GET /services/catalog/products?format=api&page=75046
Response information
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/vnd.api+json
Vary: Accept

{
    "links": {
        "first": "https://redshelf.com/services/catalog/products?format=api&page=1",
        "last": "https://redshelf.com/services/catalog/products?format=api&page=78413",
        "next": "https://redshelf.com/services/catalog/products?format=api&page=75047",
        "prev": "https://redshelf.com/services/catalog/products?format=api&page=75045"
    },
    "data": [
        {
            "type": "Product",
            "id": "00010000279353",
            "attributes": {
                "name": "Computational Fluid Dynamics in Fire Engineering",
                "subtitle": "Theory, Modelling and Practice",
                "description": "Fire and combustion presents a significant engineering challenge to mechanical, civil and dedicated fire engineers, as well as specialists in the process and chemical, safety, buildings and structural fields. We are reminded of the tragic outcomes of untenable fire disasters such as at Kings Cross underground station or Switzerlands St Gotthard tunnel. In these and many other cases, computational fluid dynamics (CFD) is at the forefront of active research into unravelling the probable causes of fires and helping to design structures and systems to ensure that they are less likely in the future. <br><br>Computational fluid dynamics (CFD) is routinely used as an analysis tool in fire and combustion engineering as it possesses the ability to handle the complex geometries and characteristics of combustion and fire. This book shows engineering students and professionals how to understand and use this powerful tool in the study of combustion processes, and in the engineering of safer or more fire resistant (or conversely, more fire-efficient) structures.<br><br>No other book is dedicated to computer-based fire dynamics tools and systems. It is supported by a rigorous pedagogy, including worked examples to illustrate the capabilities of different models, an introduction to the essential aspects of fire physics, examination and self-test exercises, fully worked solutions and a suite of accompanying software for use in industry standard modeling systems. Computational Fluid Dynamics (CFD) is widely used in engineering analysis; this is the only book dedicated to CFD modeling analysis in fire and combustion engineering Strong pedagogic features mean this book can be used as a text for graduate level mechanical, civil, structural and fire engineering courses, while its coverage of the latest techniques and industry standard software make it an important reference for researchers and professional engineers in the mechanical and structural sectors, and by fire engineers, safety consultants and regulators Strong author team (CUHK is a recognized centre of excellence in fire eng) deliver an expert package for students and professionals, showing both theory and applications. Accompanied by CFD modeling code and ready to use simulations to run in industry-standard ANSYS-CFX and Fluent software",
                "author": "Guan Heng Yeoh, Kwok Kit Yuen",
                "slug": "computational-fluid-dynamics-in-fire-engineering-279353-9780080570037-guan-heng-yeoh-kwok-kit-yuen",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080570037.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279353",
                "product_url": "/app/ecom/book/279353/computational-fluid-dynamics-in-fire-engineering-279353-9780080570037-guan-heng-yeoh-kwok-kit-yuen",
                "bisac_codes": [
                    "TEC009070",
                    "TEC009000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780750685894",
                    "EISBN13": "9780080570037",
                    "EISBN10": "0080570038"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026356107"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279352",
            "attributes": {
                "name": "Next Generation SSH2 Implementation",
                "subtitle": "Securing Data in Motion",
                "description": "New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book addresses these new trends in depth, offering the most up-to-date information on the integration of SSH into a security environment. It covers the newest features and applications of SSH-2 (which received Proposed Standard status from the IETF in 2006). SSH2 is more secure than previous versions and has many expanded uses on a wider variety of computing platforms. Another particular note driving new SSH2 adoption are the requirements of recent legislation (PCI/HIPAA/SOX/FISMA). SSH 2 has become an even more valuable tool, as it provides communications security compliance with the latest standards.<br><br>This book offers the most up-to-date information on SSH2 in a practical, hands-on, tutorial-style reference that goes well beyond UNIX implementation. It concentrates on the latest version of SSH 2 with all new information. Discover why SSH2 offers more robust security than SSH1 and how to incorporate it into your network administration software toolbox",
                "author": "Dale Liu",
                "slug": "next-generation-ssh2-implementation-279352-9780080570006-dale-liu",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080570006.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279352",
                "product_url": "/app/ecom/book/279352/next-generation-ssh2-implementation-279352-9780080570006-dale-liu",
                "bisac_codes": [
                    "COM053000",
                    "077"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597492836",
                    "EISBN13": "9780080570006",
                    "EISBN10": "0080570003"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026368585"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279350",
            "attributes": {
                "name": "Natural Gas Hydrates",
                "subtitle": "A Guide for Engineers",
