Debug informatie:
ID=038829894 ∙ extID=|library/marc/vlacc|8829894 ∙ BSID=library\m\vlacc\rest
material=zbbBook ∙ language=dut ∙ type=NonFictie ∙ targetaudience=ageAdults ∙ rose_rnk=196 ∙ hl_cnt=27 ∙ gl_hl_cnt=98 ∙ date_ent=20130618 ∙ date_mut=20131122 ∙ nbd_sum=true ∙ nbd_rev=true ∙ news_rev=false
idbrongevonden opmatch regel (debug)
1054518wise-oostvlaanderen: rest
veldbevattoegevoegd van id
_ImportTime2013-06-19 23:01:53
marcleader00918aam a2200277 4500
cf0018829894
cf00520131122104227.0
cf008130618s2013 0 dut
df020## |a9789401411431 |9paperback
df035## |a9789401411431
df035## |aBBA000103472
df040## |aBoekenBank |bdut |cOpen Vlacc
df084## |a520.72
df096## |9988 |aInternet
df100## |aWillems, Eddy |4aut
df245#0 |aCybergevaar |bhoe we ons kunnen wapenen tegen online misdaad ... en meer |hBOEK
df246#3 |aCybergevaar |bhoe we ons kunnen wapenen tegen online misdaad en terreur
df250## |a1
df260## |aTielt |bLannoo |c2013
df300## |a213 p. |bill.
df365## |b19.99 |cEUR
df521## |avolwassenen
df650## |aInternetcriminaliteit |9vtr
df693#2 |9COINBE |aWetenschap en techniek |xComputers |yInternet |zBeveiliging
df852 |a3000 |b2e verdieping Informatief Wetenschap |cComputers # Internet: Beveiliging |e@ |hCOINBE |oVIM |pAA11442301 |wN |xSeq: 3 |yB3 |1N |2BZV |64991384 |92014-02-12T00:00+0100 |id181054518 |nmrest1054518
df852 |a3272 |bInformatief: wetenschap |cInternet: Beveiliging WILL |dInformatief: wetenschap - techniek |eBZV |hCOINBE |jWILL |oVIM |pBE6828078 |wN |xSeq: 4 |yB3 |1N |2BZV |64991385 |92013-11-20T00:00+0100 |id181054518 |nmrest1054518
df852 |a3270 |bInformatief: wetenschap |cInternet: Beveiliging WILL |dInformatief: wetenschap - techniek |eBZV |hCOINBE |jWILL |oVIM |pBE6805957 |wN |xSeq: 5 |yB3 |1N |2BZV |64991386 |92013-10-29T00:00+0100 |id181054518 |nmrest1054518
df852 |a3273 |bInformatief: wetenschap |cInternet: Beveiliging WILL |dInformatief: wetenschap - techniek |eBZV |hCOINBE |jWILL |oVIM |pBE6828051 |wN |xSeq: 6 |yB3 |1N |2BZV |64991387 |92013-11-20T00:00+0100 |id181054518 |nmrest1054518
df852 |a3271 |bInformatief: wetenschap |cInternet: Beveiliging WILL |dInformatief: wetenschap - techniek |eBZV |hCOINBE |jWILL |oVIM |pBE6828027 |wN |xSeq: 7 |yB3 |1N |2BZV |64991388 |92013-11-20T00:00+0100 |id181054518 |nmrest1054518
df852 |a3274 |bInformatief: wetenschap |cInternet: Beveiliging WILL |dInformatief: wetenschap - techniek |eBZV |hCOINBE |jWILL |oVIM |pBE6828043 |wN |xSeq: 8 |yB3 |1N |2BZV |64991389 |92013-11-20T00:00+0100 |id181054518 |nmrest1054518
df852 |a3275 |bInformatief: wetenschap |cInternet: Beveiliging WILL |dInformatief: wetenschap - techniek |eBZV |hCOINBE |jWILL |oVIM |pBE6828035 |wN |xSeq: 9 |yB3 |1N |2BZV |64991390 |92013-11-20T00:00+0100 |id181054518 |nmrest1054518
df852 |a3276 |bInformatief: wetenschap |cInternet: Beveiliging WILL |dInformatief: wetenschap - techniek |eBZV |hCOINBE |jWILL |oVIM |pBE682806X |wN |xSeq: 10 |yB3 |1N |2BZV |64991391 |92013-11-20T00:00+0100 |id181054518 |nmrest1054518
