GET /services/catalog/products?format=api&page=75053
Response information
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/vnd.api+json
Vary: Accept

{
    "links": {
        "first": "https://redshelf.com/services/catalog/products?format=api&page=1",
        "last": "https://redshelf.com/services/catalog/products?format=api&page=78409",
        "next": "https://redshelf.com/services/catalog/products?format=api&page=75054",
        "prev": "https://redshelf.com/services/catalog/products?format=api&page=75052"
    },
    "data": [
        {
            "type": "Product",
            "id": "00010000279044",
            "attributes": {
                "name": "Marine Propellers and Propulsion",
                "subtitle": "",
                "description": "Although the propeller lies submerged out of sight, it is a complex component in both the hydrodynamic and structural sense. This book fulfils the need for a comprehensive and cutting edge volume that brings together a great range of knowledge on propulsion technology, a multi-disciplinary and international subject.  The book comprises three main sections covering hydrodynamics; materials and mechanical considerations; and design, operation and performance.  The discussion relates theory to practical problems of design, analysis and operational economy, and is supported by extensive design information, operational detail and tabulated data.   Fully updated and revised to cover the latest advances in the field, the new edition now also includes four new chapters on azimuthing and podded propulsors, propeller-rudder interaction, high-speed propellers, and propeller-ice interaction.<br><br>\tThe most complete book available on marine propellers, fully updated and revised, with four new chapters on azimuthing and podded propulsors, propeller-rudder interaction, high-speed propellers, and propeller-ice interaction\tA valuable reference for marine engineers and naval architects gathering together the subject of propulsion technology, in both theory and practice, over the last forty years \tWritten by a leading expert on propeller technology, essential for students of propulsion and hydrodynamics, complete with online worked examples",
                "author": "John Carlton",
                "slug": "marine-propellers-and-propulsion-279044-9780080549231-john-carlton",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080549231.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279044",
                "product_url": "/app/ecom/book/279044/marine-propellers-and-propulsion-279044-9780080549231-john-carlton",
                "bisac_codes": [
                    "TRA006000",
                    "TEC009070"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780750681506",
                    "EISBN13": "9780080549231",
                    "EISBN10": "0080549233"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026358686"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279043",
            "attributes": {
                "name": "Complete PCB Design Using OrCad Capture and Layout",
                "subtitle": "",
                "description": "<p>Complete PCB Design Using OrCad Capture and Layout provides instruction on how to use the OrCAD design suite to design and manufacture printed circuit boards. The book is written for both students and practicing engineers who need a quick tutorial on how to use the software and who need in-depth knowledge of the capabilities and limitations of the software package.   There are two goals the book aims to reach:</p>  <p>The primary goal is to show the reader how to design a PCB using OrCAD Capture and OrCAD Layout. Capture is used to build the schematic diagram of the circuit, and Layout is used to design the circuit board so that it can be manufactured. </p>  <p>The secondary goal is to show the reader how to add PSpice simulation capabilities to the design, and how to develop custom schematic parts, footprints and PSpice models. Often times separate designs are produced for documentation, simulation and board fabrication. This book shows how to perform all three functions from the same schematic design. This approach saves time and money and ensures continuity between the design and the manufactured product. </p> Information is presented in the exact order a circuit and PCB are designed  Straightforward, realistic examples present the how and why the designs work, providing a comprehensive toolset for understanding the OrCAD software  Introduction to the IPC, JEDEC, and IEEE standards relating to PCB design  Full-color interior and extensive illustrations allow readers to learn features of the product in the most realistic manner possible",
                "author": "Kraig Mitzner",
                "slug": "complete-pcb-design-using-orcad-capture-and-layout-279043-9780080549200-kraig-mitzner",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080549200.png",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279043",
                "product_url": "/app/ecom/book/279043/complete-pcb-design-using-orcad-capture-and-layout-279043-9780080549200-kraig-mitzner",
                "bisac_codes": [
                    "TEC007000",
                    "TEC008070"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780750682145",
                    "EISBN13": "9780080549200",
                    "EISBN10": "0080549209"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026355611"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279042",
            "attributes": {
                "name": "XSS Attacks",
                "subtitle": "Cross Site Scripting Exploits and Defense",
                "description": "A cross site scripting attack is a very specific type of attack on a web application. It is used by hackers to mimic real sites and fool people into providing personal data.<br><br>XSS Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they are implemented, used, and abused. After XSS is thoroughly explored, the next part provides examples of XSS malware and demonstrates real cases where XSS is a dangerous risk that exposes internet users to remote access, sensitive data theft, and monetary losses. Finally, the book closes by examining the ways developers can avoid XSS vulnerabilities in their web applications, and how users can avoid becoming a victim. The audience is web developers, security practitioners, and managers. XSS Vulnerabilities exist in 8 out of 10 Web sites The authors of this book are the undisputed industry leading authorities Contains independent, bleeding edge research, code listings and exploits that can not be found anywhere else",
