_ImportTime | 2013-11-28 00:01:43 | |
marcleader | 00951aam a2200301 4500 | |
cf001 | 8977122 | |
cf005 | 20141107105958.0 | |
cf008 | 131127s2014 0 dut | |
df020 | ##
|a9789089752925
|9paperback | |
df035 | ##
|a9789089752925 | |
df035 | ##
|aBBA000113604 | |
df040 | ##
|aBoekenBank
|bdut
|cOpen Vlacc | |
df084 | ##
|a520.72 | |
df096 | ##
|9330
|aSpannende boeken algemeen | |
df096 | ##
|9402
|aWaargebeurde verhalen | |
df100 | ##
|aGenova, Maria
|4aut | |
df245 | #0
|aKomt een vrouw bij de hacker
|bhoe je identiteit gestolen kan worden
|hBOEK | |
df250 | ##
|a1 | |
df260 | ##
|a[S.l.]
|bJust Publishers
|ccop. 2014 | |
df300 | ##
|a239 p. | |
df365 | ##
|b14.95
|cEUR | |
df490 | ##
|aTrue crime | |
df521 | ##
|avolwassenen | |
df650 | ##
|aInternetcriminaliteit
|9vtr | |
df650 | ##
|aHacken
|9vtr | |
df693 | #2
|9COINBE
|aWetenschap en techniek
|xComputers
|yInternet
|zBeveiliging | |
df852 |
|a2010
|bVolwassenen non-fictie
|cComputers # Internet: Beveiliging
|e@
|hCOINBE
|oVIN
|p13010201214
|wN
|x[pr : 15,00] -
|yB3
|1N
|2BZV
|684642
|92015-11-18T00:00+0100
|id171077748
|nmrest | 1077748 |
df852 |
|a2050
|bTaal & Letteren (+1) Volwassenen Fictie
|cGENO
|e@
|lGENO
|oVF0
|p11063350490
|wN
|xA14 - ST - 10,61
|yB2
|1N
|2BGV
|61662315
|92014-03-20T00:00+0100
|id171077748
|nmrest | 1077748 |
df852 |
|a2124
|bVolwassenen informatief
|cComputers # Internet: Beveiliging
|e@
|hCOINBE
|oVI0
|p11154197958
|wN
|xgev2018 Seq: 3
|yB3
|1N
|2BZV
|61662317
|92018-12-12T00:00+0100
|id171077748
|nmrest | 1077748 |
df852 |
|a2110
|bVolwassenen informatief
|c520.72
|e@
|l520.72
|oVI0
|p11181076712
|wN
|xH 2014/245 Seq: 5
|yB3
|1N
|2BSV
|61662319
|92014-04-09T00:00+0200
|id171077748
|nmrest | 1077748 |
df852 |
|a2130
|b2e verdieping Volwassenen informatief
|cInternet: Beveiliging GENO
|eBZV
|hCOINBE
|jGENO
|oVI0
|p11260383663
|wN
|xSeq: 6
|yB3
|1N
|2BZV
|61662320
|92014-06-16T00:00+0200
|id171077748
|nmrest | 1077748 |
df852 |
|a2170
|bInformatief: wetenschap
|cComputers # Internet: Beveiliging
|e@
|hCOINBE
|oVIM
|p11012134222
|wN
|xa2014 Seq: 7
|yB3
|1N
|2BZV
|61662321
|92014-03-24T00:00+0100
|id171077748
|nmrest | 1077748 |
df852 |
|a2120
|bInformatie Wetenschappen
|c520.72
|e@
|l520.72
|oIWE
|p11178817535
|wN
|xa14 Seq: 9
|yB3
|1N
|2BSV
|61662323
|92014-04-10T00:00+0200
|id171077748
|nmrest | 1077748 |
df852 |
|a2070
|bVolwassenen informatief
|c570.72
|e@
|l570.72
|oVI0
|p0960917
|wN
|xa2014 Seq: 10
|yB3
|1N
|2BSV
|61662324
|92014-06-10T00:00+0200
|id171077748
|nmrest | 1077748 |
