GET /services/catalog/products?format=api&page=75094
Response information
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/vnd.api+json
Vary: Accept

{
    "links": {
        "first": "https://redshelf.com/services/catalog/products?format=api&page=1",
        "last": "https://redshelf.com/services/catalog/products?format=api&page=78391",
        "next": "https://redshelf.com/services/catalog/products?format=api&page=75095",
        "prev": "https://redshelf.com/services/catalog/products?format=api&page=75093"
    },
    "data": [
        {
            "type": "Product",
            "id": "00010000277127",
            "attributes": {
                "name": "Theory of Plasticity",
                "subtitle": "",
                "description": "Plasticity is concerned with the mechanics of materials deformed beyond their elastic limit. A strong knowledge of plasticity is essential for engineers dealing with a wide range of engineering problems, such as those encountered in the forming of metals, the design of pressure vessels, the mechanics of impact, civil and structural engineering, as well as the understanding of fatigue and the economical design of structures. Theory of Plasticity is the most comprehensive reference on the subject as well as the most up to date -- no other significant Plasticity reference has been published recently, making this of great interest to academics and professionals. This new edition presents extensive new material on the use of computational methods, plus coverage of important developments in cyclic plasticity and soil plasticity. A complete plasticity reference for graduate students, researchers and practicing engineers; no other book offers such an up to date or comprehensive reference on this key continuum mechanics subject Updates with new material on computational analysis and applications, new end of chapter exercises Plasticity is a key subject in all mechanical engineering disciplines, as well as in manufacturing engineering and civil engineering. Chakrabarty is one of the subject's leading figures.",
                "author": "Jagabanduhu Chakrabarty",
                "slug": "theory-of-plasticity-277127-9780080481364-jagabanduhu-chakrabarty",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080481364.png",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277127",
                "product_url": "/app/ecom/book/277127/theory-of-plasticity-277127-9780080481364-jagabanduhu-chakrabarty",
                "bisac_codes": [
                    "TEC009070",
                    "TEC021000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780750666381",
                    "EISBN13": "9780080481364",
                    "EISBN10": "0080481361"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026357180"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277126",
            "attributes": {
                "name": "Linux Networking Clearly Explained",
                "subtitle": "",
                "description": "Passionately democratic in its advocacy of networking for the masses, this is the first book on Linux networking written especially for the novice user. Because the free, open-source Linux operating system is winning so many converts today, the number of Linux-based networks will grow exponentially over the next few years. Taking up where Linux Clearly Explained left off, Linux Networking Clearly Explained walks the reader through the creation of a TCP/IP-based, Linux-driven local area network, beginning with a \"sandbox\" installation involving just two or three computers.  Readers master the fundamentals of system and network administration-including handling user accounts and setting up security-in this less complex environment.  The author then helps them along to the more sophisticated techniques associated with connecting this network to the Internet.<br><br>* Focuses on the 20% of Linux networking knowledge that satisfies 80% of network needs-including the needs of small businesses, workgroups within enterprises and high-tech homes.<br>* Teaches novices to implement DNS servers, network information services (NIS), network file systems (NFS), and all of the most important TCP/IP services, including email, Web and newsgroup access.<br>* Explains how to set up AppleTalk and Windows NT domain servers for networks that include MacIntosh or Windows systems.<br>* Comes with a CD containing the latest version of Red Hat Linux, as well as additional freeware/shareware Linux tools and network management applications.",
                "author": "Bryan Pfaffenberger, Michael Jang",
                "slug": "linux-networking-clearly-explained-277126-9780080491714-bryan-pfaffenberger-michael-jang",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080491714.png",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277126",
                "product_url": "/app/ecom/book/277126/linux-networking-clearly-explained-277126-9780080491714-bryan-pfaffenberger-michael-jang",
                "bisac_codes": [
                    "COM046000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780125331715",
                    "EISBN13": "9780080491714",
                    "EISBN10": "0080491715"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026365368"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277124",
            "attributes": {
                "name": "Synthetic Instruments: Concepts and Applications",
                "subtitle": "",
