/var/www/htdocs/pustaka-digital/lib/SearchEngine/SearchBiblioEngine.php:688 "Search Engine Debug 🔎 🪲"
Engine Type ⚙️: "SLiMS\SearchEngine\SearchBiblioEngine"
SQL ⚙️: array:2 [ "count" => "select count(sb.biblio_id) from search_biblio as sb where sb.opac_hide=0 and ((match (sb.author) against (:author in boolean mode)))" "query" => "select sb.biblio_id, sb.title, sb.author, sb.topic, sb.image, sb.isbn_issn, sb.publisher, sb.publish_place, sb.publish_year, sb.labels, sb.input_date, sb.edition, sb.collation, sb.series_title, sb.call_number from search_biblio as sb where sb.opac_hide=0 and ((match (sb.author) against (:author in boolean mode))) order by sb.last_update desc limit 10 offset 0" ]
Bind Value ⚒️: array:1 [ ":author" => "'+Heller, Richard Frederick'" ]
This book challenges the common assumption that the predominant focus of the history of science should be the achievements of Western scientists since the so-called scientific revolution. The conceptual frameworks within which the members of earlier societies and of modern indigenous groups worked admittedly pose severe problems for our understanding. But rather than dismiss them on the grounds…
Japan is quintessentially by geography a maritime country. Maritime surveillance capabilities – underwater, shore-based and airborne – are critical to its national defence posture. This book describes and assesses these capabilities, with particular respect to the underwater segment, about which there is little strategic analysis in publicly available literature. Since the end of the Col…
Going beyond current books on privacy and security, Unauthorized Access: The Crisis in Online Privacy and Security proposes specific solutions to public policy issues pertaining to online privacy and security. Requiring no technical or legal expertise, the book explains complicated concepts in clear, straightforward language. The authors two renowned experts on computer security and law explore…
This is an open access book discusses readers to various methods of modeling plans and policies that address public sector issues and problems. Written for public policy and social sciences students at the upper undergraduate and graduate level, as well as public sector decision-makers, it demonstrates and compares the development and use of various deterministic and probabilistic optimization …
This book provides an overview of a series of advanced research lines in robotics as well as of design and development methodologies for intelligent robots and their intelligent components. It represents a selection of extended versions of the best papers presented at the Seventh IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applicati…
This Open Access book provides a practical guide to the creation of sustainable enterprise value and implementation of the principles of stakeholder capitalism for corporate boards and management teams. The authors argue that business leadership is on the threshold of a new era driven by major shifts in technology, society, political economy and climate change. They set this transition in inter…
Happiness and Utility brings together experts on utilitarianism to explore the concept of happiness within the utilitarian tradition, situating it in earlier eighteenth-century thinkers and working through some of its developments at the end of the nineteenth and beginning of the twentieth centuries. Drawing on a range of philosophical and historical approaches to the study of the central idea …
Cultural diversity raises pressing issues for both political theory and practice. The remaking of the world since 1945 has led to increased demographic diversity within many states, and greater acknowledgment of its worth. “Multiculturalism” refers to the political, legal and philosophical strategies which emerged to accommodate this newfound social diversity, and the accompanying public de…
edited by Yosuke Hirayama and Richard Ronald.
The international community is too often focused on responding to the latest cyber-attack instead of addressing the reality of pervasive and persistent cyber conflict. From ransomware against the city government of Baltimore to state-sponsored campaigns targeting electrical grids in Ukraine and the U.S., we seem to have relatively little bandwidth left over to ask what we can hope for in terms …