Product List
GET /services/catalog/products?format=api&page=74988
{ "links": { "first": "https://redshelf.com/services/catalog/products?format=api&page=1", "last": "https://redshelf.com/services/catalog/products?format=api&page=78443", "next": "https://redshelf.com/services/catalog/products?format=api&page=74989", "prev": "https://redshelf.com/services/catalog/products?format=api&page=74987" }, "data": [ { "type": "Product", "id": "00010000282075", "attributes": { "name": "E-discovery: Creating and Managing an Enterprisewide Program", "subtitle": "A Technical Guide to Digital Investigation and Litigation Support", "description": "One of the hottest topics in computer forensics today, electronic discovery (e-discovery) is the process by which parties involved in litigation respond to requests to produce electronically stored information (ESI). According to the 2007 Socha-Gelbmann Electronic Discovery Survey, it is now a $2 billion industry, a 60% increase from 2004, projected to double by 2009. The core reason for the explosion of e-discovery is sheer volume; evidence is digital and 75% of modern day lawsuits entail e-discovery.<br><br>A recent survey reports that U.S. companies face an average of 305 pending lawsuits internationally. For large U.S. companies ($1 billion or more in revenue)that number has soared to 556 on average, with an average of 50 new disputes emerging each year for nearly half of them. To properly manage the role of digital information in an investigative or legal setting, an enterprise--whether it is a Fortune 500 company, a small accounting firm or a vast government agency--must develop an effective electronic discovery program. Since the amendments to the Federal Rules of Civil Procedure, which took effect in December 2006, it is even more vital that the lifecycle of electronically stored information be understood and properly managed to avoid risks and costly mistakes.<br> <br>This books holds the keys to success for systems administrators, information security and other IT department personnel who are charged with aiding the e-discovery process. Comprehensive resource for corporate technologists, records managers, consultants, and legal team members to the e-discovery process, with information unavailable anywhere else Offers a detailed understanding of key industry trends, especially the Federal Rules of Civil Procedure, that are driving the adoption of e-discovery programs Includes vital project management metrics to help monitor workflow, gauge costs and speed the process", "author": "Karen A. Schuler", "slug": "e-discovery-creating-and-managing-an-enterprisewide-program-282075-9780080949178-karen-a-schuler", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080949178.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "282075", "product_url": "/app/ecom/book/282075/e-discovery-creating-and-managing-an-enterprisewide-program-282075-9780080949178-karen-a-schuler", "bisac_codes": [ "COM053000", "COM060040" ], "items_count": null, "identifiers": { "ISBN13": "9781597492966", "EISBN13": "9780080949178", "EISBN10": "0080949177" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026347365" } } } }, { "type": "Product", "id": "00010000282074", "attributes": { "name": "Mobile Malware Attacks and Defense", "subtitle": "", "description": "Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new devices like the iPhone. Examining code in past, current, and future risks, protect your banking, auctioning, and other activities performed on mobile devices.<br><br>* Visual Payloads<br>View attacks as visible to the end user, including notation of variants.<br><br>* Timeline of Mobile Hoaxes and Threats<br>Understand the history of major attacks and horizon for emerging threates.<br><br>* Overview of Mobile Malware Families<br>Identify and understand groups of mobile malicious code and their variations.<br><br>* Taxonomy of Mobile Malware<br>Bring order to known samples based on infection, distribution, and payload strategies.<br><br>* Phishing, SMishing, and Vishing Attacks<br>Detect and mitigate phone-based phishing (vishing) and SMS phishing (SMishing) techniques.<br><br>* Operating System and Device Vulnerabilities<br>Analyze unique OS security issues and examine offensive mobile device threats.<br><br>* Analyze Mobile Malware<br>Design a sandbox for dynamic software analysis and use MobileSandbox to analyze mobile malware.<br><br>* Forensic Analysis of Mobile Malware<br>Conduct forensic analysis of mobile devices and learn key differences in mobile forensics.<br><br>* Debugging and Disassembling Mobile Malware<br>Use IDA and other tools to reverse-engineer samples of malicious code for analysis.<br><br>* Mobile Malware Mitigation Measures<br>Qualify risk, understand threats to mobile assets, defend against attacks, and remediate incidents. Understand the History and Threat Landscape of Rapidly Emerging Mobile Attacks Analyze Mobile Device/Platform Vulnerabilities and Exploits Mitigate Current and Future Mobile Malware Threats", "author": "Ken Dunham", "slug": "mobile-malware-attacks-and-defense-282074-9780080949192-ken-dunham", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080949192.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "282074", "product_url": "/app/ecom/book/282074/mobile-malware-attacks-and-defense-282074-9780080949192-ken-dunham", "bisac_codes": [ "COM053000", "COM014000" ], "items_count": null, "identifiers": { "ISBN13": "9781597492980", "EISBN13": "9780080949192", "EISBN10": "0080949193" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026348300" } } } }, { "type": "Product", "id": "00010000282073", "attributes": { "name": "Nokia Firewall, VPN, and IPSO Configuration Guide", "subtitle": "", "description": "\"While Nokia is perhaps most recognized for its leadership in the mobile phone market, they have successfully demonstrated their knowledge of the Internet security appliance market and its customers requirements.\"<br>--Chris Christiansen, Vice President, Internet Infrastructure and Security Software, IDC.<br><br>Syngress has a long history of publishing market-leading books for system administrators and security professionals on commercial security products, particularly Firewall and Virtual Private Network (VPN) appliances from Cisco, Check Point, Juniper, SonicWall, and Nokia (see related titles for sales histories). The Nokia Firewall, VPN, and IPSO Configuration Guide will be the only book on the market covering the all-new Nokia Firewall/VPN Appliance suite. Nokia Firewall/VPN appliances are designed to protect and extend the network perimeter.