.s68f6b3544c05d_sprite0 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/68f6b3544c05d.png);background-position:0 -0px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:114px;margin-top:2px;margin-bottom:2px;}
.s68f6b3544c05d_sprite1 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/68f6b3544c05d.png);background-position:0 -124px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:114px;margin-top:2px;margin-bottom:2px;}
.s68f6b3544c05d_sprite2 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/68f6b3544c05d.png);background-position:0 -248px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:114px;margin-top:2px;margin-bottom:2px;}
.s68f6b3544c05d_sprite3 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/68f6b3544c05d.png);background-position:0 -372px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:127.5px;margin-top:2px;margin-bottom:2px;}
.s68f6b3544c05d_sprite4 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/68f6b3544c05d.png);background-position:0 -509.5px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:112px;margin-top:2px;margin-bottom:2px;}
.s68f6b3544c05d_sprite5 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/68f6b3544c05d.png);background-position:0 -631.5px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:112px;margin-top:2px;margin-bottom:2px;}
.s68f6b3544c05d_sprite6 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/68f6b3544c05d.png);background-position:0 -753.5px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:125.5px;margin-top:2px;margin-bottom:2px;}
.s68f6b3544c05d_sprite7 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/68f6b3544c05d.png);background-position:0 -889px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:112px;margin-top:2px;margin-bottom:2px;}
.s68f6b3544c05d_sprite8 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/68f6b3544c05d.png);background-position:0 -1011px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:128.5px;margin-top:2px;margin-bottom:2px;}
.s68f6b3544c05d_sprite9 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/68f6b3544c05d.png);background-position:0 -1149.5px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:115px;margin-top:2px;margin-bottom:2px;}
.s68f6b3544c05d_sprite10 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/68f6b3544c05d.png);background-position:0 -1274.5px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:112px;margin-top:2px;margin-bottom:2px;}
.s68f6b3544c05d_sprite11 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/68f6b3544c05d.png);background-position:0 -1396.5px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:84.5px;margin-top:2px;margin-bottom:2px;}
.s68f6b3544c05d_sprite12 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/68f6b3544c05d.png);background-position:0 -1491px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:117px;margin-top:2px;margin-bottom:2px;}
.s68f6b3544c05d_sprite13 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/68f6b3544c05d.png);background-position:0 -1618px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:117px;margin-top:2px;margin-bottom:2px;}
.s68f6b3544c05d_sprite14 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/68f6b3544c05d.png);background-position:0 -1745px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:118.5px;margin-top:2px;margin-bottom:2px;}
.s68f6b3544c05d_sprite15 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/68f6b3544c05d.png);background-position:0 -1873.5px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:114.5px;margin-top:2px;margin-bottom:2px;}
.s68f6b3544c05d_sprite16 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/68f6b3544c05d.png);background-position:0 -1998px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:118.5px;margin-top:2px;margin-bottom:2px;}
.s68f6b3544c05d_sprite17 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/68f6b3544c05d.png);background-position:0 -2126.5px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:116.5px;margin-top:2px;margin-bottom:2px;}
.s68f6b3544c05d_sprite18 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/68f6b3544c05d.png);background-position:0 -2253px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:112.5px;margin-top:2px;margin-bottom:2px;}
.s68f6b3544c05d_sprite19 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/68f6b3544c05d.png);background-position:0 -2375.5px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:118px;margin-top:2px;margin-bottom:2px;}
.s68f6b3544c05d_sprite20 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/68f6b3544c05d.png);background-position:0 -2503.5px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:117px;margin-top:2px;margin-bottom:2px;}
.s68f6b3544c05d_sprite21 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/68f6b3544c05d.png);background-position:0 -2630.5px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:132px;margin-top:2px;margin-bottom:2px;}
.s68f6b3544c05d_sprite22 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/68f6b3544c05d.png);background-position:0 -2772.5px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:115.5px;margin-top:2px;margin-bottom:2px;}
.s68f6b3544c05d_sprite23 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/68f6b3544c05d.png);background-position:0 -2898px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:122px;margin-top:2px;margin-bottom:2px;}
.s68f6b3544c05d_sprite24 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/68f6b3544c05d.png);background-position:0 -3030px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:112.5px;margin-top:2px;margin-bottom:2px;}
.s68f6b3544c05d_sprite25 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/68f6b3544c05d.png);background-position:0 -3152.5px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:121.5px;margin-top:2px;margin-bottom:2px;}
.s68f6b3544c05d_sprite26 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/68f6b3544c05d.png);background-position:0 -3284px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:131px;margin-top:2px;margin-bottom:2px;}
.s68f6b3544c05d_sprite27 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/68f6b3544c05d.png);background-position:0 -3425px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:113px;margin-top:2px;margin-bottom:2px;}
.s68f6b3544c05d_sprite28 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/68f6b3544c05d.png);background-position:0 -3548px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:114.5px;margin-top:2px;margin-bottom:2px;}
.s68f6b3544c05d_sprite29 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/68f6b3544c05d.png);background-position:0 -3672.5px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:113px;margin-top:2px;margin-bottom:2px;}
.s68f6b3544c05d_sprite30 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/68f6b3544c05d.png);background-position:0 -3795.5px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:118px;margin-top:2px;margin-bottom:2px;}
.s68f6b3544c05d_sprite31 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/68f6b3544c05d.png);background-position:0 -3923.5px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:114px;margin-top:2px;margin-bottom:2px;}
