Debug informatie:
ID=0310092921 ∙ extID=|library/marc/vlacc|10092921 ∙ BSID=library\m\vlacc\rest
material=zbbBook ∙ language=dut ∙ languageo=eng ∙ type=NonFictie ∙ targetaudience=ageAdults ∙ rose_rnk=600 ∙ hl_cnt=24 ∙ gl_hl_cnt=100 ∙ date_ent=20170623 ∙ date_mut=20190218 ∙ nbd_sum=true ∙ nbd_rev=true ∙ news_rev=false
idbrongevonden opmatch regel (debug)
1269610wise-gent: rest
1269610wise-oostvlaanderen: rest
veldbevattoegevoegd van id
_ImportTime2017-06-26 23:01:53
marcleader01110aam a2200313 4500
cf00110092921
cf00520190218115556.0
cf008170623s2018 0 dut
df020## |a9789045214658 |9paperback
df035## |a9789045214658
df035## |aBBA000200991
df040## |aBoekenBank |bdut |cOpen Vlacc
df041## |heng
df084## |a520.72
df096## |9600 |aNon-fictie informatief/professioneel algemeen
df100## |aGoodman, Marc |4aut
df245#0 |aCybercrime en cyberwar |bde toekomst van de misdaad in een wereld die altijd online is |hBOEK
df260## |aUithoorn |bKarakter Uitgevers B.V. |c© 2018
df300## |a573 p.
df365## |b39.99 |cEUR
df521## |avolwassenen
df534## |aFuture crimes : everything is connected, everyone is vulnerable and what we can do about it
df650## |aComputercriminaliteit |9vtr
df650## |aInternetcriminaliteit |9vtr
df650## |aHacken |9vtr
df650## |aDarknet |9vtr
df693#2 |9COINBE |aWetenschap en techniek |xComputers |yInternet |zBeveiliging
df852 |a3620 |b2de verdieping Informatica [kast 33] |c520.72 |e@ |l520.72 |oNIN |pGE30899606 |wN |yB3 |1N |2BSV |627405774 |92019-08-16T00:00+0200 |id1B1269610 |nmrest1269610
df852 |a3000 |b2e verdieping Informatief Wetenschap |cComputers # Internet: Beveiliging |e@ |hCOINBE |oVIM |pAA12050237 |wN |yB3 |1N |2BZV |66059627 |92018-03-20T00:00+0100 |id181269610 |nmrest1269610
df852 |a3270 |bVolwassenen: zizo: wetenschap |cInternet: Beveiliging GOOD |dVolwassenen: zizo: wetenschap-techniek |eBZV |hCOINBE |jGOOD |oVIM |pBE7604629 |wN |xSeq: 2 |yB3 |1N |2BZV |66059628 |92018-04-25T00:00+0200 |id181269610 |nmrest1269610
df852 |a3460 |bInformatief: wetenschap |cInternet: Beveiliging GOOD |eBZV |hCOINBE |jGOOD |oVIM |pDB132649X |wN |x2018 Seq: 3 |yB3 |1N |2BZV |66059629 |92018-02-27T00:00+0100 |id181269610 |nmrest1269610
df852 |a3110 |bVolwassenen informatief |c520.72-GOOD |dVolwassenen informatief |e@ |l520.72-GOOD |oVI0 |pEV3137155 |wN |xSeq: 6 |yB3 |1N |66059632 |92018-04-14T00:00+0200 |id181269610 |nmrest1269610
df852 |a3510 |bInformatief: wetenschap |cComputers # Internet: Beveiliging |dInformatief: wetenschap |e@ |hCOINBE |oVIM |pHE1512385 |wN |xSeq: 8 |yB3 |1N |2BZV |66059634 |92018-03-06T00:00+0100 |id181269610 |nmrest1269610
df852 |a3060 |b1e verdieping Volwassenen informatief |cInternet: Beveiliging GOOD |d1e verdieping Informatieve werken voor volwassenen |eBZV |hCOINBE |jGOOD |oVI0 |pNN1592726 |wN |xSeq: 10 |yB3 |1N |2BZV |66059636 |92018-04-05T00:00+0200 |id181269610 |nmrest1269610