<br><br>According to IDC research, Nokia Firewall/VPN Appliances hold the #3 worldwide market-share position in this space behind Cisco and Juniper/NetScreen. IDC estimated the total Firewall/VPN market at $6 billion in 2007, and Nokia owns 6.6% of this market. Nokia's primary customers for security appliances are Mid-size to Large enterprises who need site-to-site connectivity and Mid-size to Large enterprises who need remote access connectivity through enterprise-deployed mobile devices. Nokia appliances for this market are priced form $1,000 for the simplest devices (Nokia IP60) up to $60,0000 for large enterprise- and service-provider class devices (like the Nokia IP2450 released in Q4 2007). While the feature set of such a broad product range obviously varies greatly, all of the appliances run on the same operating system: Nokia IPSO (IPSO refers to Ipsilon Networks, a company specializing in IP switching acquired by Nokia in 1997. The definition of the acronym has little to no meaning for customers.) As a result of this common operating system across the product line, The Nokia Firewall, VPN, and IPSO Configuration Guide will be an essential reference to users of any of these products. Users manage the Nokia IPSO (which is a Linux variant, specifically designed for these appliances) through a Web interface called Nokia Network Voyager or via a powerful Command Line Interface (CLI). Coverage within the book becomes increasingly complex relative to the product line.<br><br>The Nokia Firewall, VPN, and IPSO Configuration Guide and companion Web site will provide seasoned network administrators and security professionals with the in-depth coverage and step-by-step walkthroughs they require to properly secure their network perimeters and ensure safe connectivity for remote users. The book contains special chapters devoted to mastering the complex Nokia IPSO command line, as well as tips and tricks for taking advantage of the new \"ease of use\" features in the Nokia Network Voyager Web interface. In addition, the companion Web site offers downloadable video walkthroughs on various installation and troubleshooting tips from the authors. Only book on the market covering Nokia Firewall/VPN appliances, which hold 6.6% of a $6 billion market Companion website offers video walkthroughs on various installation and troubleshooting tips from the authors Special chapters detail mastering the complex Nokia IPSO command line, as well as tips and tricks for taking advantage of the new \"ease of use\" features in the Nokia Network Voyager Web interface", "author": "Andrew Hay, Keli Hay, Peter Giannoulis", "slug": "nokia-firewall-vpn-and-ipso-configuration-guide-282073-9780080949161-andrew-hay-keli-hay-peter-giannoulis", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080949161.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "282073", "product_url": "/app/ecom/book/282073/nokia-firewall-vpn-and-ipso-configuration-guide-282073-9780080949161-andrew-hay-keli-hay-peter-giannoulis", "bisac_codes": [ "COM053000", "COM060040" ], "items_count": null, "identifiers": { "ISBN13": "9781597492867", "EISBN13": "9780080949161", "EISBN10": "0080949169" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026347399" } } } }, { "type": "Product", "id": "00010000282072", "attributes": { "name": "GFI Network Security and PCI Compliance Power Tools", "subtitle": "", "description": "Today all companies, U.S. federal agencies, and non-profit organizations have valuable data on their servers that needs to be secured. One of the challenges for IT experts is learning how to use new products in a time-efficient manner, so that new implementations can go quickly and smoothly. Learning how to set up sophisticated products is time-consuming, and can be confusing. GFI's LANguard Network Security Scanner reports vulnerabilities so that they can be mitigated before unauthorized intruders can wreck havoc on your network. To take advantage of the best things that GFI's LANguard Network Security Scanner has to offer, you'll want to configure it on your network so that it captures key events and alerts you to potential vulnerabilities before they are exploited.<br><br>In this book Brien Posey has pinpointed the most important concepts with examples and screenshots so that systems administrators and security engineers can understand how to get the GFI security tools working quickly and effectively. His straightforward, no nonsense writing style is devoid of difficult to understand technical jargon. His descriptive examples explain how GFI's security tools enhance the security controls that are already built into your server's operating system.<br><br>* Secure Your Network Master the various components that make up the management console and prepare to use it for most tasks.<br><br>* Analyze Scan Results View detected vulnerabilities, save and print results, query open ports, and filter your results.<br><br>* Install and Use the ReportPack Learn how to build custom reports and schedule reports. See how filters allow you to control the information that is processed when a reports is run.<br><br>* Perform a Hardware Inventory and Compile a Software Inventory Use GFI to do your inventories and perform audits. See how to blacklist and whitelist applications to make your reports more meaningful.<br><br>* Manage Patches Effectively See how to deploy a specific patch, perform a scan comparison, uninstall a patch, and deploy custom software.<br><br>* Use GFI EndPointSecurity to Lock Down Hardware Be prepared for users trying to install unauthorized software, copy sensitive data onto removable media, or perform other actions to try and circumvent your network's security.<br><br>* Create Protection Policies Control the level of device access allowed on a system and create separate protection policies; one for servers, one for workstations, and one for laptops. Learn how to deploy agents.<br><br>* Regulate Specific Devices Master some of the advanced features of GFI: locking device categories, blacklisting and whitelisting devices, and using file type restrictions.