                "description": "<p>The way electronic instruments are built is changing in a deeply fundamental way. It is making an evolutionary leap to a new method of design that is being called synthetic instruments. This new method promises to be the most significant advance in electronic test and instrumentation since the introduction of automated test equipment (ATE). The switch to synthetic instruments is beginning now, and it will profoundly affect all test and measurement equipment that will be developed in the future.</p>  <p>Synthetic instruments are like ordinary instruments in that they are specific to a particular measurement or test. They might be a voltmeter that measures voltage, or a spectrum analyzer that measures spectra. The key, defining difference is this: synthetic instruments are implemented purely in software that runs on general purpose, non-specific measurement hardware with a high speed A/D and D/A at its core. In a synthetic instrument, the software is specific; the hardware is generic. Therefore, the \"personality\" of a synthetic instrument can be changed in an instant. A voltmeter may be a spectrum analyzer a few seconds later, and then become a power meter, or network analyzer, or oscilloscope. Totally different instruments are implemented on the same hardware and can be switched back and forth in the blink of an eye.</p>  <p>This book explains the basics of synthetic instrumentation for the many people that will need to quickly learn about this revolutionary way to design test equipment. This book attempts to demystify the topic, cutting through, commercial hype, and obscure, vague jargon, to get to the heart of the technique. It reveals the important basic underlying concepts, showing people how the synthetic instrument design approach, properly executed, is so effective in creating nstrumentation that out performs traditional approaches to T&M; and ATE being used today.</p> provides an overview and complete introduction to this revolutionary new technology enables equipment designers and manufacturers to produce vastly more functional and flexible instrumentation; it's not your father's multimeter!",
                "author": "Chris Nadovich",
                "slug": "synthetic-instruments-concepts-and-applications-277124-9780080481296-chris-nadovich",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080481296.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277124",
                "product_url": "/app/ecom/book/277124/synthetic-instruments-concepts-and-applications-277124-9780080481296-chris-nadovich",
                "bisac_codes": [
                    "TEC007000",
                    "TEC008070"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780750677837",
                    "EISBN13": "9780080481296",
                    "EISBN10": "0080481299"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026358402"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277121",
            "attributes": {
                "name": "Advances in Imaging and Electron Physics",
                "subtitle": "",
                "description": "<p>The subjects reviewed in the Advances in Imaging and Electron Physics series cover a broad range of themes including microscopy, electromagnetic fields and image coding. This volume concentrates on microscopy and pattern recognition and also electron physics.</p>  <p>The text bridges the gap between academic researchers and R&D; designers by addressing and solving daily issues, which makes this book essential reading.</p> Emphasizes broad and in depth article collaborations between world-renowned scientists in the field of image and electron physics Presents theory and it's application in a practical sense, providing long awaited solutions and new findings Provides a comprehensive overview of international congress proceedings and associated publications, as source material",
                "author": "Peter W. Hawkes",
                "slug": "advances-in-imaging-and-electron-physics-277121-9780080490076",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080490076.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277121",
                "product_url": "/app/ecom/book/277121/advances-in-imaging-and-electron-physics-277121-9780080490076",
                "bisac_codes": [
                    "TEC007000",
                    "TEC021000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780120147694",
                    "EISBN13": "9780080490076",
                    "EISBN10": "0080490077"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026356625"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277120",
            "attributes": {
                "name": "Introduction to Microprocessors and Microcontrollers",
                "subtitle": "",
                "description": "Assuming only a general science education this book introduces the workings of the microprocessor, its applications, and programming in assembler and high level languages such as C and Java. Practical work and knowledge-check questions contribute to building a thorough understanding with a practical focus. The book concludes with a step-by-step walk through a project based on the PIC microcontroller. The concise but clearly written text makes this an ideal book for electronics and IT students and a wide range of technicians and engineers, including IT systems support staff, and maintenance / service engineers.<br><br>*Crisp's conversational style introduces the fundamentals of the micro (microprocessors, microcontrollers, systems on a chip) in a way that is utterly painless but technically spot-on: the talent of a true teacher.*Microprocessors and microcontrollers are covered in one book, reflecting the importance of embedded systems in today's computerised world.*Practical work and knowledge-check questions support a lively text to build a firm understanding of the subject.",
                "author": "John Crisp",
                "slug": "introduction-to-microprocessors-and-microcontrollers-277120-9780080495729-john-crisp",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080495729.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277120",
                "product_url": "/app/ecom/book/277120/introduction-to-microprocessors-and-microcontrollers-277120-9780080495729-john-crisp",
                "bisac_codes": [
                    "COM059000",
                    "TEC008070"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780750659895",
                    "EISBN13": "9780080495729",
                    "EISBN10": "0080495729"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026354493"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277119",
