GET /services/catalog/products?format=api&page=75042
Response information
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/vnd.api+json
Vary: Accept

{
    "links": {
        "first": "https://redshelf.com/services/catalog/products?format=api&page=1",
        "last": "https://redshelf.com/services/catalog/products?format=api&page=78407",
        "next": "https://redshelf.com/services/catalog/products?format=api&page=75043",
        "prev": "https://redshelf.com/services/catalog/products?format=api&page=75041"
    },
    "data": [
        {
            "type": "Product",
            "id": "00010000279307",
            "attributes": {
                "name": "Guide to Essential Math",
                "subtitle": "A Review for Physics, Chemistry and Engineering Students",
                "description": "This book reminds students in junior, senior and graduate level courses in physics, chemistry and engineering of the math they may have forgotten (or learned imperfectly) which is needed to succeed in science courses. The focus is on math actually used in physics, chemistry and engineering, and the approach to mathematics begins with 12 examples of increasing complexity, designed to hone the student's ability to think in mathematical terms and to apply quantitative methods to scientific problems. By the author's design, no problems are included in the text, to allow the students to focus on their science course assignments. Highly accessible presentation of fundamental mathematical techniques needed in science and engineering courses Use of proven pedagogical techniques develolped during the authors 40 years of teaching experience Illustrations and links to reference material on World-Wide-Web Coverage of fairly advanced topics, including vector and matrix algebra, partial differential equations, special functions and complex variables",
                "author": "Sy M. Blinder",
                "slug": "guide-to-essential-math-279307-9780080559674-sy-m-blinder",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080559674.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279307",
                "product_url": "/app/ecom/book/279307/guide-to-essential-math-279307-9780080559674-sy-m-blinder",
                "bisac_codes": [
                    "MAT000000",
                    "TEC009000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780123742643",
                    "EISBN13": "9780080559674",
                    "EISBN10": "0080559670"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026371152"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279304",
            "attributes": {
                "name": "Geotechnical Engineering Calculations and Rules of Thumb",
                "subtitle": "",
                "description": "Geotechnical Engineering Calculations and Rules of Thumb offers geotechnical, civil and structural engineers a concise, easy-to-understand approach the formulas and calculation methods used in of soil and geotechnical engineering. A one stop guide to the foundation design, pile foundation design, earth retaining structures, soil stabilization techniques and computer software, this book places calculations for almost all aspects of geotechnical engineering at your finger tips. In this book, theories is explained in a nutshell and then the calculation is presented and solved in an illustrated, step-by-step fashion. All calculations are provided in both fps and SI units. The manual includes topics such as shallow foundations, deep foundations, earth retaining structures, rock mechanics and tunnelling. In this book, the author's done all the heavy number-crunching for you, so you get instant, ready-to-apply data on activities such as: hard ground tunnelling, soft ground tunnelling, reinforced earth retaining walls, geotechnical aspects of wetland mitigation and geotechnical aspects of landfill design. Easy-to-understand approach the formulas and calculations Covers calculations for foundation,earthworks and/or pavement subgrades Provides common codes for working with computer software All calculations are provided in both US and SI units",
                "author": "Ruwan Abey Rajapakse",
                "slug": "geotechnical-engineering-calculations-and-rules-of-thumb-279304-9780080559032-ruwan-abey-rajapakse",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080559032.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279304",
                "product_url": "/app/ecom/book/279304/geotechnical-engineering-calculations-and-rules-of-thumb-279304-9780080559032-ruwan-abey-rajapakse",
                "bisac_codes": [
                    "TEC005000",
                    "TEC009070"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780750687645",
                    "EISBN13": "9780080559032",
                    "EISBN10": "0080559034"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026348286"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279299",
            "attributes": {
                "name": "Monomers, Polymers and Composites from Renewable Resources",
                "subtitle": "",
                "description": "<p>The progressive dwindling of fossil resources, coupled with the drastic increase in oil prices, have sparked a feverish activity in search of alternatives based on renewable resources for the production of energy.</p>  <p>Given the predominance of petroleum- and carbon-based chemistry for the manufacture of organic chemical commodities, a similar preoccupation has recently generated numerous initiatives aimed at replacing these fossil sources with renewable counterparts. In particular, major efforts are being conducted in the field of polymer science and technology to prepare macromolecular materials based on renewable resources. The concept of the bio-refinery, viz. the rational exploitation of the vegetable biomass in terms of the separation of its components and their utilisation as such, or after suitable chemical modifications, is thus gaining momentum and considerable financial backing from both the public and private sectors.</p>  <p>This collection of chapters, each one written by internationally recognised experts in the corresponding field, covers in a comprehensive fashion all the major aspects related to the synthesis, characterization and properties of macromolecular materials prepared using renewable resources as such, or after appropriate modifications. Thus, monomers such as terpenes and furans, oligomers like rosin and tannins, and polymers ranging from cellulose to proteins and including macromolecules synthesized by microbes, are discussed with the purpose of showing the extraordinary variety of materials that can be prepared from their intelligent exploitation.</p>  <p>Particular emphasis has been placed on recent advances and imminent perspectives, given the incessantly growing interest that this area is experiencing in both the scientific and technological realms.</p> Discusses bio-refining with explicit application to materials Replete with examples of applications of the concept of sustainable development Presents an impressive variety of novel macromolecular materials",