                "author": "Seth Fogie, Jeremiah Grossman, Robert Hansen, Anton Rager, Petko D. Petkov",
                "slug": "xss-attacks-279042-9780080553405-seth-fogie-jeremiah-grossman-robert-hansen-anton-rager-petko-d-petkov",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080553405.png",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279042",
                "product_url": "/app/ecom/book/279042/xss-attacks-279042-9780080553405-seth-fogie-jeremiah-grossman-robert-hansen-anton-rager-petko-d-petkov",
                "bisac_codes": [
                    "COM053000",
                    "077"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597491549",
                    "EISBN13": "9780080553405",
                    "EISBN10": "0080553400"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026355253"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279040",
            "attributes": {
                "name": "Passive Optical Networks",
                "subtitle": "Principles and Practice",
                "description": "<p>Passive optical network (PON) technologies have become an important broadband access technology as a result of the growing demand for bandwidth-hungry video-on-demand applications. Written by the leading researchers and industry experts in the field, Passive Optical Networks provides coherent coverage of networking technologies, fiber optic transmission technologies, as well as the electronics involved in PON system development.</p>  <p>Features:</p>   An in-depth overview of PON technologies and the potential applications that they enable Comprehensive review of all major PON standards and architecture evolutions, as well as their pros and cons Balanced coverage of recent research findings with economic and engineering considerations Presents system issues of protocols, performance, management and protection Extensive references to standards and research materials for further studies  <p>This book provides an authoritative overview of PON technologies and system requirements and is ideal for engineers and managers in industry, university researchers, and graduate students.</p> Balances treatment of the optical technologies with systems issues such as protocols, performance, management and protection Covers latest developments in WDM-PONS, protection switching, dynamic bandwidth allocation Practical coverage with a chapter on PON applications and deployment Case studies on implementing PONs",
                "author": "Cedric F. Lam",
                "slug": "passive-optical-networks-279040-9780080553450",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080553450.png",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279040",
                "product_url": "/app/ecom/book/279040/passive-optical-networks-279040-9780080553450",
                "bisac_codes": [
                    "COM043000",
                    "TEC030000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780123738530",
                    "EISBN13": "9780080553450",
                    "EISBN10": "0080553451"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026357358"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279039",
            "attributes": {
                "name": "RF Circuit Design",
                "subtitle": "",
                "description": "Its Back! New chapters, examples, and insights; all infused with the timeless concepts and theories that have helped RF engineers for the past 25 years!RF circuit design is now more important than ever as we find ourselves in an increasingly wireless world. Radio is the backbone of todays wireless industry with protocols such as Bluetooth, Wi-Fi, WiMax, and ZigBee. Most, if not all, mobile devices have an RF component and this book tells the reader how to design and integrate that component in a very practical fashion. This book has been updated to include today's integrated circuit (IC) and system-level design issues as well as keeping its classic \"wire lead\" material. Design Concepts and Tools IncludeThe Basics: Wires, Resistors, Capacitors, InductorsResonant Circuits: Resonance, Insertion Loss Filter Design: High-pass, Bandpass, Band-rejectionImpedance Matching: The L Network, Smith Charts, Software Design ToolsTransistors: Materials, Y Parameters, S ParametersSmall Signal RF Amplifier: Transistor Biasing, Y Parameters, S ParametersRF Power Amplifiers: Automatic Shutdown Circuitry , Broadband Transformers, Practical Winding HintsRF Front-End: Architectures, Software-Defined Radios, ADCs EffectsRF Design Tools: Languages, Flow, ModelingCheck out this books companion Web site at:   <p>http://www.elsevierdirect.com/companion.jsp?ISBN=9780750685184  for full-color Smith Charts and extra content!</p> Completely updated but still contains its classic timeless information Two NEW chapters on RF Front-End Design and RF Design Tools Not overly math intensive, perfect for the working RF and digital professional that need to build analog-RF-Wireless circuits",
                "author": "Christopher Bowick",
                "slug": "rf-circuit-design-279039-9780080553429-christopher-bowick",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080553429.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279039",
                "product_url": "/app/ecom/book/279039/rf-circuit-design-279039-9780080553429-christopher-bowick",
                "bisac_codes": [
                    "TEC008070",
                    "TEC008010"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780750685184",
                    "EISBN13": "9780080553429",
                    "EISBN10": "0080553427"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026370644"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279038",
            "attributes": {
                "name": "How to Cheat at VoIP Security",
                "subtitle": "",