            "attributes": {
                "name": "Strategies for Growth in SMEs",
                "subtitle": "The Role of Information and Information Sytems",
                "description": "Strategies for Growth in SMEs explores for the first time the role of information and information systems (IS) concepts in small and medium-sized enterprises (SMEs).  Most IS research focuses on large firms, yet the majority of firms in most economies are SMEs.  The book considers the applicability of IS theory and practice to SMEs and develops new theories that are relevant to these firms.Composed of 6 sections, it covers, amongst other things; the nature of SMEs, the background to IS, and SMEs' use of IS, issues of IS strategy and planning in SMEs, the way that firms can transform through use of IS, evaluation, IS flexibility, business process re-engineering, resource-based strategy and knowledge management, the appropriateness of existing theories and the development of new models to address SME-specific issues. The final section of the book reviews the learning in the previous chapters and poses future agendas for research.Written by two of the leading figures in the field, this book will be essential reading for researchers in IS and SMEs, students on entrepreneurship or IS courses, and others that focus on SMEs.<br><br>* A unique text relating IS theory to SMEs* Benefit from the authors' years of experience in the field* Familiarise yourself with this growth area for research and courses",
                "author": "Margi Levy, Philip Powell",
                "slug": "strategies-for-growth-in-smes-277119-9780080481166-margi-levy-philip-powell",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080481166.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277119",
                "product_url": "/app/ecom/book/277119/strategies-for-growth-in-smes-277119-9780080481166-margi-levy-philip-powell",
                "bisac_codes": [
                    "COM011000",
                    "COM000000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780750663519",
                    "EISBN13": "9780080481166",
                    "EISBN10": "0080481167"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026353956"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277118",
            "attributes": {
                "name": "Essential Java for Scientists and Engineers",
                "subtitle": "",
                "description": "Essential Java serves as an introduction to the programming language, Java, for scientists and engineers, and can also be used by experienced programmers wishing to learn Java as an additional language. The book focuses on how Java, and object-oriented programming, can be used to solve science and engineering problems.Many examples are included from a number of different scientific and engineering areas, as well as from business and everyday life. Pre-written packages of code are provided to help in such areas as input/output, matrix manipulation and scientific graphing. Takes a 'dive-in' approach, getting the reader writing and running programs immediately Teaches object-oriented programming for problem-solving in engineering and science",
                "author": "Brian H. Hahn, Katherine M. Malan",
                "slug": "essential-java-for-scientists-and-engineers-277118-9780080505916-brian-h-hahn-katherine-m-malan",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080505916.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277118",
                "product_url": "/app/ecom/book/277118/essential-java-for-scientists-and-engineers-277118-9780080505916-brian-h-hahn-katherine-m-malan",
                "bisac_codes": [
                    "COM000000",
                    "COM051010"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780750659918",
                    "EISBN13": "9780080505916",
                    "EISBN10": "0080505910"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026367923"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277117",
            "attributes": {
                "name": "Newnes PC Troubleshooting Pocket Book",
                "subtitle": "",
                "description": "Newnes PC Troubleshooting Pocket Book provides a concise and compact reference that describes, in a clear and straightforward manner, the principles and practice of faultfinding and upgrading PCs and peripherals.  The strong practical emphasis is backed up with many illustrations and examples of real-lie problems.  The book is aimed at anyone who is involved with the installation, configuration, maintenance, upgrading, repair or support of PC systems. It also provides non-technical users with sufficient background information, charts and checklists to enable the diagnosis of faults and help to carry out simple modifications and repairs.  The new edition of PC Troubleshooting will continue to include a number of short cuts that are instrumental in avoiding hours of potential frustration and costly effort.  In order to reflect rapid changes in computer technology (both hardware and software) this new edition has been completely revised and rewritten.  New and expanded sections on: modern machines (Pentium II, III, IV, AMD); modern buses (FSB, AGP, Cyrix, Chip sets); different RAM chip types and connectors; Win 2000, ME, XP; latest SCSI standards, Ultra DMA, \"live\" re-partitioning of the disc, FAT16, FAT36, NTFS, performance and compatibility differences; 'famous' viruses and personal firewalls. All the essential data for PC fault-finding and upgrading Ideal for systems support staff, businesses, students, teachers, and home PC users Strong practical emphasis is backed up with many illustrations and examples of real problems",
                "author": "Howard Anderson, Mike Tooley",
                "slug": "newnes-pc-troubleshooting-pocket-book-277117-9780080497464-howard-anderson-mike-tooley",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080497464.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277117",
