.s697e8bec57165_sprite0 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/697e8bec57165.png);background-position:0 -0px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:114px;margin-top:2px;margin-bottom:2px;}
.s697e8bec57165_sprite1 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/697e8bec57165.png);background-position:0 -124px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:114px;margin-top:2px;margin-bottom:2px;}
.s697e8bec57165_sprite2 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/697e8bec57165.png);background-position:0 -248px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:114px;margin-top:2px;margin-bottom:2px;}
.s697e8bec57165_sprite3 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/697e8bec57165.png);background-position:0 -372px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:114px;margin-top:2px;margin-bottom:2px;}
.s697e8bec57165_sprite4 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/697e8bec57165.png);background-position:0 -496px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:127.5px;margin-top:2px;margin-bottom:2px;}
.s697e8bec57165_sprite5 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/697e8bec57165.png);background-position:0 -633.5px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:112px;margin-top:2px;margin-bottom:2px;}
.s697e8bec57165_sprite6 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/697e8bec57165.png);background-position:0 -755.5px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:112px;margin-top:2px;margin-bottom:2px;}
.s697e8bec57165_sprite7 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/697e8bec57165.png);background-position:0 -877.5px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:125.5px;margin-top:2px;margin-bottom:2px;}
.s697e8bec57165_sprite8 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/697e8bec57165.png);background-position:0 -1013px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:112px;margin-top:2px;margin-bottom:2px;}
.s697e8bec57165_sprite9 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/697e8bec57165.png);background-position:0 -1135px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:128.5px;margin-top:2px;margin-bottom:2px;}
.s697e8bec57165_sprite10 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/697e8bec57165.png);background-position:0 -1273.5px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:115px;margin-top:2px;margin-bottom:2px;}
.s697e8bec57165_sprite11 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/697e8bec57165.png);background-position:0 -1398.5px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:112px;margin-top:2px;margin-bottom:2px;}
.s697e8bec57165_sprite12 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/697e8bec57165.png);background-position:0 -1520.5px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:84.5px;margin-top:2px;margin-bottom:2px;}
.s697e8bec57165_sprite13 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/697e8bec57165.png);background-position:0 -1615px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:117px;margin-top:2px;margin-bottom:2px;}
.s697e8bec57165_sprite14 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/697e8bec57165.png);background-position:0 -1742px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:117px;margin-top:2px;margin-bottom:2px;}
.s697e8bec57165_sprite15 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/697e8bec57165.png);background-position:0 -1869px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:118.5px;margin-top:2px;margin-bottom:2px;}
.s697e8bec57165_sprite16 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/697e8bec57165.png);background-position:0 -1997.5px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:114.5px;margin-top:2px;margin-bottom:2px;}
.s697e8bec57165_sprite17 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/697e8bec57165.png);background-position:0 -2122px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:118.5px;margin-top:2px;margin-bottom:2px;}
.s697e8bec57165_sprite18 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/697e8bec57165.png);background-position:0 -2250.5px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:116.5px;margin-top:2px;margin-bottom:2px;}
.s697e8bec57165_sprite19 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/697e8bec57165.png);background-position:0 -2377px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:112.5px;margin-top:2px;margin-bottom:2px;}
.s697e8bec57165_sprite20 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/697e8bec57165.png);background-position:0 -2499.5px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:118px;margin-top:2px;margin-bottom:2px;}
.s697e8bec57165_sprite21 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/697e8bec57165.png);background-position:0 -2627.5px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:117px;margin-top:2px;margin-bottom:2px;}
.s697e8bec57165_sprite22 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/697e8bec57165.png);background-position:0 -2754.5px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:132px;margin-top:2px;margin-bottom:2px;}
.s697e8bec57165_sprite23 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/697e8bec57165.png);background-position:0 -2896.5px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:115.5px;margin-top:2px;margin-bottom:2px;}
.s697e8bec57165_sprite24 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/697e8bec57165.png);background-position:0 -3022px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:122px;margin-top:2px;margin-bottom:2px;}
.s697e8bec57165_sprite25 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/697e8bec57165.png);background-position:0 -3154px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:112.5px;margin-top:2px;margin-bottom:2px;}
.s697e8bec57165_sprite26 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/697e8bec57165.png);background-position:0 -3276.5px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:121.5px;margin-top:2px;margin-bottom:2px;}
.s697e8bec57165_sprite27 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/697e8bec57165.png);background-position:0 -3408px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:131px;margin-top:2px;margin-bottom:2px;}
.s697e8bec57165_sprite28 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/697e8bec57165.png);background-position:0 -3549px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:113px;margin-top:2px;margin-bottom:2px;}
.s697e8bec57165_sprite29 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/697e8bec57165.png);background-position:0 -3672px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:114.5px;margin-top:2px;margin-bottom:2px;}
.s697e8bec57165_sprite30 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/697e8bec57165.png);background-position:0 -3796.5px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:113px;margin-top:2px;margin-bottom:2px;}
.s697e8bec57165_sprite31 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/697e8bec57165.png);background-position:0 -3919.5px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:118px;margin-top:2px;margin-bottom:2px;}
.s697e8bec57165_sprite32 {background-image:url(/sprites/security-sicherheitstechnik/security-fachbuecher.php/697e8bec57165.png);background-position:0 -4047.5px;background-repeat:no-repeat;display:inline-block !important;width:80px;height:114px;margin-top:2px;margin-bottom:2px;}
