Debug informatie:
ID=0310221997 ∙ extID=|library/marc/vlacc|10221997 ∙ BSID=library\m\vlacc\rest
material=zbbBook ∙ language=dut ∙ languageo=eng ∙ type=NonFictie ∙ targetaudience=ageAdults ∙ rose_rnk=444 ∙ hl_cnt=22 ∙ gl_hl_cnt=111 ∙ date_ent=20190610 ∙ date_mut=20201006 ∙ nbd_sum=true ∙ nbd_rev=true ∙ news_rev=false
idbrongevonden opmatch regel (debug)
1588144wise-gent: rest
1588144wise-oostvlaanderen: rest
veldbevattoegevoegd van id
_ImportTime2019-06-24 13:18:25
marcleader00943aam a2200301 4500
cf00110221997
cf00520201006140129.0
cf008190610s2020 0 dut
df020## |a9789045356600 |9paperback
df035## |a9789045356600
df035## |aBBA000257029
df040## |aBoekenBank |bdut |cOpen Vlacc
df041## |heng
df084## |a521.5
df096## |9980 |aInformatica algemeen
df100## |aSteinberg, Joseph |4aut
df245#0 |aCybersecurity voor dummies |hBOEK
df260## |aAmersfoort |bBBNC Uitgevers |c2020
df300## |aXXIII, 349 p. |bill.
df365## |b32.99 |cEUR
df521## |avolwassenen
df534## |aCybersecurity for dummies
df650## |aInternetcriminaliteit |9vtr
df650## |aDatabeveiliging |9vtr
df650## |aComputerbeveiliging |9vtr
df693#2 |9COINBE |aWetenschap en techniek |xComputers |yInternet |zBeveiliging
df852 |a3624 |bVolwassenen: wetenschap |cComputers # Internet: Beveiliging |e@ |hCOINBE |oVIM |pGE31305076 |wN |yB3 |1N |2BZV |627446968 |92020-10-06T00:00+0200 |id1B1588144 |nmrest1588144
df852 |a3620 |b2de verdieping Informatica [kast 33] |c521.5 |e@ |l521.5 |oNIN |pGE31305088 |wN |yB3 |1N |2BSV |627446969 |92020-10-06T00:00+0200 |id1B1588144 |nmrest1588144
df852 |a3620 |b2de verdieping Informatica [kast 33] |c521.5 |e@ |l521.5 |oNIN |pGE31497780 |wN |yB3 |1N |2BSV |627446970 |92021-01-15T00:00+0100 |id1B1588144 |nmrest1588144
df852 |a3000 |b2e verdieping Informatief Wetenschap |cInternet: Beveiliging |eBZV |hCOINBE |oVIM |p30003000043763 |wN |yB3 |1N |2BZV |613136584 |92020-07-14T00:00+0200 |id181588144 |nmrest1588144
df852 |a3360 |bVolwassenen informatief |c521.5 |eBSV |h521.5 |oVI0 |p30003005729512 |wN |yB3 |1N |2BSV |613138426 |92020-07-15T00:00+0200 |id181588144 |nmrest1588144
df852 |a3040 |bInformatief: wetenschap |cInternet: Beveiliging STEI |dInformatief volwassenen: wetenschap |eBZV |hCOINBE |jSTEI |oVIM |p30003002058965 |wN |yB3 |1N |2BZV |613161948 |92020-08-17T00:00+0200 |id181588144 |nmrest1588144
df852 |a3100 |b1e verdieping Volwassenen informatief |c521.5 STEI |eBSV |h521.5 |jSTEI |oVI0 |p30003002159286 |wN |yB3 |1N |2BSV |613163700 |92020-07-28T00:00+0200 |id181588144 |nmrest1588144
df852 |a3330 |bVolwassenen informatief |c521.5 STEI |eBSV |h521.5 |jSTEI |oVI0 |p30003005709501 |wN |yB3 |1N |2BSV |613186476 |92020-08-10T00:00+0200 |id181588144 |nmrest1588144
df852 |a3250 |bInformatief: wetenschap |cInternet: Beveiliging STEI |eBZV |hCOINBE |jSTEI |oVIM |p30003005658270 |wN |yB3 |1N |2BZV |613191965 |92020-08-12T00:00+0200 |id181588144 |nmrest1588144
df852 |a3580 |bVolwassenen informatief |c521.5 |eBSV |h521.5 |oVI0 |p30003004402035 |wN |yB3 |1N |2BSV |613197560 |92020-08-13T00:00+0200 |id181588144 |nmrest1588144
df852 |a3550 |bInformatief Wetenschap Technie |cInternet: Beveiliging STEI |dInformatief Wetenschap Techniek |eBZV |hCOINBE |jSTEI |oVIB |p30003005843442 |wN |yB3 |1N |2BZV |613207983 |92020-08-19T00:00+0200 |id181588144 |nmrest1588144
df852 |a3530 |bInformatief: wetenschap |cInternet: Beveiliging STEI |eBZV |hCOINBE |jSTEI |oVIM |p30003005826419 |wN |yB3 |1N |2BZV |613217388 |92020-08-25T00:00+0200 |id181588144 |nmrest1588144