<br><br>* Monitor Device Usage Keep tabs on your network by setting logging options, setting alerting options, and generating end point security reports. Use GFI EndPointSecurity to Lock Down Hardware Create Protection Policies to Control the Level of Device Access Master Advanced Features of GFI: Locking Device Categories, Blacklisting and Whitelisting Devices, Using File Type Restrictions and More", "author": "Brien Posey", "slug": "gfi-network-security-and-pci-compliance-power-tools-282072-9780080949154-brien-posey", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080949154.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "282072", "product_url": "/app/ecom/book/282072/gfi-network-security-and-pci-compliance-power-tools-282072-9780080949154-brien-posey", "bisac_codes": [ "COM053000", "COM060040" ], "items_count": null, "identifiers": { "ISBN13": "9781597492850", "EISBN13": "9780080949154", "EISBN10": "0080949150" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026367107" } } } }, { "type": "Product", "id": "00010000282071", "attributes": { "name": "Pattern Recognition", "subtitle": "", "description": "This book considers classical and current theory and practice, of supervised, unsupervised and semi-supervised pattern recognition, to build a complete background for professionals and students of engineering. The authors, leading experts in the field of pattern recognition, have provided an up-to-date, self-contained volume encapsulating this wide spectrum of information. The very latest methods are incorporated in this edition: semi-supervised learning, combining clustering algorithms, and relevance feedback. <br><br> Thoroughly developed to include many more worked examples to give greater understanding of the various methods and techniques<br> Many more diagrams included--now in two color--to provide greater insight through visual presentation<br> Matlab code of the most common methods are given at the end of each chapter.<br> More Matlab code is available, together with an accompanying manual, via this site <br> Latest hot topics included to further the reference value of the text including non-linear dimensionality reduction techniques, relevance feedback, semi-supervised learning, spectral clustering, combining clustering algorithms.<br> An accompanying book with Matlab code of the most common methods and algorithms in the book, together with a descriptive summary, and solved examples including real-life data sets in imaging, and audio recognition. The companion book will be available separately or at a special packaged price (ISBN: 9780123744869). Thoroughly developed to include many more worked examples to give greater understanding of the various methods and techniques Many more diagrams included--now in two color--to provide greater insight through visual presentation Matlab code of the most common methods are given at the end of each chapter An accompanying book with Matlab code of the most common methods and algorithms in the book, together with a descriptive summary and solved examples, and including real-life data sets in imaging and audio recognition. The companion book is available separately or at a special packaged price (Book ISBN: 9780123744869. Package ISBN: 9780123744913) Latest hot topics included to further the reference value of the text including non-linear dimensionality reduction techniques, relevance feedback, semi-supervised learning, spectral clustering, combining clustering algorithms Solutions manual, powerpoint slides, and additional resources are available to faculty using the text for their course. Register at www.textbooks.elsevier.com and search on \"Theodoridis\" to access resources for instructor", "author": "Konstantinos Koutroumbas, Sergios Theodoridis", "slug": "pattern-recognition-282071-9780080949123-konstantinos-koutroumbas-sergios-theodoridis", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080949123.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "282071", "product_url": "/app/ecom/book/282071/pattern-recognition-282071-9780080949123-konstantinos-koutroumbas-sergios-theodoridis", "bisac_codes": [ "TEC007000", "TEC041000" ], "items_count": null, "identifiers": { "ISBN13": "9781597492720", "EISBN13": "9780080949123", "EISBN10": "0080949126" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026347092" } } } }, { "type": "Product", "id": "00010000282070", "attributes": { "name": "How to Build a Digital Library", "subtitle": "", "description": "<p>How to Build a Digital Library reviews knowledge and tools to construct and maintain a digital library, regardless of the size or purpose. A resource for individuals, agencies, and institutions wishing to put this powerful tool to work in their burgeoning information treasuries.</p> <p>The Second Edition reflects developments in the field as well as in the Greenstone Digital Library open source software. In Part I, the authors have added an entire new chapter on user groups, user support, collaborative browsing, user contributions, and so on. There is also new material on content-based queries, map-based queries, cross-media queries. There is an increased emphasis placed on multimedia by adding a \"digitizing\" section to each major media type. A new chapter has also been added on \"internationalization,\" which will address Unicode standards, multi-language interfaces and collections, and issues with non-European languages (Chinese, Hindi, etc.). </p> <p>Part II, the software tools section, has been completely rewritten to reflect the new developments in Greenstone Digital Library Software, an internationally popular open source software tool with a comprehensive graphical facility for creating and maintaining digital libraries.</p> Outlines the history of libraries on both traditional and digital Written for both technical and non-technical audiences and covers the entire spectrum of media, including text, images, audio, video, and related XML standards Web-enhanced with software documentation, color illustrations, full-text index, source code, and more", "author": "Ian H. Witten, David Bainbridge, David M. Nichols", "slug": "how-to-build-a-digital-library-282070-9780080890395-ian-h-witten-david-bainbridge-david-m-nichols", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080890395.