|oVIM
|pWV4035216
|wN
|xSeq: 13
|yB3
|1N
|2BZV
|610887047
|92018-02-07T00:00+0100
|id191269610
|nmrest | 1269610 |
df852 |
|a4670
|bInformatief: wetenschap
|cComputers # Internet: Beveiliging
|e@
|hCOINBE
|oVIM
|pZW2766906
|wN
|xSeq: 15
|yB3
|1N
|2BZV
|610887049
|92018-07-30T00:00+0200
|id191269610
|nmrest | 1269610 |
df852 |
|a4082
|bVolwassenen informatief
|cComputers # Internet: Beveiliging GOOD
|dVolw. informatie
|e@
|hCOINBE
|lGOOD
|oVI0
|pBR12434086
|wN
|x[40 E]
|yB3
|1N
|2BZV
|612895434
|92018-02-09T00:00+0100
|id191269610
|nmrest | 1269610 |
df852 |
|a4080
|b1e verdieping Volwassenen informatief
|cComputers # Internet: Beveiliging GOOD
|d1e verdieping non-fictie
|e@
|hCOINBE
|lGOOD
|oVI0
|pBR1553755
|wN
|xSeq: 2 [40 E]
|yB3
|1N
|2BZV
|612895435
|92018-02-13T00:00+0100
|id191269610
|nmrest | 1269610 |
df852 |
|a4110
|bVolwassenen informatief
|cInternet: Beveiliging
|dVolwassenenafdeling informatieve boeken
|eBZV
|hCOINBE
|oVI0
|p2018/194
|wN
|xStandaard boekhandel
|yB3
|1N
|2BZV
|625874860
|92018-02-06T00:00+0100
|id191269610
|nmrest | 1269610 |
df999 | ##
|aInternet
|bBeveiliging
|cCO
|d2018
|fGOOD
|zVN ZIZO 2*9 | |
df999 | ##
|c520.72
|d2018
|fGOOD
|zVN SISO 2*4 | |
meta_author |
|tpersonal
|fMarc
|lGoodman
|rGoodman, Marc
|caut
|9Marc Goodman | |
meta_isbn | 9789045214658 | |
meta_isbnyear | 97890452146582018 | |
meta_subject |
|tComputercriminaliteit
|tInternetcriminaliteit
|tHacken
|tDarknet | |
meta_subject |
|lInformatieve werken
|id191269610
|nmrest | 1269610 |
meta_title | Cybercrime en cyberwar : de toekomst van de misdaad in een wereld die altijd online is | |
meta_vlaccid | 10092921 | |
branches |
|aZBB
|rss20190218 | |
branches |
|a4000
|m520.72 GOOD
|sN12
|bOS5250811
|wN
|kB3
|rss20180301
|sVolwassenen Informatica [kast 16-17]
|id191269610
|nmrest | 1269610 |
branches |
|a4060
|mComputers # Internet: Beveiliging
|sGROTE BIB : 3e VERDIEPING WERELD
|zCOINBE
|sVIM
|bBB1943634
|wN
|kB3
|rss20180220
|id191269610
|nmrest | 1269610 |
branches |
|a4230
|m520.72/GOOD
|sVOLWASSENEN : NON-FICTIE
|sVI0
|bIP5031281
|wN
|kB3
|rss20180214
|id191269610
|nmrest | 1269610 |
branches |
|a4260
|m520.72
|sNon-fictie
|sVI0
|bIZ2103354
|wN
|kB3
|rss20180614
|id191269610
|nmrest | 1269610 |
branches |
|a4281
|m520.72
|sVolwassenen Non-Fictie
|sVI0
|bKN6689167
|wN
|kB3
|rss20180220
|id191269610
|nmrest | 1269610 |
branches |
|a4300
|mComputers # Internet: Beveiliging
|sInfo: Wetenschap en techniek
|zCOINBE
|sVIM
|bKS1735780
|wN
|kB3
|rss20180215
|id191269610
|nmrest | 1269610 |
branches |
|a4360
|m520.72 GOOD
|sZone volwassenen INFORMATIE
|z520.72
|sVI0
|bLM2729458
|wN
|kB3
|rss20180226
|id191269610
|nmrest | 1269610 |
branches |
|a4430
|mComputers # Internet: Beveiliging
|sInfo: Wetenschap en techniek
|zCOINBE
|sVIM
|bMI248380
|wN
|kB3
|rss20180409
|id191269610
|nmrest | 1269610 |
branches |
|a4530
|m520.72 GOOD
|sVERDIEPING 2 : DUIVELSHOEK : INFORMATICA : Kast 16
|sNIN
|bRL7314906
|wN
|kB3
|rss20180214
|id191269610
|nmrest | 1269610 |
branches |
|a4590
|m520.72
|sInformatief volwassenen
|sVI0
|b38790004140762
|wN
|kB3
|rss20180205
|id191269610
|nmrest | 1269610 |
branches |
|a4630
|mComputers # Internet: Beveiliging
|sInfo: Wetenschap en techniek
|zCOINBE
|sVIM
|bWN1178687
|wN
|kB3
|rss20180322
|id191269610
|nmrest | 1269610 |
branches |
|a4600
|mComputers # Internet: Beveiliging
|sInfo: Wetenschap en techniek
|zCOINBE
|sVIM
|bWR2087308
|wN
|kB3
|rss20180208
|id191269610
|nmrest | 1269610 |
branches |
|a4610
|mComputers # Internet: Beveiliging GOOD
|sInfo: Wetenschap en techniek
|zCOINBE
|sVIM
|bWV4035216
|wN
|kB3
|rss20180207
|id191269610
|nmrest | 1269610 |
branches |
|a4670
|mComputers # Internet: Beveiliging
|zCOINBE
|sVIM
|bZW2766906
|wN
|kB3
|rss20180730
|sInformatief: wetenschap
|id191269610
|nmrest | 1269610 |
branches |
|a4082
|mComputers # Internet: Beveiliging GOOD
|sVolw. informatie
|zCOINBE
|sVI0
|bBR12434086
|wN
|kB3
|rss20180209
|id191269610
|nmrest | 1269610 |
branches |
|a4080
|mComputers # Internet: Beveiliging GOOD
|s1e verdieping non-fictie
|zCOINBE
|sVI0
|bBR1553755
|wN
|kB3
|rss20180213
|id191269610
|nmrest | 1269610 |
branches |
|a4110
|mInternet: Beveiliging
|sVolwassenenafdeling informatieve boeken
|zCOINBE
|sVI0
|b2018/194
|wN
|kB3
|rss20180206
|id191269610
|nmrest | 1269610 |