                "author": "Mohamed Naceur Belgacem, Alessandro Gandini",
                "slug": "monomers-polymers-and-composites-from-renewable-resources-279299-9780080560519",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080560519.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279299",
                "product_url": "/app/ecom/book/279299/monomers-polymers-and-composites-from-renewable-resources-279299-9780080560519",
                "bisac_codes": [
                    "TEC009010",
                    "TEC055000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780080453163",
                    "EISBN13": "9780080560519",
                    "EISBN10": "0080560512"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026347270"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279298",
            "attributes": {
                "name": "U-Th Series Nuclides in Aquatic Systems",
                "subtitle": "",
                "description": "Major advancement in the U-Th measurement techniques since the 1990's have resulted in new opportunities for the use of these nuclides to probe into aquatic processes in greater detail. U-Th Series Nuclides in Aquatic Systems provides state-of-the-art reviews on the applications of U-Th series nuclides to \"time\" and \"tag\" in a variety of processes occurring in aquatic systems. State of art reviews on the applications of U-Th Series nuclides to 'time'and 'tag' key processes occurring in aquatic systems. Self-contained, each chapter presents nuclide source functions, processes regulating their distributions and models used to describe them Emphasizes current thinking in the field and future directions",
                "author": "S. Krishnaswami, J. Kirk Cochran",
                "slug": "u-th-series-nuclides-in-aquatic-systems-279298-9780080564883",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080564883.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279298",
                "product_url": "/app/ecom/book/279298/u-th-series-nuclides-in-aquatic-systems-279298-9780080564883",
                "bisac_codes": [
                    "SCI026000",
                    "SCI032000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780080450124",
                    "EISBN13": "9780080564883",
                    "EISBN10": "0080564887"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026344077"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279297",
            "attributes": {
                "name": "No Tech Hacking",
                "subtitle": "A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing",
                "description": "Johnny Long's last book sold 12,000 units worldwide. Kevin Mitnick's last book sold 40,000 units in North America.<br><br>As the cliche goes, information is power. In this age of technology, an increasing majority of the world's information is stored electronically. It makes sense then that we rely on high-tech electronic protection systems to guard that information. As professional hackers, Johnny Long and Kevin Mitnick get paid to uncover weaknesses in those systems and exploit them. Whether breaking into buildings or slipping past industrial-grade firewalls, their goal has always been the same: extract the information using any means necessary. After hundreds of jobs, they have discovered the secrets to bypassing every conceivable high-tech security system. This book reveals those secrets; as the title suggests, it has nothing to do with high technology.<br><br> Dumpster Diving<br>Be a good sport and dont read the two D words written in big bold letters above, and act surprised when I tell you hackers can accomplish this without relying on a single bit of technology (punny). <br> Tailgating<br>Hackers and ninja both like wearing black, and they do share the ability to slip inside a building and blend with the shadows.<br> Shoulder Surfing<br>If you like having a screen on your laptop so you can see what youre working on, dont read this chapter.<br> Physical Security<br>Locks are serious business and lock technicians are true engineers, most backed with years of hands-on experience. But what happens when you take the age-old respected profession of the locksmith and sprinkle it with hacker ingenuity?<br> Social Engineering with Jack Wiles<br>Jack has trained hundreds of federal agents, corporate attorneys, CEOs and internal auditors on computer crime and security-related topics. His unforgettable presentations are filled with three decades of personal \"war stories\" from the trenches of Information Security and Physical Security. <br> Google Hacking<br>A hacker doesnt even need his own computer to do the necessary research. If he can make it to a public library, Kinko's or Internet cafe, he can use Google to process all that data into something useful.<br> P2P Hacking<br>Lets assume a guy has no budget, no commercial hacking software, no support from organized crime and no fancy gear. With all those restrictions, is this guy still a threat to you? Have a look at this chapter and judge for yourself.<br> People Watching<br>Skilled people watchers can learn a whole lot in just a few quick glances. In this chapter well take a look at a few examples of the types of things that draws a no-tech hackers eye.<br> Kiosks<br>What happens when a kiosk is more than a kiosk? What happens when the kiosk holds airline passenger information? What if the kiosk holds confidential patient information? What if the kiosk holds cash?<br> Vehicle Surveillance<br>Most people dont realize that some of the most thrilling vehicular espionage happens when the cars aren't moving at all!",
                "author": "Johnny Long, Kevin D. Mitnick",
