GET /services/catalog/products?format=api&page=75095
Response information
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/vnd.api+json
Vary: Accept

{
    "links": {
        "first": "https://redshelf.com/services/catalog/products?format=api&page=1",
        "last": "https://redshelf.com/services/catalog/products?format=api&page=78391",
        "next": "https://redshelf.com/services/catalog/products?format=api&page=75096",
        "prev": "https://redshelf.com/services/catalog/products?format=api&page=75094"
    },
    "data": [
        {
            "type": "Product",
            "id": "00010000277108",
            "attributes": {
                "name": "Special Ops: Host and Network Security for Microsoft Unix and Oracle",
                "subtitle": "",
                "description": "Special Ops: Internal Network Security Guide is the solution for the impossible 24-hour IT work day. By now, most companies have hardened their perimeters and locked out the \"bad guys,\" but what has been done on the inside? This book attacks the problem of the soft, chewy center in internal networks. We use a two-pronged approach-Tactical and Strategic-to give readers a complete guide to internal penetration testing. Content includes the newest vulnerabilities and exploits, assessment methodologies, host review guides, secure baselines and case studies to bring it all together. We have scoured the Internet and assembled some of the best to function as Technical Specialists and Strategic Specialists. This creates a diversified project removing restrictive corporate boundaries. The unique style of this book will allow it to cover an incredibly broad range of topics in unparalleled detail. Chapters within the book will be written using the same concepts behind software development. Chapters will be treated like functions within programming code, allowing the authors to call on each other's data. These functions will supplement the methodology when specific technologies are examined thus reducing the common redundancies found in other security books.<br><br>This book is designed to be the \"one-stop shop\" for security engineers who want all their information in one place. The technical nature of this may be too much for middle management; however technical managers can use the book to help them understand the challenges faced by the engineers who support their businesses.<br><br>\tUnprecedented Team of Security Luminaries. Led by Foundstone Principal Consultant, Erik Pace Birkholz, each of the contributing authors on this book is a recognized superstar in their respective fields. All are highly visible speakers and consultants and their frequent presentations at major industry events such as the Black Hat Briefings and the 29th Annual Computer Security Institute Show in November, 2002 will provide this book with a high-profile launch.<br>\tThe only all-encompassing book on internal network security. Windows 2000, Windows XP, Solaris, Linux and Cisco IOS  and their applications are usually running simultaneously in some form on most enterprise networks. Other books deal with these components individually, but no other book provides a comprehensive solution like Special Ops. This book's unique style will give the reader the value of 10 books in 1.",
                "author": "Syngress",
                "slug": "special-ops-host-and-network-security-for-microsoft-unix-and-oracle-277108-9780080481050-syngress",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080481050.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277108",
                "product_url": "/app/ecom/book/277108/special-ops-host-and-network-security-for-microsoft-unix-and-oracle-277108-9780080481050-syngress",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781931836692",
                    "EISBN13": "9780080481050",
                    "EISBN10": "0080481051"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026364505"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277106",
            "attributes": {
                "name": "Advanced Derivatives Pricing and Risk Management",
                "subtitle": "Theory, Tools, and Hands-On Programming Applications",
                "description": "<p>Advanced Derivatives Pricing and Risk Management covers the most important and cutting-edge topics in financial derivatives pricing and risk management, striking a fine balance between theory and practice. The book contains a wide spectrum of problems, worked-out solutions, detailed methodologies, and applied mathematical techniques for which anyone planning to make a serious career in quantitative finance must master.</p>  <p>In fact, core portions of the books material originated and evolved after years of classroom lectures and computer laboratory courses taught in a world-renowned professional Masters program in mathematical finance.</p>  <p>The book is designed for students in finance programs, particularly financial engineering.</p>*Includes easy-to-implement VB/VBA numerical software libraries*Proceeds from simple to complex in approaching pricing and risk management problems*Provides analytical methods to derive cutting-edge pricing formulas for equity derivatives",
                "author": "Claudio Albanese, Giuseppe Campolieti",
                "slug": "advanced-derivatives-pricing-and-risk-management-277106-9780080488097-claudio-albanese-giuseppe-campolieti",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080488097.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277106",
                "product_url": "/app/ecom/book/277106/advanced-derivatives-pricing-and-risk-management-277106-9780080488097-claudio-albanese-giuseppe-campolieti",
