Debug informatie:
ID=0310221997 ∙ extID=|library/marc/vlacc|10221997 ∙ BSID=library\m\vlacc\rest
material=zbbBook ∙ language=dut ∙ languageo=eng ∙ type=NonFictie ∙ targetaudience=ageAdults ∙ rose_rnk=330 ∙ hl_cnt=14 ∙ gl_hl_cnt=110 ∙ date_ent=20190610 ∙ date_mut=20201006 ∙ nbd_sum=true ∙ nbd_rev=true ∙ news_rev=false
idbrongevonden opmatch regel (debug)
1588144wise-westvlaanderen: rest
veldbevattoegevoegd van id
_ImportTime2019-06-24 13:18:25
marcleader00943aam a2200301 4500
cf00110221997
cf00520201006140129.0
cf008190610s2020 0 dut
df020## |a9789045356600 |9paperback
df035## |a9789045356600
df035## |aBBA000257029
df040## |aBoekenBank |bdut |cOpen Vlacc
df041## |heng
df084## |a521.5
df096## |9980 |aInformatica algemeen
df100## |aSteinberg, Joseph |4aut
df245#0 |aCybersecurity voor dummies |hBOEK
df260## |aAmersfoort |bBBNC Uitgevers |c2020
df300## |aXXIII, 349 p. |bill.
df365## |b32.99 |cEUR
df521## |avolwassenen
df534## |aCybersecurity for dummies
df650## |aInternetcriminaliteit |9vtr
df650## |aDatabeveiliging |9vtr
df650## |aComputerbeveiliging |9vtr
df693#2 |9COINBE |aWetenschap en techniek |xComputers |yInternet |zBeveiliging
df852 |a4280 |bVolwassenen informatief |c521.5 |dVolwassenen Non-Fictie |l521.5 |oVI0 |p30003004424956 |wN |yB3 |1N |613053354 |92020-08-04T00:00+0200 |id191588144 |nmrest1588144
df852 |a4530 |bVERDIEPING 2 : DUIVELSHOEK : Informatica |c521.5 STEI |dVERDIEPING 2 : DUIVELSHOEK : INFORMATICA : Kast 16 |eBSV |h521.5 |jSTEI |oNIN |p30003006787406 |wN |yB3 |1N |2BSV |613119938 |92020-07-08T00:00+0200 |id191588144 |nmrest1588144
df852 |a4150 |bVolwassenen informatief |c521.5 |dVolwassenen boeken non-fictie : |eX |l521.5 |oVI0 |p30003006914227 |wN |yB3 |1N |2X |613132484 |92020-07-13T00:00+0200 |id191588144 |nmrest1588144
df852 |a4130 |bInformatief: wetenschap |cInternet: Beveiliging |eBZV |hCOINBE |oVIM |p30003005963376 |wN |yB3 |1N |2BZV |613149443 |92020-07-22T00:00+0200 |id191588144 |nmrest1588144
df852 |a4560 |bInformatief : Wetenschap |cInternet: Beveiliging STEI |dInfo : Wetenschap en techniek |eBZV |hCOINBE |jSTEI |oVIM |p30003006888131 |wN |yB3 |1N |2BZV |613152522 |92020-07-23T00:00+0200 |id191588144 |nmrest1588144
df852 |a4590 |bVolwassenen informatief |c521.5 STEI |dInformatief volwassenen |eBSV |h521.5 |jSTEI |oVI0 |p30003002200151 |wN |yB3 |1N |2BSV |613154070 |92020-07-23T00:00+0200 |id191588144 |nmrest1588144
df852 |a4280 |bVolwassenen informatief |c521.5 |dVolwassenen Non-Fictie |eBSV |l521.5 |oVI0 |p30003004426247 |wN |yB3 |1N |2BSV |613155578 |92020-07-24T00:00+0200 |id191588144 |nmrest1588144
df852 |a4310 |bInformatief: wetenschap |cInternet: Beveiliging STEI |dINFO : Wetenschap en techniek : BENEDEN |eBZV |hCOINBE |jSTEI |oVIM |p30003002260116 |wN |yB3 |1N |2BZV |613165691 |92020-07-29T00:00+0200 |id191588144 |nmrest1588144
df852 |a4170 |bInformatief: wetenschap |cInternet: Beveiliging STEI |dInfo: Wetenschap en techniek ; Wetenschap - Techn |eBZV |hCOINBE |jSTEI |oVIM |p30003002249371 |wN |yB3 |1N |2BZV |613183190 |92020-08-06T00:00+0200 |id191588144 |nmrest1588144
