GET /services/catalog/products?format=api&page=75048
Response information
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/vnd.api+json
Vary: Accept

{
    "links": {
        "first": "https://redshelf.com/services/catalog/products?format=api&page=1",
        "last": "https://redshelf.com/services/catalog/products?format=api&page=78413",
        "next": "https://redshelf.com/services/catalog/products?format=api&page=75049",
        "prev": "https://redshelf.com/services/catalog/products?format=api&page=75047"
    },
    "data": [
        {
            "type": "Product",
            "id": "00010000279287",
            "attributes": {
                "name": "Netcat Power Tools",
                "subtitle": "",
                "description": "Originally released in 1996, Netcat is a netowrking program designed to read and write data across both Transmission Control Protocol TCP and User Datagram Protocol (UDP) connections using the TCP/Internet Protocol (IP) protocol suite. Netcat is often referred to as a \"Swiss Army knife\" utility, and for good reason. Just like the multi-function usefullness of the venerable Swiss Army pocket knife, Netcat's functionality is helpful as both a standalone program and a backe-end tool in a wide range of applications. Some of the many uses of Netcat include port scanning, transferring files, grabbing banners, port listening and redirection, and more nefariously, a backdoor. This is the only book dedicated to comprehensive coverage of the tool's many features, and by the end of this book, you'll discover how Netcat can be one of the most valuable tools in your arsenal.<br><br>* Get Up and Running with Netcat Simple yet powerful...Don't let the trouble-free installation and the easy command line belie the fact that Netcat is indeed a potent and powerful program.<br><br>* Go PenTesting with Netcat Master Netcat's port scanning and service identification capabilities as well as obtaining Web server application information. Test and verify outbound firewall rules and avoid detection by using antivirus software and the Window Firewall. Also, create a backdoor using Netcat.<br><br>* Conduct Enumeration and Scanning with Netcat, Nmap, and More! Netcat's not the only game in town...Learn the process of network of enumeration and scanning, and see how Netcat along with other tools such as Nmap and Scanrand can be used to thoroughly identify all of the assets on your network.<br><br>* Banner Grabbing with Netcat Banner grabbing is a simple yet highly effective method of gathering information about a remote target, and can be performed with relative ease with the Netcat utility.<br><br>* Explore the Dark Side of Netcat See the various ways Netcat has been used to provide malicious, unauthorized access to their targets. By walking through these methods used to set up backdoor access and circumvent protection mechanisms through the use of Netcat, we can understand how malicious hackers obtain and maintain illegal access. Embrace the dark side of Netcat, so that you may do good deeds later.<br><br>* Transfer Files Using Netcat The flexability and simple operation allows Netcat to fill a niche when it comes to moving a file or files in a quick and easy fashion. Encryption is provided via several different avenues including integrated support on some of the more modern Netcat variants, tunneling via third-party tools, or operating system integrated IPsec policies.<br><br>* Troubleshoot Your Network with Netcat Examine remote systems using Netat's scanning ability. Test open ports to see if they really are active and see what protocls are on those ports. Communicate with different applications to determine what problems might exist, and gain insight into how to solve these problems.<br><br>* Sniff Traffic within a System Use Netcat as a sniffer within a system to collect incoming and outgoing data. Set up Netcat to listen at ports higher than 1023 (the well-known ports), so you can use Netcat even as a normal user. Comprehensive introduction to the #4 most popular open source security tool available Tips and tricks on the legitimate uses of Netcat Detailed information on its nefarious purposes Demystifies security issues surrounding Netcat Case studies featuring dozens of ways to use Netcat in daily tasks",
                "author": "Jan Kanclirz",
                "slug": "netcat-power-tools-279287-9780080558738",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080558738.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279287",
                "product_url": "/app/ecom/book/279287/netcat-power-tools-279287-9780080558738",
                "bisac_codes": [
                    "COM053000",
                    "COM060000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597492577",
                    "EISBN13": "9780080558738",
                    "EISBN10": "0080558739"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026343055"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279286",
            "attributes": {
                "name": "ZigBee Wireless Networks and Transceivers",
                "subtitle": "",
                "description": "ZigBee is a short-range wireless networking standard backed by such industry leaders as Motorola, Texas Instruments, Philips, Samsung, Siemens, Freescale, etc. It supports mesh networking, each node can transmit and receive data, offers high security and robustness, and is being rapidly adopted in industrial, control/monitoring, and medical applications. This book will explain the ZigBee protocol, discuss the design of ZigBee hardware, and describe how to design and implement ZigBee networks. The book has a dedicated website for the latest technical updates, ZigBee networking calculators, and additional materials. Dr. Farahani is a ZigBee system engineer for Freescale semiconductors Inc. The book comes with a dedicated website that contains additional resources and calculators: http://www.learnZigBee.com Provides a comprehensive overview of ZigBee technology and networking, from RF/physical layer considerations to application layer development Discusses ZigBee security features such as encryption Describes how ZigBee can be used in location detection applications Explores techniques for ZigBee co-existence with other wireless technologies such as 802.11 and Bluetooth The book comes with a dedicated website that contains additional resources and calculators: http://www.learnZigBee.com",