                "slug": "no-tech-hacking-279297-9780080558752-johnny-long",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080558752.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279297",
                "product_url": "/app/ecom/book/279297/no-tech-hacking-279297-9780080558752-johnny-long",
                "bisac_codes": [
                    "COM014000",
                    "COM053000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597492157",
                    "EISBN13": "9780080558752",
                    "EISBN10": "0080558755"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026370490"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279296",
            "attributes": {
                "name": "TechnoSecurity's Guide to E-Discovery and Digital Forensics",
                "subtitle": "A Comprehensive Handbook",
                "description": "TechnoSecurity's Guide to E-Discovery and Digital Forensics provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can accurately and effectively analyze forensic data and recover digital evidence, while preserving the integrity of the electronic evidence for discovery and trial. Internationally known experts in computer forensics share their years of experience at the forefront of digital forensics Bonus chapters on how to build your own Forensics Lab 50% discount to the upcoming Techno Forensics conference for everyone who purchases a book",
                "author": "Jack Wiles",
                "slug": "technosecuritys-guide-to-e-discovery-and-digital-forensics-279296-9780080558813",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080558813.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279296",
                "product_url": "/app/ecom/book/279296/technosecuritys-guide-to-e-discovery-and-digital-forensics-279296-9780080558813",
                "bisac_codes": [
                    "COM053000",
                    "077"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597492232",
                    "EISBN13": "9780080558813",
                    "EISBN10": "008055881X"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026348590"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279295",
            "attributes": {
                "name": "OS X Exploits and Defense",
                "subtitle": "Own it...Just Like Windows or Linux!",
                "description": "<p>Contrary to popular belief, there has never been any shortage of Macintosh-related security issues. OS9 had issues that warranted attention. However, due to both ignorance and a lack of research, many of these issues never saw the light of day. No solid techniques were published for executing arbitrary code on OS9, and there are no notable legacy Macintosh exploits. Due to the combined lack of obvious vulnerabilities and accompanying exploits, Macintosh appeared to be a solid platform. Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an increasing number of holes, use of rootkits for post-compromise concealment or disturbed denial of service, knowing why the system is vulnerable and understanding how to defend it is critical to computer security. </p>   Macintosh OS X Boot Process and Forensic Software All the power, all the tools, and all the geekery of Linux is present in Mac OS X. Shell scripts, X11 apps, processes, kernel extensions...it's a UNIX platform....Now, you can master the boot process, and Macintosh forensic software Look Back Before the Flood and Forward Through the 21st Century Threatscape Back in the day, a misunderstanding of Macintosh security was more or less industry-wide. Neither the administrators nor the attackers knew much about the platform. Learn from Kevin Finisterre how and why that has all changed! Malicious Macs: Malware and the Mac As OS X moves further from desktops, laptops, and servers into the world of consumer technology (iPhones, iPods, and so on), what are the implications for the further spread of malware and other security breaches? Find out from David Harley Malware Detection and the Mac Understand why the continuing insistence of vociferous Mac zealots that it \"can't happen here\" is likely to aid OS X exploitationg Mac OS X for Pen Testers With its BSD roots, super-slick graphical interface, and near-bulletproof reliability, Apple's Mac OS X provides a great platform for pen testing WarDriving and Wireless Penetration Testing with OS X Configure and utilize the KisMAC WLAN discovery tool to WarDrive. Next, use the information obtained during a WarDrive, to successfully penetrate a customer's wireless network Leopard and Tiger Evasion Follow Larry Hernandez through exploitation techniques, tricks, and features of both OS X Tiger and Leopard, using real-world scenarios for explaining and demonstrating the concepts behind them Encryption Technologies and OS X Apple has come a long way from the bleak days of OS9. THere is now a wide array of encryption choices within Mac OS X. Let Gareth Poreus show you what they are. Cuts through the hype with a serious discussion of the security vulnerabilities of the Mac OS X operating system Reveals techniques by which OS X can be \"owned\" Details procedures to defeat these techniques Offers a sober look at emerging threats and trends",
                "author": "Chris Hurley, Johnny Long, David Harley, Paul Baccas, Kevin Finisterre, Larry H., Gary Porteus",
                "slug": "os-x-exploits-and-defense-279295-9780080558769-chris-hurley-johnny-long-david-harley-paul-baccas-kevin-finisterre-larry-h-gary-porteus",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080558769.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279295",
                "product_url": "/app/ecom/book/279295/os-x-exploits-and-defense-279295-9780080558769-chris-hurley-johnny-long-david-harley-paul-baccas-kevin-finisterre-larry-h-gary-porteus",
                "bisac_codes": [
                    "COM053000",
                    "077"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597492546",
                    "EISBN13": "9780080558769",
                    "EISBN10": "0080558763"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026347012"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279293",
            "attributes": {
                "name": "Structural Dynamics and Probabilistic Analysis for Engineers",
                "subtitle": "",
