An Error Was Encountered

Error Number: 1054

Unknown column 'cache_on' in 'field list'

UPDATE `aff_pdf_cache` SET `cache` = 'a:10:{i:0;O:8:\"stdClass\":13:{s:2:\"id\";s:6:\"381788\";s:6:\"status\";s:8:\"verified\";s:11:\"author_name\";s:17:\"rnrmarketresearch\";s:9:\"author_id\";s:6:\"116521\";s:14:\"author_website\";s:33:\"http://www.rnrmarketresearch.com/\";s:5:\"title\";s:66:\"World Surveillance and Security Equipment Technologies and Markets\";s:11:\"description\";s:559:\"Buy the report \"Surveillance and Security This BCC Research report analyzes the burgeoning market for new technologies that are used in surveillance and security. In this report, surveillance is broadly construed and includes any type of “sensing,” and often recording, of people or property. The report is broken down by major individual country markets such as those in Western Europe, North America and Asia/Pacific.Equipment: Technologies and Global Markets\" at US $5450 for a Single User PDF License from RnR Market Research Reports Library.\";s:5:\"thumb\";s:84:\"images/t/3818/world-surveillance-and-security-equipment-technologies-and-markets.jpg\";s:6:\"thumb2\";s:85:\"images/t2/3818/world-surveillance-and-security-equipment-technologies-and-markets.jpg\";s:9:\"permalink\";s:66:\"world-surveillance-and-security-equipment-technologies-and-markets\";s:5:\"pages\";s:1:\"3\";s:6:\"rating\";s:1:\"0\";s:5:\"voter\";s:1:\"0\";}i:1;O:8:\"stdClass\":13:{s:2:\"id\";s:5:\"34502\";s:6:\"status\";s:8:\"verified\";s:11:\"author_name\";s:13:\"gordonbarbier\";s:9:\"author_id\";s:4:\"5371\";s:14:\"author_website\";s:0:\"\";s:5:\"title\";s:87:\"Financial Statement Analysis and Security Valuation Penman 4th Edition Solutions Manual\";s:11:\"description\";s:88:\"Financial Statement Analysis and Security Valuation Penman 4th Edition Solutions Manual\n\";s:5:\"thumb\";s:104:\"images/t/346/financial-statement-analysis-and-security-valuation-penman-4th-edition-solutions-manual.jpg\";s:6:\"thumb2\";s:105:\"images/t2/346/financial-statement-analysis-and-security-valuation-penman-4th-edition-solutions-manual.jpg\";s:9:\"permalink\";s:87:\"financial-statement-analysis-and-security-valuation-penman-4th-edition-solutions-manual\";s:5:\"pages\";s:2:\"51\";s:6:\"rating\";s:1:\"0\";s:5:\"voter\";s:1:\"0\";}i:2;O:8:\"stdClass\":13:{s:2:\"id\";s:5:\"35086\";s:6:\"status\";s:8:\"verified\";s:11:\"author_name\";s:14:\"georgesheslers\";s:9:\"author_id\";s:4:\"5521\";s:14:\"author_website\";s:0:\"\";s:5:\"title\";s:87:\"Financial Statement Analysis and Security Valuation Penman 4th Edition Solutions Manual\";s:11:\"description\";s:88:\"Financial Statement Analysis and Security Valuation Penman 4th Edition Solutions Manual\n\";s:5:\"thumb\";s:106:\"images/t/351/financial-statement-analysis-and-security-valuation-penman-4th-edition-solutions-manual-1.jpg\";s:6:\"thumb2\";s:107:\"images/t2/351/financial-statement-analysis-and-security-valuation-penman-4th-edition-solutions-manual-1.jpg\";s:9:\"permalink\";s:89:\"financial-statement-analysis-and-security-valuation-penman-4th-edition-solutions-manual-1\";s:5:\"pages\";s:2:\"51\";s:6:\"rating\";s:1:\"0\";s:5:\"voter\";s:1:\"0\";}i:3;O:8:\"stdClass\":13:{s:2:\"id\";s:5:\"37193\";s:6:\"status\";s:8:\"verified\";s:11:\"author_name\";s:14:\"georgesheslers\";s:9:\"author_id\";s:4:\"5521\";s:14:\"author_website\";s:0:\"\";s:5:\"title\";s:87:\"Financial