                "product_url": "/app/ecom/book/277117/newnes-pc-troubleshooting-pocket-book-277117-9780080497464-howard-anderson-mike-tooley",
                "bisac_codes": [
                    "COM049000",
                    "TEC007000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780750659888",
                    "EISBN13": "9780080497464",
                    "EISBN10": "0080497462"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026367037"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277116",
            "attributes": {
                "name": "Strategic Business Planning for Accountants",
                "subtitle": "Methods, Tools and Case Studies",
                "description": "This book examines the practice of strategic business planning, including its functions, methods, tools, and the way in which they are employed. It does so in a practical way through case studies, which help in demonstrating how to innovate in order to overcome obstacles and cover new and evolving challenges.<br><br>The book is divided into six parts : <br> part 1 focuses on the strategic plan, as master plan of the enterprise <br> part 2 covers the management functions whose able execution makes the difference between success and failure: forecasting, planning, organizing, staffing, directing, and controlling <br> part 3 demonstrates that modern accounting rules, promoted by IFRS and US GAAP, not only assist in strategic financial planning but also provide a solid basis for management supervision and control <br> part 4 brings your attention the fact that costs matter. Strategic business plans that pay little or no attention to cost factors are doomed <br> part 5 addresses the issues associated with strategic products and markets. These range from research and development to market research, product planning, the able management of marketing functions, and sales effectiveness<br> part 6 concludes the book  with an emphasis on mergers, acquisitions, and consolidations and the risks associated with an M&A policy<br><br>Chief executives, operating officers, treasurers, financial officers, budget directors, accountants, auditors, product planners, marketing directors, and management accounting specialists will find this book of practical examples helpful to their decisions and to their work.<br><br>* Shows the factors to consider when planning how to take your company to the next level, from identifying and making strategic choices to capital allocation and financial planning. All from a professional accountant's perspective and in their language<br>* Full of case studies to help you relate your ideas to what other major companies have done before, including IBM, Delta Airlines, and Bloomberg - so you can learn from their success or failure<br>* Shows why strategic cost control is good governance, why and how to account for the cost of risk and how IFRS relates to strategic accounting principles",
                "author": "Dimitris N. Chorafas",
                "slug": "strategic-business-planning-for-accountants-277116-9780080481128-dimitris-n-chorafas",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080481128.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277116",
                "product_url": "/app/ecom/book/277116/strategic-business-planning-for-accountants-277116-9780080481128-dimitris-n-chorafas",
                "bisac_codes": [
                    "BUS001040",
                    "BUS044000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780750681322",
                    "EISBN13": "9780080481128",
                    "EISBN10": "0080481124"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026368695"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277115",
            "attributes": {
                "name": "Stealing The Network",
                "subtitle": "How to Own the Box",
                "description": "Stealing the Network: How to Own the Box is NOT intended to be a \"install, configure, update, troubleshoot, and defend book.\" It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the \"street fighting\" tactics used to attack networks and systems. Not just another \"hacker\" book, it plays on \"edgy\" market success of Steal this Computer Book with first hand, eyewitness accounts A highly provocative expose of advanced security exploits Written by some of the most high profile \"White Hats\", \"Black Hats\" and \"Gray Hats\" Gives readers a \"first ever\" look inside some of the most notorious network intrusions",
                "author": "Syngress",
                "slug": "stealing-the-network-277115-9780080481111-syngress",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080481111.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277115",
                "product_url": "/app/ecom/book/277115/stealing-the-network-277115-9780080481111-syngress",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781931836876",
                    "EISBN13": "9780080481111",
                    "EISBN10": "0080481116"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026356503"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277114",
            "attributes": {
                "name": "Oracle High Performance Tuning for 9i and 10g",
                "subtitle": "",
                "description": "There are three parts to tuning an Oracle database: data modeling, SQL code tuning and physical database configuration.<br><br>A data model contains tables and relationships between tables. Tuning a data model involves normalization and de-normalization. Different approaches are required depending on the application, such as OLTP or a Data Warehouse. Inappropriate database design can make SQL code impossible to tune. Poor data modeling can have a most profound effect on database performance since all SQL code is constructed from the data model. <br><br>Poorly written SQL code is often a culprit of performance problems and is expensive to rectify. However, tuning of SQL code is generally cheaper than changing the data model. SQL code tends to be contained inside independent blocks within applications or stored procedures.<br><br>Physical database tuning involves hardware resource usage, networking and various other Oracle things such as configuration and file distribution. Physical configuration is often a culprit of poor performance where Oracle is installed with defaults, and never altered by an expert.<br><br>*Includes all three aspects of Oracle database tuning: data model tuning, SQL & PL/SQL code tuning, physical plus configuration tuning<br>*Contains experienced guidance and real-world examples using large datasets                                              *Emphasizes development as opposed to operating system perspective",
