Debug informatie:
ID=0310222997 ∙ extID=|library/marc/vlacc|10222997 ∙ BSID=library\m\vlacc\rest
material=zbbBook ∙ language=dut ∙ type=NonFictie ∙ targetaudience=ageAdults ∙ rose_rnk=279 ∙ hl_cnt=21 ∙ gl_hl_cnt=93 ∙ date_ent=20190614 ∙ date_mut=20200305 ∙ nbd_sum=true ∙ nbd_rev=true ∙ news_rev=false
idbrongevonden opmatch regel (debug)
1588749wise-gent: rest
1588749wise-oostvlaanderen: rest
veldbevattoegevoegd van id
_ImportTime2019-06-26 23:02:06
marcleader01006aam a2200325 4500
cf00110222997
cf00520200305105817.0
cf008190614s2019 0 dut
df020## |a9789401463652 |9paperback
df035## |a9789401463652
df035## |aBBA000257774
df040## |aBoekenBank |bdut |cOpen Vlacc
df084## |a521.5
df096## |9740 |aMens en maatschappij algemeen
df096## |9980 |aInformatica algemeen
df100## |aVerbist, Hans |4aut
df245#0 |aCyberveilig in 10 dagen |hBOEK
df260## |aLeuven |bLannooCampus |c2019
df300## |a144 p.
df365## |b24.99 |cEUR
df521## |avolwassenen
df650## |aComputerbeveiliging |9vtr
df650## |aInternetcriminaliteit |9vtr
df650## |aHacken |9vtr
df650## |aComputervirussen |9vtr
df650## |aComputerwormen |9vtr
df693#2 |9COINBE |aWetenschap en techniek |xComputers |yInternet |zBeveiliging
df700## |aDée, Kenneth |4aut
df852 |a3628 |bVolwassenen: wetenschap |cComputers # Internet: Beveiliging |e@ |hCOINBE |oVIM |pGE31121263 |wN |yB3 |1N |2BZV |627423588 |92020-05-04T00:00+0200 |id1B1588749 |nmrest1588749
df852 |a3632 |bVolwassenen: wetenschap |cComputers # Internet: Beveiliging |e@ |hCOINBE |oVIM |pGE31121299 |wN |yB3 |1N |2BZV |627423589 |92020-05-04T00:00+0200 |id1B1588749 |nmrest1588749
df852 |a3620 |b2de verdieping Informatica [kast 33] |c521.5 |e@ |l521.5 |oNIN |pGE31121287 |wN |yB3 |1N |2BSV |627423590 |92020-05-04T00:00+0200 |id1B1588749 |nmrest1588749
df852 |a3620 |b2de verdieping Informatica [kast 33] |c521.5 |e@ |l521.5 |oNIN |pGE3113113X |wN |yB3 |1N |2BSV |627423591 |92020-02-21T00:00+0100 |id1B1588749 |nmrest1588749
df852 |a3050 |bThemastand |cInternet: Beveiliging VERB |eBZV |hCOINBE |jVERB |o0TH |p30003000080426 |wN |yB3 |1N |2BZV |66820076 |92019-10-17T00:00+0200 |id181588749 |nmrest1588749
df852 |a3020 |bInformatief: wetenschap |cInternet: Beveiliging |dInformatief: wetenschap en techniek |eBZV |hCOINBE |oVIM |p30003004569699 |wN |yB3 |1N |2BZV |66835828 |92019-10-28T00:00+0100 |id181588749 |nmrest1588749
df852 |a3490 |bVolw. info:wisk-inform-natuurk |c520.72 |dVolwassenen info: wiskunde - informatica - natuurkunde |eBSV |l520.72 |oN19 |p30003000091423 |wN |yB3 |1N |2BSV |66842872 |92019-10-30T00:00+0100 |id181588749 |nmrest1588749
df852 |a3180 |bVolwassenen informatief |cInternet: Beveiliging VERB |eBZV |hCOINBE |jVERB |oVI0 |p30003005742388 |wN |yB3 |1N |2BZV |67115741 |92019-11-14T00:00+0100 |id181588749 |nmrest1588749
df852 |a3451 |bInformatica |c520.72 |eBSV |h520.72 |oN17 |p30003005807328 |wN |yB3 |1N |2BSV |67315939 |92019-11-22T00:00+0100 |id181588749 |nmrest1588749
df852 |a3240 |bVolwassenen informatief |cInternet: Beveiliging VERB |eBZV |hCOINBE |jVERB |oVI0 |p30003005775213 |wN |yB3 |1N |2BZV |67612743 |92019-12-09T00:00+0100 |id181588749 |nmrest1588749
df852 |a3100 |b1e verdieping Volwassenen informatief |c520.72 VERB |eBSV |h520.72 |jVERB |oVI0 |p30003002155090 |wN |yB3 |1N |2BSV |67618352 |92019-12-11T00:00+0100 |id181588749 |nmrest1588749
