_ImportTime | 2019-03-19 00:02:03 | |
marcleader | 00887aam a2200289 4500 | |
cf001 | 10207803 | |
cf005 | 20190821143243.0 | |
cf008 | 190318s2019 0 dut | |
df020 | ##
|a9789045356440
|9paperback | |
df035 | ##
|a9789045356440 | |
df035 | ##
|aBBA000250242 | |
df040 | ##
|aBoekenBank
|bdut
|cOpen Vlacc | |
df041 | ##
|heng | |
df084 | ##
|a520.72 | |
df096 | ##
|9980
|aInformatica algemeen | |
df100 | ##
|aBeaver, Kevin
|4aut | |
df245 | #0
|aHacken voor dummies
|hBOEK | |
df260 | ##
|aAmersfoort
|bBBNC Uitgevers
|c2019 | |
df300 | ##
|aXVIII, 405 p.
|bill. | |
df365 | ##
|b32.99
|cEUR | |
df521 | ##
|avolwassenen | |
df534 | ##
|aHacking for dummies | |
df650 | ##
|aComputernetwerken
|xbeveiliging
|9vtr | |
df650 | ##
|aHacken
|9vtr | |
df693 | #2
|9COINBE
|aWetenschap en techniek
|xComputers
|yInternet
|zBeveiliging | |
df852 |
|a2250
|b1ste verdieping Volwassenen informatief
|c520.72 BEAV
|eBSV
|h520.72
|jBEAV
|oVI0
|p112711025145701
|wN
|yB3
|1N
|2BSV
|62591063
|92019-08-30T00:00+0200
|id171537363
|nmrest | 1537363 |
df852 |
|a2050
|bTweede verdieping Volwassenen informatief
|c520.72
|eBSV
|l520.72
|oVI0
|p30003006563919
|wN
|yB3
|1N
|2BSV
|62592030
|92019-09-03T00:00+0200
|id171537363
|nmrest | 1537363 |
df852 |
|a2140
|bInformatief: computers
|cInternet: Beveiliging
|eBZV
|hCOINBE
|oVI1
|p30003002063547
|wN
|xa2019
|yB3
|1N
|2BZV
|62597207
|92019-09-16T00:00+0200
|id171537363
|nmrest | 1537363 |
df852 |
|a2000
|bVolwassenen informatief
|cInternet: Beveiliging
|eBZV
|hCOINBE
|oVIN
|p30004000005290
|wN
|yB3
|1N
|2BZV
|66794727
|92019-09-24T00:00+0200
|id171537363
|nmrest | 1537363 |
df852 |
|a2210
|bVolwassenen informatief
|cInternet: Beveiliging BEAV
|eBZV
|hCOINBE
|jBEAV
|oVI0
|p30003004055492
|wN
|yB3
|1N
|2BZV
|66796255
|92019-09-25T00:00+0200
|id171537363
|nmrest | 1537363 |
df852 |
|a2270
|b1ste verdieping Volwassenen informatief
|c520.72
|eBSV
|h520.72
|oVI0
|p30004000009564
|wN
|xCode 2
|yB3
|1N
|2BSV
|66797191
|92019-09-26T00:00+0200
|id171537363
|nmrest | 1537363 |
df852 |
|a2190
|bInformatie: Wetensch. Techniek
|cInternet: Beveiliging BEAV
|dVolw. informatie WETENSCHAP EN TECHNIEK
|eBZV
|hCOINBE
|jBEAV
|oVIM
|p11051363561
|wN
|yB3
|1N
|2BZV
|66799888
|92019-10-02T00:00+0200
|id171537363
|nmrest | 1537363 |
df852 |
|a2240
|bVolwassenen informatief
|cInternet: Beveiliging
|eBZV
|hCOINBE
|oVI0
|p15049061139
|wN
|yB3
|1N
|2BZV
|66801131
|92019-10-04T00:00+0200
|id171537363
|nmrest | 1537363 |
df852 |
|a2200
|bVolwassenen informatief
|cInternet: Beveiliging BEAV
|eBZV
|hCOINBE
|jBEAV
|oVI0
|p130506011374169
|wN
|yB3
|1N
|2BZV
|66812829
|92019-10-14T00:00+0200
|id171537363
|nmrest | 1537363 |
df852 |
|a2070
|bVolwassenen informatief
|c520.72
|eX
|l520.72
|oVI0
|p1169969
|wN
|yB3
|1N
|2X
|66827881
|92019-10-22T00:00+0200
|id171537363
|nmrest | 1537363 |
df852 |
|a2020
|b1ste verdieping Zizo Wetenschap en techniek
|cInternet: Beveiliging BEAV
|d1ste verdieping Wetenschap en techniek
|eBZV
|hCOINBE
|jBEAV
|oZWT
|p30003000008017
|wN
|yB3
|1N
|2BZV