                "description": "The Perfect Reference for the Multitasked SysAdmin<br>This is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies used against the SIP and H.323 protocols as well as VoIP network infrastructure. <br>* VoIP Isnt Just Another Data Protocol<br>IP telephony uses the Internet architecture, similar to any other data application. However, from a security administrators point of view, VoIP is different. Understand why. <br>* What Functionality Is Gained, Degraded, or Enhanced on a VoIP Network?<br>Find out the issues associated with quality of service, emergency 911 service, and the major benefits of VoIP.<br>* The Security Considerations of Voice Messaging<br>Learn about the types of security attacks you need to protect against within your voice messaging system.<br>* Understand the VoIP Communication Architectures<br>Understand what PSTN is and what it does as well as the H.323 protocol specification, and SIP Functions and features.<br>* The Support Protocols of VoIP Environments<br>Learn the services, features, and security implications of DNS, TFTP, HTTP, SNMP, DHCP, RSVP, SDP, and SKINNY.<br>* Securing the Whole VoIP Infrastructure<br>Learn about Denial-of-Service attacks, VoIP service disruption, call hijacking and interception, H.323-specific attacks, and SIP-specific attacks.<br>* Authorized Access Begins with Authentication<br>Learn the methods of verifying both the user identity and the device identity in order to secure a VoIP network.<br>* Understand Skype Security<br>Skype does not log a history like other VoIP solutions; understand the implications of conducting business over a Skype connection.<br>* Get the Basics of a VoIP Security Policy<br>Use a sample VoIP Security Policy to understand the components of a complete policy. Provides system administrators with hundreds of tips, tricks, and scripts to complete administration tasks more quickly and efficiently Short on theory, history, and technical data that ultimately is not helpful in performing their jobs Avoid the time drains associated with securing VoIP",
                "author": "Thomas Porter CISSP CCNP CCDA CCS, Michael Gough",
                "slug": "how-to-cheat-at-voip-security-279038-9780080553535-thomas-porter-cissp-ccnp-ccda-ccs-michael-gough",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080553535.png",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279038",
                "product_url": "/app/ecom/book/279038/how-to-cheat-at-voip-security-279038-9780080553535-thomas-porter-cissp-ccnp-ccda-ccs-michael-gough",
                "bisac_codes": [
                    "COM053000",
                    "COM043000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597491693",
                    "EISBN13": "9780080553535",
                    "EISBN10": "0080553532"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026371279"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279036",
            "attributes": {
                "name": "How to Cheat at IIS 7 Server Administration",
                "subtitle": "",
                "description": "According to Microsoft, Internet Information Services (IIS) 7.0 is a web server that provides a secure, easy to manage platform for developing and reliably hosting Web applications and services. With the new version of IIS, there are more security options, 40 new feature models that allow administrators to customize their settings, and a new set of administration tools. Administrators migrating from version 6 will find this How to Cheat book the perfect vehicle for getting up to speed fast on the new version.<br>IIS version 7 is the perfect product for the How to Cheat series. This new version from Microsoft is an ambitious overhaul that tries to balance the growing needs for performance, cost effectiveness, and security. For the average SysAdmin, it will present a difficult migration path from earlier versions and a vexing number of new features. How to Cheat promises help get IIS 7 up and running as quickly and safely as possible. Provides the multi-tasked SysAdmin with the essential information needed to perform the daily tasks Emphasizes best-practice security measures Cover the major new release of IIS 7, which will create significant challenges for IT managers",
                "author": "Brian Frederick, Pattrick Santry, Chris Adams",
                "slug": "how-to-cheat-at-iis-7-server-administration-279036-9780080553542",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080553542.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279036",
                "product_url": "/app/ecom/book/279036/how-to-cheat-at-iis-7-server-administration-279036-9780080553542",
                "bisac_codes": [
                    "COM046050",
                    "COM053000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597491556",
                    "EISBN13": "9780080553542",
                    "EISBN10": "0080553540"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026351854"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279035",
            "attributes": {
                "name": "How to Cheat at Microsoft Vista Administration",
                "subtitle": "",
                "description": "The Perfect Reference for the Multitasked SysAdmin<br>The Microsoft Windows Vista operating system offers several changes and improvements over its predecessors. It not only brings a new and redesigned interface, but also improves on many administrative utilities and management consoles. It also enhances the systems reliability, performance, and problem-solving tools. As administrators, Vista will sometimes look like its predecessor, Windows XP, and at other times, look like an all-new operating system. How to Cheat will help you get Vista up and running as quickly and safely as possible and provide you with a solid idea of all the important changes and improvements the new Microsoft Vista OS has to offer.<br><br>In the book you will:<br>* Automate Windows Vista Installation<br>See how Windows installations can be automated for large-scale deployments using the Windows Automated Installation Kit (WAIK).<br>* Install and Maintain Devices<br>Windows Vista contains device drivers for hundreds of PnP devices, and the Device Manager snap-in is the main utility on a local computer for managing them.<br>* Customize Appearances, Taskbars, and Toolbars<br>See how to use a personalization page, use the taskbar, and customize desktop themes.