Debug informatie:
ID=0310207803 ∙ extID=|library/marc/vlacc|10207803 ∙ BSID=library\m\vlacc\rest
material=zbbBook ∙ language=dut ∙ languageo=eng ∙ type=NonFictie ∙ targetaudience=ageAdults ∙ rose_rnk=774 ∙ hl_cnt=7 ∙ gl_hl_cnt=86 ∙ date_ent=20190318 ∙ date_mut=20190821 ∙ nbd_sum=true ∙ nbd_rev=true ∙ news_rev=false
idbrongevonden opmatch regel (debug)
1537363wise-westvlaanderen: rest
veldbevattoegevoegd van id
_ImportTime2019-03-19 00:02:03
marcleader00887aam a2200289 4500
cf00110207803
cf00520190821143243.0
cf008190318s2019 0 dut
df020## |a9789045356440 |9paperback
df035## |a9789045356440
df035## |aBBA000250242
df040## |aBoekenBank |bdut |cOpen Vlacc
df041## |heng
df084## |a520.72
df096## |9980 |aInformatica algemeen
df100## |aBeaver, Kevin |4aut
df245#0 |aHacken voor dummies |hBOEK
df260## |aAmersfoort |bBBNC Uitgevers |c2019
df300## |aXVIII, 405 p. |bill.
df365## |b32.99 |cEUR
df521## |avolwassenen
df534## |aHacking for dummies
df650## |aComputernetwerken |xbeveiliging |9vtr
df650## |aHacken |9vtr
df693#2 |9COINBE |aWetenschap en techniek |xComputers |yInternet |zBeveiliging
df852 |a4000 |bVolwassenen Informatica [kast 16-17] |c520.72 BEAV |e@ |l520.72 BEAV |oN12 |pOS5397448 |wN |yB3 |1N |2BSV |67065938 |92019-09-27T00:00+0200 |id191537363 |nmrest1537363
df852 |a4230 |bVolwassenen informatief |c520.72/BEAV |dVOLWASSENEN : NON-FICTION |eBSV |l520.72/BEAV |oVI0 |pIP5264790 |wN |yB3 |1N |2BSV |611153897 |92019-09-06T00:00+0200 |id191537363 |nmrest1537363
df852 |a4280 |bVolwassenen informatief |c520.72 |dVolwassenen Non-Fictie |e@ |l520.72 |oVI0 |pKN2250187 |wN |xSeq: 2 |yB3 |1N |2BSV |611153898 |92019-08-17T00:00+0200 |id191537363 |nmrest1537363
df852 |a4360 |bVolwassenen informatief |c520.72 BEAV |dZone volwassenen INFORMATIE |eBSV |h520.72 |jBEAV |oVI0 |pLM277111X |wN |xRL Seq: 3 |yB3 |1N |2BSV |611153899 |92020-02-13T00:00+0100 |id191537363 |nmrest1537363
df852 |a4530 |bVERDIEPING 2 : DUIVELSHOEK : Informatica |c520.72 BEAV |dVERDIEPING 2 : DUIVELSHOEK : INFORMATICA : |eBSV |h520.72 |jBEAV |oNIN |pRL7687613 |wN |xSeq: 4 [S 32.99] |yB3 |1N |2BSV |611153900 |92019-10-07T00:00+0200 |id191537363 |nmrest1537363
df852 |a4590 |bVolwassenen informatief |c520.72 |dinformatief volwassenen |e@ |l520.72 |oVI0 |p38790004305001 |wN |xSeq: 5 |yB3 |1N |2BSV |611153901 |92019-11-29T00:00+0100 |id191537363 |nmrest1537363
df852 |a4083 |bVolwassenen informatief |cComputers # Internet: Beveiliging BEAV |dVolw. informatie |e@ |hCOINBE |lBEAV |oVI0 |pBR1688855 |wN |x[33 E] |yB3 |1N |2BZV |612948135 |92020-01-21T00:00+0100 |id191537363 |nmrest1537363
df852 |a4080 |b1e verdieping Volwassenen informatief |cInternet: Beveiliging BEAV |d1e verdieping Volw. Informatie (1ste verdieping) |eBZV |hCOINBE |jBEAV |oVI0 |p30003017238913 |wN |yB3 |1N |2BZV |625705376 |92022-08-23T00:00+0200 |id191537363 |nmrest1537363