                "description": "The petroleum industry spends millions of dollars every year to combat the formation of hydrates-the solid, crystalline compounds that form from water and small molecules-that cause problems by plugging transmission lines and damaging equipment. They are a problem in the production, transmission and processing of natural gas, and it is even possible for them to form in the reservoir itself if the conditions are favorable. Natural Gas Hydrates is written for the field engineer working in the natural gas industry. This book explains how, when and where hydrates form, while providing the knowledge necessary to apply remedies in practical applications.  New to the second edition, the use of new inhibitors: Kinetic Inhibitors and Anticoagulants and the topic of kinetics of hydrates. How fast do they form? How fast do they melt? New chapters on Hydrates in Nature, hydrates on the seafloor and a new section has also been added regarding the misconceptions about water dew points.  Chapters on Hydrate Types and Formers, Computer Methods, Inhibiting Hydrate Formation with Chemicals, Dehydration of Natural Gas and Phase Diagrams Hydrate Dehydration of Natural Gas and Phase Diagrams have been expanded and updated along with the companion website. Understand what gas hydrates are, how they form and what can be done to combat their formation Avoid the same problems BP experienced with clogged pipelines Presents the four most common approaches to evaluate hydrates: heat, depressurization, inhibitor chemicals, and dehydration",
                "author": "John Carroll",
                "slug": "natural-gas-hydrates-279350-9780080570020-john-carroll",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080570020.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279350",
                "product_url": "/app/ecom/book/279350/natural-gas-hydrates-279350-9780080570020-john-carroll",
                "bisac_codes": [
                    "SCI019000",
                    "TEC009010"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780750684903",
                    "EISBN13": "9780080570020",
                    "EISBN10": "008057002X"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026358558"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279349",
            "attributes": {
                "name": "SAP Security Configuration and Deployment",
                "subtitle": "The IT Administrator's Guide to Best Practices",
                "description": "Throughout the world, high-profile large organizations (aerospace and defense, automotive, banking, chemicals, financial service providers, healthcare, high tech, insurance, oil and gas, pharmaceuticals, retail, telecommunications, and utilities) and governments are using SAP software to process their most mission-critical, highly sensitive data. With more than 100,000 installations, SAP is the world's largest enterprise software company and the world's third largest independent software supplier overall. <br><br>Despite this widespread use, there have been very few books written on SAP implementation and security, despite a great deal of interest. (There are 220,000 members in an on-line SAP 'community' seeking information, ideas and tools on the IT Toolbox Website alone.) Managing SAP user authentication and authorizations is becoming more complex than ever, as there are more and more SAP products involved that have very different access issues. It's a complex area that requires focused expertise.<br><br>This book is designed for these network and systems administrator who deal with the complexity of having to make judgmental decisions regarding enormously complicated and technical data in the SAP landscape, as well as pay attention to new compliance rules and security regulations.<br><br>Most SAP users experience significant challenges when trying to manage and mitigate the risks in existing or new security solutions and usually end up facing repetitive, expensive re-work and perpetuated compliance challenges. This book is designed to help them properly and efficiently manage these challenges on an ongoing basis. It aims to  remove the 'Black Box' mystique that surrounds SAP security. The most comprehensive coverage of the essentials of SAP security currently available: risk and control management, identity and access management, data protection and privacy, corporate governance, legal and regulatory compliance This book contains information about SAP security that is not available anywhere else to help the reader avoid the \"gotchas\" that may leave them vulnerable during times of upgrade or other system changes Companion Web site provides custom SAP scripts, which readers can download to install, configure and troubleshoot SAP",
                "author": "Joey Hirao",
                "slug": "sap-security-configuration-and-deployment-279349-9780080570013-joey-hirao",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080570013.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279349",
                "product_url": "/app/ecom/book/279349/sap-security-configuration-and-deployment-279349-9780080570013-joey-hirao",
                "bisac_codes": [
                    "COM053000",
                    "077"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597492843",
                    "EISBN13": "9780080570013",
                    "EISBN10": "0080570011"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026364486"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279348",
            "attributes": {
                "name": "Malware Forensics",
                "subtitle": "Investigating and Analyzing Malicious Code",
                "description": "<p>Malware Forensics: Investigating and Analyzing Malicious Code covers the complete process of responding to a malicious code incident. Written by authors who have investigated and prosecuted federal malware cases, this book deals with the emerging and evolving field of live forensics, where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down. Unlike other forensic texts that discuss live forensics on a particular operating system, or in a generic context, this book emphasizes a live forensics and evidence collection methodology on both Windows and Linux operating systems in the context of identifying and capturing malicious code and evidence of its effect on the compromised system. It is the first book detailing how to perform live forensic techniques on malicious code.</p>  <p>The book gives deep coverage on the tools and techniques of conducting runtime behavioral malware analysis (such as file, registry, network and port monitoring) and static code analysis (such as file identification and profiling, strings discovery, armoring/packing detection, disassembling, debugging), and more. It explores over 150 different tools for malware incident response and analysis, including forensic tools for preserving and analyzing computer memory. Readers from all educational and technical backgrounds will benefit from the clear and concise explanations of the applicable legal case law and statutes covered in every chapter. In addition to the technical topics discussed, this book also offers critical legal considerations addressing the legal ramifications and requirements governing the subject matter.</p>  <p>This book is intended for system administrators, information security professionals, network personnel, forensic examiners, attorneys, and law enforcement working with the inner-workings of computer memory and malicious code.</p> Winner of Best Book Bejtlich read in 2008! http://taosecurity.blogspot.com/2008/12/best-book-bejtlich-read-in-2008.html Authors have investigated and prosecuted federal malware cases, which allows them to provide unparalleled insight to the reader First book to detail how to perform \"live forensic\" techniques on malicous code In addition to the technical topics discussed, this book also offers critical legal considerations addressing the legal ramifications and requirements governing the subject matter",