<br>* Manage File System Formats, Partitions, and Volumes<br>Learn how Windows Vista supports basic and dynamic volumes and two partition styles: MBR and GPT.<br>* Increase File System Performance<br>Learn how using tools such as disk defragging, cluster size adjustment, removing short filename support, and compression can help with performance.<br>* Administer via Remote<br>Remote Desktop and Windows Firewall can help administrators perform administrative tasks on remote computers.<br>* Managing Services<br>The Services utility allows you to view the status of services, as well as to disable nonessential services.<br>* Configure TCP/IP in Vista<br>See how to configure TCP/IP (both IPv4 and IPv6) via the user interface or via the netsh command.<br>* See Whats New with Wireless in Vista<br>Understand wireless security and learn how to install a wireless network.<br>* Optimize Windows Startup, the Hard Disk, and More<br>Optimize memory, applications, and the network connection, and see how to monitor performance.<br><br>Contents Include<br>Introducing and Installing Microsoft Vista<br>Installing and Maintaining Hardware Devices and Drivers<br>Customizing Desktop Properties<br>Managing File Systems and Disks<br>General Administration Tasks<br>Managing Local Networking Essentials<br>Managing the Wireless World and Its Security<br>Managing Security Essentials<br>Securing User Access<br>Tuning for Better Performance <br>Troubleshooting Provides the multi-tasked SysAdmin with the essential information needed to perform the daily tasks Covers the major new release of Windows, which will create significant challenges for IT managers Emphasizes best-practice security measures",
                "author": "Jan Kanclirz",
                "slug": "how-to-cheat-at-microsoft-vista-administration-279035-9780080553559-jan-kanclirz",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080553559.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279035",
                "product_url": "/app/ecom/book/279035/how-to-cheat-at-microsoft-vista-administration-279035-9780080553559-jan-kanclirz",
                "bisac_codes": [
                    "COM046050",
                    "COM046000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597491747",
                    "EISBN13": "9780080553559",
                    "EISBN10": "0080553559"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026370421"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279034",
            "attributes": {
                "name": "CIMA Exam Practice Kit Financial Analysis",
                "subtitle": "2007 edition",
                "description": "CIMA Exam Practice Kits consolidate learning by providing an extensive bank of practice questions. Each solution provides an in depth analysis of the correct answer and highlights why the alternatives are incorrect. CIMA Exam Practice Kits are ideal for students studying independently or attending a tutored revision course. It supplements the Official CIMA Learning Systems and CIMA Revision Cards with a wealth of additional questions and material focused purely on applying what has been learnt to passing the exam. CIMA Exam Practice Kits help students prepare with confidence for exam day, and to pass first time<br><br>* Helps CIMA students to prepare and pass first time * Practice applying and displaying knowledge so CIMA examiners can award you marks * Provides worked answers to fully explain the correct answer, and analysis of incorrect answers - helping CIMA students avoid common pitfalls",
                "author": "Paul Rodgers",
                "slug": "cima-exam-practice-kit-financial-analysis-279034-9780080549132-paul-rodgers",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080549132.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279034",
                "product_url": "/app/ecom/book/279034/cima-exam-practice-kit-financial-analysis-279034-9780080549132-paul-rodgers",
                "bisac_codes": [
                    "BUS001040",
                    "BUS041000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780750683739",
                    "EISBN13": "9780080549132",
                    "EISBN10": "0080549136"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026367926"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279033",
            "attributes": {
                "name": "Advanced Fluid Mechanics",
                "subtitle": "",
                "description": "<p>Fluid mechanics is the study of how fluids behave and interact under various forces and in various applied situations, whether in liquid or gas state or both. The author of Advanced Fluid Mechanics compiles pertinent information that are introduced in the more advanced classes at the senior level and at the graduate level. Advanced Fluid Mechanics courses typically cover a variety of topics involving fluids in various multiple states (phases), with both elastic and non-elastic qualities, and flowing in complex ways. This new text will integrate both the simple stages of fluid mechanics (Fundamentals) with those involving more complex parameters, including Inviscid Flow in multi-dimensions, Viscous Flow and Turbulence, and a succinct introduction to Computational Fluid Dynamics. It will offer exceptional pedagogy, for both classroom use and self-instruction, including many worked-out examples, end-of-chapter problems, and actual computer programs that can be used to reinforce theory with real-world applications.</p>  <p>Professional engineers as well as Physicists and Chemists working in the analysis of fluid behavior in complex systems will find the contents of this book useful. All manufacturing companies involved in any sort of systems that encompass fluids and fluid flow analysis (e.g., heat exchangers, air conditioning and refrigeration, chemical processes, etc.) or energy generation (steam boilers, turbines and internal combustion engines, jet propulsion systems, etc.), or fluid systems and fluid power (e.g., hydraulics, piping systems, and so on)will reap the benefits of this text.</p> Offers detailed derivation of fundamental equations for better comprehension of more advanced mathematical analysis Provides groundwork for more advanced topics on boundary layer analysis, unsteady flow, turbulent modeling, and computational fluid dynamics Includes worked-out examples and end-of-chapter problems as well as a companion web site with sample computational programs and Solutions Manual",