df852 |a3400 |bInformatief: wetenschap |cInternet: Beveiliging |eBZV |hCOINBE |oVIM |pKH0882135 |wN |x2018/B Seq: 11 |yB3 |1N |2BZV |66059637 |92018-02-23T00:00+0100 |id181269610 |nmrest1269610
df852 |a3300 |b1e verdieping Informatief: wetenschap |cInternet: Beveiliging GOOD |eBZV |hCOINBE |jGOOD |oVIM |p1000285878 |wN |xSeq: 12 |yB3 |1N |2BZV |66059638 |92018-08-24T00:00+0200 |id181269610 |nmrest1269610
df852 |a3490 |bVolw. info:wisk-inform-natuurk |c520.72 |dVolwassenen info: wiskunde - informatica - natuurkunde |e@ |l520.72 |oN19 |p30003000579920 |wN |xSB Seq: 13 |yB3 |1N |2BSV |66059639 |92018-08-13T00:00+0200 |id181269610 |nmrest1269610
df852 |a3530 |bInformatief: wetenschap |cComputers # Internet: Beveiliging |dInformatief: wetenschap |e@ |hCOINBE |oVIM |pOZ1961861 |wN |xSeq: 14 |yB3 |1N |2BZV |66059640 |92018-03-06T00:00+0100 |id181269610 |nmrest1269610
df852 |a3420 |bVolwassenen informatief |c520.72 |dVolwassenen informatief |e@ |l520.72 |oVI0 |pSM0787957 |wN |xSeq: 15 |yB3 |1N |3kreuk in de kaft |66059641 |92018-02-09T00:00+0100 |id181269610 |nmrest1269610
df852 |a3330 |bVolwassenen informatief |c520.72 GOOD |dVolwassenen informatief |e@ |l520.72 GOOD |oVI0 |pSN1801726 |wN |xSeq: 16 |yB3 |1N |2BSV |66059642 |92018-03-13T00:00+0100 |id181269610 |nmrest1269610
df852 |a3360 |bVolwassenen informatief |c520.72 |dVolwassenen informatief |e@ |l520.72 |oVI0 |pTS2203235 |wN |xSB Seq: 17 |yB3 |1N |66059643 |92018-03-20T00:00+0100 |id181269610 |nmrest1269610
df852 |a3250 |bInformatief: wetenschap |cComputers # Internet: Beveiliging GOOD |e@ |hCOINBE |lGOOD |oVIM |pWH076258X |wN |xSeq: 18 |yB3 |1N |2BZV |66059644 |92018-02-21T00:00+0100 |id181269610 |nmrest1269610
df852 |a3550 |bNon-fictie Wetenschap Techniek (+2) |cInternet: Beveiliging GOOD |eBZV |hCOINBE |jGOOD |oVIB |pZO3659240 |wN |xSeq: 19 |yB3 |1N |2BZV |66059645 |92018-03-05T00:00+0100 |id181269610 |nmrest1269610
df852 |a3620 |b2de verdieping Informatica [kast 33] |c520.72 |e@ |l520.72 |oNIN |pGE30899606 |wN |yB3 |1N |2BSV |627405774 |92019-08-16T00:00+0200 |id181269610 |nmrest1269610
df999## |aInternet |bBeveiliging |cCO |d2018 |fGOOD |zVN ZIZO 2*9
df999## |c520.72 |d2018 |fGOOD |zVN SISO 2*4
meta_author |tpersonal |fMarc |lGoodman |rGoodman, Marc |caut |9Marc Goodman
meta_isbn9789045214658
meta_isbnyear97890452146582018
meta_subject |tComputercriminaliteit |tInternetcriminaliteit |tHacken |tDarknet
meta_subject |lInformatieve werken |id1B1269610 |nmrest1269610
meta_subject |lInformatieve werken |id181269610 |nmrest1269610
meta_titleCybercrime en cyberwar : de toekomst van de misdaad in een wereld die altijd online is
meta_vlaccid10092921
branches |aZBB |rss20190218
branches |a3620 |m520.72 |sNIN |bGE30899606 |wN |kB3 |rss20190816 |s2de verdieping Informatica [kast 33] |id1B1269610 |nmrest1269610
