Debug informatie:
ID=0310207803 ∙ extID=|library/marc/vlacc|10207803 ∙ BSID=library\m\vlacc\rest
material=zbbBook ∙ language=dut ∙ languageo=eng ∙ type=NonFictie ∙ targetaudience=ageAdults ∙ rose_rnk=736 ∙ hl_cnt=13 ∙ gl_hl_cnt=92 ∙ date_ent=20190318 ∙ date_mut=20190821 ∙ nbd_sum=true ∙ nbd_rev=true ∙ news_rev=false
idbrongevonden opmatch regel (debug)
1537363wise-limburg: rest
veldbevattoegevoegd van id
_ImportTime2019-03-19 00:02:03
marcleader00887aam a2200289 4500
cf00110207803
cf00520190821143243.0
cf008190318s2019 0 dut
df020## |a9789045356440 |9paperback
df035## |a9789045356440
df035## |aBBA000250242
df040## |aBoekenBank |bdut |cOpen Vlacc
df041## |heng
df084## |a520.72
df096## |9980 |aInformatica algemeen
df100## |aBeaver, Kevin |4aut
df245#0 |aHacken voor dummies |hBOEK
df260## |aAmersfoort |bBBNC Uitgevers |c2019
df300## |aXVIII, 405 p. |bill.
df365## |b32.99 |cEUR
df521## |avolwassenen
df534## |aHacking for dummies
df650## |aComputernetwerken |xbeveiliging |9vtr
df650## |aHacken |9vtr
df693#2 |9COINBE |aWetenschap en techniek |xComputers |yInternet |zBeveiliging
df852 |a2250 |b1ste verdieping Volwassenen informatief |c520.72 BEAV |eBSV |h520.72 |jBEAV |oVI0 |p112711025145701 |wN |yB3 |1N |2BSV |62591063 |92019-08-30T00:00+0200 |id171537363 |nmrest1537363
df852 |a2050 |bTweede verdieping Volwassenen informatief |c520.72 |eBSV |l520.72 |oVI0 |p30003006563919 |wN |yB3 |1N |2BSV |62592030 |92019-09-03T00:00+0200 |id171537363 |nmrest1537363
df852 |a2140 |bInformatief: computers |cInternet: Beveiliging |eBZV |hCOINBE |oVI1 |p30003002063547 |wN |xa2019 |yB3 |1N |2BZV |62597207 |92019-09-16T00:00+0200 |id171537363 |nmrest1537363
df852 |a2000 |bVolwassenen informatief |cInternet: Beveiliging |eBZV |hCOINBE |oVIN |p30004000005290 |wN |yB3 |1N |2BZV |66794727 |92019-09-24T00:00+0200 |id171537363 |nmrest1537363
df852 |a2210 |bVolwassenen informatief |cInternet: Beveiliging BEAV |eBZV |hCOINBE |jBEAV |oVI0 |p30003004055492 |wN |yB3 |1N |2BZV |66796255 |92019-09-25T00:00+0200 |id171537363 |nmrest1537363
df852 |a2270 |b1ste verdieping Volwassenen informatief |c520.72 |eBSV |h520.72 |oVI0 |p30004000009564 |wN |xCode 2 |yB3 |1N |2BSV |66797191 |92019-09-26T00:00+0200 |id171537363 |nmrest1537363
df852 |a2190 |bInformatie: Wetensch. Techniek |cInternet: Beveiliging BEAV |dVolw. informatie WETENSCHAP EN TECHNIEK |eBZV |hCOINBE |jBEAV |oVIM |p11051363561 |wN |yB3 |1N |2BZV |66799888 |92019-10-02T00:00+0200 |id171537363 |nmrest1537363
df852 |a2240 |bVolwassenen informatief |cInternet: Beveiliging |eBZV |hCOINBE |oVI0 |p15049061139 |wN |yB3 |1N |2BZV |66801131 |92019-10-04T00:00+0200 |id171537363 |nmrest1537363
df852 |a2200 |bVolwassenen informatief |cInternet: Beveiliging BEAV |eBZV |hCOINBE |jBEAV |oVI0 |p130506011374169 |wN |yB3 |1N |2BZV |66812829 |92019-10-14T00:00+0200 |id171537363 |nmrest1537363
df852 |a2070 |bVolwassenen informatief |c520.72 |eX |l520.72 |oVI0 |p1169969 |wN |yB3 |1N |2X |66827881 |92019-10-22T00:00+0200 |id171537363 |nmrest1537363
df852 |a2020 |b1ste verdieping Zizo Wetenschap en techniek |cInternet: Beveiliging BEAV |d1ste verdieping Wetenschap en techniek |eBZV |hCOINBE |jBEAV |oZWT |p30003000008017 |wN |yB3 |1N |2BZV |67124722 |92019-11-20T00:00+0100 |id171537363 |nmrest1537363