df852 |a4080 |b1e verdieping Volwassenen informatief |cInternet: Beveiliging STEI |d1e verdieping non-fictie |eBZV |hCOINBE |jSTEI |oVI0 |p30003006095243 |wN |yB3 |1N |2BZV |613190367 |92020-08-11T00:00+0200 |id191588144 |nmrest1588144
df852 |a4000 |bVolwassenen Informatica [kast 16-17] |c521.5 STEI |eBSV |h521.5 |jSTEI |oN12 |p30003005869085 |wN |yB3 |1N |2BSV |613201092 |92020-08-17T00:00+0200 |id191588144 |nmrest1588144
df852 |a4082 |bVolwassenen informatief |cInternet: Beveiliging STEI |dVolw. informatie |eBZV |hCOINBE |jSTEI |oVI0 |p30003006099493 |wN |yB3 |1N |2BZV |613202459 |92020-09-04T00:00+0200 |id191588144 |nmrest1588144
df852 |a4083 |bVolwassenen informatief |cInternet: Beveiliging STEI |dVolw. informatie |eBZV |hCOINBE |jSTEI |oVI0 |p30003006099494 |wN |yB3 |1N |2BZV |613202460 |92020-09-03T00:00+0200 |id191588144 |nmrest1588144
df852 |a4084 |bVolwassenen informatief |cInternet: Beveiliging STEI |dVOLW. INFORMATIE |eBZV |hCOINBE |jSTEI |oVI0 |p30003006099495 |wN |yB3 |1N |2BZV |613202461 |92020-08-28T00:00+0200 |id191588144 |nmrest1588144
df852 |a4085 |bVolwassenen informatief |cInternet: Beveiliging STEI |dVolw. informatie |eBZV |hCOINBE |jSTEI |oVI0 |p30003006099496 |wN |yB3 |1N |2BZV |613202462 |92020-09-03T00:00+0200 |id191588144 |nmrest1588144
df852 |a4600 |bInformatief: wetenschap |cInternet: Beveiliging |dInfo: Wetenschap en techniek |eBZV |hCOINBE |oVIM |p30003000220924 |wN |yB3 |1N |2BZV |614052674 |92020-09-15T00:00+0200 |id191588144 |nmrest1588144
df852 |a4083 |bVolwassenen informatief |cInternet: Beveiliging STEI |dVolw. informatie |eBZV |hCOINBE |jSTEI |oVI0 |p30003006254376 |wN |yB3 |1N |2BZV |614557743 |92020-12-01T00:00+0100 |id191588144 |nmrest1588144
df852 |a4460 |bInformatief: wetenschap |cInternet: Beveiliging |dInfo: Wetenschap en techniek ; Computers |eBZV |hCOINBE |oVIM |p30003007199863 |wN |yB3 |1N |2BZV |614760791 |92021-02-17T00:00+0100 |id191588144 |nmrest1588144
df852 |a4230 |bVolwassenen informatief |c521.5 STEI |dVOLWASSENEN : NON-FICTIE |eBSV |h521.5 |jSTEI |oVI0 |p30003007905075 |wN |yB3 |1N |2BSV |624384208 |92022-05-05T00:00+0200 |id191588144 |nmrest1588144
df852 |a4110 |bVolwassenen informatief |cInternet: Beveiliging |dVolwassenenafdeling informatieve boeken |eBZV |hCOINBE |oVI0 |p2020/1277 |wN |xStandaard boekhandel |yB3 |1N |2BZV |625882168 |92020-07-14T00:00+0200 |id191588144 |nmrest1588144
df999## |aInternet |bBeveiliging |cCO |d2020 |fSTEI |zVN ZIZO 2*9
df999## |c521.5 |d2020 |fSTEI |zVN SISO 2*4
meta_author |tpersonal |fJoseph |lSteinberg |rSteinberg, Joseph |caut |9Joseph Steinberg
meta_isbn9789045356600
meta_isbnyear97890453566002020
meta_subject |tInternetcriminaliteit |tDatabeveiliging |tComputerbeveiliging
meta_titleCybersecurity voor dummies
meta_vlaccid10221997
branches |aZBB |rss20201006
branches |a4280 |m521.5 |sVolwassenen Non-Fictie |sVI0 |b30003004424956 |wN |kB3 |rss20200804 |id191588144 |nmrest1588144
branches |a4530 |m521.5 STEI |sVERDIEPING 2 : DUIVELSHOEK : INFORMATICA : Kast 16 |z521.5 |sNIN |b30003006787406 |wN |kB3 |rss20200708 |id191588144 |nmrest1588144
branches |a4150 |m521.5 |sVolwassenen boeken non-fictie : |sVI0 |b30003006914227 |wN |kB3 |rss20200713 |id191588144 |nmrest1588144
