Debug informatie:
ID=0310222997 ∙ extID=|library/marc/vlacc|10222997 ∙ BSID=library\m\vlacc\rest
material=zbbBook ∙ language=dut ∙ type=NonFictie ∙ targetaudience=ageAdults ∙ rose_rnk=186 ∙ hl_cnt=19 ∙ gl_hl_cnt=93 ∙ date_ent=20190614 ∙ date_mut=20200305 ∙ nbd_sum=true ∙ nbd_rev=true ∙ news_rev=false
idbrongevonden opmatch regel (debug)
1588749wise-limburg: rest
veldbevattoegevoegd van id
_ImportTime2019-06-26 23:02:06
marcleader01006aam a2200325 4500
cf00110222997
cf00520200305105817.0
cf008190614s2019 0 dut
df020## |a9789401463652 |9paperback
df035## |a9789401463652
df035## |aBBA000257774
df040## |aBoekenBank |bdut |cOpen Vlacc
df084## |a521.5
df096## |9740 |aMens en maatschappij algemeen
df096## |9980 |aInformatica algemeen
df100## |aVerbist, Hans |4aut
df245#0 |aCyberveilig in 10 dagen |hBOEK
df260## |aLeuven |bLannooCampus |c2019
df300## |a144 p.
df365## |b24.99 |cEUR
df521## |avolwassenen
df650## |aComputerbeveiliging |9vtr
df650## |aInternetcriminaliteit |9vtr
df650## |aHacken |9vtr
df650## |aComputervirussen |9vtr
df650## |aComputerwormen |9vtr
df693#2 |9COINBE |aWetenschap en techniek |xComputers |yInternet |zBeveiliging
df700## |aDée, Kenneth |4aut
df852 |a2120 |bInformatie Wetenschappen |c521.5 |eX |l521.5 |oIWE |p11178987089 |wN |xa19 |yB3 |1N |2X |66833551 |92019-10-25T00:00+0200 |id171588749 |nmrest1588749
df852 |a2000 |bVolwassenen informatief |cInternet: Beveiliging |eBZV |hCOINBE |oVIN |p30004000019562 |wN |yB3 |1N |2BZV |66843497 |92019-10-30T00:00+0100 |id171588749 |nmrest1588749
df852 |a2140 |bInformatief: computers |cInternet: Beveiliging |eBZV |hCOINBE |oVI1 |p30003002064301 |wN |xa2019 |yB3 |1N |2BZV |67099122 |92019-11-05T00:00+0100 |id171588749 |nmrest1588749
df852 |a2210 |bVolwassenen informatief |cInternet: Beveiliging VERB |eBZV |hCOINBE |jVERB |oVI0 |p30003004055815 |wN |yB3 |1N |2BZV |67099129 |92019-11-05T00:00+0100 |id171588749 |nmrest1588749
df852 |a2211 |bVolwassenen informatief |cInternet: Beveiliging VERB |eBZV |hCOINBE |jVERB |oVI0 |p30003004055814 |wN |yB3 |1N |2BZV |67099133 |92019-11-13T00:00+0100 |id171588749 |nmrest1588749
df852 |a2060 |bVolwassenen informatief |cInternet: Beveiliging VERB |eBZV |hCOINBE |jVERB |oVI0 |p24009710214 |wN |yB3 |1N |2BZV |67100280 |92019-11-05T00:00+0100 |id171588749 |nmrest1588749
df852 |a2170 |bInformatief: wetenschap |cInternet: Beveiliging |eBZV |hCOINBE |oVIM |p11012397747 |wN |yB3 |1N |2BZV |67318300 |92019-11-25T00:00+0100 |id171588749 |nmrest1588749
df852 |a2350 |bVolwassenen informatief |c520.72 |e@ |l520.72 |oVI0 |p03016991493 |wN |yB3 |1N |67561824 |92019-10-14T00:00+0200 |id171588749 |nmrest1588749