                "description": "Probabilistic structural dynamics offers unparalleled tools for analyzing uncertainties in structural design. Once avoided because it is mathematically rigorous, this technique has recently remerged with the aide of computer software.  Written by an author/educator with 40 years of experience in structural design, this user friendly manual integrates theories, formulas and mathematical models to produce a guide that will allow professionals to quickly grasp concepts and start solving problems. In this book, the author uses simple examples that provide templates for creating of more robust case studies later in the book.<br><br>*Problems are presented in an easy to understand form *Practical guide to software programs to solve design problems *Packed with examples and case studies of actual projects *Classical and the new stochastic factors of safety",
                "author": "Giora Maymon",
                "slug": "structural-dynamics-and-probabilistic-analysis-for-engineers-279293-9780080559094-giora-maymon",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080559094.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279293",
                "product_url": "/app/ecom/book/279293/structural-dynamics-and-probabilistic-analysis-for-engineers-279293-9780080559094-giora-maymon",
                "bisac_codes": [
                    "TEC005000",
                    "SCI032000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780750687652",
                    "EISBN13": "9780080559094",
                    "EISBN10": "0080559093"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026371255"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279292",
            "attributes": {
                "name": "Flow Induced Vibrations",
                "subtitle": "Classifications and Lessons from Practical Experiences",
                "description": "In many plants, vibration and noise problems occur due to fluid flow, which can greatly disrupt smooth plant operations. These flow-related phenomena are called Flow-Induced Vibration.This book explains how and why such vibrations happen and provides hints and tips on how to avoid them in future plant design. The world-leading author team doesnt assume prior knowledge of mathematical methods and provide the reader with information on the basics of modeling. The book includes several practical examples and thorough explanations of the structure, the evaluation method and the mechanisms to aid understanding of flow induced vibration. Helps ensure smooth plant operations Explains the structure, evaluation method and mechanisms Shows how to avoid vibrations in future plant design",
                "author": "Tomomichi Nakamura, Shigehiko Kaneko",
                "slug": "flow-induced-vibrations-279292-9780080559131",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080559131.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279292",
                "product_url": "/app/ecom/book/279292/flow-induced-vibrations-279292-9780080559131",
                "bisac_codes": [
                    "TEC009070",
                    "SCI055000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780080449548",
                    "EISBN13": "9780080559131",
                    "EISBN10": "0080559131"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026349306"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279291",
            "attributes": {
                "name": "Handbook of Medical Image Processing and Analysis",
                "subtitle": "",
                "description": "The Handbook of Medical Image Processing and Analysis is a comprehensive compilation of concepts and techniques used for processing and analyzing medical images after they have been generated or digitized. The Handbook is organized into six sections that relate to the main functions: enhancement, segmentation, quantification, registration, visualization, and compression, storage and communication.The second edition is extensively revised and updated throughout, reflecting new technology and research, and includes new chapters on: higher order statistics for tissue segmentation; tumor growth modeling in oncological image analysis; analysis of cell nuclear features in fluorescence microscopy images; imaging and communication in medical and public health informatics; and dynamic mammogram retrieval from web-based image libraries.For those looking to explore advanced concepts and access essential information, this second edition of Handbook of Medical Image Processing and Analysis is an invaluable resource. It remains the most complete single volume reference for biomedical engineers, researchers, professionals and those working in medical imaging and medical image processing.Dr. Isaac N. Bankman is the supervisor of a group that specializes on imaging, laser and sensor systems, modeling, algorithms and testing at the Johns Hopkins University Applied Physics Laboratory. He received his BSc degree in Electrical Engineering from Bogazici University, Turkey, in 1977, the MSc degree in Electronics from University of Wales, Britain, in 1979, and a PhD in Biomedical Engineering from the Israel Institute of Technology, Israel, in 1985. He is a member of SPIE. Includes contributions from internationally renowned authors from leading institutions NEW! 35 of 56 chapters have been revised and updated. Additionally, five new chapters have been added on important topics incluling Nonlinear 3D Boundary Detection, Adaptive Algorithms for Cancer Cytological Diagnosis, Dynamic Mammogram Retrieval from Web-Based Image Libraries, Imaging and Communication in Health Informatics and Tumor Growth Modeling in Oncological Image Analysis. Provides a complete collection of algorithms in computer processing of medical images Contains over 60 pages of stunning, four-color images",
                "author": "Isaac Bankman",
                "slug": "handbook-of-medical-image-processing-and-analysis-279291-9780080559148",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080559148.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279291",
                "product_url": "/app/ecom/book/279291/handbook-of-medical-image-processing-and-analysis-279291-9780080559148",
                "bisac_codes": [
                    "MED000000",
                    "TEC009000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780123739049",
                    "EISBN13": "9780080559148",
                    "EISBN10": "008055914X"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026371603"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279290",