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "282070", "product_url": "/app/ecom/book/282070/how-to-build-a-digital-library-282070-9780080890395-ian-h-witten-david-bainbridge-david-m-nichols", "bisac_codes": [ "COM021000", "COM030000" ], "items_count": null, "identifiers": { "ISBN13": "9780123748577", "EISBN13": "9780080890395", "EISBN10": "0080890393" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026347217" } } } }, { "type": "Product", "id": "00010000282069", "attributes": { "name": "The Handbook of Global User Research", "subtitle": "", "description": "User research is global yet despite its pervasiveness, practitioners are not all well equipped to work globally. What may have worked in Nigeria may not be accepted in Russia, may be done differently in Brazil, may partly work in China, and may completely fail in Kuwait. And what often goes less noticed, but can be equally vexing are technical, logistical and planning issues such as hiring qualified translators, payment procedures, travel issues, setting up facilities and finding test participants.The Handbook of Global User Research is the first book to focus on global user research. The book collects insight from UX professionals from nine countries and, following a typical project timeline, presents practical insights into the preparation, fieldwork, analysis and reporting, and overall project management for global user research projects. Any user experience professional that works on global projects -- including those new to the field, UX veterans who need information on this expanding aspect of user research, and students -- will need this book to do their job effectively. Presents the definitive collection of hard won lessons from user research professionals around the world Includes real-world examples of global user research challenges and provides approaches to these issues Contains anecdotes and hard-won from the field that illustrate actionable tactics for practitioners", "author": "Robert Schumacher", "slug": "the-handbook-of-global-user-research-282069-9780080889726-robert-schumacher", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080889726.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "282069", "product_url": "/app/ecom/book/282069/the-handbook-of-global-user-research-282069-9780080889726-robert-schumacher", "bisac_codes": [ "COM014000", "COM070000" ], "items_count": null, "identifiers": { "ISBN13": "9780123748522", "EISBN13": "9780080889726", "EISBN10": "0080889727" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026347285" } } } }, { "type": "Product", "id": "00010000282068", "attributes": { "name": "Generating Electricity in a Carbon-Constrained World", "subtitle": "", "description": "<p>The electric power sector is what keeps modern economies going, and historically, fossil fuels provided the bulk of the energy need to generate electricity, with coal a dominant player in many parts of the world. Now with growing concerns about global climate change, this historical dependence on fossil-fuels, especially those rich in carbon, are being questioned. Examining the implications of the industry's future in a carbon-constrained world, a distinct reality, is the subject of this book.</p> <p>Containing contributions from renowned scholars and academics from around the world, this book explores the various energy production options available to power companies in a carbon-constrained world. The three part treatment starts with a clear and rigorous exposition of the short term options including Clean Coal and Carbon Capture and Sequestration Technology, Coal, and Emission trading. Renewable energy options such as Nuclear Energy, Wind power, Solar power, Hydro-electric, and Geothermal energy are clearly explained along with their trade-offs and uncertainties inherent in evaluating and choosing different energy options and provides a framework for assessing policy solutions.</p> <p>This is followed by self-contained chapters of case-studies from all over the world. Other topics discussed in the book are Creating markets for tradable permits in the emerging carbon era, Global Action on Climate Change, The Impossibility of Staunching World CO2 Emissions and Energy efficiency.</p> Clearly explains short term and long term options Contributions from renowned scholars and academics from around the world Case-studies from all over the world", "author": "Fereidoon Sioshansi", "slug": "generating-electricity-in-a-carbon-constrained-world-282068-9780080889719", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080889719.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "282068", "product_url": "/app/ecom/book/282068/generating-electricity-in-a-carbon-constrained-world-282068-9780080889719", "bisac_codes": [ "TEC031000", "SCI024000" ], "items_count": null, "identifiers": { "ISBN13": "9781856176552", "EISBN13": "9780080889719", "EISBN10": "0080889719" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026370413" } } } }, { "type": "Product", "id": "00010000282067", "attributes": { "name": "The Real MCTS/MCITP Exam 70-620 Prep Kit", "subtitle": "Independent and Complete Self-Paced Solutions", "description": "This exam is designed to validate proficieny supporting Windows Vista client. This exam will fulfill the Windows Vista Technology Specialist requirements of Exam 70-620.<br><br>The Microsoft Certified Technology Specialist (MCTS) on Windows Vista credential is intended for information technology (IT) professionals who work in the complex computing environment of medium to large companies. The MCTS candidate should have at least one year of experience in Tier 1 or Tier 2 phone support in an upper midsize organization or enterprise environment.<br> <br>MCTS candidates should have experience resolving issues concerning network connectivity, desktop operating systems, security, and applications. Their experience should also include addressing logon problems, performing password resets, and resolving most issues with desktop applications. Designed to help study for and pass this important MCTS exam on the Vista operating system on the way to MCITP status Targeted to newcomers to Microsoft certification AND people who wish to upgrade their Windows 2003 MCSE/MCSA THE independent source of exam day tips, techniques, and warnings not available from Microsoft Comprehensive study guide guarantees 100% coverage of all Microsoft's exam objectives Interactive FastTrack e-learning modules help simplify difficult exam topics Two full-function ExamDay practice exams guarantee double coverage of all exam objectives Free download of audio FastTracks for use with iPods or other MP3 players 1000 page \"DRILL DOWN\" reference for comprehensive topic review", "author": "Anthony