                "author": "William Graebel",
                "slug": "advanced-fluid-mechanics-279033-9780080549088-william-graebel",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080549088.png",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279033",
                "product_url": "/app/ecom/book/279033/advanced-fluid-mechanics-279033-9780080549088-william-graebel",
                "bisac_codes": [
                    "TEC009000",
                    "TEC009070"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780123708854",
                    "EISBN13": "9780080549088",
                    "EISBN10": "008054908X"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026365421"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279032",
            "attributes": {
                "name": "How to Cheat at Configuring Open Source Security Tools",
                "subtitle": "",
                "description": "The Perfect Reference for the Multitasked SysAdmin<br>This is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using products like Snort and Wireshark and some of the add-ons available for both. In addition, learn handy techniques for network troubleshooting and protecting the perimeter.<br><br>* Take Inventory<br>See how taking an inventory of the devices on your network must be repeated regularly to ensure that the inventory remains accurate.<br>* Use Nmap<br>Learn how Nmap has more features and options than any other free scanner.<br>* Implement Firewalls<br>Use netfilter to perform firewall logic and see how SmoothWall can turn a PC into a dedicated firewall appliance that is completely configurable.<br>* Perform Basic Hardening<br>Put an IT security policy in place so that you have a concrete set of standards against which to measure. <br>* Install and Configure Snort and Wireshark<br>Explore the feature set of these powerful tools, as well as their pitfalls and other security considerations.<br>* Explore Snort Add-Ons<br>Use tools like Oinkmaster to automatically keep Snort signature files current.<br>* Troubleshoot Network Problems<br>See how to reporting on bandwidth usage and other metrics and to use data collection methods like sniffing, NetFlow, and SNMP.<br>* Learn Defensive Monitoring Considerations<br>See how to define your wireless network boundaries, and monitor to know if theyre being exceeded and watch for unauthorized traffic on your network. Covers the top 10 most popular open source security tools including Snort, Nessus, Wireshark, Nmap, and Kismet Follows Syngress' proven \"How to Cheat\" pedagogy providing readers with everything they need and nothing they don't",
                "author": "Michael Gregg, Eric Seagren, Angela Orebaugh, Matt Jonkman, Raffael Marty",
                "slug": "how-to-cheat-at-configuring-open-source-security-tools-279032-9780080553566-michael-gregg-eric-seagren-angela-orebaugh-matt-jonkman-raffael-marty",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080553566.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279032",
                "product_url": "/app/ecom/book/279032/how-to-cheat-at-configuring-open-source-security-tools-279032-9780080553566-michael-gregg-eric-seagren-angela-orebaugh-matt-jonkman-raffael-marty",
                "bisac_codes": [
                    "COM053000",
                    "077"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597491709",
                    "EISBN13": "9780080553566",
                    "EISBN10": "0080553567"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026370349"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279030",
            "attributes": {
                "name": "Wireless Communications & Networking",
                "subtitle": "",
                "description": "This book provides comprehensive coverage of mobile data networking and mobile communications under a single cover for diverse audiences including managers, practicing engineers, and students who need to understand this industry. In the last two decades, many books have been written on the subject of wireless communications and networking. However, mobile data networking and mobile communications were not fully addressed in a unified fashion. This book fills that gap in the literature and is written to provide essentials of wireless communications and wireless networking, including Wireless Personal Area Networks (WPAN), Wireless Local Area Networks (WLAN), and Wireless Wide Area Networks (WWAN). The first ten chapters of the book focus on the fundamentals that are required to study mobile data networking and mobile communications. Numerous solved examples have been included to show applications of theoretical concepts. In addition, unsolved problems are given at the end of each chapter for practice. (A solutions manual will be available.)After introducing fundamental concepts, the book focuses on mobile networking aspects. Four chapters are devoted on the discussion of WPAN, WLAN, WWAN, and internetworking between WLAN and WWAN. Remaining seven chapters deal with other aspects of mobile communications such as mobility management, security, cellular network planning, and 4G systems.A unique feature of this book that is missing in most of the available books on wireless communications and networking is a balance between the theoretical and practical concepts. Moreover, this book can be used to teach a one/two semester course in mobile data networking and mobile communications to ECE and CS students.<br><br>*Details the essentials of Wireless Personal Area Networks(WPAN), Wireless Local Are Networks (WLAN), and Wireless Wide Area Networks (WWAN)*Comprehensive and up-to-date coverage including the latest in standards and 4G technology*Suitable for classroom use in senior/first year grad level courses. Solutions manual and other instructor support available",
                "author": "Vijay Garg",
                "slug": "wireless-communications-networking-279030-9780080549071-vijay-garg",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080549071.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279030",