            "attributes": {
                "name": "Managing Project Delivery: Maintaining Control and Achieving Success",
                "subtitle": "",
                "description": "A practical handbook for career project managers and those involved intermittently with projects throughout their career. Brief and visually led, Managing Project Delivery gets to the point, giving you the knowledge and confidence to manage project benefits and increase the certainty of success. Focused on the needs of engineering and technical Project Managers, but generic enough to support projects in other areas such as business change, IT and product development. Supported by downloadable on-line project benefits management tool templates that enable the techniques developed in the book to be applied in practice. Comprehensive real world case studies demonstrate the use of tools.Successful projects are the basis for the business many successful organisations, but many professionals lack the basic skills required to manage projects successfully. This book shows how to maximise the outcomes of projects and to ensure that the benefits arising from projects -- large or small -- are fully realized by the business. This key outcome can be easily overlooked or sidelined by the need to keep projects on track. Managing Project Delivery provides simple yet powerful tools to ensure that projects deliver on their goals in a controlled and accountable manner. It is the first of four project management titles that separately build skills and together provide a powerful project management resource. A practical handbook for career project managers and those involved intermittently with projects throughout their career Brief and visually led, Managing Project Delivery gets to the point, giving you the knowledge and confidence to deliver projects and increase the certainty of success Focused on the needs of both engineering and technical Project Managers, but generic enough to support projects in other areas such as business change, IT and product development Supported by downloadable on-line project delivery tool templates that enable the techniques developed in the book to be applied in practice Comprehensive real world case studies demonstrate the use of tools Project delivery is the third stage of the project lifecycle. This book shows how to maintain control and forecast the project outcome. Provides expert advice, tried-and-tested techniques and a delivery toolkit to address: Business alignment Value delivery Control and forecasting",
                "author": "Trish Melton",
                "slug": "managing-project-delivery-maintaining-control-and-achieving-success-279290-9780080559063-trish-melton",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080559063.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279290",
                "product_url": "/app/ecom/book/279290/managing-project-delivery-maintaining-control-and-achieving-success-279290-9780080559063-trish-melton",
                "bisac_codes": [
                    "BUS082000",
                    "TEC009070"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780750685153",
                    "EISBN13": "9780080559063",
                    "EISBN10": "0080559069"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026361637"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279289",
            "attributes": {
                "name": "Combustion",
                "subtitle": "",
                "description": "Combustion Engineering, a topic generally taught at the upper undergraduate and graduate level in most mechanical engineering programs, and many chemical engineering programs, is the study of rapid energy and mass transfer usually through the common physical phenomena of flame oxidation. It covers the physics and chemistry of this process and the engineering applications - from the generation of power such as the internal combustion automobile engine to the gas turbine engine. Renewed concerns about energy efficiency and fuel costs, along with continued concerns over toxic and particulate emissions have kept the interest in this vital area of engineering high and brought about new developments in both fundamental knowledge of flame and combustion physics as well as new technologies for flame and fuel control. New chapter on new combustion concepts and technologies, including discussion on nanotechnology as related to combustion, as well as microgravity combustion, microcombustion, and catalytic combustion - all interrelated and discussed by considering scaling issues (e.g., length and time scales) New information on sensitivity analysis of reaction mechanisms and generation and application of reduced mechanisms Expanded coverage of turbulent reactive flows to better illustrate real-world applications Important new sections on stabilization of diffusion flames. For the first time, the concept of triple flames will be introduced and discussed in the context of diffusion flame stabilization",
                "author": "Irvin Glassman, Richard A. Yetter",
                "slug": "combustion-279289-9780080568812-irvin-glassman-richard-a-yetter",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080568812.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279289",
                "product_url": "/app/ecom/book/279289/combustion-279289-9780080568812-irvin-glassman-richard-a-yetter",
                "bisac_codes": [
                    "TEC009070",
                    "TEC009000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780120885732",
                    "EISBN13": "9780080568812",
                    "EISBN10": "0080568815"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026347756"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279288",
            "attributes": {
                "name": "System Engineering for IMS Networks",
                "subtitle": "",
                "description": "The IMS is the foundation architecture for the next generation of mobile phones, wireless-enabled PDAs, PCs, and the like. IMS delivers multimedia content (audio, video, text, etc.) over all types of networks. For network engineers/administrators and telecommunications engineers it will be essential to not only understand IMS architecture, but to also be able to apply it at every stage of the network design process. This book will contain pragmatic information on how to engineer IMS networks as well as an applications-oriented approach for the engineering and networking professionals responsible for making IMS function in the real world. Describes the convergence of wireless IMS (IP Multimedia Subsystem) with other networks, including wireline and cable Discusses building interfaces for end users and IMS applications servers Explores network management issues with IMS",