                "bisac_codes": [
                    "BUS027000",
                    "BUS069000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780120476824",
                    "EISBN13": "9780080488097",
                    "EISBN10": "0080488099"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026358055"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277105",
            "attributes": {
                "name": "Snort Intrusion Detection 2.0",
                "subtitle": "",
                "description": "The incredible low maintenance costs of Snort combined with its powerful security features make it one of the fastest growing IDSs within corporate IT departments. <br><br>Snort 2.0 Intrusion Detection is written by a member of Snort.org. The book provides a valuable insight to the code base of Snort and in-depth tutorials of complex installation, configuration, and troubleshooting scenarios. <br><br>The primary reader will be an individual who has a working knowledge of the TCP/IP protocol, expertise in some arena of IT infrastructure, and is inquisitive about what has been attacking their IT network perimeter every 15 seconds. The most up-to-date and comprehensive coverage for Snort 2.0! Expert Advice from the Development Team and Step-by-Step Instructions for Installing, Configuring, and Troubleshooting the Snort 2.0 Intrusion Detection System.",
                "author": "Syngress",
                "slug": "snort-intrusion-detection-20-277105-9780080481005-syngress",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080481005.png",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277105",
                "product_url": "/app/ecom/book/277105/snort-intrusion-detection-20-277105-9780080481005-syngress",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781931836746",
                    "EISBN13": "9780080481005",
                    "EISBN10": "0080481000"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026357413"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277104",
            "attributes": {
                "name": "Snort 2.1 Intrusion Detection, Second Edition",
                "subtitle": "",
                "description": "Called \"the leader in the Snort IDS book arms race\" by Richard Bejtlich, top Amazon reviewer, this brand-new edition of the best-selling Snort book covers all the latest features of a major upgrade to the product and includes a bonus DVD with Snort 2.1 and other utilities.<br><br>Written by the same lead engineers of the Snort Development team, this will be the first book available on the major upgrade from Snort 2 to Snort 2.1 (in this community, major upgrades are noted by .x and not by full number upgrades as in 2.0 to 3.0). Readers will be given invaluable insight into the code base of Snort, and in depth tutorials of complex installation, configuration, and troubleshooting scenarios. Snort has three primary uses: as a straight packet sniffer, a packet logger, or as a full-blown network intrusion detection system. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes. Snort uses a flexible rules language to describe traffic that it should collect or pass, a detection engine that utilizes a modular plug-in architecture, and a real-time alerting capability. A CD containing the latest version of Snort as well as other up-to-date Open Source security utilities will accompany the book.<br><br>Snort is a powerful Network Intrusion Detection System that can provide enterprise wide sensors to protect your computer assets from both internal and external attack.<br><br>* Completly updated and comprehensive coverage of snort 2.1<br>* Includes free CD with all the latest popular plug-ins<br>* Provides step-by-step instruction for installing, configuring and troubleshooting",
                "author": "Brian Caswell, Jay Beale",
                "slug": "snort-21-intrusion-detection-second-edition-277104-9780080480992-brian-caswell-jay-beale",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080480992.png",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277104",
                "product_url": "/app/ecom/book/277104/snort-21-intrusion-detection-second-edition-277104-9780080480992-brian-caswell-jay-beale",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781931836043",
                    "EISBN13": "9780080480992",
                    "EISBN10": "0080480993"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026343267"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277103",
            "attributes": {
                "name": "Understanding Credit Derivatives and Related Instruments",
                "subtitle": "",
                "description": "The global credit derivatives market is estimated to have grown from virtually nothing in the early 1990s to over $2 trillion dollars. Although still relatively young, the credit derivatives market has already developed to the point where one can characterize its evolution in terms of developments in its various segments, such as the market for single-name credit derivatives or the market for credit derivatives written on sovereign credits.Understanding Credit Derivatives offers a comprehensive introduction to the credit derivatives market. Rather than presenting a highly technical exploration of the subject, it offers intuitive and rigorous summaries of the major subjects and the principal perspectives associated with them. The centerpiece is pricing and valuation issues, especially discussions of different valuation tools and their use in credit models.<br><br>* Offers a broad overview of this growing field * Discusses all the main types of credit derivatives * Provides back-of-the-book summary of statistics and fixed-income mathematics",