                "author": "Eoghan Casey, Cameron H. Malin, James M. Aquilina",
                "slug": "malware-forensics-279348-9780080560199-eoghan-casey-cameron-h-malin-james-m-aquilina",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080560199.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279348",
                "product_url": "/app/ecom/book/279348/malware-forensics-279348-9780080560199-eoghan-casey-cameron-h-malin-james-m-aquilina",
                "bisac_codes": [
                    "COM053000",
                    "077"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597492683",
                    "EISBN13": "9780080560199",
                    "EISBN10": "0080560199"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026371094"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279347",
            "attributes": {
                "name": "Techno Security's Guide to Securing SCADA",
                "subtitle": "A Comprehensive Handbook On Protecting The Critical Infrastructure",
                "description": "Around the world, SCADA (supervisory control and data acquisition) systems and other real-time process control networks run mission-critical infrastructure--everything from the power grid to water treatment, chemical manufacturing to transportation. These networks are at increasing risk due to the move from proprietary systems to more standard platforms and protocols and the interconnection to other networks. Because there has been limited attention paid to security, these systems are seen as largely unsecured and very vulnerable to attack. <br><br>This book addresses currently undocumented security issues affecting SCADA systems and overall critical infrastructure protection. The respective co-authors are among the leading experts in the world capable of addressing these related-but-independent concerns of SCADA security. Headline-making threats and countermeasures like malware, sidejacking, biometric applications, emergency communications, security awareness llanning, personnel & workplace preparedness and bomb threat planning will be addressed in detail in this one of a kind book-of-books dealing with the threats to critical infrastructure protection. They collectivly have over a century of expertise in their respective fields of infrastructure protection. Included among the contributing authors are Paul Henry, VP of Technology Evangelism, Secure Computing, Chet Hosmer, CEO and Chief Scientist at Wetstone Technologies, Phil Drake, Telecommunications Director, The Charlotte Observer, Patrice Bourgeois, Tenable Network Security, Sean Lowther, President, Stealth Awareness and Jim Windle, Bomb Squad Commander, CMPD. Internationally known experts provide a detailed discussion of the complexities of SCADA security and its impact on critical infrastructure Highly technical chapters on the latest vulnerabilities to SCADA and critical infrastructure and countermeasures Bonus chapters on security awareness training, bomb threat planning, emergency communications, employee safety and much more Companion Website featuring video interviews with subject matter experts offer a \"sit-down\" with the leaders in the field",
                "author": "Greg Miles, Jack Wiles, Ted Claypoole, Phil Drake, Paul A. Henry, Lester J. Johnson, Sean Lowther, Marc Weber Tobias, James H. Windle",
                "slug": "techno-securitys-guide-to-securing-scada-279347-9780080569994-greg-miles-jack-wiles-ted-claypoole-phil-drake-paul-a-henry-lester-j-johnson-sean-lowther-marc-weber-tobias-james-h-windle",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080569994.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279347",
                "product_url": "/app/ecom/book/279347/techno-securitys-guide-to-securing-scada-279347-9780080569994-greg-miles-jack-wiles-ted-claypoole-phil-drake-paul-a-henry-lester-j-johnson-sean-lowther-marc-weber-tobias-james-h-windle",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597492829",
                    "EISBN13": "9780080569994",
                    "EISBN10": "0080569994"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026362373"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279346",
            "attributes": {
                "name": "Securing Citrix XenApp Server in the Enterprise",
                "subtitle": "",
                "description": "Citrix Presentation Server allows remote users to work off a network server as if they weren't remote. That means: Incredibly fast access to data and applications for users, no third party VPN connection, and no latency issues. All of these features make Citrix Presentation Server a great tool for increasing access and productivity for remote users. Unfortunately, these same features make Citrix just as dangerous to the network it's running on. By definition, Citrix is granting remote users direct access to corporate servers?..achieving this type of access is also the holy grail for malicious hackers. To compromise a server running Citrix Presentation Server, a hacker need not penetrate a heavily defended corporate or government server. They can simply compromise the far more vulnerable laptop, remote office, or home office of any computer connected to that server by Citrix Presentation Server. <br>All of this makes Citrix Presentation Server a high-value target for malicious hackers. And although it is a high-value target, Citrix Presentation Servers and remote workstations are often relatively easily hacked, because they are often times deployed by overworked system administrators who haven't even configured the most basic security features offered by Citrix. \"The problem, in other words, isn't a lack of options for securing Citrix instances; the problem is that administrators aren't using them.\" (eWeek, October 2007). In support of this assertion Security researcher Petko D. Petkov, aka \"pdp\", said in an Oct. 4 posting that his recent testing of Citrix gateways led him to \"tons\" of \"wide-open\" Citrix instances, including 10 on government domains and four on military domains. The most comprehensive book published for system administrators providing step-by-step instructions for a secure Citrix Presentation Server Special chapter by Security researcher Petko D. Petkov'aka \"pdp detailing tactics used by malicious hackers to compromise Citrix Presentation Servers Companion Web site contains custom Citrix scripts for administrators to install, configure, and troubleshoot Citrix Presentation Server",