                "author": "Gavin JT Powell",
                "slug": "oracle-high-performance-tuning-for-9i-and-10g-277114-9780080513294-gavin-jt-powell",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080513294.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277114",
                "product_url": "/app/ecom/book/277114/oracle-high-performance-tuning-for-9i-and-10g-277114-9780080513294-gavin-jt-powell",
                "bisac_codes": [
                    "COM021000",
                    "077"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781555583057",
                    "EISBN13": "9780080513294",
                    "EISBN10": "0080513298"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026367455"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277113",
            "attributes": {
                "name": "Stealing the Network",
                "subtitle": "How to Own a Continent",
                "description": "This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of \"Stealing the Network: How to Own the Box\"<br><br>* A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring<br>* An informative and scary insight into the boundries of hacking and cyber-terrorism<br>* Written by a team of the most accomplished cyber-security specialists in the world",
                "author": "Ryan Russell, Joe Grand, Tom Craig",
                "slug": "stealing-the-network-277113-9780080481104-ryan-russell-joe-grand-tom-craig",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080481104.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277113",
                "product_url": "/app/ecom/book/277113/stealing-the-network-277113-9780080481104-ryan-russell-joe-grand-tom-craig",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781931836050",
                    "EISBN13": "9780080481104",
                    "EISBN10": "0080481108"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026357676"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277112",
            "attributes": {
                "name": "Standard Handbook of Petroleum and Natural Gas Engineering",
                "subtitle": "",
                "description": "<p>This new edition of the Standard Handbook of Petroleum and Natural Gas Engineering provides you with the best, state-of-the-art coverage for every aspect of petroleum and natural gas engineering. With thousands of illustrations and 1,600 information-packed pages, this text is a handy and valuable reference.</p>  <p>Written by over a dozen leading industry experts and academics, the Standard Handbook of Petroleum and Natural Gas Engineering provides the best, most comprehensive source of petroleum engineering information available. Now in an easy-to-use single volume format, this classic is one of the true \"must haves\" in any petroleum or natural gas engineer's library.</p> A classic for the oil and gas industry for over 65 years! A comprehensive source for the newest developments, advances, and procedures in the petrochemical industry, covering everything from drilling and production to the economics of the oil patch Everything you need - all the facts, data, equipment, performance, and principles of petroleum engineering, information not found anywhere else A desktop reference for all kinds of calculations, tables, and equations that engineers need on the rig or in the office A time and money saver on procedural and equipment alternatives, application techniques, and new approaches to problems",
                "author": "William C. Lyons, Gary J Plisga BS",
                "slug": "standard-handbook-of-petroleum-and-natural-gas-engineering-277112-9780080481081-william-c-lyons-gary-j-plisga-bs",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080481081.png",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277112",
                "product_url": "/app/ecom/book/277112/standard-handbook-of-petroleum-and-natural-gas-engineering-277112-9780080481081-william-c-lyons-gary-j-plisga-bs",
                "bisac_codes": [
                    "TEC047000",
                    "034"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780750677851",
                    "EISBN13": "9780080481081",
                    "EISBN10": "0080481086"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026352959"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277111",
            "attributes": {
                "name": "The Grid 2",
                "subtitle": "Blueprint for a New Computing Infrastructure",