df852 |a3300 |b1e verdieping Informatief: wetenschap |cInternet: Beveiliging STEI |eBZV |hCOINBE |jSTEI |oVIM |p30003005684359 |wN |yB3 |1N |2BZV |613217700 |92020-08-25T00:00+0200 |id181588144 |nmrest1588144
df852 |a3500 |bWetenschap: computers |cInternet: Beveiliging STEI |dInformatief: wetenschap |eBZV |hCOINBE |jSTEI |oIWC |p30003005563127 |wN |yB3 |1N |2BZV |613222544 |92020-08-26T00:00+0200 |id181588144 |nmrest1588144
df852 |a3420 |bVolwassenen informatief |c521.5 |eBSV |h521.5 |oVI0 |p30003002101075 |wN |yB3 |1N |2BSV |613229041 |92020-08-28T00:00+0200 |id181588144 |nmrest1588144
df852 |a3200 |bVolwassenen informatief |c521.5 STEI |eBSV |h521.5 |jSTEI |oVI0 |p30003005747230 |wN |yB3 |1N |2BSV |613247426 |92020-09-04T00:00+0200 |id181588144 |nmrest1588144
df852 |a3020 |bInformatief: wetenschap |cInternet: Beveiliging |dInformatief: wetenschap en techniek |eBZV |hCOINBE |oVIM |p30003004562273 |wN |yB3 |1N |2BZV |3Niet gekaft |614089441 |92020-09-28T00:00+0200 |id181588144 |nmrest1588144
df852 |a3450 |bVolwassenen informatief |c521.5 STEI |eBSV |h521.5 |jSTEI |oVI0 |p30003006200338 |wN |yB3 |1N |2BSV |614426132 |92020-11-30T00:00+0100 |id181588144 |nmrest1588144
df852 |a3110 |bVolwassenen informatief |c521.5 STEI |eBSV |h521.5 |jSTEI |oVI0 |p30003006642117 |wN |yB3 |1N |2BSV |614442494 |92020-10-27T00:00+0100 |id181588144 |nmrest1588144
df852 |a3112 |bVolwassenen informatief |c521.5 STEI |eBSV |h521.5 |jSTEI |oVI0 |p30003006644028 |wN |yB3 |1N |2BSV |614556402 |92020-12-01T00:00+0100 |id181588144 |nmrest1588144
df852 |a3490 |bVolw. info:wisk-inform-natuurk |c521.5 |dVolwassenen info: wiskunde - informatica - natuurkunde |eBSV |l521.5 |oN19 |p30003000203934 |wN |yB3 |1N |2BSV |626945095 |92023-01-04T00:00+0100 |id181588144 |nmrest1588144
df852 |a3624 |bVolwassenen: wetenschap |cComputers # Internet: Beveiliging |e@ |hCOINBE |oVIM |pGE31305076 |wN |yB3 |1N |2BZV |627446968 |92020-10-06T00:00+0200 |id181588144 |nmrest1588144
df852 |a3620 |b2de verdieping Informatica [kast 33] |c521.5 |e@ |l521.5 |oNIN |pGE31305088 |wN |yB3 |1N |2BSV |627446969 |92020-10-06T00:00+0200 |id181588144 |nmrest1588144
df852 |a3620 |b2de verdieping Informatica [kast 33] |c521.5 |e@ |l521.5 |oNIN |pGE31497780 |wN |yB3 |1N |2BSV |627446970 |92021-01-15T00:00+0100 |id181588144 |nmrest1588144
df999## |aInternet |bBeveiliging |cCO |d2020 |fSTEI |zVN ZIZO 2*9
df999## |c521.5 |d2020 |fSTEI |zVN SISO 2*4
meta_author |tpersonal |fJoseph |lSteinberg |rSteinberg, Joseph |caut |9Joseph Steinberg
meta_isbn9789045356600
meta_isbnyear97890453566002020
meta_subject |tInternetcriminaliteit |tDatabeveiliging |tComputerbeveiliging
meta_titleCybersecurity voor dummies
meta_vlaccid10221997
branches |aZBB |rss20201006
branches |a3624 |mComputers # Internet: Beveiliging |zCOINBE |sVIM |bGE31305076 |wN |kB3 |rss20201006 |sVolwassenen: wetenschap |id1B1588144 |nmrest1588144
branches |a3620 |m521.5 |sNIN |bGE31305088 |wN |kB3 |rss20201006 |s2de verdieping Informatica [kast 33] |id1B1588144 |nmrest1588144
branches |a3620 |m521.5 |sNIN |bGE31497780 |wN |kB3 |rss20210115 |s2de verdieping Informatica [kast 33] |id1B1588144 |nmrest1588144
branches |a3000 |mInternet: Beveiliging |zCOINBE |sVIM |b30003000043763 |wN |kB3 |rss20200714 |s2e verdieping Informatief Wetenschap |id181588144 |nmrest1588144