                "author": "Tariq Azad",
                "slug": "securing-citrix-xenapp-server-in-the-enterprise-279346-9780080569987-tariq-azad",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080569987.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279346",
                "product_url": "/app/ecom/book/279346/securing-citrix-xenapp-server-in-the-enterprise-279346-9780080569987-tariq-azad",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597492812",
                    "EISBN13": "9780080569987",
                    "EISBN10": "0080569986"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026357966"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279345",
            "attributes": {
                "name": "Programming Lego Mindstorms NXT",
                "subtitle": "",
                "description": "Teach your robot new tricks! With this projects-based approach you can program your Mindstorms NXT robot to solve a maze, build a house, run an obstacle course, and many other activities. Along the way you will learn the basics of programming structures and techniques using NXT-G and Microsoft VPL. <br><br>For hobbyists, and students working on robot projects, Bishop provides the background and tools to program your robot for tasks that go beyond the simple routines provided with the robot kit. The programs range in complexity from simple contact avoidance and path following, to programs generating some degree of artificial intelligence a how-to guide for programming your robot, using NXT-G and Microsoft VPL ten robot-specific projects show how to extend your robot's capabilities beyond the manufacturer's provided software. Examples of projects include: Maze solver, Robot House Builder, Search (obstacle avoidance), Song and Dance Act flowcharts and data flow diagrams are used to illustrate how to develop programs introduces basic programming structures",
                "author": "Owen Bishop",
                "slug": "programming-lego-mindstorms-nxt-279345-9780080569963-owen-bishop",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080569963.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279345",
                "product_url": "/app/ecom/book/279345/programming-lego-mindstorms-nxt-279345-9780080569963-owen-bishop",
                "bisac_codes": [
                    "TEC037000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597492782",
                    "EISBN13": "9780080569963",
                    "EISBN10": "008056996X"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026357768"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279344",
            "attributes": {
                "name": "Microsoft Exchange Server 2007 with SP1",
                "subtitle": "Tony Redmond's Guide to Successful Implementation",
                "description": "Exchange 2007 represents the biggest advance in the history of Microsoft Exchange Server technology. Given Exchange's leap to x64 architecture and its wide array of new features, it isn't surprising that the SP1 release of 2007 would be particularly robust in terms of hotfixes, security enhancements and additional functionality.  <br><br>Tony Redmond's upgraded edition of his popular Microsoft Exchange Server 2007 bible features extensive coverage of the significant changes and additions offered with SP1. Every chapter has been updated, with particular focus on the most pivotal aspects of SP1, including:<br><br>*install enabling on Windows Server 2008   <br>*IVp6 support<br>*Unified Messaging inclusion<br>*EMC enhancements<br>*Client Access Improvements for Outlook Web Access and Activesync<br>*New user interfaces for POP3 and IMAP4<br>*System resource monitoring and message routing improvements<br>*New features for the mailbox server role<br>*.pst file data managment improvements<br>*new high-availability features<br>*optimization for mobile access<br>*and much more! Complete coverage of all the updates in SP1 ensure admins skip the initial 2007 release's bugs and upgrade with ease Written by HP Services CTO Tony Redmond, the world's most trusted author of Exchange books for over a decade 250+ pages of updates throughout, including totally new sections on Windows 2008 compatibility, Microsoft Yona, Windows Mobile 6 and 6.1 devices, Apple iPhone, and more!",
                "author": "Tony Redmond",
                "slug": "microsoft-exchange-server-2007-with-sp1-279344-9780080560168-tony-redmond",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080560168.png",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279344",
                "product_url": "/app/ecom/book/279344/microsoft-exchange-server-2007-with-sp1-279344-9780080560168-tony-redmond",
                "bisac_codes": [
                    "COM051230",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781555583552",
                    "EISBN13": "9780080560168",
                    "EISBN10": "0080560164"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026344373"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279343",
            "attributes": {
                "name": "The Best Damn Windows Server 2008 Book Period",
                "subtitle": "",
                "description": "<p>Best Damn Windows Server 2008 Book Period, Second Edition is completely revised and updated to Windows Server 2008.</p>  <p>This book will show you how to increase the reliability and flexibility of your server infrastructure with built-in Web and virtualization technologies; have more control over your servers and web sites using new tools like IIS7, Windows Server Manager, and Windows PowerShell; and secure your network with Network Access Protection and the Read-Only Domain Controller.</p> Web server management with Internet Information Services 7.0 Virtualize multiple operating systems on a single server Hardening Security, including Network Access Protection, Federated Rights Management, and Read-Only Domain Controller",
