Debug informatie:
ID=038977122 ∙ extID=|library/marc/vlacc|8977122 ∙ BSID=library\m\vlacc\rest
material=zbbBook ∙ language=dut ∙ type=NonFictie ∙ targetaudience=ageAdults ∙ rose_rnk=276 ∙ hl_cnt=17 ∙ gl_hl_cnt=92 ∙ date_ent=20131127 ∙ date_mut=20141107 ∙ nbd_sum=true ∙ nbd_rev=true ∙ news_rev=false
idbrongevonden opmatch regel (debug)
1077748wise-limburg: rest
veldbevattoegevoegd van id
_ImportTime2013-11-28 00:01:43
marcleader00951aam a2200301 4500
cf0018977122
cf00520141107105958.0
cf008131127s2014 0 dut
df020## |a9789089752925 |9paperback
df035## |a9789089752925
df035## |aBBA000113604
df040## |aBoekenBank |bdut |cOpen Vlacc
df084## |a520.72
df096## |9330 |aSpannende boeken algemeen
df096## |9402 |aWaargebeurde verhalen
df100## |aGenova, Maria |4aut
df245#0 |aKomt een vrouw bij de hacker |bhoe je identiteit gestolen kan worden |hBOEK
df250## |a1
df260## |a[S.l.] |bJust Publishers |ccop. 2014
df300## |a239 p.
df365## |b14.95 |cEUR
df490## |aTrue crime
df521## |avolwassenen
df650## |aInternetcriminaliteit |9vtr
df650## |aHacken |9vtr
df693#2 |9COINBE |aWetenschap en techniek |xComputers |yInternet |zBeveiliging
df852 |a2010 |bVolwassenen non-fictie |cComputers # Internet: Beveiliging |e@ |hCOINBE |oVIN |p13010201214 |wN |x[pr : 15,00] - |yB3 |1N |2BZV |684642 |92015-11-18T00:00+0100 |id171077748 |nmrest1077748
df852 |a2050 |bTaal & Letteren (+1) Volwassenen Fictie |cGENO |e@ |lGENO |oVF0 |p11063350490 |wN |xA14 - ST - 10,61 |yB2 |1N |2BGV |61662315 |92014-03-20T00:00+0100 |id171077748 |nmrest1077748
df852 |a2124 |bVolwassenen informatief |cComputers # Internet: Beveiliging |e@ |hCOINBE |oVI0 |p11154197958 |wN |xgev2018 Seq: 3 |yB3 |1N |2BZV |61662317 |92018-12-12T00:00+0100 |id171077748 |nmrest1077748
df852 |a2110 |bVolwassenen informatief |c520.72 |e@ |l520.72 |oVI0 |p11181076712 |wN |xH 2014/245 Seq: 5 |yB3 |1N |2BSV |61662319 |92014-04-09T00:00+0200 |id171077748 |nmrest1077748
df852 |a2130 |b2e verdieping Volwassenen informatief |cInternet: Beveiliging GENO |eBZV |hCOINBE |jGENO |oVI0 |p11260383663 |wN |xSeq: 6 |yB3 |1N |2BZV |61662320 |92014-06-16T00:00+0200 |id171077748 |nmrest1077748
df852 |a2170 |bInformatief: wetenschap |cComputers # Internet: Beveiliging |e@ |hCOINBE |oVIM |p11012134222 |wN |xa2014 Seq: 7 |yB3 |1N |2BZV |61662321 |92014-03-24T00:00+0100 |id171077748 |nmrest1077748
df852 |a2120 |bInformatie Wetenschappen |c520.72 |e@ |l520.72 |oIWE |p11178817535 |wN |xa14 Seq: 9 |yB3 |1N |2BSV |61662323 |92014-04-10T00:00+0200 |id171077748 |nmrest1077748
df852 |a2070 |bVolwassenen informatief |c570.72 |e@ |l570.72 |oVI0 |p0960917 |wN |xa2014 Seq: 10 |yB3 |1N |2BSV |61662324 |92014-06-10T00:00+0200 |id171077748 |nmrest1077748
df852 |a2180 |bEerste verdieping Volwassenen informatief |c520.72 |e@ |l520.72 |oVI0 |p11190398160 |wN |xa2014 Seq: 11 |yB3 |1N |2BSV |61662325 |92014-03-14T00:00+0100 |id171077748 |nmrest1077748
df852 |a2250 |b1ste verdieping Volwassenen informatief |c520.72 GENO |eBSV |h520.72 |jGENO |oVI0 |p112711020364391 |wN |xa2014 Seq: 14 |yB3 |1N |2BSV |61662328 |92014-05-02T00:00+0200 |id171077748 |nmrest1077748
df852 |a2260 |bVolwassenen : non-fiction |cInternet: Beveiliging GENO |eBZV |hCOINBE |jGENO |oVI0 |p1304200003480 |wN |xa2014 Seq: 15 |yB3 |1N |2BZV |61662329 |92014-04-17T00:00+0200 |id171077748 |nmrest1077748
df852 |a2270 |b1ste verdieping Volwassenen informatief |c520.72 |eBSV |h520.72 |oVI0 |p0501230526 |wN |yB3 |1N |2BSV |61662330 |92014-04-23T00:00+0200 |id171077748 |nmrest1077748
df852 |a2290 |bVolwassenen informatief |c520.72 |eBSV |h520.72 |oVI0 |p120226946 |wN |xSeq: 17 |yB3 |1N |2BSV |61662331 |92014-06-30T00:00+0200 |id171077748 |nmrest1077748
df852 |a2310 |bBoven Volwassenen informatief |c520.72 |dBoven Volwassenen informatieve boeken |e@ |l520.72 |oVI0 |p35015763249 |wN |yB3 |1N |67165199 |92014-03-19T00:00+0100 |id171077748 |nmrest1077748