df852 |a4110 |bVolwassenen informatief |cInternet: Beveiliging |dVolwassenenafdeling informatieve boeken |eBZV |hCOINBE |oVI0 |p2019/2067 |wN |xStandaard boekhandel |yB3 |1N |2BZV |625880219 |92019-09-11T00:00+0200 |id191537363 |nmrest1537363
df999## |aInternet |bBeveiliging |cCO |d2019 |fBEAV |zVN ZIZO 2*9
df999## |c520.72 |d2019 |fBEAV |zVN SISO 2*4
meta_author |tpersonal |fKevin |lBeaver |rBeaver, Kevin |caut |9Kevin Beaver
meta_isbn9789045356440
meta_isbnyear97890453564402019
meta_subject |tComputernetwerken ; beveiliging |tHacken
meta_subject |lFirewalls |id191537363 |nmrest1537363
meta_titleHacken voor dummies
meta_vlaccid10207803
branches |aZBB |rss20190821
branches |a4000 |m520.72 BEAV |sN12 |bOS5397448 |wN |kB3 |rss20190927 |sVolwassenen Informatica [kast 16-17] |id191537363 |nmrest1537363
branches |a4230 |m520.72/BEAV |sVOLWASSENEN : NON-FICTION |sVI0 |bIP5264790 |wN |kB3 |rss20190906 |id191537363 |nmrest1537363
branches |a4280 |m520.72 |sVolwassenen Non-Fictie |sVI0 |bKN2250187 |wN |kB3 |rss20190817 |id191537363 |nmrest1537363
branches |a4360 |m520.72 BEAV |sZone volwassenen INFORMATIE |z520.72 |sVI0 |bLM277111X |wN |kB3 |rss20200213 |id191537363 |nmrest1537363
branches |a4530 |m520.72 BEAV |sVERDIEPING 2 : DUIVELSHOEK : INFORMATICA : |z520.72 |sNIN |bRL7687613 |wN |kB3 |rss20191007 |id191537363 |nmrest1537363
branches |a4590 |m520.72 |sinformatief volwassenen |sVI0 |b38790004305001 |wN |kB3 |rss20191129 |id191537363 |nmrest1537363
branches |a4083 |mComputers # Internet: Beveiliging BEAV |sVolw. informatie |zCOINBE |sVI0 |bBR1688855 |wN |kB3 |rss20200121 |id191537363 |nmrest1537363
branches |a4080 |mInternet: Beveiliging BEAV |s1e verdieping Volw. Informatie (1ste verdieping) |zCOINBE |sVI0 |b30003017238913 |wN |kB3 |rss20220823 |id191537363 |nmrest1537363
branches |a4110 |mInternet: Beveiliging |sVolwassenenafdeling informatieve boeken |zCOINBE |sVI0 |b2019/2067 |wN |kB3 |rss20190911 |id191537363 |nmrest1537363
frabl
73B987C802F1ACA0
key1
hacking for dummies
key2
beaver,kevin
mat
zbbBook
lang
dut
geïndexeerde woorden (in freetext zoek index)
hacking for Dummies Hacken voor
extidfrablmatlanggl_hl_cntpublisheryear
Deze records met dezelfde key1 & key2, maar ander materiaal worden gesuggereerd:
|library/marc/vlacc|1033545373B987C802F0A0A01BBNC Uitgevers2020
Deze records met dezelfde frabl worden gegroepeerd (ook beschikbaarheid)
|library/marc/vlacc|1020780373B987C802F1ACA086BBNC Uitgevers2019
Deze records met dezelfde key1 & key2, maar ander materiaal worden gesuggereerd:
|library/marc/vlacc|1017883873B987C802F1ACA74Wiley© 2018