                "author": "Anthony Piltzecker",
                "slug": "the-best-damn-windows-server-2008-book-period-279343-9780080560076-anthony-piltzecker",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080560076.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279343",
                "product_url": "/app/ecom/book/279343/the-best-damn-windows-server-2008-book-period-279343-9780080560076-anthony-piltzecker",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597492737",
                    "EISBN13": "9780080560076",
                    "EISBN10": "0080560075"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026344173"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279342",
            "attributes": {
                "name": "Securing Windows Server 2008",
                "subtitle": "Prevent Attacks from Outside and Inside Your Organization",
                "description": "Microsoft hails the latest version of its flagship server operating system, Windows Server 2008, as \"the most secure Windows Server ever\". However, to fully achieve this lofty status, system administrators and security professionals must install, configure, monitor, log, and troubleshoot a dizzying array of new features and tools designed to keep the bad guys out and maintain the integrity of their network servers. This is no small task considering the market saturation of Windows Server and the rate at which it is attacked by malicious hackers. According to IDC, Windows Server runs 38% of all network servers. This market prominence also places Windows Server at the top of the SANS top 20 Security Attach Targets. The first five attack targets listed in the SANS top 20 for operating systems are related to Windows Server. This doesn't mean that Windows is inherently less secure than other operating systems; it's simply a numbers game. More machines running Windows Server. More targets for attackers to hack.<br>As a result of being at the top of the \"most used\" and \"most hacked\" lists, Microsoft has released a truly powerful suite of security tools for system administrators to deploy with Windows Server 2008. This book is the comprehensive guide needed by system administrators and security professionals to master seemingly overwhelming arsenal of new security tools including: <br>1.\tNetwork Access Protection, which gives administrators the power to isolate computers that don't comply with established security policies. The ability to enforce security requirements is a powerful means of protecting the network.<br>2.\tEnhanced solutions for intelligent rules and policies creation to increase control and protection over networking functions, allowing administrators to have a policy-driven network.<br>3.\tProtection of data to ensure it can only be accessed by users with the correct security context, and to make it available when hardware failures occur.<br>4.\tProtection against malicious software with User Account Control with a new authentication architecture.<br>5.\tIncreased control over your user settings with Expanded Group Policy.<br>...to name just a handful of the new security features. In short, Windows Server 2008 contains by far the most powerful and complex suite of security tools ever released in a Microsoft Server product. Securing Windows Server 2008 provides system administrators and security professionals with the knowledge they need to harness this power. Describes new technologies and features in Windows Server 2008, such as improvements to networking and remote access features, centralized server role management, and an improved file system Outlines steps for installing only the necessary components and subsystems of Windows Server 2008 in your environment. No GUI needed Describes Windows Server 2008?s security innovations, such as Network Access Protection, Federated Rights Management, and Read-Only Domain Controller Includes coverage of monitoring, securing, and troubleshooting Windows Server 2008 Covers Microsoft's Hyper-V virtualization technology, which is offered as an add-on to four of the eight versions of Windows Server 2008 and as a stand-alone product",
                "author": "Aaron Tiensivu",
                "slug": "securing-windows-server-2008-279342-9780080569970-aaron-tiensivu",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080569970.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279342",
                "product_url": "/app/ecom/book/279342/securing-windows-server-2008-279342-9780080569970-aaron-tiensivu",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597492805",
                    "EISBN13": "9780080569970",
                    "EISBN10": "0080569978"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026356055"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279341",
            "attributes": {
                "name": "Programming 32-bit Microcontrollers in C",
                "subtitle": "Exploring the PIC32",
                "description": "<p>*Just months after the introduction of the new generation of 32-bit PIC microcontrollers, a Microchip insider and acclaimed author takes you by hand at the exploration of the PIC32*Includes handy checklists to help readers perform the most common programming and debugging tasksThe new 32-bit microcontrollers bring the promise of more speed and more performance while offering an unprecedented level of compatibility with existing 8 and 16-bit PIC microcontrollers. In sixteen engaging chapters, using a parallel track to his previous title dedicated to 16-bit programming, the author puts all these claims to test while offering a gradual introduction to the development and debugging of embedded control applications in C. Author Lucio Di Jasio, a PIC and embedded control expert, offers unique insight into the new 32-bit architecture while developing a number of projects of growing complexity.</p>  <p>Experienced PIC users and newcomers to the field alike will benefit from the texts many thorough examples which demonstrate how to nimbly side-step common obstacles, solve real-world design problems efficiently and optimize code using the new PIC32 features and peripheral set. You will learn about:*basic timing and I/O operation*debugging methods with the MPLAB SIM *simulator and ICD tools*multitasking using the PIC32 interrupts*all the new hardware peripherals*how to control LCD displays*experimenting with the Explorer16 board and *the PIC32 Starter Kit*accessing mass-storage media*generating audio and video signals *and more!TABLE OF CONTENTSDay 1 And the adventure beginsDay 2 Walking in circlesDay 3 Message in a BottleDay 4 NUMB3RSDay 5 InterruptsDay 6 Memory Part 2 ExperimentingDay 7 RunningDay 8 Communication Day 9 LinksDay 10 Glass = BlissDay 11 Its an analog worldPart 3 ExpansionDay 12 Capturing User InputsDay 13 UTubeDay 14 Mass StorageDay 15 File I/ODay 16 Musica Maestro! </p> 32-bit microcontrollers are becoming the technology of choice for high performance embedded control applications including portable media players, cell phones, and GPS receivers. Learn to use the C programming language for advanced embedded control designs and/or learn to migrate your applications from previous 8 and 16-bit architectures.",