                "description": "<p>\"The Grid is an emerging infrastructure that will fundamentally change the way we think about-and use-computing. The word Grid is used by analogy with the electric power grid, which provides pervasive access to electricity and has had a dramatic impact on human capabilities and society. Many believe that by allowing all components of our information technology infrastructure-computational capabilities, databases, sensors, and people-to be shared flexibly as true collaborative tools the Grid will have a similar transforming effect, allowing new classes of applications to emerge.\" --From the Preface</p>  <p>In 1998, Ian Foster and Carl Kesselman introduced a whole new concept in computing with the first edition of this book. Today there is a broader and deeper understanding of the nature of the opportunities offered by Grid computing and the technologies needed to realize those opportunities. In Grid 2, the editors reveal the revolutionary impact of large-scale resource sharing and virtualization within science and industry, the intimate relationships between organization and resource sharing structures and the new technologies required to enable secure, reliable, and efficient resource sharing on large scale.</p>  <p>Foster and Kesselman have once again assembled a team of experts to present an up-to-date view of Grids that reports on real experiences and explains the available technologies and new technologies emerging from labs, companies and standards bodies. Grid 2, like its predecessor, serves as a manifesto, design blueprint, user guide and research agenda for future Grid systems.</p> 30 chapters including more than a dozen completely new chapters Web access to 13 unchanged chapters from the first edition Three personal essays by influential thinkers on the significance of Grids from the perspectives of infrastructure, industry, and science A foundational overview of the central Grid concepts and architectural principles Twelve application vignettes showcase working Grids in science, engineering, industry, and commerce Detailed discussions of core architecture and services, data and knowledge management, and higher-level tools Focused presentations on production Grid deployment, computing platforms, peer-to-peer technologies, and network infrastructures Extensive bibliography and glossary",
                "author": "Ian Foster, Carl Kesselman",
                "slug": "the-grid-2-277111-9780080521534",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080521534.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277111",
                "product_url": "/app/ecom/book/277111/the-grid-2-277111-9780080521534",
                "bisac_codes": [
                    "COM011000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781558609334",
                    "EISBN13": "9780080521534",
                    "EISBN10": "0080521533"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026345253"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277110",
            "attributes": {
                "name": "SSCP Systems Security Certified Practitioner Study Guide and DVD Training System",
                "subtitle": "",
                "description": "The SSCP Study Guide and DVD Training System is a unique and comprehensive combination of text, DVD-quality instructor-led training, and Web-based exam simulation and remediation. These components will give the student 100% coverage of all (ISC)2 official exam objectives and realistic exam simulation.<br><br>The SSCP Study Guide and DVD Training System consists of:<br>1.\tSSCP Study Guide The 1,000,000 readers who have read previous Syngress Study Guides will find many familiar features in the Study Guide along with many new enhancements including:<br>\tExercises: There will be frequent use of step-by-step exercises with many screen captures and line drawings. Exercises will be presented in sidebar-like style, and will run 1 to 2 pages. <br>\tAnatomy of a Question: Question types will be diagrammed and analyzed to give readers access to the theory behind the questions themselves.<br>\tTeacher's Pet: These will be written from the instructor's perspective and will provide insight into the teaching methodologies applied to certain objectives that will give readers the \"$2,000 worth of training in a $60 book feel.\" These will be presented in sidebar-like style and will run about 1 page.<br>\tObjectives Fast Track: End of chapter element containing each A-head from the chapter and succinct bullet points reviewing most important information from each section (same as current Solutions Fast Track). <br>\tFAQs: End of Chapter Frequently Asked Questions on objective content. These are not exam preparation questions (same as our current FAQ). <br>\tTest What You Learned: End of chapter exam preparation questions, which are in the format of the real exam.<br>2.\tSSCP DVD: The DVD will contain 1 hour of instructor-led training covering the most difficult to comprehend topics on the exam. The instructor's presentation will also include on-screen configurations and networking schematics.<br>SSCP from [email protected]  The accompanying Web site will provide students with realistic exam-simulations software. The exam will emulate the content and the look and feel of the real-exam. Students will be able to grade their performance on the Web-based exam and automatically link to the accompanying e-book for further review of difficult concepts<br><br>\t$2,000 worth of training in a $60 book, DVD, and Web-enhanced training system. Consumers of this product will receive an unprecedented value. Instructor-led training for similar certifications averages $2,000 per class, and retail DVD training products are priced from $69 to $129. Consumers are accustomed to paying 20% to 100% more than the cost of this training system for only the DVD!<br>\tChanges to the CISSP Certification pre-requisites will result in an increase in the popularity of the SSCP certification. Recently the (ISC)2 increased the work experience requirement of the CISSP certification to four years from three years.  This increase will result into current candidates for the CISSP to shift to the SSCP certification, as the verifiable field requirement is only one year.<br>\tSyngress well-positioned in wide open playing field. The landscape of certification publishing has changed dramatically over the past month with Coriolis ceasing operations, Hungry Minds facing an uncertain future after their acquisition by John Wiley & Sons, and Syngress ending its long-term relationship with Osborne McGraw Hill in pursuit of publishing Study Guides independently. We are confident that Syngress' long history of best-selling Study Guides will continue in this new era.",
                "author": "Syngress",
                "slug": "sscp-systems-security-certified-practitioner-study-guide-and-dvd-training-system-277110-9780080481074-syngress",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080481074.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277110",