df852 |a2190 |bInformatie: Wetensch. Techniek |cInternet: Beveiliging VERB |dVolw. informatie WETENSCHAP EN TECHNIEK |eBZV |hCOINBE |jVERB |oVIM |p11051363928 |wN |yB3 |1N |2BZV |67595110 |92019-11-29T00:00+0100 |id171588749 |nmrest1588749
df852 |a2200 |bVolwassenen informatief |cInternet: Beveiliging VERB |eBZV |hCOINBE |jVERB |oVI0 |p130506011416335 |wN |yB3 |1N |2BZV |67606285 |92019-12-05T00:00+0100 |id171588749 |nmrest1588749
df852 |a2070 |bVolwassenen informatief |c520.72 |eBSV |h520.72 |oVI0 |p1095805 |wN |yB3 |1N |2BSV |67640196 |92019-12-28T00:00+0100 |id171588749 |nmrest1588749
df852 |a2310 |bBoven Volwassenen informatief |c520.72 |dBoven Volwassenen informatieve boeken |eBSV |h520.72 |oVI0 |p30004000041697 |wN |yB3 |1N |2BSV |67643511 |92020-01-03T00:00+0100 |id171588749 |nmrest1588749
df852 |a2110 |bVolwassenen informatief |c520.72 |eBSV |h520.72 |oVI0 |p11181291088 |wN |xH 2019/1691 |yB3 |1N |2BSV |67678737 |92020-01-23T00:00+0100 |id171588749 |nmrest1588749
df852 |a2330 |bComputers - software |c521.5 |dEerste verdieping - computerlokaal |eBSV |h521.5 |oCOM |p30003004246283 |wN |yB3 |1N |2BSV |67767020 |92020-03-16T00:00+0100 |id171588749 |nmrest1588749
df852 |a2010 |bVolwassenen non-fictie |cInternet: Beveiliging VERB |eBZV |hCOINBE |jVERB |oVIN |p30004000048006 |wN |yB3 |1N |2BZV |613197121 |92020-08-13T00:00+0200 |id171588749 |nmrest1588749
df852 |a2370 |bVolwassenen Informatief ZIZO |cComputers # Internet: Beveiliging |dVolwassenen Informatief |e@ |hCOINBE |oVI0 |p2019/2723 |wN |yB3 |1N |2BZV |614251882 |92019-10-24T00:00+0200 |id171588749 |nmrest1588749
df852 |a2380 |bGelijkvloers Volwassenen informatief |cComputers # Internet: Beveiliging |dGelijkvloers volwassenen; informatief |e@ |hCOINBE |oVI0 |p30004000746631 |wN |yB3 |1N |2BZV |614355820 |92019-10-15T00:00+0200 |id171588749 |nmrest1588749
df852 |a2400 |bInformatief: wetenschap |cComputers # Internet: Sociale media |dInfo: Wetenschap en techniek |e@ |hCOINEC |oVIM |p201903844 |wN |x[25] |yB3 |1N |2BZV |626400555 |92019-11-05T00:00+0100 |id171588749 |nmrest1588749
df999## |aInternet |bBeveiliging |cCO |d2019 |fVERB |zVN ZIZO 2*9
df999## |c521.5 |d2019 |fVERB |zVN SISO 2*4
meta_author |tpersonal |fHans |lVerbist |rVerbist, Hans |caut |9Hans Verbist
meta_author |tpersonal |fKenneth |lDée |rDée, Kenneth |caut |9Kenneth Dée
meta_isbn9789401463652
meta_isbnyear97894014636522019
meta_subject |tComputerbeveiliging |tInternetcriminaliteit |tHacken |tComputervirussen |tComputerwormen
meta_subject |lcomputers |lcriminaliteit |id171588749 |nmrest1588749
meta_titleCyberveilig in 10 dagen
meta_vlaccid10222997
branches |aZBB |rss20200305
branches |a2120 |m521.5 |sIWE |b11178987089 |wN |kB3 |rss20191025 |sInformatie Wetenschappen |id171588749 |nmrest1588749
