_ImportTime | 2013-11-28 00:01:43 | |
marcleader | 00951aam a2200301 4500 | |
cf001 | 8977122 | |
cf005 | 20141107105958.0 | |
cf008 | 131127s2014 0 dut | |
df020 | ##
|a9789089752925
|9paperback | |
df035 | ##
|a9789089752925 | |
df035 | ##
|aBBA000113604 | |
df040 | ##
|aBoekenBank
|bdut
|cOpen Vlacc | |
df084 | ##
|a520.72 | |
df096 | ##
|9330
|aSpannende boeken algemeen | |
df096 | ##
|9402
|aWaargebeurde verhalen | |
df100 | ##
|aGenova, Maria
|4aut | |
df245 | #0
|aKomt een vrouw bij de hacker
|bhoe je identiteit gestolen kan worden
|hBOEK | |
df250 | ##
|a1 | |
df260 | ##
|a[S.l.]
|bJust Publishers
|ccop. 2014 | |
df300 | ##
|a239 p. | |
df365 | ##
|b14.95
|cEUR | |
df490 | ##
|aTrue crime | |
df521 | ##
|avolwassenen | |
df650 | ##
|aInternetcriminaliteit
|9vtr | |
df650 | ##
|aHacken
|9vtr | |
df693 | #2
|9COINBE
|aWetenschap en techniek
|xComputers
|yInternet
|zBeveiliging | |
df852 |
|a4000
|bVolwassenen Informatica [kast 16-17]
|c520.72 GENO
|e@
|l520.72 GENO
|oN12
|pOS4444361
|wN
|yB3
|1N
|2BSV
|66984968
|92014-03-14T00:00+0100
|id191077748
|nmrest | 1077748 |
df852 |
|a4120
|bVolwassenen fictie
|cGENO
|e@
|lGENO
|oVF0
|pDH1381261
|wN
|xSeq: 2
|yB2
|1N
|610017123
|92014-03-14T00:00+0100
|id191077748
|nmrest | 1077748 |
df852 |
|a4130
|bVolwassenen fictie
|cGENO
|dFICTION :
|e@
|lGENO
|oVF0
|pDP087700X
|wN
|xSeq: 3 [14.95 (S)]
|yB2
|1N
|610017124
|92014-02-17T00:00+0100
|id191077748
|nmrest | 1077748 |
df852 |
|a4230
|bVolwassenen informatief
|c395.664/GENO
|dVOLWASSENEN : NON-FICTION
|e@
|l395.664/GENO
|oVI0
|pIP4268016
|wN
|xSeq: 5
|yB3
|1N
|2BSV
|610017126
|92014-02-20T00:00+0100
|id191077748
|nmrest | 1077748 |
df852 |
|a4260
|bVolwassenen informatief
|c395.664
|dNon-fictie
|e@
|l395.664
|oVI0
|pIZ2080486
|wN
|xME Seq: 6
|yB3
|1N
|2BSV
|610017127
|92014-07-15T00:00+0200
|id191077748
|nmrest | 1077748 |
df852 |
|a4280
|bVolwassenen informatief
|c395.664
|dVolwassenen Non-Fictie
|e@
|l395.664
|oVI0
|pKN1748874
|wN
|xSeq: 7
|yB3
|1N
|2BSV
|610017128
|92014-03-06T00:00+0100
|id191077748
|nmrest | 1077748 |
df852 |
|a4320
|bVolwassenen informatief
|c520.72
|dInformatie :
|e@
|l520.72
|oVI0
|pKR6218776
|wN
|xSeq: 8
|yB3
|1N
|2BSV
|610017129
|92014-04-18T00:00+0200
|id191077748
|nmrest | 1077748 |
df852 |
|a4400
|bInformatief: wetenschap
|cComputers # Internet: Beveiliging GENO
|dInfo (lichtblauw): Wetenschap en techniek ; Aarde
|e@
|hCOINBE
|lGENO
|oVIM
|pMN2464659
|wN
|xSeq: 9 [15]
|yB3
|1N
|2BZV
|610017130
|92014-03-10T00:00+0100
|id191077748
|nmrest | 1077748 |
df852 |
|a4490
|bInformatief: wetenschap
|cInternet: Beveiliging