branches |a4130 |mInternet: Beveiliging |zCOINBE |sVIM |b30003005963376 |wN |kB3 |rss20200722 |sInformatief: wetenschap |id191588144 |nmrest1588144
branches |a4560 |mInternet: Beveiliging STEI |sInfo : Wetenschap en techniek |zCOINBE |sVIM |b30003006888131 |wN |kB3 |rss20200723 |id191588144 |nmrest1588144
branches |a4590 |m521.5 STEI |sInformatief volwassenen |z521.5 |sVI0 |b30003002200151 |wN |kB3 |rss20200723 |id191588144 |nmrest1588144
branches |a4280 |m521.5 |sVolwassenen Non-Fictie |sVI0 |b30003004426247 |wN |kB3 |rss20200724 |id191588144 |nmrest1588144
branches |a4310 |mInternet: Beveiliging STEI |sINFO : Wetenschap en techniek : BENEDEN |zCOINBE |sVIM |b30003002260116 |wN |kB3 |rss20200729 |id191588144 |nmrest1588144
branches |a4170 |mInternet: Beveiliging STEI |sInfo: Wetenschap en techniek ; Wetenschap - Techn |zCOINBE |sVIM |b30003002249371 |wN |kB3 |rss20200806 |id191588144 |nmrest1588144
branches |a4080 |mInternet: Beveiliging STEI |s1e verdieping non-fictie |zCOINBE |sVI0 |b30003006095243 |wN |kB3 |rss20200811 |id191588144 |nmrest1588144
branches |a4000 |m521.5 STEI |z521.5 |sN12 |b30003005869085 |wN |kB3 |rss20200817 |sVolwassenen Informatica [kast 16-17] |id191588144 |nmrest1588144
branches |a4082 |mInternet: Beveiliging STEI |sVolw. informatie |zCOINBE |sVI0 |b30003006099493 |wN |kB3 |rss20200904 |id191588144 |nmrest1588144
branches |a4083 |mInternet: Beveiliging STEI |sVolw. informatie |zCOINBE |sVI0 |b30003006099494 |wN |kB3 |rss20200903 |id191588144 |nmrest1588144
branches |a4084 |mInternet: Beveiliging STEI |sVOLW. INFORMATIE |zCOINBE |sVI0 |b30003006099495 |wN |kB3 |rss20200828 |id191588144 |nmrest1588144
branches |a4085 |mInternet: Beveiliging STEI |sVolw. informatie |zCOINBE |sVI0 |b30003006099496 |wN |kB3 |rss20200903 |id191588144 |nmrest1588144
branches |a4600 |mInternet: Beveiliging |sInfo: Wetenschap en techniek |zCOINBE |sVIM |b30003000220924 |wN |kB3 |rss20200915 |id191588144 |nmrest1588144
branches |a4083 |mInternet: Beveiliging STEI |sVolw. informatie |zCOINBE |sVI0 |b30003006254376 |wN |kB3 |rss20201201 |id191588144 |nmrest1588144
branches |a4460 |mInternet: Beveiliging |sInfo: Wetenschap en techniek ; Computers |zCOINBE |sVIM |b30003007199863 |wN |kB3 |rss20210217 |id191588144 |nmrest1588144
branches |a4230 |m521.5 STEI |sVOLWASSENEN : NON-FICTIE |z521.5 |sVI0 |b30003007905075 |wN |kB3 |rss20220505 |id191588144 |nmrest1588144
branches |a4110 |mInternet: Beveiliging |sVolwassenenafdeling informatieve boeken |zCOINBE |sVI0 |b2020/1277 |wN |kB3 |rss20200714 |id191588144 |nmrest1588144
frabl
3B7CA2AC37F1ACA0
key1
cybersecurity for dummies
key2
steinberg,joseph
mat
zbbBook
lang
dut
geïndexeerde woorden (in freetext zoek index)
cybersecurity voor dummies
extidfrablmatlanggl_hl_cntpublisheryear
Deze records met dezelfde key1 & key2, maar ander materiaal worden gesuggereerd:
|library/marc/vlacc|103889513B7CA2AC37F0A0A01BBNC Uitgevers2021
Deze records met dezelfde frabl worden gegroepeerd (ook beschikbaarheid)
|library/marc/vlacc|102219973B7CA2AC37F1ACA0110BBNC Uitgevers2020