_ImportTime | 2014-07-01 23:01:51 | |
marcleader | 00904aam a2200301 4500 | |
cf001 | 9172836 | |
cf005 | 20190220155551.0 | |
cf008 | 140701s2014 0 dut | |
df020 | ##
|a9789059053403
|9paperback | |
df035 | ##
|a9789059053403 | |
df035 | ##
|aBBA000124348 | |
df040 | ##
|aBoekenBank
|bdut
|cOpen Vlacc | |
df084 | ##
|a521.5 | |
df096 | ##
|9987
|aHardware | |
df110 | ##
|aStudio Visual Steps
|4aut | |
df245 | #0
|aTablet beveiligen, back-uppen en onderhouden
|hBOEK | |
df250 | ##
|a1 | |
df260 | ##
|aUithoorn
|bVisual Steps
|c2014 | |
df300 | ##
|a134 p.
|bill. | |
df365 | ##
|b12.95
|cEUR | |
df490 | ##
|aComputergidsen | |
df521 | ##
|avolwassenen | |
df650 | ##
|aComputerbeveiliging
|9vtr | |
df650 | ##
|aBack-up
|9vtr | |
df650 | ##
|aTablets
|9vtr | |
df693 | #2
|9COINBE
|aWetenschap en techniek
|xComputers
|yInternet
|zBeveiliging | |
df852 |
|a4060
|bGROTE BIB : 3e VERDIEPING ZVWT - Info: wetenschap
|cComputers # Internet: Beveiliging
|dGROTE BIB : 3e VERDIEPING WERELD
|e@
|hCOINBE
|oVIM
|pBB1777203
|wN
|yB3
|1N
|2BZV
|610203868
|92016-01-28T00:00+0100
|id191107920
|nmrest | 1107920 |
df852 |
|a4170
|bInformatief: wetenschap
|cComputers # Multimedia: Multimedia
|dInfo: Wetenschap en techniek ; Wetenschap - Techn
|e@
|hCOMUMU
|oVIM
|pGI0736848
|wN
|xSeq: 5
|yB3
|1N
|2BZV
|610203872
|92014-12-22T00:00+0100
|id191107920
|nmrest | 1107920 |
df852 |
|a4320
|bVolwassenen informatief
|c521.5
|dInformatie :
|e@
|l521.5
|oVI0
|pKR6688284
|wN
|xSeq: 11
|yB3
|1N
|2BSV
|610203878
|92015-03-18T00:00+0100
|id191107920
|nmrest | 1107920 |
df852 |
|a4300
|bInformatief: wetenschap
|cComputers # Internet: Beveiliging
|dInfo: Wetenschap en techniek
|e@
|hCOINBE
|oVIM
|pKS1724592
|wN
|xaanw 2016 rk 111 Seq: 12
|yB3
|1N
|2BZV
|610203879
|92016-11-28T00:00+0100
|id191107920
|nmrest | 1107920 |
df852 |
|a4530
|bVERDIEPING 2 : DUIVELSHOEK : Informatica
|c521.5 STUD
|dVERDIEPING 2 : DUIVELSHOEK : INFORMATICA : Kast 16
|eBSV
|h521.5
|jSTUD
|oNIN
|pRL6362974
|wN
|xSeq: 17 [S 12.95]
|yB3
|1N
|2BSV
|610203884
|92014-12-12T00:00+0100
|id191107920
|nmrest | 1107920 |
df852 |
|a4580
|bInformatief: wetenschap
|cComputers # Multimedia: Multimedia
|dInfo: Wetenschap en techniek
|e@
|hCOMUMU
|oVIM
|pVN1071602
|wN
|xSeq: 19
|yB3
|1N
|2BZV
|610203886
|92015-01-05T00:00+0100
|id191107920
|nmrest | 1107920 |
df852 |
|a4601
|bInformatief: wetenschap
|cComputers # Internet: Beveiliging
|dInfo: Wetenschap en techniek
|e@
|hCOINBE
|oVIM
|pWR1851381
|wN
|xSeq: 20
|yB3
|1N
|2BZV
|610203887
|92015-01-07T00:00+0100
|id191107920
|nmrest | 1107920 |