                "author": "Arun Handa",
                "slug": "system-engineering-for-ims-networks-279288-9780080558592-arun-handa",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080558592.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279288",
                "product_url": "/app/ecom/book/279288/system-engineering-for-ims-networks-279288-9780080558592-arun-handa",
                "bisac_codes": [
                    "TEC007000",
                    "TEC041000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780750683883",
                    "EISBN13": "9780080558592",
                    "EISBN10": "0080558593"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026369906"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279287",
            "attributes": {
                "name": "Netcat Power Tools",
                "subtitle": "",
                "description": "Originally released in 1996, Netcat is a netowrking program designed to read and write data across both Transmission Control Protocol TCP and User Datagram Protocol (UDP) connections using the TCP/Internet Protocol (IP) protocol suite. Netcat is often referred to as a \"Swiss Army knife\" utility, and for good reason. Just like the multi-function usefullness of the venerable Swiss Army pocket knife, Netcat's functionality is helpful as both a standalone program and a backe-end tool in a wide range of applications. Some of the many uses of Netcat include port scanning, transferring files, grabbing banners, port listening and redirection, and more nefariously, a backdoor. This is the only book dedicated to comprehensive coverage of the tool's many features, and by the end of this book, you'll discover how Netcat can be one of the most valuable tools in your arsenal.<br><br>* Get Up and Running with Netcat Simple yet powerful...Don't let the trouble-free installation and the easy command line belie the fact that Netcat is indeed a potent and powerful program.<br><br>* Go PenTesting with Netcat Master Netcat's port scanning and service identification capabilities as well as obtaining Web server application information. Test and verify outbound firewall rules and avoid detection by using antivirus software and the Window Firewall. Also, create a backdoor using Netcat.<br><br>* Conduct Enumeration and Scanning with Netcat, Nmap, and More! Netcat's not the only game in town...Learn the process of network of enumeration and scanning, and see how Netcat along with other tools such as Nmap and Scanrand can be used to thoroughly identify all of the assets on your network.<br><br>* Banner Grabbing with Netcat Banner grabbing is a simple yet highly effective method of gathering information about a remote target, and can be performed with relative ease with the Netcat utility.<br><br>* Explore the Dark Side of Netcat See the various ways Netcat has been used to provide malicious, unauthorized access to their targets. By walking through these methods used to set up backdoor access and circumvent protection mechanisms through the use of Netcat, we can understand how malicious hackers obtain and maintain illegal access. Embrace the dark side of Netcat, so that you may do good deeds later.<br><br>* Transfer Files Using Netcat The flexability and simple operation allows Netcat to fill a niche when it comes to moving a file or files in a quick and easy fashion. Encryption is provided via several different avenues including integrated support on some of the more modern Netcat variants, tunneling via third-party tools, or operating system integrated IPsec policies.<br><br>* Troubleshoot Your Network with Netcat Examine remote systems using Netat's scanning ability. Test open ports to see if they really are active and see what protocls are on those ports. Communicate with different applications to determine what problems might exist, and gain insight into how to solve these problems.<br><br>* Sniff Traffic within a System Use Netcat as a sniffer within a system to collect incoming and outgoing data. Set up Netcat to listen at ports higher than 1023 (the well-known ports), so you can use Netcat even as a normal user. Comprehensive introduction to the #4 most popular open source security tool available Tips and tricks on the legitimate uses of Netcat Detailed information on its nefarious purposes Demystifies security issues surrounding Netcat Case studies featuring dozens of ways to use Netcat in daily tasks",
                "author": "Jan Kanclirz",
                "slug": "netcat-power-tools-279287-9780080558738",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080558738.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279287",
                "product_url": "/app/ecom/book/279287/netcat-power-tools-279287-9780080558738",
                "bisac_codes": [
                    "COM053000",
                    "COM060000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597492577",
                    "EISBN13": "9780080558738",
                    "EISBN10": "0080558739"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026343055"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279286",
            "attributes": {
                "name": "ZigBee Wireless Networks and Transceivers",
                "subtitle": "",
                "description": "ZigBee is a short-range wireless networking standard backed by such industry leaders as Motorola, Texas Instruments, Philips, Samsung, Siemens, Freescale, etc. It supports mesh networking, each node can transmit and receive data, offers high security and robustness, and is being rapidly adopted in industrial, control/monitoring, and medical applications. This book will explain the ZigBee protocol, discuss the design of ZigBee hardware, and describe how to design and implement ZigBee networks. The book has a dedicated website for the latest technical updates, ZigBee networking calculators, and additional materials. Dr. Farahani is a ZigBee system engineer for Freescale semiconductors Inc. The book comes with a dedicated website that contains additional resources and calculators: http://www.learnZigBee.com Provides a comprehensive overview of ZigBee technology and networking, from RF/physical layer considerations to application layer development Discusses ZigBee security features such as encryption Describes how ZigBee can be used in location detection applications Explores techniques for ZigBee co-existence with other wireless technologies such as 802.11 and Bluetooth The book comes with a dedicated website that contains additional resources and calculators: http://www.learnZigBee.com",