Statement Analysis and Security Valuation Penman 4th Edition Solutions Manual\";s:11:\"description\";s:88:\"Financial Statement Analysis and Security Valuation Penman 4th Edition Solutions Manual\n\";s:5:\"thumb\";s:106:\"images/t/372/financial-statement-analysis-and-security-valuation-penman-4th-edition-solutions-manual-4.jpg\";s:6:\"thumb2\";s:107:\"images/t2/372/financial-statement-analysis-and-security-valuation-penman-4th-edition-solutions-manual-4.jpg\";s:9:\"permalink\";s:89:\"financial-statement-analysis-and-security-valuation-penman-4th-edition-solutions-manual-4\";s:5:\"pages\";s:2:\"51\";s:6:\"rating\";s:1:\"0\";s:5:\"voter\";s:1:\"0\";}i:4;O:8:\"stdClass\":13:{s:2:\"id\";s:5:\"38967\";s:6:\"status\";s:8:\"verified\";s:11:\"author_name\";s:14:\"georgesheslers\";s:9:\"author_id\";s:4:\"5521\";s:14:\"author_website\";s:0:\"\";s:5:\"title\";s:87:\"Financial Statement Analysis and Security Valuation Penman 4th Edition Solutions Manual\";s:11:\"description\";s:88:\"Financial Statement Analysis and Security Valuation Penman 4th Edition Solutions Manual\n\";s:5:\"thumb\";s:106:\"images/t/390/financial-statement-analysis-and-security-valuation-penman-4th-edition-solutions-manual-7.jpg\";s:6:\"thumb2\";s:107:\"images/t2/390/financial-statement-analysis-and-security-valuation-penman-4th-edition-solutions-manual-7.jpg\";s:9:\"permalink\";s:89:\"financial-statement-analysis-and-security-valuation-penman-4th-edition-solutions-manual-7\";s:5:\"pages\";s:2:\"51\";s:6:\"rating\";s:1:\"0\";s:5:\"voter\";s:1:\"0\";}i:5;O:8:\"stdClass\":13:{s:2:\"id\";s:5:\"40540\";s:6:\"status\";s:8:\"verified\";s:11:\"author_name\";s:14:\"georgesheslers\";s:9:\"author_id\";s:4:\"5521\";s:14:\"author_website\";s:0:\"\";s:5:\"title\";s:87:\"Financial Statement Analysis and Security Valuation Penman 4th Edition Solutions Manual\";s:11:\"description\";s:88:\"Financial Statement Analysis and Security Valuation Penman 4th Edition Solutions Manual\n\";s:5:\"thumb\";s:107:\"images/t/406/financial-statement-analysis-and-security-valuation-penman-4th-edition-solutions-manual-10.jpg\";s:6:\"thumb2\";s:108:\"images/t2/406/financial-statement-analysis-and-security-valuation-penman-4th-edition-solutions-manual-10.jpg\";s:9:\"permalink\";s:90:\"financial-statement-analysis-and-security-valuation-penman-4th-edition-solutions-manual-10\";s:5:\"pages\";s:2:\"51\";s:6:\"rating\";s:1:\"0\";s:5:\"voter\";s:1:\"0\";}i:6;O:8:\"stdClass\":13:{s:2:\"id\";s:5:\"44420\";s:6:\"status\";s:8:\"verified\";s:11:\"author_name\";s:14:\"georgesheslers\";s:9:\"author_id\";s:4:\"5521\";s:14:\"author_website\";s:0:\"\";s:5:\"title\";s:87:\"Financial Statement Analysis and Security Valuation Penman 4th Edition Solutions Manual\";s:11:\"description\";s:88:\"Financial Statement Analysis and Security Valuation Penman 4th Edition Solutions