df852 |
|a4660
|bInformatief: wetenschap
|cComputers # Internet: Beveiliging 2014 STUD
|dInfo: Wetenschap en techniek
|e@
|hCOINBE
|l2014 STUD
|oVIM
|pZB1020469
|wN
|xSeq: 22 [12,95 EUR (RL)]
|yB5
|1N
|2BZV
|610203889
|92015-01-16T00:00+0100
|id191107920
|nmrest | 1107920 |
df852 |
|a4380
|bVolwassen - informatief getal
|cComputers # Internet: Beveiliging 521.5
|e@
|hCOINBE
|l521.5
|oVI0
|p2015/314.L
|wN
|yB3
|1N
|2BZV
|612333975
|92015-04-08T00:00+0200
|id191107920
|nmrest | 1107920 |
df999 | ##
|aInternet
|bBeveiliging
|cCO
|d2014
|fSTUD
|zVN ZIZO 2*9 | |
df999 | ##
|c521.5
|d2014
|fSTUD
|zVN SISO 2*4 | |
meta_author |
|tcorporate
|lStudio Visual Steps
|rStudio Visual Steps
|caut
|9Studio Visual Steps | |
meta_isbn | 9789059053403 | |
meta_isbnyear | 97890590534032014 | |
meta_subject |
|tComputerbeveiliging
|tBack-up
|tTablets | |
meta_subject |
|lInternet ; beveiliging
|lInternet
|lbeveiliging
|id191107920
|nmrest | 1107920 |
meta_title | Tablet beveiligen, back-uppen en onderhouden | |
meta_vlaccid | 9172836 | |
branches |
|aZBB
|rss20190220 | |
branches |
|a4060
|mComputers # Internet: Beveiliging
|sGROTE BIB : 3e VERDIEPING WERELD
|zCOINBE
|sVIM
|bBB1777203
|wN
|kB3
|rss20160128
|id191107920
|nmrest | 1107920 |
branches |
|a4170
|mComputers # Multimedia: Multimedia
|sInfo: Wetenschap en techniek ; Wetenschap - Techn
|zCOMUMU
|sVIM
|bGI0736848
|wN
|kB3
|rss20141222
|id191107920
|nmrest | 1107920 |
branches |
|a4320
|m521.5
|sInformatie :
|sVI0
|bKR6688284
|wN
|kB3
|rss20150318
|id191107920
|nmrest | 1107920 |
branches |
|a4300
|mComputers # Internet: Beveiliging
|sInfo: Wetenschap en techniek
|zCOINBE
|sVIM
|bKS1724592
|wN
|kB3
|rss20161128
|id191107920
|nmrest | 1107920 |
branches |
|a4530
|m521.5 STUD
|sVERDIEPING 2 : DUIVELSHOEK : INFORMATICA : Kast 16
|z521.5
|sNIN
|bRL6362974
|wN
|kB3
|rss20141212
|id191107920
|nmrest | 1107920 |
branches |
|a4580
|mComputers # Multimedia: Multimedia
|sInfo: Wetenschap en techniek
|zCOMUMU
|sVIM
|bVN1071602
|wN
|kB3
|rss20150105
|id191107920
|nmrest | 1107920 |
branches |
|a4601
|mComputers # Internet: Beveiliging
|sInfo: Wetenschap en techniek
|zCOINBE
|sVIM
|bWR1851381
|wN
|kB3
|rss20150107
|id191107920
|nmrest | 1107920 |
branches |
|a4660
|mComputers # Internet: Beveiliging 2014 STUD
|sInfo: Wetenschap en techniek
|zCOINBE
|sVIM
|bZB1020469
|wN
|kB5
|rss20150116
|id191107920
|nmrest | 1107920 |
branches |
|a4380
|mComputers # Internet: Beveiliging 521.5
|zCOINBE
|sVI0
|b2015/314.L
|wN
|kB3
|rss20150408
|sVolwassen - informatief getal
|id191107920
|nmrest | 1107920 |