/var/www/htdocs/pustaka-digital/lib/SearchEngine/SearchBiblioEngine.php:688 "Search Engine Debug 🔎 🪲"
Engine Type ⚙️: "SLiMS\SearchEngine\SearchBiblioEngine"
SQL ⚙️: array:2 [ "count" => "select count(sb.biblio_id) from search_biblio as sb where sb.opac_hide=0 and ((match (sb.topic) against (:subject in boolean mode)))" "query" => "select sb.biblio_id, sb.title, sb.author, sb.topic, sb.image, sb.isbn_issn, sb.publisher, sb.publish_place, sb.publish_year, sb.labels, sb.input_date, sb.edition, sb.collation, sb.series_title, sb.call_number from search_biblio as sb where sb.opac_hide=0 and ((match (sb.topic) against (:subject in boolean mode))) order by sb.last_update desc limit 10 offset 40" ]
Bind Value ⚒️: array:1 [ ":subject" => "'+\"networks\"'" ]
The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, written in a way that makes it easy for them to under…
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do cool things with the TPM. The approach is to ramp t…
Examine the evolving enterprise security landscape and discover how to manage and survive risk. While based primarily on the author’s experience and insights at major companies where he has served as CISO and CSPO, the book also includes many examples from other well-known companies and provides guidance for a management-level audience. Managing Risk and Information Security provides thoug…
Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Securit…
This open access book provides the first comprehensive collection of papers that provide an integrative view on cybersecurity. It discusses theories, problems and solutions on the relevant ethical issues involved. This work is sorely needed in a world where cybersecurity has become indispensable to protect trust and confidence in the digital infrastructure whilst respecting fundamental values l…
Over the past few decades, various types of hate material have caused increasing concern. Today, the scope of hate is wider than ever, as easy and often-anonymous access to an enormous amount of online content has opened the Internet up to both use and abuse. By providing possibilities for inexpensive and instantaneous access without ties to geographic location or a user identification system, …
Social Networks with Rich Edge Semantics introduces a new mechanism for representing social networks in which pairwise relationships can be drawn from a range of realistic possibilities, including different types of relationships, different strengths in the directions of a pair, positive and negative relationships, and relationships whose intensities change with time. For each possibility, the …
Winner of the 2017 Sweetland Digital Rhetoric Collaborative Book Prize Software developers work rhetorically to make meaning through the code they write. In some ways, writing code is like any other form of communication; in others, it proves to be new, exciting, and unique. In Rhetorical Code Studies, Kevin Brock explores how software code serves as meaningful communication through which softw…
"Since its launch in 2006, Twitter has served as a major platform for political performance, social justice activism, and large-scale public debates over race, ethnicity, gender, sexuality, and nationality. It has empowered minoritarian groups to organize protests, articulate often-underrepresented perspectives, and form community. It has also spread hashtags that have been used to bully and …
From Mah-Jong, to the introduction of Prussian war-games, through to the emergence of location-based play: maps and play share a long and diverse history. This monograph shows how mapping and playing unfold in the digital age, when the relations between these apparently separate tropes are increasingly woven together. Fluid networks of interaction have encouraged a proliferation of hybrid forms…