                "author": "Shahin Farahani",
                "slug": "zigbee-wireless-networks-and-transceivers-279286-9780080558479-shahin-farahani",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080558479.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279286",
                "product_url": "/app/ecom/book/279286/zigbee-wireless-networks-and-transceivers-279286-9780080558479-shahin-farahani",
                "bisac_codes": [
                    "TEC007000",
                    "TEC008070"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780750683937",
                    "EISBN13": "9780080558479",
                    "EISBN10": "008055847X"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026355679"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279283",
            "attributes": {
                "name": "PEM Fuel Cell Modeling and Simulation Using Matlab",
                "subtitle": "",
                "description": "Although, the basic concept of a fuel cell is quite simple, creating new designs and optimizing their performance takes serious work and a mastery of several technical areas. PEM Fuel Cell Modeling and Simulation Using Matlab, provides design engineers and researchers with a valuable tool for understanding and overcoming barriers to designing and building the next generation of PEM Fuel Cells. With this book, engineers can test components and verify designs in the development phase, saving both time and money.<br><br>Easy to read and understand, this book provides design and modelling tips for fuel cell components such as: modelling proton exchange structure, catalyst layers, gas diffusion, fuel distribution structures, fuel cell stacks and fuel cell plant. This book includes design advice and MATLAB and FEMLAB codes for Fuel Cell types such as: polymer electrolyte, direct methanol and solid oxide fuel cells. This book also includes types for one, two and three dimensional modeling and two-phase flow phenomena and microfluidics.<br><br>*Modeling and design validation techniques<br>*Covers most types of Fuel Cell including SOFC <br>*MATLAB and FEMLAB modelling codes<br>*Translates basic phenomena into mathematical equations",
                "author": "Colleen Spiegel",
                "slug": "pem-fuel-cell-modeling-and-simulation-using-matlab-279283-9780080559018-colleen-spiegel",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080559018.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279283",
                "product_url": "/app/ecom/book/279283/pem-fuel-cell-modeling-and-simulation-using-matlab-279283-9780080559018-colleen-spiegel",
                "bisac_codes": [
                    "TEC031000",
                    "BUS069000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780123742599",
                    "EISBN13": "9780080559018",
                    "EISBN10": "0080559018"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026369874"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279280",
            "attributes": {
                "name": "Nitrogen in the Marine Environment",
                "subtitle": "",
                "description": "Since the first edition of Nitrogen in the Marine Environment was published in 1983, it has been recognized as the standard in the field.  In the time since the book first appeared, there has been tremendous growth in the field with unprecedented discoveries over the past decade that have fundamentally changed the view of the marine nitrogen cycle.  As a result, this Second Edition contains twice the amount of information that the first edition contained.  This updated edition is now available online, offering searchability and instant, multi-user access to this important information.<br><br>*The classic text, fully updated to reflect the rapid pace of discovery*Provides researchers and students in oceanography, chemistry, and marine ecology an understanding of the marine nitrogen cycle*Available online with easy access and search - the information you need, when you need it",
                "author": "Douglas G. Capone, Deborah A. Bronk, Margaret R. Mulholland, Edward J. Carpenter",
                "slug": "nitrogen-in-the-marine-environment-279280-9780123725226",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780123725226.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279280",
                "product_url": "/app/ecom/book/279280/nitrogen-in-the-marine-environment-279280-9780123725226",
                "bisac_codes": [
                    "SCI000000",
                    "703"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780080558929",
                    "EISBN13": "9780123725226",
                    "EISBN10": "0123725224"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026343823"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279279",
            "attributes": {
                "name": "How to Cheat at Securing Linux",
                "subtitle": "",
                "description": "Linux servers now account for 33% of all networks servers running worldwide (Source: IDC). The top 3 market share holders in the network server space (IBM, Hewlett-Packard, and Dell) all use Linux as their standard operating system. <br><br>This book teaches Linux system administrators how to protect their servers from malicious threats.<br><br>As with any technologies, increased usage results in increased attention from malicious hackers. For years a myth existed that Windows was inherently less secure than Linux, because there were significantly more attacks against Windows machines than Linux. This was a fallacy. There were more attacks against Windows machines because there were simply so many more Windows machines to attack. Now, the numbers tell the exact opposite story. Linux servers account for 1/3 of all servers worldwide, but in 2005 there were 3 times as many high-severity security vulnerabilities discovered on Linux servers (Source: IDC).<br><br>This book covers Open Source security, implementing an intrusion detection system, unearthing Rootkits, defending against malware, creating Virtual Private Networks, and much more.<br><br>The Perfect Reference for the Multitasked SysAdmin<br>* Discover Why \"Measure Twice, Cut Once\" Applies to Securing Linux<br>* Complete Coverage of Hardening the Operating System, Implementing an Intrusion Detection System, and Defending Databases<br>* Short on Theory, History, and Technical Data that Is Not Helpful in Performing Your Job",