                "author": "Lucio Di Jasio",
                "slug": "programming-32-bit-microcontrollers-in-c-279341-9780080560106-lucio-di-jasio",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080560106.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279341",
                "product_url": "/app/ecom/book/279341/programming-32-bit-microcontrollers-in-c-279341-9780080560106-lucio-di-jasio",
                "bisac_codes": [
                    "TEC008070",
                    "TEC008060"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780750687096",
                    "EISBN13": "9780080560106",
                    "EISBN10": "0080560105"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026366794"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279339",
            "attributes": {
                "name": "Embedded DSP Processor Design",
                "subtitle": "Application Specific Instruction Set Processors",
                "description": "<p>This book provides design methods for Digital Signal Processors and Application Specific Instruction set Processors, based on the author's extensive, industrial design experience. Top-down and bottom-up design methodologies are presented, providing valuable guidance for both students and practicing design engineers.</p>  <p>Coverage includes design of internal-external data types, application specific instruction sets, micro architectures, including designs for datapath and control path, as well as memory sub systems. Integration and verification of a DSP-ASIP processor are discussed and reinforced with extensive examples.</p> Instruction set design for application specific processors based on fast application profiling Micro architecture design methodology Micro architecture design details based on real examples  Extendable architecture design protocols Design for efficient memory sub systems (minimizing on chip memory and cost) Real example designs based on extensive, industrial experiences",
                "author": "Dake Liu",
                "slug": "embedded-dsp-processor-design-279339-9780080569871-dake-liu",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080569871.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279339",
                "product_url": "/app/ecom/book/279339/embedded-dsp-processor-design-279339-9780080569871-dake-liu",
                "bisac_codes": [
                    "TEC007000",
                    "TEC008070"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780123741233",
                    "EISBN13": "9780080569871",
                    "EISBN10": "0080569870"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026356086"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279338",
            "attributes": {
                "name": "The Maritime Engineering Reference Book",
                "subtitle": "A Guide to Ship Design, Construction and Operation",
                "description": "The Maritime Engineering Reference Book is a one-stop source for engineers involved in marine engineering and naval architecture. In this essential reference, Anthony F. Molland has brought together the work of a number of the world's leading writers in the field to create an inclusive volume for a wide audience of marine engineers, naval architects and those involved in marine operations, insurance and other related fields. Coverage ranges from the basics to more advanced topics in ship design, construction and operation. All the key areas are covered, including ship flotation and stability, ship structures, propulsion, seakeeping and maneuvering. The marine environment and maritime safety are explored as well as new technologies, such as computer aided ship design and remotely operated vehicles (ROVs).Facts, figures and data from world-leading experts makes this an invaluable ready-reference for those involved in the field of maritime engineering.Professor A.F. Molland, BSc, MSc, PhD, CEng, FRINA. is Emeritus Professor of Ship Design at the University of Southampton, UK.  He has lectured ship design and operation for many years. He has carried out extensive research and published widely on ship design and various aspects of ship hydrodynamics.<br><br>* A comprehensive overview from best-selling authors including Bryan Barrass, Rawson and Tupper, and David Eyres* Covers basic and advanced material on marine engineering and Naval Architecture topics* Have key facts, figures and data to hand in one complete reference book",
                "author": "Anthony F. Molland",
                "slug": "the-maritime-engineering-reference-book-279338-9780080560090",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080560090.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279338",
                "product_url": "/app/ecom/book/279338/the-maritime-engineering-reference-book-279338-9780080560090",
                "bisac_codes": [
                    "TEC009070",
                    "TRA006000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780750689878",
                    "EISBN13": "9780080560090",
                    "EISBN10": "0080560091"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026363281"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279337",
            "attributes": {
                "name": "Integrating ISA Server 2006 with Microsoft Exchange 2007",
                "subtitle": "",
