Debug informatie:
ID=0310092921 ∙ extID=|library/marc/vlacc|10092921 ∙ BSID=library\m\vlacc\rest
material=zbbBook ∙ language=dut ∙ languageo=eng ∙ type=NonFictie ∙ targetaudience=ageAdults ∙ rose_rnk=428 ∙ hl_cnt=16 ∙ gl_hl_cnt=107 ∙ date_ent=20170623 ∙ date_mut=20190218 ∙ nbd_sum=true ∙ nbd_rev=true ∙ news_rev=false
idbrongevonden opmatch regel (debug)
1269610wise-limburg: rest
veldbevattoegevoegd van id
_ImportTime2017-06-26 23:01:53
marcleader01110aam a2200313 4500
cf00110092921
cf00520190218115556.0
cf008170623s2018 0 dut
df020## |a9789045214658 |9paperback
df035## |a9789045214658
df035## |aBBA000200991
df040## |aBoekenBank |bdut |cOpen Vlacc
df041## |heng
df084## |a520.72
df096## |9600 |aNon-fictie informatief/professioneel algemeen
df100## |aGoodman, Marc |4aut
df245#0 |aCybercrime en cyberwar |bde toekomst van de misdaad in een wereld die altijd online is |hBOEK
df260## |aUithoorn |bKarakter Uitgevers B.V. |c© 2018
df300## |a573 p.
df365## |b39.99 |cEUR
df521## |avolwassenen
df534## |aFuture crimes : everything is connected, everyone is vulnerable and what we can do about it
df650## |aComputercriminaliteit |9vtr
df650## |aInternetcriminaliteit |9vtr
df650## |aHacken |9vtr
df650## |aDarknet |9vtr
df693#2 |9COINBE |aWetenschap en techniek |xComputers |yInternet |zBeveiliging
df852 |a2040 |b1ste verdieping Informatief: wetenschap |cComputers # Internet: Beveiliging |e@ |hCOINBE |oVIM |p1120142333 |wN |xA 2018 [39.99 STANDAARD] |yB3 |1N |2BZV |62101191 |92018-02-22T00:00+0100 |id171269610 |nmrest1269610
df852 |a2050 |bInformatie (+2) Volwassenen informatief |c520.72 |e@ |l520.72 |oVI0 |p11063567983 |wN |xA18 - ST - 31,99 Seq: 2 |yB3 |1N |2BZV |62101192 |92018-07-13T00:00+0200 |id171269610 |nmrest1269610
df852 |a2140 |bInformatief: computers |cComputers # Internet: Beveiliging |e@ |hCOINBE |oVI1 |p113010100022 |wN |xa2018 Seq: 3 |yB3 |1N |2BZV |62101193 |92018-02-12T00:00+0100 |id171269610 |nmrest1269610
df852 |a2150 |bEerste verdieping Volwassenen informatief |c520.72 GOOD |e@ |l520.72 GOOD |oVI0 |p8910013097 |wN |xa2018 VANV Seq: 4 |yB3 |1N |2BSV |62101194 |92018-04-11T00:00+0200 |id171269610 |nmrest1269610
df852 |a2170 |bInformatief: wetenschap |cComputers # Internet: Beveiliging |e@ |hCOINBE |oVIM |p11012216281 |wN |xa2018 Seq: 5 |yB3 |1N |2BZV |62101195 |92018-03-21T00:00+0100 |id171269610 |nmrest1269610
df852 |a2200 |bVolwassenen informatief |cInternet: Beveiliging GOOD |eBZV |hCOINBE |jGOOD |oVI0 |p130506010909460 |wN |xa2018.0064 Seq: 6 |yB3 |1N |2BZV |62101196 |92018-02-13T00:00+0100 |id171269610 |nmrest1269610
df852 |a2190 |bInformatie: Wetensch. Techniek |cComputers # Internet: Beveiliging |dVolw. informatie WETENSCHAP EN TECHNIEK |e@ |hCOINBE |oVIM |p11051352924 |wN |xJ18 : 40.00 EUR Seq: 7 |yB3 |1N |2BZV |62101197 |92018-04-11T00:00+0200 |id171269610 |nmrest1269610
df852 |a2120 |bInformatie Wetenschappen |c520.72 |e@ |l520.72 |oIWE |p11178931177 |wN |xa18 Seq: 8 |yB3 |1N |2BSV |62101198 |92018-08-06T00:00+0200 |id171269610 |nmrest1269610
df852 |a2070 |bVolwassenen informatief |c520.72 |e@ |l520.72 |oVI0 |p1234868 |wN |xa2018 Seq: 9 |yB3 |1N |2BSV |62101199 |92018-03-13T00:00+0100 |id171269610 |nmrest1269610
df852 |a2180 |bEerste verdieping Volwassenen informatief |c520.72 |e@ |l520.72 |oVI0 |p11190608020 |wN |xa2018 Seq: 10 |yB3 |1N |2BSV |62101200 |92018-04-16T00:00+0200 |id171269610 |nmrest1269610
df852 |a2250 |b1ste verdieping Volwassenen informatief |c520.72 GOOD |eBSV |h520.72 |jGOOD |oVI0 |p112711024311796 |wN |xa2018 Seq: 11 |yB3 |1N |2BSV |62101201 |92018-07-13T00:00+0200 |id171269610 |nmrest1269610
df852 |a2270 |b1ste verdieping Volwassenen informatief |c520.72 |eBSV |h520.72 |oVI0 |p0501256577 |wN |yB3 |1N |2BSV |62101202 |92018-09-18T00:00+0200 |id171269610 |nmrest1269610