df852 |a3000 |b2e verdieping Informatief Wetenschap |cInternet: Beveiliging |eBZV |hCOINBE |oVIM |p30003000059686 |wN |yB3 |1N |2BZV |67647916 |92020-01-07T00:00+0100 |id181588749 |nmrest1588749
df852 |a3450 |bInformatica |c520.72 |eBSV |h520.72 |oN17 |p30003005912634 |wN |yB3 |1N |2BSV |67648971 |92020-01-07T00:00+0100 |id181588749 |nmrest1588749
df852 |a3110 |bVolwassenen informatief |c520.72 VERB |eBSV |h520.72 |jVERB |oVI0 |p30003006635596 |wN |yB3 |1N |2BSV |67656341 |92020-01-09T00:00+0100 |id181588749 |nmrest1588749
df852 |a3090 |bInformatief: wetenschap |c520.72 VERB |eBSV |h520.72 |jVERB |oVIM |p30003002123522 |wN |yB3 |1N |2BSV |67666633 |92020-01-16T00:00+0100 |id181588749 |nmrest1588749
df852 |a3370 |bVolwassenen informatief |cInternet: Beveiliging VERB |eBZV |hCOINBE |jVERB |oVI0 |p30003005738617 |wN |yB3 |1N |2BZV |67677960 |92020-01-22T00:00+0100 |id181588749 |nmrest1588749
df852 |a3350 |bVolwassenen informatief |cInternet: Beveiliging |eBZV |hCOINBE |oVI0 |p30003005724048 |wN |yB3 |1N |2BZV |67736099 |92020-02-26T00:00+0100 |id181588749 |nmrest1588749
df852 |a3270 |bInformatief: wetenschap |cInternet: Beveiliging VERB |dInformatief: wetenschap - techniek |eBZV |hCOINBE |jVERB |oVIM |p30003005664536 |wN |yB3 |1N |2BZV |67766570 |92020-03-16T00:00+0100 |id181588749 |nmrest1588749
df852 |a3500 |bWetenschap: computers |cInternet: Beveiliging VERB |dInformatief: wetenschap |eBZV |hCOINBE |jVERB |oIWC |p30003005562750 |wN |yB3 |1N |2BZV |612191838 |92020-05-20T00:00+0200 |id181588749 |nmrest1588749
df852 |a3628 |bVolwassenen: wetenschap |cComputers # Internet: Beveiliging |e@ |hCOINBE |oVIM |pGE31121263 |wN |yB3 |1N |2BZV |627423588 |92020-05-04T00:00+0200 |id181588749 |nmrest1588749
df852 |a3632 |bVolwassenen: wetenschap |cComputers # Internet: Beveiliging |e@ |hCOINBE |oVIM |pGE31121299 |wN |yB3 |1N |2BZV |627423589 |92020-05-04T00:00+0200 |id181588749 |nmrest1588749
df852 |a3620 |b2de verdieping Informatica [kast 33] |c521.5 |e@ |l521.5 |oNIN |pGE31121287 |wN |yB3 |1N |2BSV |627423590 |92020-05-04T00:00+0200 |id181588749 |nmrest1588749
df852 |a3620 |b2de verdieping Informatica [kast 33] |c521.5 |e@ |l521.5 |oNIN |pGE3113113X |wN |yB3 |1N |2BSV |627423591 |92020-02-21T00:00+0100 |id181588749 |nmrest1588749
df999## |aInternet |bBeveiliging |cCO |d2019 |fVERB |zVN ZIZO 2*9
df999## |c521.5 |d2019 |fVERB |zVN SISO 2*4
meta_author |tpersonal |fHans |lVerbist |rVerbist, Hans |caut |9Hans Verbist
meta_author |tpersonal |fKenneth |lDée |rDée, Kenneth |caut |9Kenneth Dée
meta_isbn9789401463652
meta_isbnyear97894014636522019
meta_subject |tComputerbeveiliging |tInternetcriminaliteit |tHacken |tComputervirussen |tComputerwormen
meta_subject |lcomputers |lcriminaliteit |id1B1588749 |nmrest1588749
meta_subject |lcomputers |lcriminaliteit |id181588749 |nmrest1588749
meta_titleCyberveilig in 10 dagen
meta_vlaccid10222997
branches |aZBB |rss20200305
branches |a3628 |mComputers # Internet: Beveiliging |zCOINBE |sVIM |bGE31121263 |wN |kB3 |rss20200504 |sVolwassenen: wetenschap |id1B1588749 |nmrest1588749
branches |a3632 |mComputers # Internet: Beveiliging |zCOINBE |sVIM |bGE31121299 |wN |kB3 |rss20200504 |sVolwassenen: wetenschap |id1B1588749 |nmrest1588749