branches |a2000 |mInternet: Beveiliging |zCOINBE |sVIN |b30004000019562 |wN |kB3 |rss20191030 |sVolwassenen informatief |id171588749 |nmrest1588749
branches |a2140 |mInternet: Beveiliging |zCOINBE |sVI1 |b30003002064301 |wN |kB3 |rss20191105 |sInformatief: computers |id171588749 |nmrest1588749
branches |a2210 |mInternet: Beveiliging VERB |zCOINBE |sVI0 |b30003004055815 |wN |kB3 |rss20191105 |sVolwassenen informatief |id171588749 |nmrest1588749
branches |a2211 |mInternet: Beveiliging VERB |zCOINBE |sVI0 |b30003004055814 |wN |kB3 |rss20191113 |sVolwassenen informatief |id171588749 |nmrest1588749
branches |a2060 |mInternet: Beveiliging VERB |zCOINBE |sVI0 |b24009710214 |wN |kB3 |rss20191105 |sVolwassenen informatief |id171588749 |nmrest1588749
branches |a2170 |mInternet: Beveiliging |zCOINBE |sVIM |b11012397747 |wN |kB3 |rss20191125 |sInformatief: wetenschap |id171588749 |nmrest1588749
branches |a2350 |m520.72 |sVI0 |b03016991493 |wN |kB3 |rss20191014 |sVolwassenen informatief |id171588749 |nmrest1588749
branches |a2190 |mInternet: Beveiliging VERB |sVolw. informatie WETENSCHAP EN TECHNIEK |zCOINBE |sVIM |b11051363928 |wN |kB3 |rss20191129 |id171588749 |nmrest1588749
branches |a2200 |mInternet: Beveiliging VERB |zCOINBE |sVI0 |b130506011416335 |wN |kB3 |rss20191205 |sVolwassenen informatief |id171588749 |nmrest1588749
branches |a2070 |m520.72 |z520.72 |sVI0 |b1095805 |wN |kB3 |rss20191228 |sVolwassenen informatief |id171588749 |nmrest1588749
branches |a2310 |m520.72 |sBoven Volwassenen informatieve boeken |z520.72 |sVI0 |b30004000041697 |wN |kB3 |rss20200103 |id171588749 |nmrest1588749
branches |a2110 |m520.72 |z520.72 |sVI0 |b11181291088 |wN |kB3 |rss20200123 |sVolwassenen informatief |id171588749 |nmrest1588749
branches |a2330 |m521.5 |sEerste verdieping - computerlokaal |z521.5 |sCOM |b30003004246283 |wN |kB3 |rss20200316 |id171588749 |nmrest1588749
branches |a2010 |mInternet: Beveiliging VERB |zCOINBE |sVIN |b30004000048006 |wN |kB3 |rss20200813 |sVolwassenen non-fictie |id171588749 |nmrest1588749
branches |a2370 |mComputers # Internet: Beveiliging |sVolwassenen Informatief |zCOINBE |sVI0 |b2019/2723 |wN |kB3 |rss20191024 |id171588749 |nmrest1588749
branches |a2380 |mComputers # Internet: Beveiliging |sGelijkvloers volwassenen; informatief |zCOINBE |sVI0 |b30004000746631 |wN |kB3 |rss20191015 |id171588749 |nmrest1588749
branches |a2400 |mComputers # Internet: Sociale media |sInfo: Wetenschap en techniek |zCOINEC |sVIM |b201903844 |wN |kB3 |rss20191105 |id171588749 |nmrest1588749
frabl
3EC54467EAF1ACA0
key1
cyberveilig in 10 dagen
key2
verbist,hans
mat
zbbBook
lang
dut
geïndexeerde woorden (in freetext zoek index)
Cyberveilig in 10 dagen