/home/dift7783/public_html/devperpus.difagroup.id/lib/SearchEngine/DefaultEngine.php:610 "Search Engine Debug 🔎 🪲"
Engine Type ⚙️: "SLiMS\SearchEngine\DefaultEngine"
SQL ⚙️: array:2 [ "count" => "select count(distinct b.biblio_id) from biblio as b left join mst_publisher as mp on b.publisher_id=mp.publisher_id left join mst_place as mpl on b.publish_place_id=mpl.place_id where b.opac_hide=0 and (b.biblio_id in(select ba.biblio_id from biblio_author as ba left join mst_author as ma on ba.author_id=ma.author_id where ma.author_name like ?))" "query" => "select b.biblio_id, b.title, b.image, b.isbn_issn, b.publish_year, mp.publisher_name as `publisher`, mpl.place_name as `publish_place`, b.labels, b.input_date, b.edition, b.collation, b.series_title, b.call_number from biblio as b left join mst_publisher as mp on b.publisher_id=mp.publisher_id left join mst_place as mpl on b.publish_place_id=mpl.place_id where b.opac_hide=0 and (b.biblio_id in(select ba.biblio_id from biblio_author as ba left join mst_author as ma on ba.author_id=ma.author_id where ma.author_name like ?)) order by b.last_update desc limit 10 offset 0" ]
Bind Value ⚒️: array:1 [ 0 => "%Bernik, Igor%" ]
In order to enable general understanding and to foster the implementation of necessary support measures in organizations, this book describes the fundamental and conceptual aspects of cyberspace abuse. These aspects are logically and reasonably discussed in the fields related to cybercrime and cyberwarfare. The book illustrates differences between the two fields, perpetrators’ activities, as …