                "author": "James Stanger",
                "slug": "how-to-cheat-at-securing-linux-279279-9780080558684-james-stanger",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080558684.png",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279279",
                "product_url": "/app/ecom/book/279279/how-to-cheat-at-securing-linux-279279-9780080558684-james-stanger",
                "bisac_codes": [
                    "COM053000",
                    "COM046070"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597492072",
                    "EISBN13": "9780080558684",
                    "EISBN10": "0080558682"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026355636"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279278",
            "attributes": {
                "name": "Software Development for Embedded Multi-core Systems",
                "subtitle": "A Practical Guide Using Embedded Intel Architecture",
                "description": "The multicore revolution has reached the deployment stage in embedded systems ranging from small ultramobile devices to large telecommunication servers. The transition from single to multicore processors, motivated by the need to increase performance while conserving power, has placed great responsibility on the shoulders of software engineers. In this new embedded multicore era, the toughest task is the development of code to support more sophisticated systems. This book provides embedded engineers with solid grounding in the skills required to develop software targeting multicore processors. Within the text, the author undertakes an in-depth exploration of performance analysis, and a close-up look at the tools of the trade. Both general multicore design principles and processor-specific optimization techniques are revealed. Detailed coverage of critical issues for multicore employment within embedded systems is provided, including the Threading Development Cycle, with discussions of analysis, design, development, debugging, and performance tuning of threaded applications. Software development techniques engendering optimal mobility and energy efficiency are highlighted through multiple case studies, which provide practical how-to advice on implementing the latest multicore processors. Finally, future trends are discussed, including terascale, speculative multithreading, transactional memory, interconnects, and the software-specific implications of these looming architectural developments. This is the only book to explain software optimization for embedded multi-core systems Helpful tips, tricks and design secrets from an Intel programming expert, with detailed examples using the popular X86 architecture Covers hot topics, including ultramobile devices, low-power designs, Pthreads vs. OpenMP, and heterogeneous cores",
                "author": "Max Domeika",
                "slug": "software-development-for-embedded-multi-core-systems-279278-9780080558585-max-domeika",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080558585.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279278",
                "product_url": "/app/ecom/book/279278/software-development-for-embedded-multi-core-systems-279278-9780080558585-max-domeika",
                "bisac_codes": [
                    "TEC007000",
                    "COM051230"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780750685399",
                    "EISBN13": "9780080558585",
                    "EISBN10": "0080558585"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026370722"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279277",
            "attributes": {
                "name": "Processor Description Languages",
                "subtitle": "",
                "description": "Efficient design of embedded processors plays a critical role in embedded systems design. Processor description languages and their associated specification, exploration and rapid prototyping methodologies are used to find the best possible design for a given set of applications under various design constraints, such as area, power and performance.  This book is the first, comprehensive survey of modern architecture description languages and will be an invaluable reference for embedded system architects, designers, developers, and validation engineers.  Readers will see that the use of particular architecture description languages will lead to productivity gains in designing particular (application-specific) types of embedded processors.<br><br>* Comprehensive coverage of all modern architecture description languages... use the right ADL to design your processor to fit your application;* Most up-to-date information available about each architecture description language from the developers...save time chasing down reliable documentation;* Describes how each architecture desccription language enables key design automation tasks, such as simulation, synthesis and testing...fit the ADL to your design cycle;",
                "author": "Prabhat Mishra, Nikil Dutt",
                "slug": "processor-description-languages-279277-9780080558370",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080558370.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279277",
                "product_url": "/app/ecom/book/279277/processor-description-languages-279277-9780080558370",
                "bisac_codes": [
                    "COM011000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780123742872",
                    "EISBN13": "9780080558370",
                    "EISBN10": "0080558372"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026353608"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279276",
            "attributes": {
                "name": "The IT / Digital Legal Companion",
                "subtitle": "A Comprehensive Business Guide to Software, IT, Internet, Media and IP Law",