branches |a3360 |m521.5 |z521.5 |sVI0 |b30003005729512 |wN |kB3 |rss20200715 |sVolwassenen informatief |id181588144 |nmrest1588144
branches |a3040 |mInternet: Beveiliging STEI |sInformatief volwassenen: wetenschap |zCOINBE |sVIM |b30003002058965 |wN |kB3 |rss20200817 |id181588144 |nmrest1588144
branches |a3100 |m521.5 STEI |z521.5 |sVI0 |b30003002159286 |wN |kB3 |rss20200728 |s1e verdieping Volwassenen informatief |id181588144 |nmrest1588144
branches |a3330 |m521.5 STEI |z521.5 |sVI0 |b30003005709501 |wN |kB3 |rss20200810 |sVolwassenen informatief |id181588144 |nmrest1588144
branches |a3250 |mInternet: Beveiliging STEI |zCOINBE |sVIM |b30003005658270 |wN |kB3 |rss20200812 |sInformatief: wetenschap |id181588144 |nmrest1588144
branches |a3580 |m521.5 |z521.5 |sVI0 |b30003004402035 |wN |kB3 |rss20200813 |sVolwassenen informatief |id181588144 |nmrest1588144
branches |a3550 |mInternet: Beveiliging STEI |sInformatief Wetenschap Techniek |zCOINBE |sVIB |b30003005843442 |wN |kB3 |rss20200819 |id181588144 |nmrest1588144
branches |a3530 |mInternet: Beveiliging STEI |zCOINBE |sVIM |b30003005826419 |wN |kB3 |rss20200825 |sInformatief: wetenschap |id181588144 |nmrest1588144
branches |a3300 |mInternet: Beveiliging STEI |zCOINBE |sVIM |b30003005684359 |wN |kB3 |rss20200825 |s1e verdieping Informatief: wetenschap |id181588144 |nmrest1588144
branches |a3500 |mInternet: Beveiliging STEI |sInformatief: wetenschap |zCOINBE |sIWC |b30003005563127 |wN |kB3 |rss20200826 |id181588144 |nmrest1588144
branches |a3420 |m521.5 |z521.5 |sVI0 |b30003002101075 |wN |kB3 |rss20200828 |sVolwassenen informatief |id181588144 |nmrest1588144
branches |a3200 |m521.5 STEI |z521.5 |sVI0 |b30003005747230 |wN |kB3 |rss20200904 |sVolwassenen informatief |id181588144 |nmrest1588144
branches |a3020 |mInternet: Beveiliging |sInformatief: wetenschap en techniek |zCOINBE |sVIM |b30003004562273 |wN |kB3 |xNiet gekaft |rss20200928 |id181588144 |nmrest1588144
branches |a3450 |m521.5 STEI |z521.5 |sVI0 |b30003006200338 |wN |kB3 |rss20201130 |sVolwassenen informatief |id181588144 |nmrest1588144
branches |a3110 |m521.5 STEI |z521.5 |sVI0 |b30003006642117 |wN |kB3 |rss20201027 |sVolwassenen informatief |id181588144 |nmrest1588144
branches |a3112 |m521.5 STEI |z521.5 |sVI0 |b30003006644028 |wN |kB3 |rss20201201 |sVolwassenen informatief |id181588144 |nmrest1588144
branches |a3490 |m521.5 |sVolwassenen info: wiskunde - informatica - natuurkunde |sN19 |b30003000203934 |wN |kB3 |rss20230104 |id181588144 |nmrest1588144
branches |a3624 |mComputers # Internet: Beveiliging |zCOINBE |sVIM |bGE31305076 |wN |kB3 |rss20201006 |sVolwassenen: wetenschap |id181588144 |nmrest1588144
branches |a3620 |m521.5 |sNIN |bGE31305088 |wN |kB3 |rss20201006 |s2de verdieping Informatica [kast 33] |id181588144 |nmrest1588144
branches |a3620 |m521.5 |sNIN |bGE31497780 |wN |kB3 |rss20210115 |s2de verdieping Informatica [kast 33] |id181588144 |nmrest1588144
frabl
3B7CA2AC37F1ACA0
key1
cybersecurity for dummies
key2
steinberg,joseph
mat
zbbBook
lang
dut
geïndexeerde woorden (in freetext zoek index)
cybersecurity voor dummies
extidfrablmatlanggl_hl_cntpublisheryear
Deze records met dezelfde key1 & key2, maar ander materiaal worden gesuggereerd:
|library/marc/vlacc|103889513B7CA2AC37F0A0A01BBNC Uitgevers2021
Deze records met dezelfde frabl worden gegroepeerd (ook beschikbaarheid)
|library/marc/vlacc|102219973B7CA2AC37F1ACA0111BBNC Uitgevers2020