branches |a3620 |m521.5 |sNIN |bGE31121287 |wN |kB3 |rss20200504 |s2de verdieping Informatica [kast 33] |id1B1588749 |nmrest1588749
branches |a3620 |m521.5 |sNIN |bGE3113113X |wN |kB3 |rss20200221 |s2de verdieping Informatica [kast 33] |id1B1588749 |nmrest1588749
branches |a3050 |mInternet: Beveiliging VERB |zCOINBE |s0TH |b30003000080426 |wN |kB3 |rss20191017 |sThemastand |id181588749 |nmrest1588749
branches |a3020 |mInternet: Beveiliging |sInformatief: wetenschap en techniek |zCOINBE |sVIM |b30003004569699 |wN |kB3 |rss20191028 |id181588749 |nmrest1588749
branches |a3490 |m520.72 |sVolwassenen info: wiskunde - informatica - natuurkunde |sN19 |b30003000091423 |wN |kB3 |rss20191030 |id181588749 |nmrest1588749
branches |a3180 |mInternet: Beveiliging VERB |zCOINBE |sVI0 |b30003005742388 |wN |kB3 |rss20191114 |sVolwassenen informatief |id181588749 |nmrest1588749
branches |a3451 |m520.72 |z520.72 |sN17 |b30003005807328 |wN |kB3 |rss20191122 |sInformatica |id181588749 |nmrest1588749
branches |a3240 |mInternet: Beveiliging VERB |zCOINBE |sVI0 |b30003005775213 |wN |kB3 |rss20191209 |sVolwassenen informatief |id181588749 |nmrest1588749
branches |a3100 |m520.72 VERB |z520.72 |sVI0 |b30003002155090 |wN |kB3 |rss20191211 |s1e verdieping Volwassenen informatief |id181588749 |nmrest1588749
branches |a3000 |mInternet: Beveiliging |zCOINBE |sVIM |b30003000059686 |wN |kB3 |rss20200107 |s2e verdieping Informatief Wetenschap |id181588749 |nmrest1588749
branches |a3450 |m520.72 |z520.72 |sN17 |b30003005912634 |wN |kB3 |rss20200107 |sInformatica |id181588749 |nmrest1588749
branches |a3110 |m520.72 VERB |z520.72 |sVI0 |b30003006635596 |wN |kB3 |rss20200109 |sVolwassenen informatief |id181588749 |nmrest1588749
branches |a3090 |m520.72 VERB |z520.72 |sVIM |b30003002123522 |wN |kB3 |rss20200116 |sInformatief: wetenschap |id181588749 |nmrest1588749
branches |a3370 |mInternet: Beveiliging VERB |zCOINBE |sVI0 |b30003005738617 |wN |kB3 |rss20200122 |sVolwassenen informatief |id181588749 |nmrest1588749
branches |a3350 |mInternet: Beveiliging |zCOINBE |sVI0 |b30003005724048 |wN |kB3 |rss20200226 |sVolwassenen informatief |id181588749 |nmrest1588749
branches |a3270 |mInternet: Beveiliging VERB |sInformatief: wetenschap - techniek |zCOINBE |sVIM |b30003005664536 |wN |kB3 |rss20200316 |id181588749 |nmrest1588749
branches |a3500 |mInternet: Beveiliging VERB |sInformatief: wetenschap |zCOINBE |sIWC |b30003005562750 |wN |kB3 |rss20200520 |id181588749 |nmrest1588749
branches |a3628 |mComputers # Internet: Beveiliging |zCOINBE |sVIM |bGE31121263 |wN |kB3 |rss20200504 |sVolwassenen: wetenschap |id181588749 |nmrest1588749
branches |a3632 |mComputers # Internet: Beveiliging |zCOINBE |sVIM |bGE31121299 |wN |kB3 |rss20200504 |sVolwassenen: wetenschap |id181588749 |nmrest1588749
branches |a3620 |m521.5 |sNIN |bGE31121287 |wN |kB3 |rss20200504 |s2de verdieping Informatica [kast 33] |id181588749 |nmrest1588749
branches |a3620 |m521.5 |sNIN |bGE3113113X |wN |kB3 |rss20200221 |s2de verdieping Informatica [kast 33] |id181588749 |nmrest1588749
frabl
3EC54467EAF1ACA0
key1
cyberveilig in 10 dagen
key2
verbist,hans
mat
zbbBook
lang
dut
geïndexeerde woorden (in freetext zoek index)
Cyberveilig in 10 dagen