                "description": "The IT/Digital Legal Companion is a comprehensive business and legal guidance covering intellectual property for digital business; digital contract fundamentals; open source rules and strategies; development, consulting and outsourcing; software as a service; business software licensing, partnering, and distribution; web and Internet agreements; privacy on the Internet; digital multimedia content clearance and distribution; IT standards; video game development and content deals; international distribution; and user-created content, mash-ups, MMOGs, and web widgets.<br><br>Chapters deal with topics such as copyrights on the Internet, for software protection and around the world; trademarks and domain names; patents and digital technology companies; trade secrets and non-disclosure agreements; confidentiality, rights transfer, and non-competition agreements for employees; introduction to digital product and service contracts; a pragmatic guide to open source; IT services - development, outsourcing, and consulting; beta test agreements; commercial end-user agreements; terms of use for web sites and online applications; privacy and use of personal data; digital technology standards - opportunities, risks, and strategies; content for digital media; and deals in the web and mobile value chains.<br><br>This book is intended for executives, entrepreneurs, finance and business development officers; technology and engineering officers; marketers, licensing professionals, and technology professionals; in-house counsel; and anyone else that deals with software or digital technology in business.<br><br>Comprehensive Business and Legal Guidance including<br><br>* Securing Intellectual Property for Digital Business<br>* Digital Contract Fundamentals<br>* Open Source Rules and Strategies<br>* Development, Consulting and Outsourcing<br>* Software as a Service<br>* Business Software Licensing, Partnering, and Distribution<br>* Web and Internet Agreements<br>* Privacy on the Internet<br>* Digital Multimedia Content Clearance and Distribution<br>* IT Standards<br>* Video Game Development and Content Deals<br>* International Distribution<br>* User-Created Content, Mash-Ups, MMOGs, and Web Widgets<br>* And Much More<br><br>Key Features:<br><br>* Up-to-the-Moment Legal Guide<br><br>* In Plain English<br><br>* Includes 38 Contract and Web Forms in the Book",
                "author": "Gene K. Landy, Amy J. Mastrobattista",
                "slug": "the-it-digital-legal-companion-279276-9780080558820-gene-k-landy-amy-j-mastrobattista",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080558820.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279276",
                "product_url": "/app/ecom/book/279276/the-it-digital-legal-companion-279276-9780080558820-gene-k-landy-amy-j-mastrobattista",
                "bisac_codes": [
                    "COM005000",
                    "COM032000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597492560",
                    "EISBN13": "9780080558820",
                    "EISBN10": "0080558828"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026348414"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279273",
            "attributes": {
                "name": "OSSEC Host-Based Intrusion Detection Guide",
                "subtitle": "",
                "description": "<p>This book is the definitive guide on the OSSEC Host-based Intrusion Detection system and frankly, to really use OSSEC you are going to need a definitive guide. Documentation has been available since the start of the OSSEC project but, due to time constraints, no formal book has been created to outline the various features and functions of the OSSEC product. This has left very important and powerful features of the product undocumented...until now! The book you are holding will show you how to install and configure OSSEC on the operating system of your choice and provide detailed examples to help prevent and mitigate attacks on your systems. -- Stephen Northcutt</p>  <p>OSSEC determines if a host has been compromised in this manner by taking the equivalent of a picture of the host machine in its original, unaltered state. This \"picture\" captures the most relevant information about that machine's configuration. OSSEC saves this \"picture\" and then constantly compares it to the current state of that machine to identify anything that may have changed from the original configuration. Now, many of these changes are necessary, harmless, and authorized, such as a system administrator installing a new software upgrade, patch, or application. But, then there are the not-so-harmless changes, like the installation of a rootkit, trojan horse, or virus. Differentiating between the harmless and the not-so-harmless changes determines whether the system administrator or security professional is managing a secure, efficient network or a compromised network which might be funneling credit card numbers out to phishing gangs or storing massive amounts of pornography creating significant liability for that organization. </p>  <p>Separating the wheat from the chaff is by no means an easy task. Hence the need for this book. The book is co-authored by Daniel Cid, who is the founder and lead developer of the freely available OSSEC host-based IDS. As such, readers can be certain they are reading the most accurate, timely, and insightful information on OSSEC.</p> Nominee for Best Book Bejtlich read in 2008! http://taosecurity.blogspot.com/2008/12/best-book-bejtlich-read-in-2008.html  Get Started with OSSEC. Get an overview of the features of OSSEC including commonly used terminology, pre-install preparation, and deployment considerations Follow Steb-by-Step Installation Instructions. Walk through the installation process for the \"local, agent, and \"server\" install types on some of the most popular operating systems available Master Configuration. Learn the basic configuration options for your install type and learn how to monitor log files, receive remote messages, configure email notification, and configure alert levels Work With Rules. Extract key information from logs using decoders and how you can leverage rules to alert you of strange occurrences on your network Understand System Integrity Check and Rootkit Detection. Monitor binary executable files, system configuration files, and the Microsoft Windows registry Configure Active Response. Configure the active response actions you want and bind the actions to specific rules and sequence of events Use the OSSEC Web User Interface. Install, configure, and use the community-developed, open source web interface available for OSSEC Play in the OSSEC VMware Environment Sandbox Dig Deep into Data Log Mining. Take the high art of log analysis to the next level by breaking the dependence on the lists of strings or patterns to look for in the logs",