df852 |a2310 |bBoven Volwassenen informatief |c520.7 |dBoven Volwassenen informatieve boeken |e@ |l520.7 |oVI0 |p35018563381 |wN |yB3 |1N |67189127 |92018-04-17T00:00+0200 |id171269610 |nmrest1269610
df852 |a2370 |bVolwassenen Informatief ZIZO |cComputers # Internet: Beveiliging |dVolwassenen Informatief |e@ |hCOINBE |oVI0 |p2018/308 |wN |x[40] |yB3 |1N |2BZV |614246908 |92018-02-14T00:00+0100 |id171269610 |nmrest1269610
df852 |a2380 |bGelijkvloers Volwassenen informatief |cComputers # Internet: Beveiliging |dGelijkvloers volwassenen; informatief |e@ |hCOINBE |oVI0 |p30004000752611 |wN |yB3 |1N |2BZV |614345531 |92018-02-06T00:00+0100 |id171269610 |nmrest1269610
df999## |aInternet |bBeveiliging |cCO |d2018 |fGOOD |zVN ZIZO 2*9
df999## |c520.72 |d2018 |fGOOD |zVN SISO 2*4
meta_author |tpersonal |fMarc |lGoodman |rGoodman, Marc |caut |9Marc Goodman
meta_isbn9789045214658
meta_isbnyear97890452146582018
meta_subject |tComputercriminaliteit |tInternetcriminaliteit |tHacken |tDarknet
meta_subject |lInformatieve werken |id171269610 |nmrest1269610
meta_titleCybercrime en cyberwar : de toekomst van de misdaad in een wereld die altijd online is
meta_vlaccid10092921
branches |aZBB |rss20190218
branches |a2040 |mComputers # Internet: Beveiliging |zCOINBE |sVIM |b1120142333 |wN |kB3 |rss20180222 |s1ste verdieping Informatief: wetenschap |id171269610 |nmrest1269610
branches |a2050 |m520.72 |sVI0 |b11063567983 |wN |kB3 |rss20180713 |sInformatie (+2) Volwassenen informatief |id171269610 |nmrest1269610
branches |a2140 |mComputers # Internet: Beveiliging |zCOINBE |sVI1 |b113010100022 |wN |kB3 |rss20180212 |sInformatief: computers |id171269610 |nmrest1269610
branches |a2150 |m520.72 GOOD |sVI0 |b8910013097 |wN |kB3 |rss20180411 |sEerste verdieping Volwassenen informatief |id171269610 |nmrest1269610
branches |a2170 |mComputers # Internet: Beveiliging |zCOINBE |sVIM |b11012216281 |wN |kB3 |rss20180321 |sInformatief: wetenschap |id171269610 |nmrest1269610
branches |a2200 |mInternet: Beveiliging GOOD |zCOINBE |sVI0 |b130506010909460 |wN |kB3 |rss20180213 |sVolwassenen informatief |id171269610 |nmrest1269610
branches |a2190 |mComputers # Internet: Beveiliging |sVolw. informatie WETENSCHAP EN TECHNIEK |zCOINBE |sVIM |b11051352924 |wN |kB3 |rss20180411 |id171269610 |nmrest1269610
branches |a2120 |m520.72 |sIWE |b11178931177 |wN |kB3 |rss20180806 |sInformatie Wetenschappen |id171269610 |nmrest1269610
branches |a2070 |m520.72 |sVI0 |b1234868 |wN |kB3 |rss20180313 |sVolwassenen informatief |id171269610 |nmrest1269610
branches |a2180 |m520.72 |sVI0 |b11190608020 |wN |kB3 |rss20180416 |sEerste verdieping Volwassenen informatief |id171269610 |nmrest1269610
branches |a2250 |m520.72 GOOD |z520.72 |sVI0 |b112711024311796 |wN |kB3 |rss20180713 |s1ste verdieping Volwassenen informatief |id171269610 |nmrest1269610
branches |a2270 |m520.72 |z520.72 |sVI0 |b0501256577 |wN |kB3 |rss20180918 |s1ste verdieping Volwassenen informatief |id171269610 |nmrest1269610
branches |a2310 |m520.7 |sBoven Volwassenen informatieve boeken |sVI0 |b35018563381 |wN |kB3 |rss20180417 |id171269610 |nmrest1269610
branches |a2370 |mComputers # Internet: Beveiliging |sVolwassenen Informatief |zCOINBE |sVI0 |b2018/308 |wN |kB3 |rss20180214 |id171269610 |nmrest1269610
branches |a2380 |mComputers # Internet: Beveiliging |sGelijkvloers volwassenen; informatief |zCOINBE |sVI0 |b30004000752611 |wN |kB3 |rss20180206 |id171269610 |nmrest1269610
frabl
4C7FF7AC91F1ACA0
key1
future crimes everything is connected everyone is vulnerable and what we can do about it
key2
goodman,marc
mat
zbbBook
lang
dut
geïndexeerde woorden (in freetext zoek index)
Cybercrime en cyberwar Future crimes