|67124722
|92019-11-20T00:00+0100
|id171537363
|nmrest | 1537363 |
df852 |
|a2310
|bBoven Volwassenen informatief
|c520.72
|dBoven Volwassenen informatieve boeken
|e@
|l520.72
|oVI0
|p35019647209
|wN
|yB3
|1N
|67195986
|92019-11-05T00:00+0100
|id171537363
|nmrest | 1537363 |
df852 |
|a2390
|bVolwassenen informatief
|cComputers # Internet: Beveiliging
|dVolwassenen informatief
|e@
|hCOINBE
|oVI0
|p20191865
|wN
|yB3
|1N
|2BZV
|614403369
|92019-09-20T00:00+0200
|id171537363
|nmrest | 1537363 |
df999 | ##
|aInternet
|bBeveiliging
|cCO
|d2019
|fBEAV
|zVN ZIZO 2*9 | |
df999 | ##
|c520.72
|d2019
|fBEAV
|zVN SISO 2*4 | |
meta_author |
|tpersonal
|fKevin
|lBeaver
|rBeaver, Kevin
|caut
|9Kevin Beaver | |
meta_isbn | 9789045356440 | |
meta_isbnyear | 97890453564402019 | |
meta_subject |
|tComputernetwerken ; beveiliging
|tHacken | |
meta_subject |
|lFirewalls
|id171537363
|nmrest | 1537363 |
meta_title | Hacken voor dummies | |
meta_vlaccid | 10207803 | |
branches |
|aZBB
|rss20190821 | |
branches |
|a2250
|m520.72 BEAV
|z520.72
|sVI0
|b112711025145701
|wN
|kB3
|rss20190830
|s1ste verdieping Volwassenen informatief
|id171537363
|nmrest | 1537363 |
branches |
|a2050
|m520.72
|sVI0
|b30003006563919
|wN
|kB3
|rss20190903
|sTweede verdieping Volwassenen informatief
|id171537363
|nmrest | 1537363 |
branches |
|a2140
|mInternet: Beveiliging
|zCOINBE
|sVI1
|b30003002063547
|wN
|kB3
|rss20190916
|sInformatief: computers
|id171537363
|nmrest | 1537363 |
branches |
|a2000
|mInternet: Beveiliging
|zCOINBE
|sVIN
|b30004000005290
|wN
|kB3
|rss20190924
|sVolwassenen informatief
|id171537363
|nmrest | 1537363 |
branches |
|a2210
|mInternet: Beveiliging BEAV
|zCOINBE
|sVI0
|b30003004055492
|wN
|kB3
|rss20190925
|sVolwassenen informatief
|id171537363
|nmrest | 1537363 |
branches |
|a2270
|m520.72
|z520.72
|sVI0
|b30004000009564
|wN
|kB3
|rss20190926
|s1ste verdieping Volwassenen informatief
|id171537363
|nmrest | 1537363 |
branches |
|a2190
|mInternet: Beveiliging BEAV
|sVolw. informatie WETENSCHAP EN TECHNIEK
|zCOINBE
|sVIM
|b11051363561
|wN
|kB3
|rss20191002
|id171537363
|nmrest | 1537363 |
branches |
|a2240
|mInternet: Beveiliging
|zCOINBE
|sVI0
|b15049061139
|wN
|kB3
|rss20191004
|sVolwassenen informatief
|id171537363
|nmrest | 1537363 |
branches |
|a2200
|mInternet: Beveiliging BEAV
|zCOINBE
|sVI0
|b130506011374169
|wN
|kB3
|rss20191014
|sVolwassenen informatief
|id171537363
|nmrest | 1537363 |
branches |
|a2070
|m520.72
|sVI0
|b1169969
|wN
|kB3
|rss20191022
|sVolwassenen informatief
|id171537363
|nmrest | 1537363 |
branches |
|a2020
|mInternet: Beveiliging BEAV
|s1ste verdieping Wetenschap en techniek
|zCOINBE
|sZWT
|b30003000008017
|wN
|kB3
|rss20191120
|id171537363
|nmrest | 1537363 |
branches |
|a2310
|m520.72
|sBoven Volwassenen informatieve boeken
|sVI0
|b35019647209
|wN
|kB3
|rss20191105
|id171537363
|nmrest | 1537363 |
branches |
|a2390
|mComputers # Internet: Beveiliging
|sVolwassenen informatief
|zCOINBE
|sVI0
|b20191865
|wN
|kB3
|rss20190920
|id171537363
|nmrest | 1537363 |