                "author": "Daniel Cid, Andrew Hay, Rory Bray",
                "slug": "ossec-host-based-intrusion-detection-guide-279273-9780080558776-daniel-cid-andrew-hay-rory-bray",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080558776.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279273",
                "product_url": "/app/ecom/book/279273/ossec-host-based-intrusion-detection-guide-279273-9780080558776-daniel-cid-andrew-hay-rory-bray",
                "bisac_codes": [
                    "COM053000",
                    "COM046000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597492409",
                    "EISBN13": "9780080558776",
                    "EISBN10": "0080558771"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026365249"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279272",
            "attributes": {
                "name": "Microscope Image Processing",
                "subtitle": "",
                "description": "<p>Digital image processing, an integral part of microscopy, is increasingly important to the fields of medicine and scientific research. This book provides a unique one-stop reference on the theory, technique, and applications of this technology.</p>  <p>Written by leading experts in the field, this book presents a unique practical perspective of state-of-the-art microscope image processing and the development of specialized algorithms. It contains in-depth analysis of methods coupled with the results of specific real-world experiments. Microscope Image Processing covers image digitization and display, object measurement and classification, autofocusing, and structured illumination.</p>  <p>Key Features:</p>   Detailed descriptions of many leading-edge methods and algorithms In-depth analysis of the method and experimental results, taken from real-life examples Emphasis on computational and algorithmic aspects of microscope image processing Advanced material on geometric, morphological, and wavelet image processing, fluorescence, three-dimensional and time-lapse microscopy, microscope image enhancement, MultiSpectral imaging, and image data management  <p>This book is of interest to all scientists, engineers, clinicians, post-graduate fellows, and graduate students working in the fields of biology, medicine, chemistry, pharmacology, and other related fields. Anyone who uses microscopes in their work and needs to understand the methodologies and capabilities of the latest digital image processing techniques will find this book invaluable.</p> Presents a unique practical perspective of state-of-the-art microcope image processing and the development of specialized algorithms Each chapter includes in-depth analysis of methods coupled with the results of specific real-world experiments Co-edited by Kenneth R. Castleman, world-renowned pioneer in digital image processing and author of two seminal textbooks on the subject",
                "author": "Qiang Wu, Fatima Merchant, Kenneth Castleman",
                "slug": "microscope-image-processing-279272-9780080558547",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080558547.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279272",
                "product_url": "/app/ecom/book/279272/microscope-image-processing-279272-9780080558547",
                "bisac_codes": [
                    "TEC041000",
                    "TEC007000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780123725783",
                    "EISBN13": "9780080558547",
                    "EISBN10": "0080558542"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026362945"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279271",
            "attributes": {
                "name": "Physical and Logical Security Convergence: Powered By Enterprise Security Management",
                "subtitle": "",
                "description": "Government and companies have already invested hundreds of millions of dollars in the convergence of physical and logical security solutions, but there are no books on the topic.<br><br>This book begins with an overall explanation of information security, physical security, and why approaching these two different types of security in one way (called convergence) is so critical in todays changing security landscape. It then details enterprise security management as it relates to incident detection and incident management. This is followed by detailed examples of implementation, taking the reader through cases addressing various physical security technologies such as: video surveillance, HVAC, RFID, access controls, biometrics, and more. This topic is picking up momentum every day with every new computer exploit, announcement of a malicious insider, or issues related to terrorists, organized crime, and nation-state threats  The author has over a decade of real-world security and management expertise developed in some of the most sensitive and mission-critical environments in the world Enterprise Security Management (ESM) is deployed in tens of thousands of organizations worldwide",
                "author": "Brian T Contos, Colby DeRodeff, William P Crowell, Dan Dunkel, Eric Cole",
                "slug": "physical-and-logical-security-convergence-powered-by-enterprise-security-management-279271-9780080558783-brian-t-contos-colby-derodeff-william-p-crowell-dan-dunkel",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080558783.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279271",
                "product_url": "/app/ecom/book/279271/physical-and-logical-security-convergence-powered-by-enterprise-security-management-279271-9780080558783-brian-t-contos-colby-derodeff-william-p-crowell-dan-dunkel",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597491228",
                    "EISBN13": "9780080558783",
                    "EISBN10": "008055878X"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026347574"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279270",
            "attributes": {
                "name": "The Art of Designing Embedded Systems",
                "subtitle": "",