df852 |a2360 |bVolwassenen informatief |cComputers # Internet: Beveiliging Internet / Beveiliging |dVolwassenen non-fictie |e@ |hCOINBE |lInternet / Beveiliging |oVI0 |p2018/596 |wN |yB2 |1N |2BZV |614174892 |92018-04-12T00:00+0200 |id171077748 |nmrest1077748
df852 |a2370 |bVolwassenen Informatief ZIZO |cComputers # Internet: Beveiliging |dVolwassenen Informatief |e@ |hCOINBE |oVI0 |p2014/382 |wN |x[15] |yB3 |1N |2BZV |614231213 |92014-03-25T00:00+0100 |id171077748 |nmrest1077748
df852 |a2390 |bVolwassenen fictie |cGENO |dVolwassenen romans |e@ |lGENO |oVF0 |p20140391 |wN |yB2 |1N |614388534 |92014-03-07T00:00+0100 |id171077748 |nmrest1077748
df999## |aInternet |bBeveiliging |cCO |d2014 |fGENO |zVN ZIZO 2*9
df999## |c520.72 |d2014 |fGENO |zVN SISO 2*4
meta_author |tpersonal |fMaria |lGenova |rGenova, Maria |caut |9Maria Genova
meta_isbn9789089752925
meta_isbnyear97890897529252014
meta_subject |tInternetcriminaliteit |tHacken
meta_subject |lWaargebeurd |lInternetcriminaliteit; Hacken |id171077748 |nmrest1077748
meta_titleKomt een vrouw bij de hacker : hoe je identiteit gestolen kan worden
meta_vlaccid8977122
branches |aZBB |rss20141107
branches |a2010 |mComputers # Internet: Beveiliging |zCOINBE |sVIN |b13010201214 |wN |kB3 |rss20151118 |sVolwassenen non-fictie |id171077748 |nmrest1077748
branches |a2050 |mGENO |sVF0 |b11063350490 |wN |kB2 |rss20140320 |sTaal & Letteren (+1) Volwassenen Fictie |id171077748 |nmrest1077748
branches |a2124 |mComputers # Internet: Beveiliging |zCOINBE |sVI0 |b11154197958 |wN |kB3 |rss20181212 |sVolwassenen informatief |id171077748 |nmrest1077748
branches |a2110 |m520.72 |sVI0 |b11181076712 |wN |kB3 |rss20140409 |sVolwassenen informatief |id171077748 |nmrest1077748
branches |a2130 |mInternet: Beveiliging GENO |zCOINBE |sVI0 |b11260383663 |wN |kB3 |rss20140616 |s2e verdieping Volwassenen informatief |id171077748 |nmrest1077748
branches |a2170 |mComputers # Internet: Beveiliging |zCOINBE |sVIM |b11012134222 |wN |kB3 |rss20140324 |sInformatief: wetenschap |id171077748 |nmrest1077748
branches |a2120 |m520.72 |sIWE |b11178817535 |wN |kB3 |rss20140410 |sInformatie Wetenschappen |id171077748 |nmrest1077748
branches |a2070 |m570.72 |sVI0 |b0960917 |wN |kB3 |rss20140610 |sVolwassenen informatief |id171077748 |nmrest1077748
branches |a2180 |m520.72 |sVI0 |b11190398160 |wN |kB3 |rss20140314 |sEerste verdieping Volwassenen informatief |id171077748 |nmrest1077748
branches |a2250 |m520.72 GENO |z520.72 |sVI0 |b112711020364391 |wN |kB3 |rss20140502 |s1ste verdieping Volwassenen informatief |id171077748 |nmrest1077748
branches |a2260 |mInternet: Beveiliging GENO |zCOINBE |sVI0 |b1304200003480 |wN |kB3 |rss20140417 |sVolwassenen : non-fiction |id171077748 |nmrest1077748
branches |a2270 |m520.72 |z520.72 |sVI0 |b0501230526 |wN |kB3 |rss20140423 |s1ste verdieping Volwassenen informatief |id171077748 |nmrest1077748
branches |a2290 |m520.72 |z520.72 |sVI0 |b120226946 |wN |kB3 |rss20140630 |sVolwassenen informatief |id171077748 |nmrest1077748
branches |a2310 |m520.72 |sBoven Volwassenen informatieve boeken |sVI0 |b35015763249 |wN |kB3 |rss20140319 |id171077748 |nmrest1077748
branches |a2360 |mComputers # Internet: Beveiliging Internet / Beveiliging |sVolwassenen non-fictie |zCOINBE |sVI0 |b2018/596 |wN |kB2 |rss20180412 |id171077748 |nmrest1077748
branches |a2370 |mComputers # Internet: Beveiliging |sVolwassenen Informatief |zCOINBE |sVI0 |b2014/382 |wN |kB3 |rss20140325 |id171077748 |nmrest1077748
branches |a2390 |mGENO |sVolwassenen romans |sVF0 |b20140391 |wN |kB2 |rss20140307 |id171077748 |nmrest1077748
frabl
64CB8D327CF1ACA0
key1
komt een vrouw bij de hacker hoe je identiteit gestolen kan worden
key2
genova,maria
mat
zbbBook
lang
dut
geïndexeerde woorden (in freetext zoek index)
komt Een vrouw bij De hacker