                "author": "Antulio N. Bomfim",
                "slug": "understanding-credit-derivatives-and-related-instruments-277103-9780080481487-antulio-n-bomfim",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080481487.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277103",
                "product_url": "/app/ecom/book/277103/understanding-credit-derivatives-and-related-instruments-277103-9780080481487-antulio-n-bomfim",
                "bisac_codes": [
                    "BUS027000",
                    "BUS069000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780121082659",
                    "EISBN13": "9780080481487",
                    "EISBN10": "0080481485"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026357450"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277102",
            "attributes": {
                "name": "Sniffer Pro Network Optimization & Troubleshooting Handbook",
                "subtitle": "",
                "description": "<p>Sniffer Network Optimization and Troubleshooting Handbook introduces the reader to the vast functionality of the suite of Sniffer Solutions from Network Associates but ultimately focuses on the affordable and most widely used Sniffer Product - Sniffer Pro LAN Network Analyzer. This book begins with the basic features of Sniffer Pro LAN and then moves the reader through the impressive tips and tools available for gathering data, analyzing, troubleshooting, resolving and securing problems on their network.</p>  <p>Sniffer from Network Associates is a suite of tools including Sniffer Portable Analysis Suite, Sniffer Distributed Analysis Suite, Sniffer Reporting, Sniffer Optical, and Sniffer Wireless. With a clear market leadership, Sniffer Solutions are employed in over 80% of the enterprise networks of the Fortune 100. Sniffer has also received wide industry acclaim from the experts and its everyday users. In 2000 Sniffer was named one of the 10 most computer products of the decade by Network Computing Magazine. It also received the \"Editor's Choice\" award from PC Magazine during the second quarter of 2001.</p>  <p>Over 60,000 individuals have taken advantage of the educational services offered by Sniffer Technologies - aptly named Sniffer University. Coupled with the introduction of the Sniffer Certified Professional Program (SCPP) as a replacement for the popular CNX (Certified Network Expert) certification, an aptitude with Sniffer Solutions is a \"must-have\" for system administrators.</p> Offers comprehensive coverage of Sniffer Pro LAN Supplemental study materials for the SCPP certification track. As of April 2001, the CNX certifications track became inactive. Current CNXs looking to update their certifications to the new SCPP track are going to need to bring themselves up to speed on the new offerings from the Sniffer family of products before desertification Up to the Minute Web-based Support. Once the reader understands the concepts of network hardware, configuration, and implementation, they can receive up-to-the minute links, white papers, and analysis for one year at [email protected]",
                "author": "Syngress",
                "slug": "sniffer-pro-network-optimization-troubleshooting-handbook-277102-9780080480985-syngress",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080480985.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277102",
                "product_url": "/app/ecom/book/277102/sniffer-pro-network-optimization-troubleshooting-handbook-277102-9780080480985-syngress",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781931836579",
                    "EISBN13": "9780080480985",
                    "EISBN10": "0080480985"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026357407"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277100",
            "attributes": {
                "name": "Knowledge Representation and Reasoning",
                "subtitle": "",
                "description": "Knowledge representation is at the very core of a radical idea for understanding intelligence. Instead of trying to understand or build brains from the bottom up, its goal is to understand and build intelligent behavior from the top down, putting the focus on what an agent needs to know in order to behave intelligently, how this knowledge can be represented symbolically, and how automated reasoning procedures can make this knowledge available as needed. This landmark text takes the central concepts of knowledge representation developed over the last 50 years and illustrates them in a lucid and compelling way. Each of the various styles of representation is presented in a simple and intuitive form, and the basics of reasoning with that representation are explained in detail. This approach gives readers a solid foundation for understanding the more advanced work found in the research literature. The presentation is clear enough to be accessible to a broad audience, including researchers and practitioners in database management, information retrieval, and object-oriented systems as well as artificial intelligence. This book provides the foundation in knowledge representation and reasoning that every AI practitioner needs. Authors are well-recognized experts in the field who have applied the techniques to real-world problems Presents the core ideas of KR&R; in a simple straight forward approach, independent of the quirks of research systems  Offers the first true synthesis of the field in over a decade",
