/var/www/htdocs/pustaka-digital/lib/SearchEngine/SearchBiblioEngine.php:688 "Search Engine Debug 🔎 🪲"
Engine Type ⚙️: "SLiMS\SearchEngine\SearchBiblioEngine"
SQL ⚙️: array:2 [ "count" => "select count(sb.biblio_id) from search_biblio as sb where sb.opac_hide=0 and ((match (sb.topic) against (:subject in boolean mode)))" "query" => "select sb.biblio_id, sb.title, sb.author, sb.topic, sb.image, sb.isbn_issn, sb.publisher, sb.publish_place, sb.publish_year, sb.labels, sb.input_date, sb.edition, sb.collation, sb.series_title, sb.call_number from search_biblio as sb where sb.opac_hide=0 and ((match (sb.topic) against (:subject in boolean mode))) order by sb.last_update desc limit 10 offset 30" ]
Bind Value ⚒️: array:1 [ ":subject" => "'+\"networks\"'" ]
This book presents a Facebook study on members of the Cusp Generation, or those born before the “great digital divide” of 1995. This delineation allows for a discussion on the possible socio-cultural implications of Facebook use for people of all ages. Members of the Cusp Generation are in a unique position as “part digital natives” to easily acquire and use new media technologies, whil…
This open access book constitutes the refereed proceedings of the 15th International Annual Conference on Cyber Security, CNCERT 2018, held in Beijing, China, in August 2018. The 14 full papers presented were carefully reviewed and selected from 53 submissions. The papers cover the following topics: emergency response, mobile internet security, IoT security, cloud security, threat intelligence …
This open access book constitutes the refereed proceedings of the 17th International Conference on String Processing and Information Retrieval, ICOST 2019, held in New York City, NY, USA, in October 2019. The 15 full papers and 5 short papers presented in this volume were carefully reviewed and selected from 24 submissions. They cover topics such as: e-health technology design; well-being tech…
Digital technology already has permeated the physical world. Devices such as smartphones, tablets or wearables and online venues like virtual worlds and social networks have penetrated every part of our lives. The contributions to this volume apply innovative forms of ethnographic research to the digital realm. They examine the emergence of new online communities around Greenlandic news blogs o…
Since the growth of social media, human communication has become much more visual. This book presents a scholarly analysis of the images people post on a regular basis to Facebook. By including hundreds of examples, readers can see for themselves the differences between postings from a village north of London, and those from a small town in Trinidad. Why do women respond so differently to becom…
This open access book was prepared as a Final Publication of the COST Action IC1304 “Autonomous Control for a Reliable Internet of Services (ACROSS)”. The book contains 14 chapters and constitutes a show-case of the main outcome of the Action in line with its scientific goals. It will serve as a valuable reference for undergraduate and post-graduate students, educators, faculty members, res…
Technology has made human lives incomparably better. Civilization as we know it would utterly collapse without it. However, if not properly managed, technology can and will be systematically abused and misuse and thereby become one of the biggest threats to humankind. This open access book applies proactive crisis management to the management of technology organizations to make them more sustai…
Apress is proud to announce that Rethinking the Internet of Things was a 2014 Jolt Award Finalist, the highest honor for a programming book. And the amazing part is that there is no code in the book. Over the next decade, most devices connected to the Internet will not be used by people in the familiar way that personal computers, tablets and smart phones are. Billions of interconnected devi…
"It's our thesis that privacy will be an integral part of the next wave in the technology revolution and that innovators who are emphasizing privacy as an integral part of the product life cycle are on the right track." --The authors of The Privacy Engineer's Manifesto The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value is the first book of its kind, offering industr…
The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, written in a way that makes it easy for them to under…