                "product_url": "/app/ecom/book/277110/sscp-systems-security-certified-practitioner-study-guide-and-dvd-training-system-277110-9780080481074-syngress",
                "bisac_codes": [
                    "COM055000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781931836807",
                    "EISBN13": "9780080481074",
                    "EISBN10": "0080481078"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026343334"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277109",
            "attributes": {
                "name": "Guard Force Management, Updated Edition",
                "subtitle": "",
                "description": "Guard Force Management looks at the contract guard force as a business and demonstrates how current management techniques can be used to improve efficiency and increase profitability. The author takes proven management principles and applies them to the competitive security industry. <br><br>This updated edition includes an entirely new chapter on preparation and response to crisis in order to maintain business continuity. The book focuses on administrative and financial functions that are frequently neglected in guard companies, and discusses planning and conducting guard operations in detail.<br><br>* Addresses the administrative, financial and client service needs of the security guard function;* Details the analytical steps needed to establish, equip, train and employ a guard force;* Emphasizes practical, proven management techniques",
                "author": "Lucien Canton",
                "slug": "guard-force-management-updated-edition-277109-9780080507675-lucien-canton",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080507675.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277109",
                "product_url": "/app/ecom/book/277109/guard-force-management-updated-edition-277109-9780080507675-lucien-canton",
                "bisac_codes": [
                    "POL014000",
                    "785"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780750677417",
                    "EISBN13": "9780080507675",
                    "EISBN10": "0080507670"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026363424"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277108",
            "attributes": {
                "name": "Special Ops: Host and Network Security for Microsoft Unix and Oracle",
                "subtitle": "",
                "description": "Special Ops: Internal Network Security Guide is the solution for the impossible 24-hour IT work day. By now, most companies have hardened their perimeters and locked out the \"bad guys,\" but what has been done on the inside? This book attacks the problem of the soft, chewy center in internal networks. We use a two-pronged approach-Tactical and Strategic-to give readers a complete guide to internal penetration testing. Content includes the newest vulnerabilities and exploits, assessment methodologies, host review guides, secure baselines and case studies to bring it all together. We have scoured the Internet and assembled some of the best to function as Technical Specialists and Strategic Specialists. This creates a diversified project removing restrictive corporate boundaries. The unique style of this book will allow it to cover an incredibly broad range of topics in unparalleled detail. Chapters within the book will be written using the same concepts behind software development. Chapters will be treated like functions within programming code, allowing the authors to call on each other's data. These functions will supplement the methodology when specific technologies are examined thus reducing the common redundancies found in other security books.<br><br>This book is designed to be the \"one-stop shop\" for security engineers who want all their information in one place. The technical nature of this may be too much for middle management; however technical managers can use the book to help them understand the challenges faced by the engineers who support their businesses.<br><br>\tUnprecedented Team of Security Luminaries. Led by Foundstone Principal Consultant, Erik Pace Birkholz, each of the contributing authors on this book is a recognized superstar in their respective fields. All are highly visible speakers and consultants and their frequent presentations at major industry events such as the Black Hat Briefings and the 29th Annual Computer Security Institute Show in November, 2002 will provide this book with a high-profile launch.<br>\tThe only all-encompassing book on internal network security. Windows 2000, Windows XP, Solaris, Linux and Cisco IOS  and their applications are usually running simultaneously in some form on most enterprise networks. Other books deal with these components individually, but no other book provides a comprehensive solution like Special Ops. This book's unique style will give the reader the value of 10 books in 1.",
                "author": "Syngress",
                "slug": "special-ops-host-and-network-security-for-microsoft-unix-and-oracle-277108-9780080481050-syngress",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080481050.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277108",
                "product_url": "/app/ecom/book/277108/special-ops-host-and-network-security-for-microsoft-unix-and-oracle-277108-9780080481050-syngress",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781931836692",
                    "EISBN13": "9780080481050",
                    "EISBN10": "0080481051"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026364505"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277106",
            "attributes": {
                "name": "Advanced Derivatives Pricing and Risk Management",
                "subtitle": "Theory, Tools, and Hands-On Programming Applications",