df852 |a3277 |bInformatief: wetenschap |cInternet: Beveiliging WILL |dInformatief: wetenschap - techniek |eBZV |hCOINBE |lWILL |oVIM |pBE6828086 |wN |xSeq: 11 |yB3 |1N |2BZV |64991392 |92013-11-20T00:00+0100 |id181054518 |nmrest1054518
df852 |a3030 |bVolwassenen informatief |c520.72 WILL |dVolwassenen informatief |e@ |l520.72 WILL |oVI0 |pDL1246089 |wN |xSeq: 12 |yB3 |1N |64991393 |92013-10-24T00:00+0200 |id181054518 |nmrest1054518
df852 |a3450 |bInformatica |c520.72 |e@ |l520.72 |oN17 |pDZ224103X |wN |x[L&C 19.90] Seq: 13 |yB3 |1N |64991394 |92013-11-30T00:00+0100 |id181054518 |nmrest1054518
df852 |a3020 |bInformatief: wetenschap |cComputers # Internet: Beveiliging |dInformatief: wetenschap en techniek |e@ |hCOINBE |oVIM |pEM1052500 |wN |xSeq: 14 |yB3 |1N |2BZV |64991395 |92013-10-28T00:00+0100 |id181054518 |nmrest1054518
df852 |a3110 |bVolwassenen informatief |c520.72-WILL |dVolwassenen informatief |e@ |l520.72-WILL |oVI0 |pEV2714523 |wN |xSeq: 15 |yB3 |1N |64991396 |92013-12-06T00:00+0100 |id181054518 |nmrest1054518
df852 |a3210 |bInformatief: wetenschap |cComputers # Internet: Beveiliging |dInformatief: wetenschap |e@ |hCOINBE |oVIM |p30003017554628 |wN |xSeq: 18 |yB3 |1N |2BZV |64991399 |92014-01-10T00:00+0100 |id181054518 |nmrest1054518
df852 |a3060 |b1e verdieping Volwassenen informatief |c520.72 |d1e verdieping Informatieve werken voor volwassenen |e@ |l520.72 |oVI0 |pNN0934704 |wN |xSeq: 20 |yB3 |1N |64991401 |92013-11-21T00:00+0100 |id181054518 |nmrest1054518
df852 |a3300 |b1e verdieping Informatief: wetenschap |cInternet: Beveiliging WILL |eBZV |hCOINBE |jWILL |oVIM |p1000236469 |wN |xSeq: 21 |yB3 |1N |2BZV |64991402 |92013-10-21T00:00+0200 |id181054518 |nmrest1054518
df852 |a3480 |bInformatief: wetenschap |cInternet: Beveiliging WILL |eBZV |hCOINBE |jWILL |oVIM |pML0748692 |wN |x14/237 Seq: 24 |yB3 |1N |2BZV |64991405 |92014-03-03T00:00+0100 |id181054518 |nmrest1054518
df852 |a3310 |bInformatief: wetenschap |cComputers # Internet: Beveiliging |dInformatief: wetenschap |e@ |hCOINBE |oVIM |p30003017292540 |wN |xSeq: 25 |yB3 |1N |2BZV |64991406 |92014-05-05T00:00+0200 |id181054518 |nmrest1054518
df852 |a3580 |bVolwassenen informatief |c520.72 |dVolwassenen informatief |e@ |l520.72 |oVI0 |pOA2412462 |wN |xBE Seq: 27 |yB3 |1N |64991408 |92013-11-26T00:00+0100 |id181054518 |nmrest1054518
df852 |a3380 |bVolwassenen informatief |c520.72 |dVolwassenen informatieve boeken |e@ |l520.72 |oVI0 |pPI0674370 |wN |x14/ B. Seq: 28 |yB3 |1N |64991409 |92015-02-02T00:00+0100 |id181054518 |nmrest1054518
df852 |a3590 |bInfobalie Magazijn ZIZO |cComputers # Internet: Beveiliging WILL |dMagazijn : vragen in afdeling Muziek-Film-Spel |e@ |hCOINBE |lWILL |oZI0 |pRO2473933 |wN |xSeq: 29 |yB3 |1N |2BZV |64991410 |92013-11-22T00:00+0100 |id181054518 |nmrest1054518
df852 |a3320 |bInformatief: wetenschap |cComputers # Internet: Beveiliging |dInformatief: wetenschap |e@ |hCOINBE |oVIM |pSG1415468 |wN |xSeq: 32 |yB3 |1N |2BZV |64991413 |92013-10-21T00:00+0200 |id181054518 |nmrest1054518