df852 |
|a2180
|bEerste verdieping Volwassenen informatief
|c520.72
|e@
|l520.72
|oVI0
|p11190398160
|wN
|xa2014 Seq: 11
|yB3
|1N
|2BSV
|61662325
|92014-03-14T00:00+0100
|id171077748
|nmrest | 1077748 |
df852 |
|a2250
|b1ste verdieping Volwassenen informatief
|c520.72 GENO
|eBSV
|h520.72
|jGENO
|oVI0
|p112711020364391
|wN
|xa2014 Seq: 14
|yB3
|1N
|2BSV
|61662328
|92014-05-02T00:00+0200
|id171077748
|nmrest | 1077748 |
df852 |
|a2260
|bVolwassenen : non-fiction
|cInternet: Beveiliging GENO
|eBZV
|hCOINBE
|jGENO
|oVI0
|p1304200003480
|wN
|xa2014 Seq: 15
|yB3
|1N
|2BZV
|61662329
|92014-04-17T00:00+0200
|id171077748
|nmrest | 1077748 |
df852 |
|a2270
|b1ste verdieping Volwassenen informatief
|c520.72
|eBSV
|h520.72
|oVI0
|p0501230526
|wN
|yB3
|1N
|2BSV
|61662330
|92014-04-23T00:00+0200
|id171077748
|nmrest | 1077748 |
df852 |
|a2290
|bVolwassenen informatief
|c520.72
|eBSV
|h520.72
|oVI0
|p120226946
|wN
|xSeq: 17
|yB3
|1N
|2BSV
|61662331
|92014-06-30T00:00+0200
|id171077748
|nmrest | 1077748 |
df852 |
|a2310
|bBoven Volwassenen informatief
|c520.72
|dBoven Volwassenen informatieve boeken
|e@
|l520.72
|oVI0
|p35015763249
|wN
|yB3
|1N
|67165199
|92014-03-19T00:00+0100
|id171077748
|nmrest | 1077748 |
df852 |
|a2360
|bVolwassenen informatief
|cComputers # Internet: Beveiliging Internet / Beveiliging
|dVolwassenen non-fictie
|e@
|hCOINBE
|lInternet / Beveiliging
|oVI0
|p2018/596
|wN
|yB2
|1N
|2BZV
|614174892
|92018-04-12T00:00+0200
|id171077748
|nmrest | 1077748 |
df852 |
|a2370
|bVolwassenen Informatief ZIZO
|cComputers # Internet: Beveiliging
|dVolwassenen Informatief
|e@
|hCOINBE
|oVI0
|p2014/382
|wN
|x[15]
|yB3
|1N
|2BZV
|614231213
|92014-03-25T00:00+0100
|id171077748
|nmrest | 1077748 |
df852 |
|a2390
|bVolwassenen fictie
|cGENO
|dVolwassenen romans
|e@
|lGENO
|oVF0
|p20140391
|wN
|yB2
|1N
|614388534
|92014-03-07T00:00+0100
|id171077748
|nmrest | 1077748 |
df999 | ##
|aInternet
|bBeveiliging
|cCO
|d2014
|fGENO
|zVN ZIZO 2*9 | |
df999 | ##
|c520.72
|d2014
|fGENO
|zVN SISO 2*4 | |
meta_author |
|tpersonal
|fMaria
|lGenova
|rGenova, Maria
|caut
|9Maria Genova | |
meta_isbn | 9789089752925 | |
meta_isbnyear | 97890897529252014 | |
meta_subject |
|tInternetcriminaliteit
|tHacken | |
meta_subject |
|lWaargebeurd
|lInternetcriminaliteit; Hacken
|id171077748
|nmrest | 1077748 |
meta_title | Komt een vrouw bij de hacker : hoe je identiteit gestolen kan worden | |
meta_vlaccid | 8977122 | |
branches |
|aZBB
|rss20141107 | |
branches |
|a2010
|mComputers # Internet: Beveiliging