                "author": "Ronald Brachman, Hector Levesque",
                "slug": "knowledge-representation-and-reasoning-277100-9780080489322-ronald-brachman-hector-levesque",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080489322.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277100",
                "product_url": "/app/ecom/book/277100/knowledge-representation-and-reasoning-277100-9780080489322-ronald-brachman-hector-levesque",
                "bisac_codes": [
                    "COM004000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781558609327",
                    "EISBN13": "9780080489322",
                    "EISBN10": "008048932X"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026365067"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277099",
            "attributes": {
                "name": "Sensor Technology Handbook",
                "subtitle": "",
                "description": "Without sensors most electronic applications would not existthey perform a vital function, namely providing an interface to the real world. The importance of sensors, however, contrasts with the limited information available on them. Today's smart sensors, wireless sensors, and microtechnologies are revolutionizing sensor design and applications. This volume is a comprehensive sensor reference guide to be used by engineers and scientists in industry, research, and academia to help with their sensor selection and system design. It is filled with hard-to-find information, contributed by noted engineers and companies working in the field today. The book offers guidance on selecting, specifying, and using the optimum sensor for any given application. The editor-in-chief, Jon Wilson, has years of experience in the sensor industry and leads workshops and seminars on sensor-related topics. In addition to background information on sensor technology, measurement, and data acquisition, the handbook provides detailed information on each type of sensor technology, covering: technology fundamentals sensor types, w/ advantages/disadvantages manufacturers selecting and specifying sensors applicable standards (w/ urls of related web sites) interfacing information, with hardware and software info design techniques and tips, with design examples latest and future developmentsThe handbook also contains information on the latest MEMS and nanotechnology sensor applications. Jam-packed with over 800 pages of techniques and tips, detailed design examples, standards, hardware and software interfacing information, and manufacturer pros/cons to help make the best sensor selection for any design Covers sensors from A to Z- from basic technological fundamentals, to cutting-edge info. on the latest MEMS and the hottest nanotechnology applications",
                "author": "Jon S. Wilson",
                "slug": "sensor-technology-handbook-277099-9780080480848-jon-s-wilson",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080480848.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277099",
                "product_url": "/app/ecom/book/277099/sensor-technology-handbook-277099-9780080480848-jon-s-wilson",
                "bisac_codes": [
                    "TEC021000",
                    "BUS044000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780750677295",
                    "EISBN13": "9780080480848",
                    "EISBN10": "0080480845"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026354896"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277098",
            "attributes": {
                "name": "Security Assessment",
                "subtitle": "Case Studies for Implementing the NSA IAM",
                "description": "<p>The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or availability. Security Assessment shows how to do a complete security assessment based on the NSA's guidelines.</p>  <p>Security Assessment also focuses on providing a detailed organizational information technology security assessment using case studies. The Methodology used for the assessment is based on the National Security Agency's (NSA) INFOSEC Assessment Methodology (IAM). Examples will be given dealing with issues related to military organizations, medical issues, critical infrastructure (power generation etc).</p>  <p>Security Assessment is intended to provide an educational and entertaining analysis of an organization, showing the steps of the assessment and the challenges faced during an assessment. It will also provide examples, sample templates, and sample deliverables that readers can take with them to help them be better prepared and make the methodology easier to implement.</p> Everything You Need to Know to Conduct a Security Audit of Your Organization Step-by-Step Instructions for Implementing the National Security Agency's Guidelines Special Case Studies Provide Examples in Healthcare, Education, Infrastructure, and more",
                "author": "Syngress",
                "slug": "security-assessment-277098-9780080480824-syngress",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080480824.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277098",
                "product_url": "/app/ecom/book/277098/security-assessment-277098-9780080480824-syngress",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781932266962",
                    "EISBN13": "9780080480824",
                    "EISBN10": "0080480829"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026358617"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277097",