Piltzecker", "slug": "the-real-mctsmcitp-exam-70-620-prep-kit-282067-9780080949093-anthony-piltzecker", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080949093.png", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "282067", "product_url": "/app/ecom/book/282067/the-real-mctsmcitp-exam-70-620-prep-kit-282067-9780080949093-anthony-piltzecker", "bisac_codes": [ "COM043000", "COM046000" ], "items_count": null, "identifiers": { "ISBN13": "9781597492331", "EISBN13": "9780080949093", "EISBN10": "0080949096" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026347621" } } } }, { "type": "Product", "id": "00010000282066", "attributes": { "name": "Smart Buildings Systems for Architects, Owners and Builders", "subtitle": "", "description": "<p>Smart Buildings Systems for Architects, Owners and Builders is a practical guide and resource for architects, builders, engineers, facility managers, developers, contractors, and design consultants. The book covers the costs and benefits of smart buildings, and the basic design foundations, technology systems, and management systems encompassed within a smart building. Unlike other resources, Smart Buildings is organized to provide an overview of each of the technology systems in a building, and to indicate where each of these systems is in their migration to and utilization of the standard underpinnings of a smart building.</p> <p>Written for any professional interested in designing or building smart Buildings systems, this book provides you with the fundamentals needed to select and utilize the most up to date technologies to serve your purpose. In this book, you'll find simple to follow illustrations and diagrams, detailed explanations of systems and how they work and their draw backs. Case studies are used to provide examples of systems and the common problems encountered during instillation. Some simple Repair and Trouble shooting tips are also included. After reading this book, builders, architects and owners will have a solid understanding of how these systems work which of these system is right for their project. Concise and easy to understand, the book will also provide a common language for ensure understanding across the board. Thereby, eliminating confusion and creating a common understanding among professionals.</p> Ethernet, TCP/IP protocols, SQL datebases, standard fiber optic Data Networks and Voice Networks Fire Alarm Systems, Access Control Systems and Video Surveillance Systems Heating, Ventilating and Air Conditioning Systems and Electric Power Management Systems, Lighting Control Systems Facility Management Systems", "author": "James M Sinopoli", "slug": "smart-buildings-systems-for-architects-owners-and-builders-282066-9780080889696-james-m-sinopoli", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080889696.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "282066", "product_url": "/app/ecom/book/282066/smart-buildings-systems-for-architects-owners-and-builders-282066-9780080889696-james-m-sinopoli", "bisac_codes": [ "TEC005000", "TEC009060" ], "items_count": null, "identifiers": { "ISBN13": "9781856176538", "EISBN13": "9780080889696", "EISBN10": "0080889697" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026350743" } } } }, { "type": "Product", "id": "00010000282065", "attributes": { "name": "Electrical Safety Code Manual", "subtitle": "A Plain Language Guide to National Electrical Code, OSHA and NFPA 70E", "description": "<p>Safety in any workplace is extremely important. In the case of the electrical industry, safety is critical and the codes and regulations which determine safe practices are both diverse and complicated. Employers, electricians, electrical system designers, inspectors, engineers and architects must comply with safety standards listed in the National Electrical Code, OSHA and NFPA 70E. Unfortunately, the publications which list these safety requirements are written in very technically advanced terms and the average person has an extremely difficult time understanding exactly what they need to do to ensure safe installations and working environments.</p> <p>Electrical Safety Code Manual will tie together the various regulations and practices for electrical safety and translate these complicated standards into easy to understand terms. This will result in a publication that is a practical, if not essential, asset to not only designers and company owners but to the electricians who must put compliance requirements into action in the field.</p> Best-practice methods for accident prevention and electrical hazard avoidance Current safety regulations, including new standards from OSHA, NEC, NESC, and NFPA Information on low-, medium-, and high-voltage safety systems Step-by-step guidelines on safety audits Training program how-to's, from setup to rescue and first aid procedures", "author": "Kimberley Keller", "slug": "electrical-safety-code-manual-282065-9780080889702-kimberley-keller", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080889702.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "282065", "product_url": "/app/ecom/book/282065/electrical-safety-code-manual-282065-9780080889702-kimberley-keller", "bisac_codes": [ "TEC005000", "TEC007000" ], "items_count": null, "identifiers": { "ISBN13": "9781856176545", "EISBN13": "9780080889702", "EISBN10": "0080889700" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026357203" } } } }, { "type": "Product", "id": "00010000282063", "attributes": { "name": "SAE and the Evolved Packet Core", "subtitle": "Driving the Mobile Broadband Revolution", "description": "<p>This book provides a clear, concise, complete and authoritative introduction to System Architecture Evolution (SAE) standardization work and its main outcome: the Evolved Packet Core (EPC), including potential services and operational scenarios. After providing an insightful overview of SAEs historical development, the book gives detailed explanations of the EPC architecture and key concepts as an introduction. In-depth technical descriptions of EPC follow, including thorough functional accounts of the different components of EPC, protocols, network entities and procedures. Case studies of deployment scenarios show how the functions described within EPC are placed within a live network context, while a description of the services that are predicted to be used shows what EPC as a core network can enable.</p> <p>This book is an essential resource for professionals and students who need to understand the latest developments in SAE and EPC, the 'engine' that connects broadband access to the internet.