                "description": "Jack Ganssle has been forming the careers of embedded engineers for 20+ years. He has done this with four books, over 500 articles, a weekly column, and continuous lecturing. Technology moves fast and since the first edition of this best-selling classic much has changed. The new edition will reflect the author's new and ever evolving philosophy in the face of new technology and realities. Now more than ever an overarching philosophy of development is needed before just sitting down to build an application. Practicing embedded engineers will find that Jack provides a high-level strategic plan of attack to the often times chaotic and ad hoc design and development process. He helps frame and solve the issues an engineer confronts with real-time code and applications, hardware and software coexistences, and streamlines detail management. CONTENTS: Chapter 1 - IntroductionChapter 2  The ProjectChapter 3  The CodeChapter 4  Real TimeChapter 5  The Real WorldChapter 6  Disciplined DevelopmentAppendix A  A Firmware StandardAppendix B - A Simple Drawing SystemAppendix C  A Bosss Guide to Process Authored by Jack Ganssle, Tech Editor of Embedded Systems Programming and weekly column on embedded.com Keep schedules in check as projects and codes grow by taking time to understand the project beforehand Understand how cost/benefit coexists with design and development",
                "author": "Jack Ganssle",
                "slug": "the-art-of-designing-embedded-systems-279270-9780080568799-jack-ganssle",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080568799.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279270",
                "product_url": "/app/ecom/book/279270/the-art-of-designing-embedded-systems-279270-9780080568799-jack-ganssle",
                "bisac_codes": [
                    "TEC007000",
                    "034"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780750686440",
                    "EISBN13": "9780080568799",
                    "EISBN10": "0080568793"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026354815"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279269",
            "attributes": {
                "name": "Demystifying Embedded Systems Middleware",
                "subtitle": "",
                "description": "<p>This practical technical guide to embedded middleware implementation offers a coherent framework that guides readers through all the key concepts necessary to gain an understanding of this broad topic. Big picture theoretical discussion is integrated with down-to-earth advice on successful real-world use via step-by-step examples of each type of middleware implementation. Technically detailed case studies bring it all together, by providing insight into typical engineering situations readers are likely to encounter. Expert author Tammy Noergaard keeps explanations as simple and readable as possible, eschewing jargon and carefully defining acronyms.</p>  <p>The start of each chapter includes a \"setting the stage\" section, so readers can take a step back and understand the context and applications of the information being provided. Core middleware, such as networking protocols, file systems, virtual machines, and databases; more complex middleware that builds upon generic pieces, such as MOM, ORB, and RPC; and integrated middleware software packages, such as embedded JVMs, .NET, and CORBA packages are all demystified. </p> Embedded middleware theory and practice that will get your knowledge and skills up to speed Covers standards, networking, file systems, virtual machines, and more Get hands-on programming experience by starting with the downloadable open source code examples from book website",
                "author": "Tammy Noergaard",
                "slug": "demystifying-embedded-systems-middleware-279269-9780080558516-tammy-noergaard",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080558516.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279269",
                "product_url": "/app/ecom/book/279269/demystifying-embedded-systems-middleware-279269-9780080558516-tammy-noergaard",
                "bisac_codes": [
                    "TEC007000",
                    "TEC008070"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780750684552",
                    "EISBN13": "9780080558516",
                    "EISBN10": "0080558518"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026357205"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279268",
            "attributes": {
                "name": "Evaluating Children's Interactive Products",
                "subtitle": "Principles and Practices for Interaction Designers",
                "description": "<p>Evaluating Children's Interactive Products directly addresses the need to ensure that interactive products designed for children  whether toys, games, educational products, or websites  are safe, effective, and entertaining. It presents an essential background in child development and child psychology, particularly as they relate to technology; captures best practices for observing and surveying children, training evaluators, and capturing the child user experience using audio and visual technology; and examines ethical and legal issues involved in working with children and offers guidelines for effective risk management.</p>  <p>Based on the authors' workshops, conference courses, and own design experience and research, this highly practical book reads like a handbook, while being thoroughly grounded in the latest research. Throughout, the authors illustrate techniques and principles with numerous mini case studies and highlight practical information in tips and exercises and conclude with three in-depth case studies.</p>  <p>This book is recommended for usability experts, product developers, and researchers in the field.</p> Presents an essential background in child development and child psychology, particularly as they relate to technology Captures best practices for observing and surveying children, training evaluators, and capturing the child user experience using audio and visual technology Examines ethical and legal issues involved in working with children and offers guidelines for effective risk management",
                "author": "Panos Markopoulos, Janet C Read, Stuart MacFarlane, Johanna Hoysniemi",
                "slug": "evaluating-childrens-interactive-products-279268-9780080558257-panos-markopoulos-janet-c-read-stuart-macfarlane-johanna-hoysniemi",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080558257.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279268",
