/var/www/htdocs/pustaka-digital/lib/SearchEngine/SearchBiblioEngine.php:688 "Search Engine Debug 🔎 🪲"
Engine Type ⚙️: "SLiMS\SearchEngine\SearchBiblioEngine"
SQL ⚙️: array:2 [ "count" => "select count(sb.biblio_id) from search_biblio as sb where sb.opac_hide=0 and ((match (sb.author) against (:author in boolean mode)))" "query" => "select sb.biblio_id, sb.title, sb.author, sb.topic, sb.image, sb.isbn_issn, sb.publisher, sb.publish_place, sb.publish_year, sb.labels, sb.input_date, sb.edition, sb.collation, sb.series_title, sb.call_number from search_biblio as sb where sb.opac_hide=0 and ((match (sb.author) against (:author in boolean mode))) order by sb.last_update desc limit 10 offset 0" ]
Bind Value ⚒️: array:1 [ ":author" => "'+Feeley, Malcolm'" ]
In this book, a diverse group of authors—including open access pioneers, science communicators, scholars, researchers, and university administrators—offer a bold proposition: universities should become open knowledge institutions, acting with principles of openness at their center and working across boundaries and with broad communities to generate shared knowledge resources for the benefit…
Given that security breaches and intrusions continue to be reported daily across organizations of every size, is information security really effective? Given the rapid evolution of new technologies and uses, does the information security group even need to exist? Obviously, this is a somewhat rhetorical question. I cannot imagine that any sizeable organization would operate well without an…
Security and first-person shooter video games have one obvious thing in common: if you’re not continuously moving, you’re dead. In this second edition of Managing Risk and Information Security , Malcolm Harkins helps us move our thinking into areas of risk that have become more prominent over the last several years. Because there is so much new content in this edition, I will focus on …
This insightful volume provides a comprehensive account of the history and politics of lawyers of the last 200 years in the Nordic countries: Norway, Sweden, Denmark, Finland, and Iceland. Topping most global indexes of core civil rights, these states have been found to contain few to no visible legal complexes. Where previous studies have characterized lawyers as stewards and guardians of the …
This volume brings scholars of anthropology, economics, Science and Technology Studies, and sociology together with global political economy scholars in assessing the actual implications posed by Bitcoin and blockchains for contemporary global governance. Its interdisciplinary contributions provide academics, policymakers, industry practitioners and the general public with more nuanced understa…
Examine the evolving enterprise security landscape and discover how to manage and survive risk. While based primarily on the author’s experience and insights at major companies where he has served as CISO and CSPO, the book also includes many examples from other well-known companies and provides guidance for a management-level audience. Managing Risk and Information Security provides thoug…
Malcolm Langford, Marit Skivenes and Karl Harald Søvig (eds.).