</p> <p>All of the authors have from their positions with Ericsson been actively involved in GPRS, SAE and 3GPP from a business and technical perspective for many years. Several of the authors have also been actively driving the standardization efforts within 3GPP.</p> <p>\"There is no doubt that this book, which appears just when the mobile industry starts its transition away from legacy GSM/GPRS and UMTS networks into the future will become the reference work on SAE/LTE. There are no better qualified persons than the authors of this book to provide both communication professionals and an interested general public with insights into the inner workings of SAE/LTE. Not only are they associated with one of the largest mobile network equipment vendors in the world, they have all actively contributed to and, in some cases, been the driving forces behind the development of SAE/LTE within 3GPP.\" - from the foreword by Dr. Ulf Nilsson, TeliaSonera R&D;, Mobility Core and Connectivity</p> <p>\"The authors have done an excellent job in writing this book. Their familiarity with the requirements, concepts and solution alternatives, as well as the standardization work allows them to present the material in a way that provides easy communication between Architecture and Standards groups and Planning/ Operational groups within service provider organizations.\" - from the foreword by Dr. Kalyani Bogineni, Principal Architect, Verizon</p> Up-to-date coverage of SAE including the latest standards development Easily accessible overview of the architecture and concepts defined by SAE Thorough description of the Evolved Packet Core for LTE, fixed and other wireless accesses Comprehensive explanation of SAE key concepts, security and Quality-of-Service Covers potential service and operator scenarios including interworking with existing 3GPP and 3GPP2 systems Detailed walkthrough of network entities, protocols and procedures Written by established experts in the SAE standardization process, all of whom have extensive experience and understanding of its goals, history and vision", "author": "Magnus Olsson, Catherine Mulligan, Stefan Rommer, Shabnam Sultana, Lars Frid", "slug": "sae-and-the-evolved-packet-core-282063-9780080888705-magnus-olsson-catherine-mulligan-stefan-rommer-shabnam-sultana-lars-frid", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080888705.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "282063", "product_url": "/app/ecom/book/282063/sae-and-the-evolved-packet-core-282063-9780080888705-magnus-olsson-catherine-mulligan-stefan-rommer-shabnam-sultana-lars-frid", "bisac_codes": [ "TEC041000", "TEC008070" ], "items_count": null, "identifiers": { "ISBN13": "9780123748263", "EISBN13": "9780080888705", "EISBN10": "0080888704" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026350391" } } } }, { "type": "Product", "id": "00010000282062", "attributes": { "name": "Advances in Planar Lipid Bilayers and Liposomes", "subtitle": "", "description": "Advances in Planar Lipid Bilayers and Liposomes, Volume 9, continues to include invited chapters on a broad range of topics, covering both main arrangements of the reconstituted system, namely planar lipid bilayers and spherical liposomes. The invited authors present the latest results in this exciting multidisciplinary field of their own research group. Many of the contributors working in both fields over many decades were in close collaboration with the late Prof. H. Ti Tien, the founding editor of this book series. There are also chapters written by some of the younger generation of scientists included in this series. This volume keeps in mind the broader goal with both systems, planar lipid bilayers and spherical liposomes, which is the further development of this interdisciplinary field worldwide. Incorporates contributions from newcomers and established and experienced researchers Explores the planar lipid bilayer systems and spherical liposomes from both theoretical and experimental perspectives Serves as an indispensable source of information for new scientists", "author": "A. Leitmannova Liu", "slug": "advances-in-planar-lipid-bilayers-and-liposomes-282062-9780080888651", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080888651.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "282062", "product_url": "/app/ecom/book/282062/advances-in-planar-lipid-bilayers-and-liposomes-282062-9780080888651", "bisac_codes": [ "SCI013000", "TEC021000" ], "items_count": null, "identifiers": { "ISBN13": "9780123748225", "EISBN13": "9780080888651", "EISBN10": "0080888658" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026355985" } } } }, { "type": "Product", "id": "00010000282061", "attributes": { "name": "Multimodal Signal Processing", "subtitle": "Theory and Applications for Human-Computer Interaction", "description": "<p>Multimodal signal processing is an important research and development field that processes signals and combines information from a variety of modalities speech, vision, language, text which significantly enhance the understanding, modelling, and performance of human-computer interaction devices or systems enhancing human-human communication. The overarching theme of this book is the application of signal processing and statistical machine learning techniques to problems arising in this multi-disciplinary field. It describes the capabilities and limitations of current technologies, and discusses the technical challenges that must be overcome to develop efficient and user-friendly multimodal interactive systems. </p> <p>With contributions from the leading experts in the field, the present book should serve as a reference in multimodal signal processing for signal processing researchers, graduate students, R&D; engineers, and computer engineers who are interested in this emerging field.</p> Presents state-of-art methods for multimodal signal processing, analysis, and modeling Contains numerous examples of systems with different modalities combined Describes advanced applications in multimodal Human-Computer Interaction (HCI) as well as in computer-based analysis and modelling of multimodal human-human communication scenes.", "author": "Jean-Philippe Thiran, Ferran Marqués, Hervé Bourlard", "slug": "multimodal-signal-processing-282061-9780080888699", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080888699.