df852 |a3160 |bInformatief: wetenschap |cComputers # Internet: Beveiliging |e@ |hCOINBE |oVIM |pWB0645303 |wN |xSt.,2014 Seq: 33 |yB3 |1N |2BZV |64991414 |92014-02-24T00:00+0100 |id181054518 |nmrest1054518
df852 |a3131 |bInformatief: wetenschap |cComputers # Internet: Beveiliging |dInformatief: wetenschap |e@ |hCOINBE |oVIM |pWS0478695 |wN |xSeq: 34 |yB3 |1N |2BZV |64991415 |92013-10-28T00:00+0100 |id181054518 |nmrest1054518
df852 |a3260 |bVolwassenen informatief |c520.72 WILL |eBSV |h520.72 |jWILL |oVI0 |pZE1548689 |wN |x1 Seq: 35 |yB3 |1N |2BSV |64991416 |92013-10-15T00:00+0200 |id181054518 |nmrest1054518
df852 |a3170 |bVolwassenen informatief |c520.72 |dVolwassenen informatief |e@ |l520.72 |oVI0 |pZZ0628395 |wN |xSB Seq: 36 |yB3 |1N |2BSV |64991417 |92013-11-07T00:00+0100 |id181054518 |nmrest1054518
df852 |a3610 |bVolwassenen informatief |c520.72 |e@ |l520.72 |oVI0 |pBK0952389 |wN |yB3 |1N |2BSV |627089293 |92013-12-19T00:00+0100 |id181054518 |nmrest1054518
df999## |aInternet |bBeveiliging |cCO |d2013 |fWILL |zVN ZIZO 2*9
df999## |c520.72 |d2013 |fWILL |zVN SISO 2*4
meta_author |tpersonal |fEddy |lWillems |rWillems, Eddy |caut |9Eddy Willems
meta_isbn9789401411431
meta_isbnyear97894014114312013
meta_subject |tInternetcriminaliteit
meta_subject |lVeilig internetten |lComputernetwerken ; beveiliging |lComputercriminaliteit |lInformatieve werken |lCyberspionage |lHacken |lComputerbeveiliging |lInternet ; beveiliging |fCyber-criminalité |fProtection d'ordinateur |fInternet ; protection |id181054518 |nmrest1054518
meta_titleCybergevaar : hoe we ons kunnen wapenen tegen online misdaad ... en meer
meta_vlaccid8829894
branches |aZBB |rss20131122
branches |a3000 |mComputers # Internet: Beveiliging |zCOINBE |sVIM |bAA11442301 |wN |kB3 |rss20140212 |s2e verdieping Informatief Wetenschap |id181054518 |nmrest1054518
branches |a3272 |mInternet: Beveiliging WILL |sInformatief: wetenschap - techniek |zCOINBE |sVIM |bBE6828078 |wN |kB3 |rss20131120 |id181054518 |nmrest1054518
branches |a3270 |mInternet: Beveiliging WILL |sInformatief: wetenschap - techniek |zCOINBE |sVIM |bBE6805957 |wN |kB3 |rss20131029 |id181054518 |nmrest1054518
branches |a3273 |mInternet: Beveiliging WILL |sInformatief: wetenschap - techniek |zCOINBE |sVIM |bBE6828051 |wN |kB3 |rss20131120 |id181054518 |nmrest1054518
branches |a3271 |mInternet: Beveiliging WILL |sInformatief: wetenschap - techniek |zCOINBE |sVIM |bBE6828027 |wN |kB3 |rss20131120 |id181054518 |nmrest1054518
branches |a3274 |mInternet: Beveiliging WILL |sInformatief: wetenschap - techniek |zCOINBE |sVIM |bBE6828043 |wN |kB3 |rss20131120 |id181054518 |nmrest1054518
branches |a3275 |mInternet: Beveiliging WILL |sInformatief: wetenschap - techniek |zCOINBE |sVIM |bBE6828035 |wN |kB3 |rss20131120 |id181054518 |nmrest1054518
branches |a3276 |mInternet: Beveiliging WILL |sInformatief: wetenschap - techniek |zCOINBE |sVIM |bBE682806X |wN |kB3 |rss20131120 |id181054518 |nmrest1054518