|eBZV
|hCOINBE
|oVIM
|pOB040828X
|wN
|xSeq: 10
|yB3
|1N
|2BZV
|610017131
|92014-03-21T00:00+0100
|id191077748
|nmrest | 1077748 |
df852 |
|a4460
|bVolwassenen fictie waargebeurd
|cGENO
|dWAARGEBEURDE VERHALEN
|e@
|lGENO
|oVFW
|pOK2840952
|wN
|xSeq: 11
|yB2
|1N
|2BGV
|610017132
|92014-02-24T00:00+0100
|id191077748
|nmrest | 1077748 |
df852 |
|a4530
|bVERDIEPING 2 : DUIVELSHOEK : Informatica
|c520.72 GENO
|dVERDIEPING 2 : DUIVELSHOEK : INFORMATICA :
|e@
|l520.72 GENO
|oNIN
|pRL6498345
|wN
|xSeq: 12 [S 14.95]
|yB3
|1N
|2BSV
|610017133
|92014-05-28T00:00+0200
|id191077748
|nmrest | 1077748 |
df852 |
|a4590
|bVolwassenen informatief
|c395.664
|dinformatief volwassenen
|e@
|l395.664
|oVI0
|p38790003746882
|wN
|xSeq: 13
|yB3
|1N
|2BSV
|610017134
|92014-02-20T00:00+0100
|id191077748
|nmrest | 1077748 |
df852 |
|a4640
|bInformatief: wetenschap
|cComputers # Internet: Beveiliging
|dInfo: Wetenschap en techniek ; Wetenschap - Techn
|e@
|hCOINBE
|oVIM
|pZD2303345
|wN
|xSeq: 15 [14.95 ST]
|yB3
|1N
|2BZV
|610017136
|92014-02-18T00:00+0100
|id191077748
|nmrest | 1077748 |
df852 |
|a4670
|bInformatief: wetenschap
|cComputers # Internet: Beveiliging
|e@
|hCOINBE
|oVIM
|pZW2492946
|wN
|xSeq: 16
|yB3
|1N
|2BZV
|610017137
|92014-03-03T00:00+0100
|id191077748
|nmrest | 1077748 |
df852 |
|a4082
|bVolwassenen informatief
|cInternet: Beveiliging GENO
|dVolw. informatie
|eBZV
|hCOINBE
|jGENO
|oVI0
|pBR11688653
|wN
|x[15 E]
|yB3
|1N
|2BZV
|612750474
|92014-04-30T00:00+0200
|id191077748
|nmrest | 1077748 |
df852 |
|a4080
|b1e verdieping Volwassenen informatief
|cComputers # Internet: Beveiliging GENO
|d1e verdieping Volw. Informatie (1ste verdieping)
|e@
|hCOINBE
|lGENO
|oVI0
|pBR1220993
|wN
|xSeq: 2 [15 E]
|yB3
|1N
|2BZV
|612750475
|92014-11-18T00:00+0100
|id191077748
|nmrest | 1077748 |
df852 |
|a4290
|bVolwassenen informatief
|cComputers # Internet: Beveiliging COINBE Internet / Beveiliging
|dVolwassenen Non-fictie
|e@
|hCOINBE
|lCOINBE Internet / Beveiliging
|oVI0
|p2014/267
|wN
|xVanooteghem
|yB3
|1N
|2BZV
|625948911
|92014-02-24T00:00+0100
|id191077748
|nmrest | 1077748 |
df999 | ##
|aInternet
|bBeveiliging
|cCO
|d2014
|fGENO
|zVN ZIZO 2*9 | |
df999 | ##
|c520.72
|d2014
|fGENO
|zVN SISO 2*4 | |
meta_author |
|tpersonal
|fMaria
|lGenova
|rGenova, Maria
|caut
|9Maria Genova | |
meta_isbn | 9789089752925 | |
meta_isbnyear | 97890897529252014 | |
meta_subject |
|tInternetcriminaliteit
|tHacken | |
meta_subject |
|lWaargebeurd
|lInternetcriminaliteit; Hacken
|id191077748
|nmrest | 1077748 |
meta_title | Komt een vrouw bij de hacker : hoe je identiteit gestolen kan worden | |
