_ImportTime | 2018-06-28 23:01:56 | |
marcleader | 00974aam a2200301 4500 | |
cf001 | 10159527 | |
cf005 | 20190218184535.0 | |
cf008 | 180616s2018 0 dut | |
df020 | ##
|a9789461263032
|9paperback | |
df035 | ##
|a9789461263032 | |
df035 | ##
|aBBA000228405 | |
df040 | ##
|aBoekenBank
|bdut
|cOpen Vlacc | |
df084 | ##
|a521.5 | |
df096 | ##
|9800
|aBedrijfskunde algemeen | |
df100 | ##
|aBobbert, Yuri
|4aut | |
df245 | #0
|aCybersecurity in 60 minuten
|hBOEK | |
df260 | ##
|aZaltbommel
|bHaystack
|c2018 | |
df300 | ##
|a141 pagina's
|billustraties | |
df365 | ##
|b12.50
|cEUR | |
df490 | ##
|aDigitale trends en tools in 60 minuten | |
df521 | ##
|avolwassenen | |
df650 | ##
|aComputerbeveiliging
|9vtr | |
df650 | ##
|aDatabeveiliging
|9vtr | |
df650 | ##
|aInternetcriminaliteit
|9vtr | |
df693 | #2
|9COINBE
|aWetenschap en techniek
|xComputers
|yInternet
|zBeveiliging | |
df700 | ##
|aBroersma, Melvin
|4aut | |
df852 |
|a3620
|b2de verdieping Informatica [kast 33]
|c521.5
|e@
|l521.5
|oNIN
|pGE30612664
|wN
|yB3
|1N
|2BSV
|627387397
|92019-02-18T00:00+0100
|id1B1327097
|nmrest | 1327097 |
df999 | ##
|aInternet
|bBeveiliging
|cCO
|d2018
|fBOBB
|zVN ZIZO 2*9 | |
df999 | ##
|c521.5
|d2018
|fBOBB
|zVN SISO 2*4 | |
meta_author |
|tpersonal
|fYuri
|lBobbert
|rBobbert, Yuri
|caut
|9Yuri Bobbert | |
meta_author |
|tpersonal
|fMelvin
|lBroersma
|rBroersma, Melvin
|caut
|9Melvin Broersma | |
meta_isbn | 9789461263032 | |
meta_isbnyear | 97894612630322018 | |
meta_subject |
|tComputerbeveiliging
|tDatabeveiliging
|tInternetcriminaliteit | |
meta_subject |
|lInternet ; beveiliging
|id1B1327097
|nmrest | 1327097 |
meta_title | Cybersecurity in 60 minuten | |
meta_vlaccid | 10159527 | |
branches |
|aZBB
|rss20190218 | |
branches |
|a3620
|m521.5
|sNIN
|bGE30612664
|wN
|kB3
|rss20190218
|s2de verdieping Informatica [kast 33]
|id1B1327097
|nmrest | 1327097 |