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "282061", "product_url": "/app/ecom/book/282061/multimodal-signal-processing-282061-9780080888699", "bisac_codes": [ "COM018000", "TEC007000" ], "items_count": null, "identifiers": { "ISBN13": "9780123748256", "EISBN13": "9780080888699", "EISBN10": "0080888690" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026354367" } } } }, { "type": "Product", "id": "00010000282060", "attributes": { "name": "Advances in Applied Mechanics", "subtitle": "", "description": "The Advances in Applied Mechanics book series draws together recent significant advances in various topics in applied mechanics. Published since 1948, Advances in Applied Mechanics aims to provide authoritative review articles on topics in the mechanical sciences, primarily of interest to scientists and engineers working in the various branches of mechanics, but also of interest to the many who use the results of investigations in mechanics in various application areas, such as aerospace, chemical, civil, environmental, mechanical and nuclear engineering. Covers all fields of the mechanical sciences Highlights classical and modern areas of mechanics that are ready for review Provides comprehensive coverage of the field in question", "author": "Erik van der Giessen, Hassan Aref", "slug": "advances-in-applied-mechanics-282060-9780080888569", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080888569.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "282060", "product_url": "/app/ecom/book/282060/advances-in-applied-mechanics-282060-9780080888569", "bisac_codes": [ "SCI055000", "SCI003000" ], "items_count": null, "identifiers": { "ISBN13": "9780123748133", "EISBN13": "9780080888569", "EISBN10": "0080888569" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026362796" } } } }, { "type": "Product", "id": "00010000282059", "attributes": { "name": "The Student's Guide to VHDL", "subtitle": "", "description": "The Student's Guide to VHDL is a condensed edition of The Designer's Guide to VHDL, the most widely used textbook on VHDL for digital system modeling. The Student's Guide is targeted as a supplemental reference book for computer organization and digital design courses.Since publication of the first edition of The Student's Guide, the IEEE VHDL and related standards have been revised. The Designer's Guide has been revised to reflect the changes, so it is appropriate that The Student's Guide also be revised. In The Student's Guide to VHDL, 2nd Edition, we have included a design case study illustrating an FPGA-based design flow. The aim is to show how VHDL modeling fits into a design flow, starting from high-level design and proceeding through detailed design and verification, synthesis, FPGA place and route, and final timing verification. Inclusion of the case study helps to better serve the educational market. Currently, most college courses do not formally address the details of design flow. Students may be given informal guidance on how to proceed with lab projects. In many cases, it is left to students to work it out for themselves. The case study in The Student's Guide provides a reference design flow that can be adapted to a variety of lab projects.", "author": "Peter J. Ashenden", "slug": "the-students-guide-to-vhdl-282059-9780080948553-peter-j-ashenden", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080948553.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "282059", "product_url": "/app/ecom/book/282059/the-students-guide-to-vhdl-282059-9780080948553-peter-j-ashenden", "bisac_codes": [ "COM011000", "077" ], "items_count": null, "identifiers": { "ISBN13": "9781558608658", "EISBN13": "9780080948553", "EISBN10": "0080948553" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026356749" } } } }, { "type": "Product", "id": "00010000282058", "attributes": { "name": "Forms that Work", "subtitle": "Designing Web Forms for Usability", "description": "<p>Forms that Work: Designing Web Forms for Usability clearly explains exactly how to design great forms for the web. The book provides proven and practical advice that will help you avoid pitfalls, and produce forms that are aesthetically pleasing, efficient and cost-effective. It features invaluable design methods, tips, and tricks to help ensure accurate data and satisfied customers. It includes dozens of examples - from nitty-gritty details (label alignment, mandatory fields) to visual designs (creating good grids, use of color).</p> <p>This book isnt just about colons and choosing the right widgets. Its about the whole process of making good forms, which has a lot more to do with making sure youre asking the right questions in a way that your users can answer than it does with whether you use a drop-down list or radio buttons. In an easy-to-read format with lots of examples, the authors present their three-layer model - relationship, conversation, appearance. You need all three for a successful form - a form that looks good, flows well, asks the right questions in the right way, and, most important of all, gets people to fill it out. Liberally illustrated with full-color examples, this book guides readers on how to define requirements, how to write questions that users will understand and want to answer, and how to deal with instructions, progress indicators and errors.</p> <p>This book is essential reading for HCI professionals, web designers, software developers, user interface designers, HCI academics and students, market research professionals, and financial professionals.</p>*Provides proven and practical advice that will help you avoid pitfalls, and produce forms that are aesthetically pleasing, efficient and cost-effective. *Features invaluable design methods, tips, and tricks to help ensure accurate data and satisfied customers. *Includes dozens of examples -- from nitty-gritty details (label alignment, mandatory fields) to visual designs (creating good grids, use of color).*Foreword by Steve Krug, author of the best selling Don't Make Me Think!", "author": "Caroline Jarrett, Gerry Gaffney, Steve Krug", "slug": "forms-that-work-282058-9780080948485-caroline-jarrett-gerry-gaffney", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080948485.