                "author": "Shahin Farahani",
                "slug": "zigbee-wireless-networks-and-transceivers-279286-9780080558479-shahin-farahani",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080558479.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279286",
                "product_url": "/app/ecom/book/279286/zigbee-wireless-networks-and-transceivers-279286-9780080558479-shahin-farahani",
                "bisac_codes": [
                    "TEC007000",
                    "TEC008070"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780750683937",
                    "EISBN13": "9780080558479",
                    "EISBN10": "008055847X"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026355679"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279283",
            "attributes": {
                "name": "PEM Fuel Cell Modeling and Simulation Using Matlab",
                "subtitle": "",
                "description": "Although, the basic concept of a fuel cell is quite simple, creating new designs and optimizing their performance takes serious work and a mastery of several technical areas. PEM Fuel Cell Modeling and Simulation Using Matlab, provides design engineers and researchers with a valuable tool for understanding and overcoming barriers to designing and building the next generation of PEM Fuel Cells. With this book, engineers can test components and verify designs in the development phase, saving both time and money.<br><br>Easy to read and understand, this book provides design and modelling tips for fuel cell components such as: modelling proton exchange structure, catalyst layers, gas diffusion, fuel distribution structures, fuel cell stacks and fuel cell plant. This book includes design advice and MATLAB and FEMLAB codes for Fuel Cell types such as: polymer electrolyte, direct methanol and solid oxide fuel cells. This book also includes types for one, two and three dimensional modeling and two-phase flow phenomena and microfluidics.<br><br>*Modeling and design validation techniques<br>*Covers most types of Fuel Cell including SOFC <br>*MATLAB and FEMLAB modelling codes<br>*Translates basic phenomena into mathematical equations",
                "author": "Colleen Spiegel",
                "slug": "pem-fuel-cell-modeling-and-simulation-using-matlab-279283-9780080559018-colleen-spiegel",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080559018.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279283",
                "product_url": "/app/ecom/book/279283/pem-fuel-cell-modeling-and-simulation-using-matlab-279283-9780080559018-colleen-spiegel",
                "bisac_codes": [
                    "TEC031000",
                    "BUS069000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780123742599",
                    "EISBN13": "9780080559018",
                    "EISBN10": "0080559018"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026369874"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279280",
            "attributes": {
                "name": "Nitrogen in the Marine Environment",
                "subtitle": "",
                "description": "Since the first edition of Nitrogen in the Marine Environment was published in 1983, it has been recognized as the standard in the field.  In the time since the book first appeared, there has been tremendous growth in the field with unprecedented discoveries over the past decade that have fundamentally changed the view of the marine nitrogen cycle.  As a result, this Second Edition contains twice the amount of information that the first edition contained.  This updated edition is now available online, offering searchability and instant, multi-user access to this important information.<br><br>*The classic text, fully updated to reflect the rapid pace of discovery*Provides researchers and students in oceanography, chemistry, and marine ecology an understanding of the marine nitrogen cycle*Available online with easy access and search - the information you need, when you need it",
                "author": "Douglas G. Capone, Deborah A. Bronk, Margaret R. Mulholland, Edward J. Carpenter",
                "slug": "nitrogen-in-the-marine-environment-279280-9780123725226",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780123725226.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279280",
                "product_url": "/app/ecom/book/279280/nitrogen-in-the-marine-environment-279280-9780123725226",
                "bisac_codes": [
                    "SCI000000",
                    "703"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780080558929",
                    "EISBN13": "9780123725226",
                    "EISBN10": "0123725224"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026343823"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279279",
            "attributes": {
                "name": "How to Cheat at Securing Linux",
                "subtitle": "",
                "description": "Linux servers now account for 33% of all networks servers running worldwide (Source: IDC). The top 3 market share holders in the network server space (IBM, Hewlett-Packard, and Dell) all use Linux as their standard operating system. <br><br>This book teaches Linux system administrators how to protect their servers from malicious threats.<br><br>As with any technologies, increased usage results in increased attention from malicious hackers. For years a myth existed that Windows was inherently less secure than Linux, because there were significantly more attacks against Windows machines than Linux. This was a fallacy. There were more attacks against Windows machines because there were simply so many more Windows machines to attack. Now, the numbers tell the exact opposite story. Linux servers account for 1/3 of all servers worldwide, but in 2005 there were 3 times as many high-severity security vulnerabilities discovered on Linux servers (Source: IDC).<br><br>This book covers Open Source security, implementing an intrusion detection system, unearthing Rootkits, defending against malware, creating Virtual Private Networks, and much more.<br><br>The Perfect Reference for the Multitasked SysAdmin<br>* Discover Why \"Measure Twice, Cut Once\" Applies to Securing Linux<br>* Complete Coverage of Hardening the Operating System, Implementing an Intrusion Detection System, and Defending Databases<br>* Short on Theory, History, and Technical Data that Is Not Helpful in Performing Your Job",