                "description": "<p>Advanced Derivatives Pricing and Risk Management covers the most important and cutting-edge topics in financial derivatives pricing and risk management, striking a fine balance between theory and practice. The book contains a wide spectrum of problems, worked-out solutions, detailed methodologies, and applied mathematical techniques for which anyone planning to make a serious career in quantitative finance must master.</p>  <p>In fact, core portions of the books material originated and evolved after years of classroom lectures and computer laboratory courses taught in a world-renowned professional Masters program in mathematical finance.</p>  <p>The book is designed for students in finance programs, particularly financial engineering.</p>*Includes easy-to-implement VB/VBA numerical software libraries*Proceeds from simple to complex in approaching pricing and risk management problems*Provides analytical methods to derive cutting-edge pricing formulas for equity derivatives",
                "author": "Claudio Albanese, Giuseppe Campolieti",
                "slug": "advanced-derivatives-pricing-and-risk-management-277106-9780080488097-claudio-albanese-giuseppe-campolieti",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080488097.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277106",
                "product_url": "/app/ecom/book/277106/advanced-derivatives-pricing-and-risk-management-277106-9780080488097-claudio-albanese-giuseppe-campolieti",
                "bisac_codes": [
                    "BUS027000",
                    "BUS069000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780120476824",
                    "EISBN13": "9780080488097",
                    "EISBN10": "0080488099"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026358055"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277105",
            "attributes": {
                "name": "Snort Intrusion Detection 2.0",
                "subtitle": "",
                "description": "The incredible low maintenance costs of Snort combined with its powerful security features make it one of the fastest growing IDSs within corporate IT departments. <br><br>Snort 2.0 Intrusion Detection is written by a member of Snort.org. The book provides a valuable insight to the code base of Snort and in-depth tutorials of complex installation, configuration, and troubleshooting scenarios. <br><br>The primary reader will be an individual who has a working knowledge of the TCP/IP protocol, expertise in some arena of IT infrastructure, and is inquisitive about what has been attacking their IT network perimeter every 15 seconds. The most up-to-date and comprehensive coverage for Snort 2.0! Expert Advice from the Development Team and Step-by-Step Instructions for Installing, Configuring, and Troubleshooting the Snort 2.0 Intrusion Detection System.",
                "author": "Syngress",
                "slug": "snort-intrusion-detection-20-277105-9780080481005-syngress",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080481005.png",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277105",
                "product_url": "/app/ecom/book/277105/snort-intrusion-detection-20-277105-9780080481005-syngress",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781931836746",
                    "EISBN13": "9780080481005",
                    "EISBN10": "0080481000"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026357413"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277104",
            "attributes": {
                "name": "Snort 2.1 Intrusion Detection, Second Edition",
                "subtitle": "",
                "description": "Called \"the leader in the Snort IDS book arms race\" by Richard Bejtlich, top Amazon reviewer, this brand-new edition of the best-selling Snort book covers all the latest features of a major upgrade to the product and includes a bonus DVD with Snort 2.1 and other utilities.<br><br>Written by the same lead engineers of the Snort Development team, this will be the first book available on the major upgrade from Snort 2 to Snort 2.1 (in this community, major upgrades are noted by .x and not by full number upgrades as in 2.0 to 3.0). Readers will be given invaluable insight into the code base of Snort, and in depth tutorials of complex installation, configuration, and troubleshooting scenarios. Snort has three primary uses: as a straight packet sniffer, a packet logger, or as a full-blown network intrusion detection system. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes. Snort uses a flexible rules language to describe traffic that it should collect or pass, a detection engine that utilizes a modular plug-in architecture, and a real-time alerting capability. A CD containing the latest version of Snort as well as other up-to-date Open Source security utilities will accompany the book.<br><br>Snort is a powerful Network Intrusion Detection System that can provide enterprise wide sensors to protect your computer assets from both internal and external attack.<br><br>* Completly updated and comprehensive coverage of snort 2.1<br>* Includes free CD with all the latest popular plug-ins<br>* Provides step-by-step instruction for installing, configuring and troubleshooting",
                "author": "Brian Caswell, Jay Beale",
                "slug": "snort-21-intrusion-detection-second-edition-277104-9780080480992-brian-caswell-jay-beale",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080480992.png",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277104",
                "product_url": "/app/ecom/book/277104/snort-21-intrusion-detection-second-edition-277104-9780080480992-brian-caswell-jay-beale",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781931836043",
                    "EISBN13": "9780080480992",
                    "EISBN10": "0080480993"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026343267"
                    }
                }
            }
        }
    ],
    "meta": {
        "pagination": {
            "page": 75094,
            "pages": 78391,
            "count": 1567813
        }
    }
}

Response Info

Default: None