branches |a3277 |mInternet: Beveiliging WILL |sInformatief: wetenschap - techniek |zCOINBE |sVIM |bBE6828086 |wN |kB3 |rss20131120 |id181054518 |nmrest1054518
branches |a3030 |m520.72 WILL |sVolwassenen informatief |sVI0 |bDL1246089 |wN |kB3 |rss20131024 |id181054518 |nmrest1054518
branches |a3450 |m520.72 |sN17 |bDZ224103X |wN |kB3 |rss20131130 |sInformatica |id181054518 |nmrest1054518
branches |a3020 |mComputers # Internet: Beveiliging |sInformatief: wetenschap en techniek |zCOINBE |sVIM |bEM1052500 |wN |kB3 |rss20131028 |id181054518 |nmrest1054518
branches |a3110 |m520.72-WILL |sVolwassenen informatief |sVI0 |bEV2714523 |wN |kB3 |rss20131206 |id181054518 |nmrest1054518
branches |a3210 |mComputers # Internet: Beveiliging |sInformatief: wetenschap |zCOINBE |sVIM |b30003017554628 |wN |kB3 |rss20140110 |id181054518 |nmrest1054518
branches |a3060 |m520.72 |s1e verdieping Informatieve werken voor volwassenen |sVI0 |bNN0934704 |wN |kB3 |rss20131121 |id181054518 |nmrest1054518
branches |a3300 |mInternet: Beveiliging WILL |zCOINBE |sVIM |b1000236469 |wN |kB3 |rss20131021 |s1e verdieping Informatief: wetenschap |id181054518 |nmrest1054518
branches |a3480 |mInternet: Beveiliging WILL |zCOINBE |sVIM |bML0748692 |wN |kB3 |rss20140303 |sInformatief: wetenschap |id181054518 |nmrest1054518
branches |a3310 |mComputers # Internet: Beveiliging |sInformatief: wetenschap |zCOINBE |sVIM |b30003017292540 |wN |kB3 |rss20140505 |id181054518 |nmrest1054518
branches |a3580 |m520.72 |sVolwassenen informatief |sVI0 |bOA2412462 |wN |kB3 |rss20131126 |id181054518 |nmrest1054518
branches |a3380 |m520.72 |sVolwassenen informatieve boeken |sVI0 |bPI0674370 |wN |kB3 |rss20150202 |id181054518 |nmrest1054518
branches |a3590 |mComputers # Internet: Beveiliging WILL |sMagazijn : vragen in afdeling Muziek-Film-Spel |zCOINBE |sZI0 |bRO2473933 |wN |kB3 |rss20131122 |id181054518 |nmrest1054518
branches |a3320 |mComputers # Internet: Beveiliging |sInformatief: wetenschap |zCOINBE |sVIM |bSG1415468 |wN |kB3 |rss20131021 |id181054518 |nmrest1054518
branches |a3160 |mComputers # Internet: Beveiliging |zCOINBE |sVIM |bWB0645303 |wN |kB3 |rss20140224 |sInformatief: wetenschap |id181054518 |nmrest1054518
branches |a3131 |mComputers # Internet: Beveiliging |sInformatief: wetenschap |zCOINBE |sVIM |bWS0478695 |wN |kB3 |rss20131028 |id181054518 |nmrest1054518
branches |a3260 |m520.72 WILL |z520.72 |sVI0 |bZE1548689 |wN |kB3 |rss20131015 |sVolwassenen informatief |id181054518 |nmrest1054518
branches |a3170 |m520.72 |sVolwassenen informatief |sVI0 |bZZ0628395 |wN |kB3 |rss20131107 |id181054518 |nmrest1054518
branches |a3610 |m520.72 |sVI0 |bBK0952389 |wN |kB3 |rss20131219 |sVolwassenen informatief |id181054518 |nmrest1054518
frabl
4B8A249D9AF1ACA0
key1
cybergevaar hoe we ons kunnen wapenen tegen online misdaad en meer
key2
willems,eddy
mat
zbbBook
lang
dut
geïndexeerde woorden (in freetext zoek index)
Cybergevaar