                "description": "This book is a convenient, targeted, single-source guide to integrating Microsoft's ISA Server with Exchange 2007 SP1. Unlike longwinded \"comprehensive resources\" it doesn't waste time re-hashing general information on the architectures and purposes of ISA and Exchange for raw beginners. Instead, its pragmatic purpose is to smooth the path of the busy administrator who is under pressure to get the integration done quickly, and done right, the first time. It features \"break-out sessions\" for issues that require in-depth discussion, \"tips and tricks\" sections that hone in on and demystify trouble spots, and \"FAQs\" alphabetized by topic that act as a quick-reference for readers who just want a quick answer to a specific question.<br><br>Readers will learn how to:<br>*Create the protocol definitions and firewall policy to allow only authorized users to connect to your Exchange Server<br>*Configure SMTP Filtering and SMTP Message Screener<br>*Troubleshoot the SSL connection to your Exchange Server<br>*Take advantage of ISA 2006's integrated Exchange 2007 support<br>*Enable forms-based authentication for Outlook Web Access<br>*Leverage unified SSL, VPN, application-layer filtering and endpoint security<br>to optimize access for mobile devices<br>*Configure user-based settings to provide pre-authenticated access to specific Web applications<br>...and much more!<br><br>*Practical and focused, this guide explains explains everything you need to know in order to successfully integrate ISA 2006 and Exchange 2007, without wasting time on minutiae  <br>*Tips and tricks from the expert author help you avoid pitfalls before you stumble into them, troubleshoot problems with ease, and optimize performance<br>*In-depth coverage of Exchange SP1 highlights the many security enhancements that optimize integration with ISA",
                "author": "Fergus Strachan",
                "slug": "integrating-isa-server-2006-with-microsoft-exchange-2007-279337-9780080560205-fergus-strachan",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080560205.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279337",
                "product_url": "/app/ecom/book/279337/integrating-isa-server-2006-with-microsoft-exchange-2007-279337-9780080560205-fergus-strachan",
                "bisac_codes": [
                    "COM046000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597492751",
                    "EISBN13": "9780080560205",
                    "EISBN10": "0080560202"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026343954"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279332",
            "attributes": {
                "name": "Fundamentals of Nuclear Reactor Physics",
                "subtitle": "",
                "description": "<p>Fundamentals of Nuclear Reactor Physics offers a one-semester treatment of the essentials of how the fission nuclear reactor works, the various approaches to the design of reactors, and their safe and efficient operation . It provides a clear, general overview of atomic physics from the standpoint of reactor functionality and design, including the sequence of fission reactions and their energy release.</p>  <p>It provides in-depth discussion of neutron reactions, including neutron kinetics and the neutron energy spectrum, as well as neutron spatial distribution. It includes ample worked-out examples and over 100 end-of-chapter problems.</p>  <p>Engineering students will find this applications-oriented approach, with many worked-out examples, more accessible and more meaningful as they aspire to become future nuclear engineers.</p> A clear, general overview of atomic physics from the standpoint of reactor functionality and design, including the sequence of fission reactions and their energy release In-depth discussion of neutron reactions, including neutron kinetics and the neutron energy spectrum, as well as neutron spatial distribution Ample worked-out examples and over 100 end-of-chapter problems Full Solutions Manual",
                "author": "Elmer E. Lewis",
                "slug": "fundamentals-of-nuclear-reactor-physics-279332-9780080560434-elmer-e-lewis",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080560434.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279332",
                "product_url": "/app/ecom/book/279332/fundamentals-of-nuclear-reactor-physics-279332-9780080560434-elmer-e-lewis",
                "bisac_codes": [
                    "TEC009070",
                    "TEC009000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780123706317",
                    "EISBN13": "9780080560434",
                    "EISBN10": "0080560431"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026363480"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279331",
            "attributes": {
                "name": "Multifractal Volatility",
                "subtitle": "Theory, Forecasting, and Pricing",
                "description": "Calvet and Fisher present a powerful, new technique for volatility forecasting that draws on insights from the use of multifractals in the natural sciences and mathematics and provides a unified treatment of the use of multifractal techniques in finance. A large existing literature (e.g., Engle, 1982; Rossi, 1995) models volatility as an average of past shocks, possibly with a noise component. This approach often has difficulty capturing sharp discontinuities and large changes in financial volatility. Their research has shown the advantages of modelling volatility as subject to abrupt regime changes of heterogeneous durations. Using the intuition that some economic phenomena are long-lasting while others are more transient, they permit regimes to have varying degrees of persistence. By drawing on insights from the use of multifractals in the natural sciences and mathematics, they show how to construct high-dimensional regime-switching models that are easy to estimate, and substantially outperform some of the best traditional forecasting models such as GARCH. The goal of Multifractal Volatility is to popularize the approach by presenting these exciting new developments to a wider audience. They emphasize both theoretical and empirical applications, beginning with a style that is easily accessible and intuitive in early chapters, and extending to the most rigorous continuous-time and equilibrium pricing formulations in final chapters. Presents a powerful new technique for forecasting volatility Leads the reader intuitively from existing volatility techniques to the frontier of research in this field by top scholars at major universities The first comprehensive book on multifractal techniques in finance, a cutting-edge field of research",
                "author": "Laurent E. Calvet, Adlai J. Fisher",
                "slug": "multifractal-volatility-279331-9780080559964-laurent-e-calvet-adlai-j-fisher",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080559964.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279331",
                "product_url": "/app/ecom/book/279331/multifractal-volatility-279331-9780080559964-laurent-e-calvet-adlai-j-fisher",