                "product_url": "/app/ecom/book/279030/wireless-communications-networking-279030-9780080549071-vijay-garg",
                "bisac_codes": [
                    "COM043000",
                    "077"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780123735805",
                    "EISBN13": "9780080549071",
                    "EISBN10": "0080549071"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026351242"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279028",
            "attributes": {
                "name": "Ethernet Networking for the Small Office and Professional Home Office",
                "subtitle": "",
                "description": "<p>In a local area network (LAN) or intranet, there are many pieces of hardare trying to gain access to the network transmission media at the same time (i.e., phone lines, coax, wireless, etc.). However, a network cable or wireless transmission frequency can physically only allow one node to use it at a given time. Therefore, there must be some way to regulate which node has control of the medium (a media access control, or MAC, protocol). Ethernet is a MAC protocol; it is one way to regulate physical access to network tranmission media.</p>  <p>Ethernet networking is used primarily by networks that are contained within a single physical location. If you need to design, install, and manage a network in such an envronment, i.e., home or small business office, then Ethernet Networking for the Small Office and Professional Home Office will give you an in-depth understanding of the technology involved in an Ethernet network.</p>  <p>One of the major goals of this book is to demystify the jargon of networks so that the reader gains a working familiarity with common networking terminology and acronyms.</p>  <p>In addition, this books explains not only how to choose and configure network hardware but also provides practical information about the types of network devices and software needed to make it all work. Tips and direction on how to manage an Ethernet network are also provided.</p>  <p>This book therefore goes beyond the hardware aspects of Ethernet to look at the entire network from bottom to top, along with enough technical detail to enable the reader to make intelligent choices about what types of transmission media are used and the way in which the various parts of the network are interconnected.</p> Explains how the Ethernet works, with emphasis on current technologies and emerging trends in gigabit and fast Ethernet, WiFi, routers, and security issues Teaches how to design and select complementary components of Ethernet networks with a focus on home and small business applications Discuses the various types of cables, software, and hardware involved in constructing, connecting, operating and monitoring Ethernet networks",
                "author": "Jan L. Harrington",
                "slug": "ethernet-networking-for-the-small-office-and-professional-home-office-279028-9780080553603-jan-l-harrington",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080553603.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279028",
                "product_url": "/app/ecom/book/279028/ethernet-networking-for-the-small-office-and-professional-home-office-279028-9780080553603-jan-l-harrington",
                "bisac_codes": [
                    "COM043000",
                    "077"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780123737441",
                    "EISBN13": "9780080553603",
                    "EISBN10": "0080553605"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026350882"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279027",
            "attributes": {
                "name": "Visualization in Medicine",
                "subtitle": "Theory, Algorithms, and Applications",
                "description": "Visualization in Medicine is the first book on visualization and its application to problems in medical diagnosis, education, and treatment. The book describes the algorithms, the applications and their validation (how reliable are the results?), and the clinical evaluation of the applications (are the techniques useful?). It discusses visualization techniques from research literature as well as the compromises required to solve practical clinical problems. The book covers image acquisition, image analysis, and interaction techniques designed to explore and analyze the data. The final chapter shows how visualization is used for planning liver surgery, one of the most demanding surgical disciplines. The book is based on several years of the authors' teaching and research experience. Both authors have initiated and lead a variety of interdisciplinary projects involving computer scientists and medical doctors, primarily radiologists and surgeons.<br><br>* A core field of visualization and graphics missing a dedicated book until now* Written by pioneers in the field and illustrated in full color* Covers theory as well as practice",
                "author": "Bernhard Preim, Dirk Bartz",
                "slug": "visualization-in-medicine-279027-9780080549057-bernhard-preim-dirk-bartz",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080549057.png",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279027",
                "product_url": "/app/ecom/book/279027/visualization-in-medicine-279027-9780080549057-bernhard-preim-dirk-bartz",
                "bisac_codes": [
                    "COM012000",
                    "077"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780123705969",
                    "EISBN13": "9780080549057",
                    "EISBN10": "0080549055"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026370909"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279025",
            "attributes": {
                "name": "Cyber Crime Investigations",
                "subtitle": "Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors",