                "product_url": "/app/ecom/book/279268/evaluating-childrens-interactive-products-279268-9780080558257-panos-markopoulos-janet-c-read-stuart-macfarlane-johanna-hoysniemi",
                "bisac_codes": [
                    "COM070000",
                    "077"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780123741110",
                    "EISBN13": "9780080558257",
                    "EISBN10": "0080558259"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026354230"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279267",
            "attributes": {
                "name": "Kismet Hacking",
                "subtitle": "",
                "description": "Kismet is the industry standard for examining wireless network traffic, and is used by over 250,000 security professionals, wireless networking enthusiasts, and WarDriving hobbyists.<br><br>Unlike other wireless networking books that have been published in recent years that geared towards Windows users, Kismet Hacking is geared to those individuals that use the Linux operating system. People who use Linux and want to use wireless tools need to use Kismet. Now with the introduction of Kismet NewCore, they have a book that will answer all their questions about using this great tool. This book continues in the successful vein of books for wireless users such as WarDriving: Drive, Detect Defend. Wardrive Running Kismet from the BackTrack Live CD Build and Integrate Drones with your Kismet Server Map Your Data with GPSMap, KisMap, WiGLE and GpsDrive",
                "author": "Frank Thornton, Michael J. Schearer, Brad Haines",
                "slug": "kismet-hacking-279267-9780080558707-frank-thornton-michael-j-schearer-brad-haines",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080558707.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279267",
                "product_url": "/app/ecom/book/279267/kismet-hacking-279267-9780080558707-frank-thornton-michael-j-schearer-brad-haines",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597491174",
                    "EISBN13": "9780080558707",
                    "EISBN10": "0080558704"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026370418"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279266",
            "attributes": {
                "name": "Microsoft Forefront Security Administration Guide",
                "subtitle": "",
                "description": "Microsoft Forefront is a comprehensive suite of security products that will provide companies with multiple layers of defense against threats. Computer and Network Security is a paramount issue for companies in the global marketplace. Businesses can no longer afford for their systems to go down because of viruses, malware, bugs, trojans, or other attacks. Running a Microsoft Forefront Suite within your environment brings many different benefits. Forefront allows you to achieve comprehensive, integrated, and simplified infrastructure security. This comprehensive suite of tools provides end-to-end security stretching from Web servers back to the desktop. This book will provide system administrators familiar with Syngress' existing Microsoft networking and security titles with a complete reference to Microsoft's flagship security products. First book to address securing an entire Microsoft network from Web servers all the way back to the desktop Companion Web site provides best practices checklists for securing Microsoft operating systems, applications, servers, and databases Companion Web site provides special chapter on designing and implementing a disaster recover plan for a Microsoft network",
                "author": "Jesse Varsalone",
                "slug": "microsoft-forefront-security-administration-guide-279266-9780080558721-jesse-varsalone",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080558721.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279266",
                "product_url": "/app/ecom/book/279266/microsoft-forefront-security-administration-guide-279266-9780080558721-jesse-varsalone",
                "bisac_codes": [
                    "COM053000",
                    "COM046000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597492447",
                    "EISBN13": "9780080558721",
                    "EISBN10": "0080558720"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026347434"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279265",
            "attributes": {
                "name": "Managing Catastrophic Loss of Sensitive Data",
                "subtitle": "A Guide for IT and Security Professionals",
                "description": "Offering a structured approach to handling and recovering from a catastrophic data loss, this book will help both technical and non-technical professionals put effective processes in place to secure their business-critical information and provide a roadmap of the appropriate recovery and notification steps when calamity strikes. Addresses a very topical subject of great concern to security, general IT and business management Provides a step-by-step approach to managing the consequences of and recovering from the loss of sensitive data Gathers in a single place all information about this critical issue, including legal, public relations and regulatory issues",
                "author": "Constantine Photopoulos",
                "slug": "managing-catastrophic-loss-of-sensitive-data-279265-9780080558714-constantine-photopoulos",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080558714.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279265",
                "product_url": "/app/ecom/book/279265/managing-catastrophic-loss-of-sensitive-data-279265-9780080558714-constantine-photopoulos",
                "bisac_codes": [
                    "COM053000",
                    "077"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597492393",
                    "EISBN13": "9780080558714",
                    "EISBN10": "0080558712"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026343423"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279264",
            "attributes": {
                "name": "Nessus Network Auditing",
                "subtitle": "",