                "bisac_codes": [
                    "BUS027000",
                    "BUS069000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780121500139",
                    "EISBN13": "9780080559964",
                    "EISBN10": "0080559964"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026347378"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279330",
            "attributes": {
                "name": "Digital Signal Processing: Instant Access",
                "subtitle": "",
                "description": "Digital signal processing is commonplace in most electronics including MP3 players, HDTVs, and phones, just to name a few of the applications. The engineers creating these devices are in need of essential information at a moment's notice. The Instant Access Series provides all the critical content that a signal or communications engineer needs in his or her daily work. This book provides an introduction to DSPs as well as succinct overviews of linear systems, digital filters, and digital compression.  This book is filled with images, figures, tables, and easy to find tips and tricks for the engineer that needs material fast to complete projects to deadline. Tips and tricks feature that will help engineers get info fast and move on to the next issue Easily searchable content complete with tabs, chapter table of contents, bulleted lists, and boxed features Just the essentials, no need to page through material not needed for the current project",
                "author": "James D. Broesch",
                "slug": "digital-signal-processing-instant-access-279330-9780080560137-james-d-broesch",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080560137.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279330",
                "product_url": "/app/ecom/book/279330/digital-signal-processing-instant-access-279330-9780080560137-james-d-broesch",
                "bisac_codes": [
                    "TEC007000",
                    "034"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780750689762",
                    "EISBN13": "9780080560137",
                    "EISBN10": "008056013X"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026363978"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279329",
            "attributes": {
                "name": "Programming 8-bit PIC Microcontrollers in C",
                "subtitle": "with Interactive Hardware Simulation",
                "description": "<p>Microcontrollers are present in many new and existing electronic products, and the PIC microcontroller is a leading processor in the embedded applications market. Students and development engineers need to be able to design new products using microcontrollers, and this book explains from first principles how to use the universal development language C to create new PIC based systems, as well as the associated hardware interfacing principles. </p> <p>The book includes many source code listings, circuit schematics and hardware block diagrams. It describes the internal hardware of 8-bit PIC microcontroller, outlines the development systems available to write and test C programs, and shows how to use CCS C to create PIC firmware. In addition, simple interfacing principles are explained, a demonstration program for the PIC mechatronics development board provided and some typical applications outlined.</p> Focuses on the C programming language which is by far the most popular for microcontrollers (MCUs) Features Proteus VSMg the most complete microcontroller simulator on the market, along with CCS PCM C compiler, both are highly compatible with Microchip tools Extensive downloadable content including fully worked examples",
                "author": "Martin P. Bates",
                "slug": "programming-8-bit-pic-microcontrollers-in-c-279329-9780080560144-martin-p-bates",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080560144.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279329",
                "product_url": "/app/ecom/book/279329/programming-8-bit-pic-microcontrollers-in-c-279329-9780080560144-martin-p-bates",
                "bisac_codes": [
                    "TEC008070",
                    "034"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780750689601",
                    "EISBN13": "9780080560144",
                    "EISBN10": "0080560148"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026361772"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279327",
            "attributes": {
                "name": "FPGAs: Instant Access",
                "subtitle": "",
                "description": "FPGAs are central to electronic design! The engineers designing these devices are in need of essential information at a moment's notice. The Instant Access Series provides all the critical content that a computer design engineer needs in his or her daily work. This book provides an introduction to FPGAs as well as succinct overviews of fundamental concepts and basic programming. FPGAs are a customizable chip flexible enough to be deployed in a wide range of products and applications. There are several basic design flows detailed including ones based in C/C++, DSP, and HDL. This book is filled with images, figures, tables, and easy to find tips and tricks for the engineer that needs material fast to complete projects to deadline. Tips and tricks feature that will help engineers get info fast and move on to the next issue Easily searchable content complete with tabs, chapter table of contents, bulleted lists, and boxed features Just the essentials, no need to page through material not needed for the current project",
                "author": "Clive Maxfield",
                "slug": "fpgas-instant-access-279327-9780080560113-clive-maxfield",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080560113.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279327",
                "product_url": "/app/ecom/book/279327/fpgas-instant-access-279327-9780080560113-clive-maxfield",
                "bisac_codes": [
                    "TEC008030",
                    "COM059000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780750689748",
                    "EISBN13": "9780080560113",
                    "EISBN10": "0080560113"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026347960"
                    }
                }
            }
        }
    ],
    "meta": {
        "pagination": {
            "page": 75046,
            "pages": 78413,
            "count": 1568249
        }
    }
}

Response Info

Default: None