Manual\n\";s:5:\"thumb\";s:107:\"images/t/445/financial-statement-analysis-and-security-valuation-penman-4th-edition-solutions-manual-15.jpg\";s:6:\"thumb2\";s:108:\"images/t2/445/financial-statement-analysis-and-security-valuation-penman-4th-edition-solutions-manual-15.jpg\";s:9:\"permalink\";s:90:\"financial-statement-analysis-and-security-valuation-penman-4th-edition-solutions-manual-15\";s:5:\"pages\";s:2:\"51\";s:6:\"rating\";s:1:\"0\";s:5:\"voter\";s:1:\"0\";}i:7;O:8:\"stdClass\":13:{s:2:\"id\";s:5:\"45497\";s:6:\"status\";s:8:\"verified\";s:11:\"author_name\";s:14:\"georgesheslers\";s:9:\"author_id\";s:4:\"5521\";s:14:\"author_website\";s:0:\"\";s:5:\"title\";s:87:\"Financial Statement Analysis and Security Valuation Penman 4th Edition Solutions Manual\";s:11:\"description\";s:88:\"Financial Statement Analysis and Security Valuation Penman 4th Edition Solutions Manual\n\";s:5:\"thumb\";s:107:\"images/t/455/financial-statement-analysis-and-security-valuation-penman-4th-edition-solutions-manual-16.jpg\";s:6:\"thumb2\";s:108:\"images/t2/455/financial-statement-analysis-and-security-valuation-penman-4th-edition-solutions-manual-16.jpg\";s:9:\"permalink\";s:90:\"financial-statement-analysis-and-security-valuation-penman-4th-edition-solutions-manual-16\";s:5:\"pages\";s:2:\"51\";s:6:\"rating\";s:1:\"0\";s:5:\"voter\";s:1:\"0\";}i:8;O:8:\"stdClass\":13:{s:2:\"id\";s:6:\"252458\";s:6:\"status\";s:8:\"verified\";s:11:\"author_name\";s:15:\"charlesmartin17\";s:9:\"author_id\";s:5:\"79407\";s:14:\"author_website\";s:0:\"\";s:5:\"title\";s:45:\"Australia Defence and Security Report Q3 2012\";s:11:\"description\";s:437:\"BMI’s Australia Defence and Security report for Q312 examines the country’s strategic position in the\nPacific region and the wider world. It provides an overview of the contemporary geopolitical challenges\nfacing the country, and the challenges it may face in the future. The report examines the trends occurring in the country’s current and future defence procurement, and the order of battle across its armed forces. \";s:5:\"thumb\";s:63:\"images/t/2525/australia-defence-and-security-report-q3-2012.jpg\";s:6:\"thumb2\";s:64:\"images/t2/2525/australia-defence-and-security-report-q3-2012.jpg\";s:9:\"permalink\";s:45:\"australia-defence-and-security-report-q3-2012\";s:5:\"pages\";s:1:\"2\";s:6:\"rating\";s:1:\"0\";s:5:\"voter\";s:1:\"0\";}i:9;O:8:\"stdClass\":13:{s:2:\"id\";s:6:\"280130\";s:6:\"status\";s:8:\"verified\";s:11:\"author_name\";s:8:\"egestalt\";s:9:\"author_id\";s:5:\"28359\";s:14:\"author_website\";s:23:\"http://www.egestalt.com\";s:5:\"title\";s:36:\"IT Compliance and Security Solutions\";s:11:\"description\";s:370:\"Most people and organization’s conjecture, IT compliance and security to be all about security professionals and CIO’s deploying anti-malware, anti-spyware and firewall protection systems, to keep the information systems and critical data safe. The process also includes managing regulatory compliance requirements that governs the modern day IT landscape. \";s:5:\"thumb\";s:54:\"images/t/2802/it-compliance-and-security-solutions.jpg\";s:6:\"thumb2\";s:55:\"images/t2/2802/it-compliance-and-security-solutions.jpg\";s:9:\"permalink\";s:36:\"it-compliance-and-security-solutions\";s:5:\"pages\";s:1:\"2\";s:6:\"rating\";s:1:\"0\";s:5:\"voter\";s:1:\"0\";}}', `cache_on` = '2015-02-27 11:52:14' WHERE `aff_id` = '325829'