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "282058", "product_url": "/app/ecom/book/282058/forms-that-work-282058-9780080948485-caroline-jarrett-gerry-gaffney", "bisac_codes": [ "COM079010" ], "items_count": null, "identifiers": { "ISBN13": "9781558607101", "EISBN13": "9780080948485", "EISBN10": "0080948480" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026356730" } } } }, { "type": "Product", "id": "00010000282057", "attributes": { "name": "Artificial Intelligence: A New Synthesis", "subtitle": "", "description": "Intelligent agents are employed as the central characters in this introductory text. Beginning with elementary reactive agents, Nilsson gradually increases their cognitive horsepower to illustrate the most important and lasting ideas in AI. Neural networks, genetic programming, computer vision, heuristic search, knowledge representation and reasoning, Bayes networks, planning, and language understanding are each revealed through the growing capabilities of these agents. A distinguishing feature of this text is in its evolutionary approach to the study of AI. This book provides a refreshing and motivating synthesis of the field by one of AI's master expositors and leading researches. An evolutionary approach provides a unifying theme Thorough coverage of important AI ideas, old and new Frequent use of examples and illustrative diagrams Extensive coverage of machine learning methods throughout the text Citations to over 500 references Comprehensive index", "author": "Nils J. Nilsson", "slug": "artificial-intelligence-a-new-synthesis-282057-9780080948348-nils-j-nilsson", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080948348.png", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "282057", "product_url": "/app/ecom/book/282057/artificial-intelligence-a-new-synthesis-282057-9780080948348-nils-j-nilsson", "bisac_codes": [ "COM004000", "077" ], "items_count": null, "identifiers": { "ISBN13": "9781558605350", "EISBN13": "9780080948348", "EISBN10": "0080948340" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026365454" } } } }, { "type": "Product", "id": "00010000282056", "attributes": { "name": "Principles of Transaction Processing", "subtitle": "", "description": "Principles of Transaction Processing is a comprehensive guide to developing applications, designing systems, and evaluating engineering products. The book provides detailed discussions of the internal workings of transaction processing systems, and it discusses how these systems work and how best to utilize them. It covers the architecture of Web Application Servers and transactional communication paradigms.The book is divided into 11 chapters, which cover the following: Overview of transaction processing application and system structureSoftware abstractions found in transaction processing systemsArchitecture of multitier applications and the functions of transactional middleware and database serversQueued transaction processing and its internals, with IBM's Websphere MQ and Oracle's Stream AQ as examplesBusiness process management and its mechanismsDescription of the two-phase locking function, B-tree locking and multigranularity locking used in SQL database systems and nested transaction lockingSystem recovery and its failuresTwo-phase commit protocolComparison between the tradeoffs of replicating servers versus replication resourcesTransactional middleware products and standardsFuture trends, such as cloud computing platforms, composing scalable systems using distributed computing components, the use of flash storage to replace disks and data streams from sensor devices as a source of transaction requests. The text meets the needs of systems professionals, such as IT application programmers who construct TP applications, application analysts, and product developers. The book will also be invaluable to students and novices in application programming. Complete revision of the classic \"non mathematical\" transaction processing reference for systems professionals Updated to focus on the needs of transaction processing via the Internet-- the main focus of business data processing investments, via web application servers, SOA, and important new TP standards Retains the practical, non-mathematical, but thorough conceptual basis of the first edition", "author": "Philip A. Bernstein, Eric Newcomer", "slug": "principles-of-transaction-processing-282056-9780080948416-philip-a-bernstein-eric-newcomer", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080948416.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "282056", "product_url": "/app/ecom/book/282056/principles-of-transaction-processing-282056-9780080948416-philip-a-bernstein-eric-newcomer", "bisac_codes": [ "COM021000", "077" ], "items_count": null, "identifiers": { "ISBN13": "9781558606234", "EISBN13": "9780080948416", "EISBN10": "0080948413" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026356592" } } } }, { "type": "Product", "id": "00010000282055", "attributes": { "name": "The benefits of e-business performance measurement systems", "subtitle": "", "description": "To participate fully in the new world of e-business, organisations have to make significant financial investments. How then, should they evaluate e-business investment proposals and monitor the resulting performance of their on-line business operations? To what extent are traditional performance measurement systems fit for a world where clicks not bricks determine business success? This CIMA report describes research investigating how organisations have been adapting their performance measurement systems for e-business. The research aimed to identify the features and benefits of an effective e-business performance measurement system by studying twelve organisations that have had some success in developing performance measurement systems suitable for the on-line environment.<br><br>* Based on four years of case study research inlcuding interviews with 12 managers<br>* offers a distinctive view of e-business in measuring the performance of a business<br>* Recommendations are made based on the findings from cross case analysis", "author": "Matthew Hinton, David Barnes", "slug": "the-benefits-of-e-business-performance-measurement-systems-282055-9780080888057-matthew-hinton-david-barnes", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080888057.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "282055", "product_url": "/app/ecom/book/282055/the-benefits-of-e-business-performance-measurement-systems-282055-9780080888057-matthew-hinton-david-barnes", "bisac_codes": [ "BUS041000", "BUS001010" ], "items_count": null, "identifiers": { "ISBN13": "9781856175258", "EISBN13": "9780080888057", "EISBN10": "0080888054" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026350599" } } } } ], "meta": { "pagination": { "page": 74988, "pages": 78443, "count": 1568841 } } }
Response Info
Default: None