Debug informatie:
ID=0310159527 ∙ extID=|library/marc/vlacc|10159527 ∙ BSID=library\m\vlacc\rest
material=zbbBook ∙ language=dut ∙ type=NonFictie ∙ targetaudience=ageAdults ∙ rose_rnk=38 ∙ hl_cnt=6 ∙ gl_hl_cnt=19 ∙ date_ent=20180616 ∙ date_mut=20190218 ∙ nbd_sum=true ∙ nbd_rev=true ∙ news_rev=false
idbrongevonden opmatch regel (debug)
1327097wise-antwerpen: rest
veldbevattoegevoegd van id
_ImportTime2018-06-28 23:01:56
marcleader00974aam a2200301 4500
cf00110159527
cf00520190218184535.0
cf008180616s2018 0 dut
df020## |a9789461263032 |9paperback
df035## |a9789461263032
df035## |aBBA000228405
df040## |aBoekenBank |bdut |cOpen Vlacc
df084## |a521.5
df096## |9800 |aBedrijfskunde algemeen
df100## |aBobbert, Yuri |4aut
df245#0 |aCybersecurity in 60 minuten |hBOEK
df260## |aZaltbommel |bHaystack |c2018
df300## |a141 pagina's |billustraties
df365## |b12.50 |cEUR
df490## |aDigitale trends en tools in 60 minuten
df521## |avolwassenen
df650## |aComputerbeveiliging |9vtr
df650## |aDatabeveiliging |9vtr
df650## |aInternetcriminaliteit |9vtr
df650 |aComputerbeveiliging |9vtr |id211327097 |nmrest1327097
df650 |aDatabeveiliging |9vtr |id211327097 |nmrest1327097
df650 |aInternetcriminaliteit |9vtr |id211327097 |nmrest1327097
df693#2 |9COINBE |aWetenschap en techniek |xComputers |yInternet |zBeveiliging
df700## |aBroersma, Melvin |4aut
df852 |a7590 |bVolwassenen informatief |c521.5 |dVolwassenen : informatief |e@ |l521.5 |oVI0 |pTH1807602 |wN |x[12,50] |yB3 |1N |2BSV |620854882 |92019-01-03T00:00+0100 |id211327097 |nmrest1327097
df852 |a7070 |bZIZO-Volwassenen : Wetenschap |cComputers # Internet: Beveiliging |dZIZO-Volwassenen : Wetenschap en Techniek |e@ |hCOINBE |oVIM |pBS10001032009055 |wN |x[12,50] |yB3 |1N |2BZV |620929480 |92019-04-16T00:00+0200 |id211327097 |nmrest1327097
df852 |a7010 |bInformatief: wetenschap |cComputers # Internet: Beveiliging BOBB |dVerdieping: Wetenschap en techniek |e@ |hCOINBE |lBOBB |oVIM |p080019565511 |wN |yB3 |1N |2BZV |622546552 |92018-11-20T00:00+0100 |id211327097 |nmrest1327097
df852 |a7010 |bInformatief: wetenschap |cComputers # Internet: Beveiliging BOBB |dVerdieping: Wetenschap en techniek |e@ |hCOINBE |lBOBB |oVIM |p080019565500 |wN |yB3 |1N |2BZV |622546553 |92018-11-20T00:00+0100 |id211327097 |nmrest1327097
df852 |a7019 |bInformatief: wetenschap |cComputers # Internet: Beveiliging BOBB |dZIZO-Volwassenen : Wetenschap en techniek |e@ |hCOINBE |lBOBB |oVIM |p080019565544 |wN |yB3 |1N |2BZV |622546556 |92018-11-20T00:00+0100 |id211327097 |nmrest1327097
df852 |a7012 |bInformatief: wetenschap |cComputers # Internet: Beveiliging BOBB |dZIZO-Volwassenen : Wetenschap en techniek |e@ |hCOINBE |lBOBB |oVIM |p080019565570 |wN |yB3 |1N |2BZV |622546559 |92018-11-20T00:00+0100 |id211327097 |nmrest1327097
df852 |a7018 |bInformatief: wetenschap |cComputers # Internet: Beveiliging BOBB |dZIZO-Volwassenen : Wetenschap en techniek |e@ |hCOINBE |lBOBB |oVIM |p080019565592 |wN |yB3 |1N |2BZV |622546561 |92018-11-20T00:00+0100 |id211327097 |nmrest1327097
df999## |aInternet |bBeveiliging |cCO |d2018 |fBOBB |zVN ZIZO 2*9
df999## |c521.5 |d2018 |fBOBB |zVN SISO 2*4
meta_author |tpersonal |fYuri |lBobbert |rBobbert, Yuri |caut |9Yuri Bobbert
meta_author |tpersonal |fMelvin |lBroersma |rBroersma, Melvin |caut |9Melvin Broersma
meta_isbn9789461263032
meta_isbnyear97894612630322018
meta_subject |tComputerbeveiliging |tDatabeveiliging |tInternetcriminaliteit
meta_subject |lInternet ; beveiliging |id211327097 |nmrest1327097
meta_titleCybersecurity in 60 minuten
meta_vlaccid10159527
branches |aZBB |rss20190218
branches |a7590 |m521.5 |sVolwassenen : informatief |sVI0 |bTH1807602 |wN |kB3 |rss20190103 |id211327097 |nmrest1327097
branches |a7070 |mComputers # Internet: Beveiliging |sZIZO-Volwassenen : Wetenschap en Techniek |zCOINBE |sVIM |bBS10001032009055 |wN |kB3 |rss20190416 |id211327097 |nmrest1327097
branches |a7010 |mComputers # Internet: Beveiliging BOBB |sVerdieping: Wetenschap en techniek |zCOINBE |sVIM |b080019565511 |wN |kB3 |rss20181120 |id211327097 |nmrest1327097
branches |a7010 |mComputers # Internet: Beveiliging BOBB |sVerdieping: Wetenschap en techniek |zCOINBE |sVIM |b080019565500 |wN |kB3 |rss20181120 |id211327097 |nmrest1327097
branches |a7019 |mComputers # Internet: Beveiliging BOBB |sZIZO-Volwassenen : Wetenschap en techniek |zCOINBE |sVIM |b080019565544 |wN |kB3 |rss20181120 |id211327097 |nmrest1327097
branches |a7012 |mComputers # Internet: Beveiliging BOBB |sZIZO-Volwassenen : Wetenschap en techniek |zCOINBE |sVIM |b080019565570 |wN |kB3 |rss20181120 |id211327097 |nmrest1327097
branches |a7018 |mComputers # Internet: Beveiliging BOBB |sZIZO-Volwassenen : Wetenschap en techniek |zCOINBE |sVIM |b080019565592 |wN |kB3 |rss20181120 |id211327097 |nmrest1327097
frabl
2DC39F1900F1ACA0
key1
cybersecurity in 60 minuten
key2
bobbert,yuri
mat
zbbBook
lang
dut
geïndexeerde woorden (in freetext zoek index)
cybersecurity in 60 minuten