|zCOINBE
|sVIN
|b13010201214
|wN
|kB3
|rss20151118
|sVolwassenen non-fictie
|id171077748
|nmrest | 1077748 |
branches |
|a2050
|mGENO
|sVF0
|b11063350490
|wN
|kB2
|rss20140320
|sTaal & Letteren (+1) Volwassenen Fictie
|id171077748
|nmrest | 1077748 |
branches |
|a2124
|mComputers # Internet: Beveiliging
|zCOINBE
|sVI0
|b11154197958
|wN
|kB3
|rss20181212
|sVolwassenen informatief
|id171077748
|nmrest | 1077748 |
branches |
|a2110
|m520.72
|sVI0
|b11181076712
|wN
|kB3
|rss20140409
|sVolwassenen informatief
|id171077748
|nmrest | 1077748 |
branches |
|a2130
|mInternet: Beveiliging GENO
|zCOINBE
|sVI0
|b11260383663
|wN
|kB3
|rss20140616
|s2e verdieping Volwassenen informatief
|id171077748
|nmrest | 1077748 |
branches |
|a2170
|mComputers # Internet: Beveiliging
|zCOINBE
|sVIM
|b11012134222
|wN
|kB3
|rss20140324
|sInformatief: wetenschap
|id171077748
|nmrest | 1077748 |
branches |
|a2120
|m520.72
|sIWE
|b11178817535
|wN
|kB3
|rss20140410
|sInformatie Wetenschappen
|id171077748
|nmrest | 1077748 |
branches |
|a2070
|m570.72
|sVI0
|b0960917
|wN
|kB3
|rss20140610
|sVolwassenen informatief
|id171077748
|nmrest | 1077748 |
branches |
|a2180
|m520.72
|sVI0
|b11190398160
|wN
|kB3
|rss20140314
|sEerste verdieping Volwassenen informatief
|id171077748
|nmrest | 1077748 |
branches |
|a2250
|m520.72 GENO
|z520.72
|sVI0
|b112711020364391
|wN
|kB3
|rss20140502
|s1ste verdieping Volwassenen informatief
|id171077748
|nmrest | 1077748 |
branches |
|a2260
|mInternet: Beveiliging GENO
|zCOINBE
|sVI0
|b1304200003480
|wN
|kB3
|rss20140417
|sVolwassenen : non-fiction
|id171077748
|nmrest | 1077748 |
branches |
|a2270
|m520.72
|z520.72
|sVI0
|b0501230526
|wN
|kB3
|rss20140423
|s1ste verdieping Volwassenen informatief
|id171077748
|nmrest | 1077748 |
branches |
|a2290
|m520.72
|z520.72
|sVI0
|b120226946
|wN
|kB3
|rss20140630
|sVolwassenen informatief
|id171077748
|nmrest | 1077748 |
branches |
|a2310
|m520.72
|sBoven Volwassenen informatieve boeken
|sVI0
|b35015763249
|wN
|kB3
|rss20140319
|id171077748
|nmrest | 1077748 |
branches |
|a2360
|mComputers # Internet: Beveiliging Internet / Beveiliging
|sVolwassenen non-fictie
|zCOINBE
|sVI0
|b2018/596
|wN
|kB2
|rss20180412
|id171077748
|nmrest | 1077748 |
branches |
|a2370
|mComputers # Internet: Beveiliging
|sVolwassenen Informatief
|zCOINBE
|sVI0
|b2014/382
|wN
|kB3
|rss20140325
|id171077748
|nmrest | 1077748 |
branches |
|a2390
|mGENO
|sVolwassenen romans
|sVF0
|b20140391
|wN
|kB2
|rss20140307
|id171077748
|nmrest | 1077748 |