                "author": "James Stanger",
                "slug": "how-to-cheat-at-securing-linux-279279-9780080558684-james-stanger",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080558684.png",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279279",
                "product_url": "/app/ecom/book/279279/how-to-cheat-at-securing-linux-279279-9780080558684-james-stanger",
                "bisac_codes": [
                    "COM053000",
                    "COM046070"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597492072",
                    "EISBN13": "9780080558684",
                    "EISBN10": "0080558682"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026355636"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279278",
            "attributes": {
                "name": "Software Development for Embedded Multi-core Systems",
                "subtitle": "A Practical Guide Using Embedded Intel Architecture",
                "description": "The multicore revolution has reached the deployment stage in embedded systems ranging from small ultramobile devices to large telecommunication servers. The transition from single to multicore processors, motivated by the need to increase performance while conserving power, has placed great responsibility on the shoulders of software engineers. In this new embedded multicore era, the toughest task is the development of code to support more sophisticated systems. This book provides embedded engineers with solid grounding in the skills required to develop software targeting multicore processors. Within the text, the author undertakes an in-depth exploration of performance analysis, and a close-up look at the tools of the trade. Both general multicore design principles and processor-specific optimization techniques are revealed. Detailed coverage of critical issues for multicore employment within embedded systems is provided, including the Threading Development Cycle, with discussions of analysis, design, development, debugging, and performance tuning of threaded applications. Software development techniques engendering optimal mobility and energy efficiency are highlighted through multiple case studies, which provide practical how-to advice on implementing the latest multicore processors. Finally, future trends are discussed, including terascale, speculative multithreading, transactional memory, interconnects, and the software-specific implications of these looming architectural developments. This is the only book to explain software optimization for embedded multi-core systems Helpful tips, tricks and design secrets from an Intel programming expert, with detailed examples using the popular X86 architecture Covers hot topics, including ultramobile devices, low-power designs, Pthreads vs. OpenMP, and heterogeneous cores",
                "author": "Max Domeika",
                "slug": "software-development-for-embedded-multi-core-systems-279278-9780080558585-max-domeika",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080558585.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279278",
                "product_url": "/app/ecom/book/279278/software-development-for-embedded-multi-core-systems-279278-9780080558585-max-domeika",
                "bisac_codes": [
                    "TEC007000",
                    "COM051230"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780750685399",
                    "EISBN13": "9780080558585",
                    "EISBN10": "0080558585"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026370722"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279277",
            "attributes": {
                "name": "Processor Description Languages",
                "subtitle": "",
                "description": "Efficient design of embedded processors plays a critical role in embedded systems design. Processor description languages and their associated specification, exploration and rapid prototyping methodologies are used to find the best possible design for a given set of applications under various design constraints, such as area, power and performance.  This book is the first, comprehensive survey of modern architecture description languages and will be an invaluable reference for embedded system architects, designers, developers, and validation engineers.  Readers will see that the use of particular architecture description languages will lead to productivity gains in designing particular (application-specific) types of embedded processors.<br><br>* Comprehensive coverage of all modern architecture description languages... use the right ADL to design your processor to fit your application;* Most up-to-date information available about each architecture description language from the developers...save time chasing down reliable documentation;* Describes how each architecture desccription language enables key design automation tasks, such as simulation, synthesis and testing...fit the ADL to your design cycle;",
                "author": "Prabhat Mishra, Nikil Dutt",
                "slug": "processor-description-languages-279277-9780080558370",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080558370.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279277",
                "product_url": "/app/ecom/book/279277/processor-description-languages-279277-9780080558370",
                "bisac_codes": [
                    "COM011000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780123742872",
                    "EISBN13": "9780080558370",
                    "EISBN10": "0080558372"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026353608"
                    }
                }
            }
        }
    ],
    "meta": {
        "pagination": {
            "page": 75042,
            "pages": 78407,
            "count": 1568134
        }
    }
}

Response Info

Default: None