meta_vlaccid | 8977122 | |
branches |
|aZBB
|rss20141107 | |
branches |
|a4000
|m520.72 GENO
|sN12
|bOS4444361
|wN
|kB3
|rss20140314
|sVolwassenen Informatica [kast 16-17]
|id191077748
|nmrest | 1077748 |
branches |
|a4120
|mGENO
|sVF0
|bDH1381261
|wN
|kB2
|rss20140314
|sVolwassenen fictie
|id191077748
|nmrest | 1077748 |
branches |
|a4130
|mGENO
|sFICTION :
|sVF0
|bDP087700X
|wN
|kB2
|rss20140217
|id191077748
|nmrest | 1077748 |
branches |
|a4230
|m395.664/GENO
|sVOLWASSENEN : NON-FICTION
|sVI0
|bIP4268016
|wN
|kB3
|rss20140220
|id191077748
|nmrest | 1077748 |
branches |
|a4260
|m395.664
|sNon-fictie
|sVI0
|bIZ2080486
|wN
|kB3
|rss20140715
|id191077748
|nmrest | 1077748 |
branches |
|a4280
|m395.664
|sVolwassenen Non-Fictie
|sVI0
|bKN1748874
|wN
|kB3
|rss20140306
|id191077748
|nmrest | 1077748 |
branches |
|a4320
|m520.72
|sInformatie :
|sVI0
|bKR6218776
|wN
|kB3
|rss20140418
|id191077748
|nmrest | 1077748 |
branches |
|a4400
|mComputers # Internet: Beveiliging GENO
|sInfo (lichtblauw): Wetenschap en techniek ; Aarde
|zCOINBE
|sVIM
|bMN2464659
|wN
|kB3
|rss20140310
|id191077748
|nmrest | 1077748 |
branches |
|a4490
|mInternet: Beveiliging
|zCOINBE
|sVIM
|bOB040828X
|wN
|kB3
|rss20140321
|sInformatief: wetenschap
|id191077748
|nmrest | 1077748 |
branches |
|a4460
|mGENO
|sWAARGEBEURDE VERHALEN
|sVFW
|bOK2840952
|wN
|kB2
|rss20140224
|id191077748
|nmrest | 1077748 |
branches |
|a4530
|m520.72 GENO
|sVERDIEPING 2 : DUIVELSHOEK : INFORMATICA :
|sNIN
|bRL6498345
|wN
|kB3
|rss20140528
|id191077748
|nmrest | 1077748 |
branches |
|a4590
|m395.664
|sinformatief volwassenen
|sVI0
|b38790003746882
|wN
|kB3
|rss20140220
|id191077748
|nmrest | 1077748 |
branches |
|a4640
|mComputers # Internet: Beveiliging
|sInfo: Wetenschap en techniek ; Wetenschap - Techn
|zCOINBE
|sVIM
|bZD2303345
|wN
|kB3
|rss20140218
|id191077748
|nmrest | 1077748 |
branches |
|a4670
|mComputers # Internet: Beveiliging
|zCOINBE
|sVIM
|bZW2492946
|wN
|kB3
|rss20140303
|sInformatief: wetenschap
|id191077748
|nmrest | 1077748 |
branches |
|a4082
|mInternet: Beveiliging GENO
|sVolw. informatie
|zCOINBE
|sVI0
|bBR11688653
|wN
|kB3
|rss20140430
|id191077748
|nmrest | 1077748 |
branches |
|a4080
|mComputers # Internet: Beveiliging GENO
|s1e verdieping Volw. Informatie (1ste verdieping)
|zCOINBE
|sVI0
|bBR1220993
|wN
|kB3
|rss20141118
|id191077748
|nmrest | 1077748 |
branches |
|a4290
|mComputers # Internet: Beveiliging COINBE Internet / Beveiliging
|sVolwassenen Non-fictie
|zCOINBE
|sVI0
|b2014/267
|wN
|kB3
|rss20140224
|id191077748
|nmrest | 1077748 |