branches |a3000 |mComputers # Internet: Beveiliging |zCOINBE |sVIM |bAA12050237 |wN |kB3 |rss20180320 |s2e verdieping Informatief Wetenschap |id181269610 |nmrest1269610
branches |a3270 |mInternet: Beveiliging GOOD |sVolwassenen: zizo: wetenschap-techniek |zCOINBE |sVIM |bBE7604629 |wN |kB3 |rss20180425 |id181269610 |nmrest1269610
branches |a3460 |mInternet: Beveiliging GOOD |zCOINBE |sVIM |bDB132649X |wN |kB3 |rss20180227 |sInformatief: wetenschap |id181269610 |nmrest1269610
branches |a3110 |m520.72-GOOD |sVolwassenen informatief |sVI0 |bEV3137155 |wN |kB3 |rss20180414 |id181269610 |nmrest1269610
branches |a3510 |mComputers # Internet: Beveiliging |sInformatief: wetenschap |zCOINBE |sVIM |bHE1512385 |wN |kB3 |rss20180306 |id181269610 |nmrest1269610
branches |a3060 |mInternet: Beveiliging GOOD |s1e verdieping Informatieve werken voor volwassenen |zCOINBE |sVI0 |bNN1592726 |wN |kB3 |rss20180405 |id181269610 |nmrest1269610
branches |a3400 |mInternet: Beveiliging |zCOINBE |sVIM |bKH0882135 |wN |kB3 |rss20180223 |sInformatief: wetenschap |id181269610 |nmrest1269610
branches |a3300 |mInternet: Beveiliging GOOD |zCOINBE |sVIM |b1000285878 |wN |kB3 |rss20180824 |s1e verdieping Informatief: wetenschap |id181269610 |nmrest1269610
branches |a3490 |m520.72 |sVolwassenen info: wiskunde - informatica - natuurkunde |sN19 |b30003000579920 |wN |kB3 |rss20180813 |id181269610 |nmrest1269610
branches |a3530 |mComputers # Internet: Beveiliging |sInformatief: wetenschap |zCOINBE |sVIM |bOZ1961861 |wN |kB3 |rss20180306 |id181269610 |nmrest1269610
branches |a3420 |m520.72 |sVolwassenen informatief |sVI0 |bSM0787957 |wN |kB3 |xkreuk in de kaft |rss20180209 |id181269610 |nmrest1269610
branches |a3330 |m520.72 GOOD |sVolwassenen informatief |sVI0 |bSN1801726 |wN |kB3 |rss20180313 |id181269610 |nmrest1269610
branches |a3360 |m520.72 |sVolwassenen informatief |sVI0 |bTS2203235 |wN |kB3 |rss20180320 |id181269610 |nmrest1269610
branches |a3250 |mComputers # Internet: Beveiliging GOOD |zCOINBE |sVIM |bWH076258X |wN |kB3 |rss20180221 |sInformatief: wetenschap |id181269610 |nmrest1269610
branches |a3550 |mInternet: Beveiliging GOOD |zCOINBE |sVIB |bZO3659240 |wN |kB3 |rss20180305 |sNon-fictie Wetenschap Techniek (+2) |id181269610 |nmrest1269610
branches |a3620 |m520.72 |sNIN |bGE30899606 |wN |kB3 |rss20190816 |s2de verdieping Informatica [kast 33] |id181269610 |nmrest1269610
frabl
4C7FF7AC91F1ACA0
key1
future crimes everything is connected everyone is vulnerable and what we can do about it
key2
goodman,marc
mat
zbbBook
lang
dut
geïndexeerde woorden (in freetext zoek index)
Cybercrime en cyberwar future crimes
extidfrablmatlanggl_hl_cntpublisheryear
Deze records met dezelfde key1 & key2, maar ander materiaal worden gesuggereerd:
|vlacc-daisy|102436454C7FF7AC91F0A4A01Luisterpunt2018
Deze records met dezelfde frabl worden gegroepeerd (ook beschikbaarheid)
|library/marc/vlacc|100929214C7FF7AC91F1ACA0100Karakter Uitgevers B.V.© 2018