                "description": "Written by a former NYPD cyber cop, this is the only book available that discusses the hard questions cyber crime investigators are asking.<br><br>The book begins with the chapter What is Cyber Crime? This introductory chapter describes the most common challenges faced by cyber investigators today. The following chapters discuss the methodologies behind cyber investigations; and frequently encountered pitfalls. Issues relating to cyber crime definitions, the electronic crime scene, computer forensics, and preparing and presenting a cyber crime investigation in court will be examined. Not only will these topics be generally be discussed and explained for the novice, but the hard questions the questions that have the power to divide this community will also be examined in a comprehensive and thoughtful manner. <br><br>This book will serve as a foundational text for the cyber crime community to begin to move past current difficulties into its next evolution. This book has been written by a retired NYPD cyber cop, who has worked many high-profile computer crime cases Discusses the complex relationship between the public and private sector with regards to cyber crime Provides essential information for IT security professionals and first responders on maintaining chain of evidence",
                "author": "James Steele, Anthony Reyes, Richard Brittson, Kevin O'Shea",
                "slug": "cyber-crime-investigations-279025-9780080553634-james-steele-anthony-reyes-richard-brittson-kevin-oshea",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080553634.png",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279025",
                "product_url": "/app/ecom/book/279025/cyber-crime-investigations-279025-9780080553634-james-steele-anthony-reyes-richard-brittson-kevin-oshea",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597491334",
                    "EISBN13": "9780080553634",
                    "EISBN10": "008055363X"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026358718"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279026",
            "attributes": {
                "name": "The Mantle and Core",
                "subtitle": "Treatise on Geochemistry,Volume 2",
                "description": "<p>Though largely inaccessible, the geochemistry of Earth's mantle and core can be examined through a wide variety of approaches. Volume 2 focuses first on \"remote\" sensing using evidence from cosmochemical, seismic, petrologic and geochemical approaches. Mantle composition is then examined in detail through descriptions of mantle samples brought to Earth's surface through tectonic, volcanic, and volatile-outgassing processes. The volume concludes with examination of processes that modify the composition of the mantle and core including an early magma ocean, partial melting, element partitioning between minerals and melts, and physical mixing caused by plate subduction, mantle convection and mass exchange between mantle and core.</p>  <p>Reprinted individual volume from the acclaimed Treatise on Geochemistry, (10 Volume Set, ISBN 0-08-043751-6, published in 2003)</p> Comprehensive and authoritative scope and focus Reviews from renowned scientists across a range of subjects, providing both overviews and new data, supplemented by extensive bibliographies Extensive illustrations and examples from the field",
                "author": "R.W. Carlson",
                "slug": "the-mantle-and-core-279026-9780080549019",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080549019.png",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279026",
                "product_url": "/app/ecom/book/279026/the-mantle-and-core-279026-9780080549019",
                "bisac_codes": [
                    "SCI019000",
                    "SCI005000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780080448480",
                    "EISBN13": "9780080549019",
                    "EISBN10": "0080549012"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026369260"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279024",
            "attributes": {
                "name": "Advances in Heat Transfer",
                "subtitle": "Transport Phenomena in Plasma",
                "description": "Advances in Heat Transfer fills the information gap between regularly scheduled journals and university-level textbooks by providing wide-ranging and in-depth review articles. Put simply, this book is essential reading for all mechanical, chemical and industrial engineers working in the field of heat transfer in graduate schools or industry. The articles, which serve as a broad review for experts in the field, will also be of great interest to non-specialists who need to keep up-to-date with the results of the latest research. Provides an overview of review articles on topics of current interest Bridges the gap between academic researchers and practitioners in industry A long-running and prestigious series",
                "author": "James P. Hartnett, Alexander Fridman, Young I. Cho, George A. Greene, Avram Bar-Cohen",
                "slug": "advances-in-heat-transfer-279024-9780080553719-james-p-hartnett",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080553719.png",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279024",
                "product_url": "/app/ecom/book/279024/advances-in-heat-transfer-279024-9780080553719-james-p-hartnett",
                "bisac_codes": [
                    "TEC009070",
                    "TEC009010"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780123739230",
                    "EISBN13": "9780080553719",
                    "EISBN10": "0080553710"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026352688"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279023",
            "attributes": {
                "name": "Business Continuity and Disaster Recovery Planning for IT Professionals",
                "subtitle": "",
