Debug informatie:
ID=0310092921 ∙ extID=|library/marc/vlacc|10092921 ∙ BSID=library\m\vlacc\rest
material=zbbBook ∙ language=dut ∙ languageo=eng ∙ type=NonFictie ∙ targetaudience=ageAdults ∙ rose_rnk=545 ∙ hl_cnt=20 ∙ gl_hl_cnt=109 ∙ date_ent=20170623 ∙ date_mut=20190218 ∙ nbd_sum=true ∙ nbd_rev=true ∙ news_rev=false
idbrongevonden opmatch regel (debug)
1269610wise-vlaamsbrabant: rest
veldbevattoegevoegd van id
_ImportTime2017-06-26 23:01:53
marcleader01110aam a2200313 4500
cf00110092921
cf00520190218115556.0
cf008170623s2018 0 dut
df020## |a9789045214658 |9paperback
df035## |a9789045214658
df035## |aBBA000200991
df040## |aBoekenBank |bdut |cOpen Vlacc
df041## |heng
df084## |a520.72
df096## |9600 |aNon-fictie informatief/professioneel algemeen
df100## |aGoodman, Marc |4aut
df245#0 |aCybercrime en cyberwar |bde toekomst van de misdaad in een wereld die altijd online is |hBOEK
df260## |aUithoorn |bKarakter Uitgevers B.V. |c© 2018
df300## |a573 p.
df365## |b39.99 |cEUR
df521## |avolwassenen
df534## |aFuture crimes : everything is connected, everyone is vulnerable and what we can do about it
df650## |aComputercriminaliteit |9vtr
df650## |aInternetcriminaliteit |9vtr
df650## |aHacken |9vtr
df650## |aDarknet |9vtr
df693#2 |9COINBE |aWetenschap en techniek |xComputers |yInternet |zBeveiliging
df852 |a6560 |b1e verdieping Volwassenen informatief Inform |c520.72 |d1e verdieping Volwassenen informatief Informatica |e@ |l520.72 |oN14 |p0260096221 |wN |yB2 |1N |614930121 |92017-12-07T00:00+0100 |id221269610 |nmrest1269610
df852 |a6030 |bVolwassenen informatief |cComputers # Internet: Beveiliging |dVolwassenen non-fictie |e@ |hCOINBE |oVI0 |p30002000213377 |wN |yB3 |1N |2BZV |615068063 |92020-09-24T00:00+0200 |id221269610 |nmrest1269610
df852 |a6020 |bV non-fictie |c520.72 |dVolwassenen non-fictie |e@ |l520.72 |oVI0 |p0282336740 |wN |yB3 |1N |2BSV |615183942 |92018-03-02T00:00+0100 |id221269610 |nmrest1269610
df852 |a6280 |bVolwassenen informatief |cComputers # Internet: Beveiliging GOOD |e@ |hCOINBE |lGOOD |oVI0 |p0411800302 |wN |yB3 |1N |2BZV |615250618 |92018-03-09T00:00+0100 |id221269610 |nmrest1269610
df852 |a6230 |bVolwassenen informatief |cComputers # Internet: Beveiliging |dVolwassenen non-fictie |e@ |hCOINBE |oVI0 |pHUL1800655 |wN |yB3 |1N |2BZV |615271254 |92018-02-15T00:00+0100 |id221269610 |nmrest1269610
df852 |a6490 |bVolwassenen informatief |cInternet: Beveiliging GOOD |eBZV |hCOINBE |jGOOD |oVI0 |p0370422763 |wN |yB3 |1N |2BZV |615586036 |92018-07-17T00:00+0200 |id221269610 |nmrest1269610
df852 |a6100 |bVolwassenen Non-fictie |c520.72 |e@ |l520.72 |oVI0 |pDIL3715975 |wN |yB3 |1N |2BSV |616270022 |92018-02-20T00:00+0100 |id221269610 |nmrest1269610
df852 |a6390 |bVolwassenen informatief |cComputers # Internet: Beveiliging |e@ |hCOINBE |oVI0 |p021000020173496 |wN |yB3 |1N |2BZV |616273490 |92018-02-23T00:00+0100 |id221269610 |nmrest1269610
df852 |a6180 |bVolwassenen informatief |c520.72 GOOD |e@ |l520.72 GOOD |oVI0 |p0900079961 |wN |yB3 |1N |2BSV |616338555 |92018-02-26T00:00+0100 |id221269610 |nmrest1269610
df852 |a6150 |bVolwassenen informatief |c520.72 GOOD |dVolwassenen Non-fictie |e@ |l520.72 GOOD |oVI0 |p02900000054158 |wN |yB3 |1N |2BSV |616391332 |92019-04-16T00:00+0200 |id221269610 |nmrest1269610
df852 |a6590 |bInformatief: wetenschap |cComputers # Internet: Beveiliging GOOD |dVolwassenen non-fictie Wetenschap en Techniek |e@ |hCOINBE |lGOOD |oVIM |p00200000218250 |wN |xA1804 - PP/32.00 |yB3 |1N |2BZV |616432592 |92018-03-14T00:00+0100 |id221269610 |nmrest1269610
df852 |a6540 |bGelijkvloers: Wiskunde-informatica |c520.72 |dGelijkvloers: Wiskunde - informatica |e@ |l520.72 |oN51 |p2512381 |wN |xA201803 |yB3 |1N |2BSV |623519454 |92018-03-22T00:00+0100 |id221269610 |nmrest1269610