df852 |a2310 |bBoven Volwassenen informatief |c520.72 |dBoven Volwassenen informatieve boeken |e@ |l520.72 |oVI0 |p35019647209 |wN |yB3 |1N |67195986 |92019-11-05T00:00+0100 |id171537363 |nmrest1537363
df852 |a2390 |bVolwassenen informatief |cComputers # Internet: Beveiliging |dVolwassenen informatief |e@ |hCOINBE |oVI0 |p20191865 |wN |yB3 |1N |2BZV |614403369 |92019-09-20T00:00+0200 |id171537363 |nmrest1537363
df999## |aInternet |bBeveiliging |cCO |d2019 |fBEAV |zVN ZIZO 2*9
df999## |c520.72 |d2019 |fBEAV |zVN SISO 2*4
meta_author |tpersonal |fKevin |lBeaver |rBeaver, Kevin |caut |9Kevin Beaver
meta_isbn9789045356440
meta_isbnyear97890453564402019
meta_subject |tComputernetwerken ; beveiliging |tHacken
meta_subject |lFirewalls |id171537363 |nmrest1537363
meta_titleHacken voor dummies
meta_vlaccid10207803
branches |aZBB |rss20190821
branches |a2250 |m520.72 BEAV |z520.72 |sVI0 |b112711025145701 |wN |kB3 |rss20190830 |s1ste verdieping Volwassenen informatief |id171537363 |nmrest1537363
branches |a2050 |m520.72 |sVI0 |b30003006563919 |wN |kB3 |rss20190903 |sTweede verdieping Volwassenen informatief |id171537363 |nmrest1537363
branches |a2140 |mInternet: Beveiliging |zCOINBE |sVI1 |b30003002063547 |wN |kB3 |rss20190916 |sInformatief: computers |id171537363 |nmrest1537363
branches |a2000 |mInternet: Beveiliging |zCOINBE |sVIN |b30004000005290 |wN |kB3 |rss20190924 |sVolwassenen informatief |id171537363 |nmrest1537363
branches |a2210 |mInternet: Beveiliging BEAV |zCOINBE |sVI0 |b30003004055492 |wN |kB3 |rss20190925 |sVolwassenen informatief |id171537363 |nmrest1537363
branches |a2270 |m520.72 |z520.72 |sVI0 |b30004000009564 |wN |kB3 |rss20190926 |s1ste verdieping Volwassenen informatief |id171537363 |nmrest1537363
branches |a2190 |mInternet: Beveiliging BEAV |sVolw. informatie WETENSCHAP EN TECHNIEK |zCOINBE |sVIM |b11051363561 |wN |kB3 |rss20191002 |id171537363 |nmrest1537363
branches |a2240 |mInternet: Beveiliging |zCOINBE |sVI0 |b15049061139 |wN |kB3 |rss20191004 |sVolwassenen informatief |id171537363 |nmrest1537363
branches |a2200 |mInternet: Beveiliging BEAV |zCOINBE |sVI0 |b130506011374169 |wN |kB3 |rss20191014 |sVolwassenen informatief |id171537363 |nmrest1537363
branches |a2070 |m520.72 |sVI0 |b1169969 |wN |kB3 |rss20191022 |sVolwassenen informatief |id171537363 |nmrest1537363
branches |a2020 |mInternet: Beveiliging BEAV |s1ste verdieping Wetenschap en techniek |zCOINBE |sZWT |b30003000008017 |wN |kB3 |rss20191120 |id171537363 |nmrest1537363
branches |a2310 |m520.72 |sBoven Volwassenen informatieve boeken |sVI0 |b35019647209 |wN |kB3 |rss20191105 |id171537363 |nmrest1537363
branches |a2390 |mComputers # Internet: Beveiliging |sVolwassenen informatief |zCOINBE |sVI0 |b20191865 |wN |kB3 |rss20190920 |id171537363 |nmrest1537363
frabl
73B987C802F1ACA0
key1
hacking for dummies
key2
beaver,kevin
mat
zbbBook
lang
dut
geïndexeerde woorden (in freetext zoek index)
hacking for dummies Hacken voor
extidfrablmatlanggl_hl_cntpublisheryear
Deze records met dezelfde key1 & key2, maar ander materiaal worden gesuggereerd:
|library/marc/vlacc|1033545373B987C802F0A0A01BBNC Uitgevers2020
Deze records met dezelfde frabl worden gegroepeerd (ook beschikbaarheid)
|library/marc/vlacc|1020780373B987C802F1ACA092BBNC Uitgevers2019