                "description": "Powerful Earthquake Triggers Tsunami in Pacific. Hurricane Katrina Makes Landfall in the Gulf Coast. Avalanche Buries Highway in Denver. Tornado Touches Down in Georgia. These headlines not only have caught the attention of people around the world, they have had a significant effect on IT professionals as well. <br><br>As technology continues to become more integral to corporate operations at every level of the organization, the job of IT has expanded to become almost all-encompassing. These days, its difficult to find corners of a company that technology does not touch. As a result, the need to plan for potential disruptions to technology services has increased exponentially. <br><br>That is what Business Continuity Planning (BCP) is: a methodology used to create a plan for how an organization will recover after a disaster of various types. It takes into account both security and corporate risk management tatics.<br><br>There is a lot of movement around this initiative in the industry: the British Standards Institute is releasing a new standard for BCP this year. Trade shows are popping up covering the topic.<br><br>* Complete coverage of the 3 categories of disaster: natural hazards, human-caused hazards, and accidental and technical hazards.<br>* Only published source of information on the new BCI standards and government requirements.<br>* Up dated information on recovery from cyber attacks, rioting, protests, product tampering, bombs, explosions, and terrorism.",
                "author": "Susan Snedaker",
                "slug": "business-continuity-and-disaster-recovery-planning-for-it-professionals-279023-9780080553726-susan-snedaker",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080553726.png",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279023",
                "product_url": "/app/ecom/book/279023/business-continuity-and-disaster-recovery-planning-for-it-professionals-279023-9780080553726-susan-snedaker",
                "bisac_codes": [
                    "COM014000",
                    "COM053000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597491723",
                    "EISBN13": "9780080553726",
                    "EISBN10": "0080553729"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026343866"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279022",
            "attributes": {
                "name": "Microsoft Exchange Server 2007: Tony Redmond's Guide to Successful Implementation",
                "subtitle": "",
                "description": "<p>Microsoft Exchange Server 2007 marks the biggest advancement in the history of the Exchange Product group. The completely re-engineered server system will change the face of how IT administrators approach Exchange. </p>  <p>Tony Redmond, one of the worlds most acclaimed Exchange experts, offers insider insight from the very basics of the newly transformed architecture to understanding the nuances of the new and improved Microsoft Management Console (MMC) 3.0 and the two new administrative interfacesthe Exchange Management Console (EMC) and the Exchange Management Shell (EMS).</p> How Exchange works with Active Directory How the new management model works How to use the Exchange Management Shell to automate administrative operations How Outlook, Outlook Web Access, and Windows Mobile clients work with Exchange How Exchange 2007 message routing differs from previous versions How to help your users to use Exchange intelligently How to select hardware for Exchange 2007",
                "author": "Tony Redmond",
                "slug": "microsoft-exchange-server-2007-tony-redmonds-guide-to-successful-implementation-279022-9780080548982-tony-redmond",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080548982.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279022",
                "product_url": "/app/ecom/book/279022/microsoft-exchange-server-2007-tony-redmonds-guide-to-successful-implementation-279022-9780080548982-tony-redmond",
                "bisac_codes": [
                    "COM000000",
                    "COM043000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781555583477",
                    "EISBN13": "9780080548982",
                    "EISBN10": "0080548989"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026350873"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000279020",
            "attributes": {
                "name": "Simulation Modeling and Analysis with ARENA",
                "subtitle": "",
                "description": "Simulation Modeling and Analysis with Arena is a highly readable textbook which treats the essentials of the Monte Carlo discrete-event simulation methodology, and does so in the context of a popular Arena simulation environment.  It treats simulation modeling as an in-vitro laboratory that facilitates the understanding of complex systems and experimentation with what-if scenarios in order to estimate their performance metrics.  The book contains chapters on the simulation modeling methodology and the underpinnings of discrete-event systems, as well as the relevant underlying probability, statistics, stochastic processes, input analysis, model validation and output analysis.  All simulation-related concepts are illustrated in numerous Arena examples, encompassing production lines, manufacturing and inventory systems, transportation systems, and computer information systems in networked settings. Introduces the concept of discrete event Monte Carlo simulation, the most commonly used methodology for modeling and analysis of complex systems Covers essential workings of the popular animated simulation language, ARENA, including set-up, design parameters, input data, and output analysis, along with a wide variety of sample model applications from production lines to transportation systems Reviews elements of statistics, probability, and stochastic processes relevant to simulation modeling",
                "author": "Tayfur Altiok, Benjamin Melamed",
                "slug": "simulation-modeling-and-analysis-with-arena-279020-9780080548951-tayfur-altiok-benjamin-melamed",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080548951.png",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "279020",
                "product_url": "/app/ecom/book/279020/simulation-modeling-and-analysis-with-arena-279020-9780080548951-tayfur-altiok-benjamin-melamed",
                "bisac_codes": [
                    "TEC009070",
                    "TEC009000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780123705235",
                    "EISBN13": "9780080548951",
                    "EISBN10": "0080548954"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026363572"
                    }
                }
            }
        }
    ],
    "meta": {
        "pagination": {
            "page": 75053,
            "pages": 78409,
            "count": 1568164
        }
    }
}

Response Info

Default: None