                "description": "<p>The Updated Version of the Bestselling Nessus Book. This is the ONLY Book to Read if You Run Nessus Across the Enterprise. Ever since its beginnings in early 1998, the Nessus Project has attracted security researchers from all walks of life. It continues this growth today. It has been adopted as a de facto standard by the security industry, vendor, and practitioner alike, many of whom rely on Nessus as the foundation to their security practices. Now, a team of leading developers have created the definitive book for the Nessus community.  Perform a Vulnerability Assessment Use Nessus to find programming errors that allow intruders to gain unauthorized access.  Obtain and Install Nessus Install from source or binary, set up up clients and user accounts, and update your plug-ins.  Modify the Preferences Tab Specify the options for Nmap and other complex, configurable components of Nessus.  Understand Scanner Logic and Determine Actual Risk Plan your scanning strategy and learn what variables can be changed.  Prioritize Vulnerabilities Prioritize and manage critical vulnerabilities, information leaks, and denial of service errors.  Deal with False Positives Learn the different types of false positives and the differences between intrusive and nonintrusive tests.  Get Under the Hood of Nessus Understand the architecture and design of Nessus and master the Nessus Attack Scripting Language (NASL).  Scan the Entire Enterprise Network Plan for enterprise deployment by gauging network bandwith and topology issues.</p> Nessus is the premier Open Source vulnerability assessment tool, and has been voted the \"most popular\" Open Source security tool several times. The first edition is still the only book available on the product. Written by the world's premier Nessus developers and featuring a foreword by the creator of Nessus, Renaud Deraison.",
                "author": "Russ Rogers",
                "slug": "nessus-network-auditing-279264-9780080558653",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080558653.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279264",
                "product_url": "/app/ecom/book/279264/nessus-network-auditing-279264-9780080558653",
                "bisac_codes": [
                    "COM053000",
                    "077"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597492089",
                    "EISBN13": "9780080558653",
                    "EISBN10": "0080558658"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026370310"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279263",
            "attributes": {
                "name": "The Designer's Guide to VHDL",
                "subtitle": "",
                "description": "VHDL, the IEEE standard hardware description language for describing digital electronic systems, has recently been revised. The Designer's Guide to VHDL has become a standard in the industry for learning the features of VHDL and using it to verify hardware designs. This third edition is the first comprehensive book on the market to address the new features of VHDL-2008. First comprehensive book on VHDL to incorporate all new features of VHDL-2008, the latest release of the VHDL standard Helps readers get up to speed quickly with new features of the new standard Presents a structured guide to the modeling facilities offered by VHDL Shows how VHDL functions to help design digital systems Includes extensive case studies and source code used to develop testbenches and case study examples Helps readers gain maximum facility with VHDL for design of digital systems",
                "author": "Peter J. Ashenden",
                "slug": "the-designers-guide-to-vhdl-279263-9780080568850-peter-j-ashenden",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080568850.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279263",
                "product_url": "/app/ecom/book/279263/the-designers-guide-to-vhdl-279263-9780080568850-peter-j-ashenden",
                "bisac_codes": [
                    "COM014000",
                    "COM000000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780120887859",
                    "EISBN13": "9780080568850",
                    "EISBN10": "0080568858"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026371497"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279262",
            "attributes": {
                "name": "Zigbee Wireless Networking",
                "subtitle": "",
                "description": "ZigBee is a standard based on the IEEE 802.15.4 standard for wireless personal networks. This standard allows for the creation of very lost cost and low power networks - these applications run for years rather than months. These networks are created from sensors and actuators and can wireless control many electrical products such as remote controls, medical, industrial, and security sensors. <br><br>Hundreds of companies are creating applications including Mitsubishi, Motorola, Freescale, and Siemens. This book is written for engineers who plan to develop ZigBee applications and networks, to understand how they work, and to evaluate this technology to see if it is appropriate to a particular project. This book does not simply state facts but explains what ZigBee can do through detailed code examples. Details how to plan and develop applications and networks Zigbee sensors have many applications including industrial automation, medical sensing, remote controls, and security Hot topic for today's electrical engineer because it is low cost and low power",
                "author": "Drew Gislason",
                "slug": "zigbee-wireless-networking-279262-9780080558622-drew-gislason",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080558622.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279262",
                "product_url": "/app/ecom/book/279262/zigbee-wireless-networking-279262-9780080558622-drew-gislason",
                "bisac_codes": [
                    "TEC007000",
                    "TEC008070"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780750685979",
                    "EISBN13": "9780080558622",
                    "EISBN10": "0080558623"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026370299"
                    }
                }
            }
        }
    ],
    "meta": {
        "pagination": {
            "page": 75048,
            "pages": 78413,
            "count": 1568241
        }
    }
}

Response Info

Default: None