df852 |a6170 |bVolwassenen informatief |c520.72 |e@ |l520.72 |oN52 |p1845383 |wN |yB3 |1N |2BSV |623679918 |92018-10-02T00:00+0200 |id221269610 |nmrest1269610
df852 |a6520 |b2de verdieping Volwassenen informatief |c520.72 |eBSV |h520.72 |oN01 |p201812455 |wN |xStandaard Boekhandel Tervuren |yB3 |1N |2BSV |623954494 |92018-07-23T00:00+0200 |id221269610 |nmrest1269610
df852 |a6220 |bVolwassenen informatief |cComputers # Internet: Beveiliging |dVolwassenen - non-fictie |e@ |hCOINBE |oVI0 |p20186501 |wN |xStandaard Boekhandel |yB3 |1N |2BZV |624019882 |92018-02-28T00:00+0100 |id221269610 |nmrest1269610
df999## |aInternet |bBeveiliging |cCO |d2018 |fGOOD |zVN ZIZO 2*9
df999## |c520.72 |d2018 |fGOOD |zVN SISO 2*4
meta_author |tpersonal |fMarc |lGoodman |rGoodman, Marc |caut |9Marc Goodman
meta_isbn9789045214658
meta_isbnyear97890452146582018
meta_subject |tComputercriminaliteit |tInternetcriminaliteit |tHacken |tDarknet
meta_subject |lInformatieve werken |id221269610 |nmrest1269610
meta_titleCybercrime en cyberwar : de toekomst van de misdaad in een wereld die altijd online is
meta_vlaccid10092921
branches |aZBB |rss20190218
branches |a6560 |m520.72 |s1e verdieping Volwassenen informatief Informatica |sN14 |b0260096221 |wN |kB2 |rss20171207 |id221269610 |nmrest1269610
branches |a6030 |mComputers # Internet: Beveiliging |sVolwassenen non-fictie |zCOINBE |sVI0 |b30002000213377 |wN |kB3 |rss20200924 |id221269610 |nmrest1269610
branches |a6020 |m520.72 |sVolwassenen non-fictie |sVI0 |b0282336740 |wN |kB3 |rss20180302 |id221269610 |nmrest1269610
branches |a6280 |mComputers # Internet: Beveiliging GOOD |zCOINBE |sVI0 |b0411800302 |wN |kB3 |rss20180309 |sVolwassenen informatief |id221269610 |nmrest1269610
branches |a6230 |mComputers # Internet: Beveiliging |sVolwassenen non-fictie |zCOINBE |sVI0 |bHUL1800655 |wN |kB3 |rss20180215 |id221269610 |nmrest1269610
branches |a6490 |mInternet: Beveiliging GOOD |zCOINBE |sVI0 |b0370422763 |wN |kB3 |rss20180717 |sVolwassenen informatief |id221269610 |nmrest1269610
branches |a6100 |m520.72 |sVI0 |bDIL3715975 |wN |kB3 |rss20180220 |sVolwassenen Non-fictie |id221269610 |nmrest1269610
branches |a6390 |mComputers # Internet: Beveiliging |zCOINBE |sVI0 |b021000020173496 |wN |kB3 |rss20180223 |sVolwassenen informatief |id221269610 |nmrest1269610
branches |a6180 |m520.72 GOOD |sVI0 |b0900079961 |wN |kB3 |rss20180226 |sVolwassenen informatief |id221269610 |nmrest1269610
branches |a6150 |m520.72 GOOD |sVolwassenen Non-fictie |sVI0 |b02900000054158 |wN |kB3 |rss20190416 |id221269610 |nmrest1269610
branches |a6590 |mComputers # Internet: Beveiliging GOOD |sVolwassenen non-fictie Wetenschap en Techniek |zCOINBE |sVIM |b00200000218250 |wN |kB3 |rss20180314 |id221269610 |nmrest1269610
branches |a6540 |m520.72 |sGelijkvloers: Wiskunde - informatica |sN51 |b2512381 |wN |kB3 |rss20180322 |id221269610 |nmrest1269610
branches |a6170 |m520.72 |sN52 |b1845383 |wN |kB3 |rss20181002 |sVolwassenen informatief |id221269610 |nmrest1269610
branches |a6520 |m520.72 |z520.72 |sN01 |b201812455 |wN |kB3 |rss20180723 |s2de verdieping Volwassenen informatief |id221269610 |nmrest1269610
branches |a6220 |mComputers # Internet: Beveiliging |sVolwassenen - non-fictie |zCOINBE |sVI0 |b20186501 |wN |kB3 |rss20180228 |id221269610 |nmrest1269610
frabl
4C7FF7AC91F1ACA0
key1
future crimes everything is connected everyone is vulnerable and what we can do about it
key2
goodman,marc
mat
zbbBook
lang
dut
geïndexeerde woorden (in freetext zoek index)
Cybercrime en cyberwar future crimes
extidfrablmatlanggl_hl_cntpublisheryear
Deze records met dezelfde key1 & key2, maar ander materiaal worden gesuggereerd:
|vlacc-daisy|102436454C7FF7AC91F0A4A01Luisterpunt2018
Deze records met dezelfde frabl worden gegroepeerd (ook beschikbaarheid)
|library/marc/vlacc|100929214C7FF7AC91F1ACA0109Karakter Uitgevers B.V.© 2018