            "attributes": {
                "name": "Security Sage's Guide to Hardening the Network Infrastructure",
                "subtitle": "",
                "description": "This is the only computer book to focus completely on infrastucture security: network devices, protocols and architectures. It offers unique coverage of network design so administrators understand how they should design and protect their enterprises. Network security publishing has boomed in the last several years with a proliferation of materials that focus on various elements of the enterprise.<br><br>* This is the only computer book to focus completely on infrastucture security: network devices, protocols and architectures<br>* It offers unique coverage of network design so administrators understand how they should design and protect their enterprises<br>* Helps provide real practical solutions and not just background theory",
                "author": "Steven Andres, Brian Kenyon, Erik Pack Birkholz",
                "slug": "security-sages-guide-to-hardening-the-network-infrastructure-277097-9780080480831-steven-andres-brian-kenyon-erik-pack-birkholz",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080480831.png",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277097",
                "product_url": "/app/ecom/book/277097/security-sages-guide-to-hardening-the-network-infrastructure-277097-9780080480831-steven-andres-brian-kenyon-erik-pack-birkholz",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781931836012",
                    "EISBN13": "9780080480831",
                    "EISBN10": "0080480837"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026344187"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277096",
            "attributes": {
                "name": "JSTL",
                "subtitle": "Practical Guide for JSP Programmers",
                "description": "Web developers and page authors who use JavaServer Pages (JSP) know that it is much easier and efficient to implement web pages without reinventing the wheel each time. In order to shave valuable time from their development schedules, those who work with JSP have created, debugged, and used custom tagsa set of programmable actions that provide dynamic behavior to static pagespaving the way towards a more common, standard approach to using Java technology for web development. The biggest boost to this effort however has only recently arrived in the form of a standard set of tag libraries, known as the JSTL, which now provides a wide range of functionality and gives web page authors a much more simplified approach to implementing dynamic, Java-based web sites. <br><br>JSTL: Practical Guide for JSP Programmers is a timely resource for anyone interested in doing large-scale J2EE application development. It sticks to the main features of the JSTL so that developers don't have to sift through unnecessary details to begin using the tags and working with the expression language. Sue Spielman's straight-forward, practical approach is enhanced with numerous code samples and insightful descriptions to make learning the JSTL a quickly and easily accomplished task. Written by a best-selling author with a wealth of development experience and recognition in the Java community. Covers the core elements of the JSTL including the four standard tag libraries (core, internationalization/format, XML, and SQL) and expression language. Includes a reference section for all of the tabs and attributes contained in the JSTL.",
                "author": "Sue Spielman",
                "slug": "jstl-277096-9780080495965-sue-spielman",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080495965.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277096",
                "product_url": "/app/ecom/book/277096/jstl-277096-9780080495965-sue-spielman",
                "bisac_codes": [
                    "COM051280",
                    "COM051010"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780126567557",
                    "EISBN13": "9780080495965",
                    "EISBN10": "0080495966"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026363435"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277095",
            "attributes": {
                "name": "Network Simulation Experiments Manual",
                "subtitle": "",
                "description": "The lab exercises contained in the network simulation experiments manual are based on the OPNET simulator (v. 9), a network simulation tool that was originally developed at M.I.T. It provides networking professionals with the option of implementing experiments from their homes or workplaces and the lab manual comes with directions for downloading the free easy-to-install software (special version to this book only--see system requirements below). These labs run through simulations closely tied to the material in the text so that you can visualize the discussions covering core network topologies. Various scenarios are presented within each topology, and review questions and a lab report exercise accompany each lab experiment. The experiments also follows the organization of Computer Networks, Third Edition, by Larry Peterson and Bruce Davie.<br><br>System requirements for using the OPNET IT Guru Academic Edition release 9.1:<br>-Intel Pentium III, 4 or compatible (500 MHz or better)<br>-256 MB RAM<br>-400 MB disk space<br>-Display: 1024 x 768 or higher resolution, 256 or more colors<br>-The English language version of the following operating systems are supported:<br>Microsoft Windows NT (Service Pack 3, 5, or 6a)<br>Windows 2000 (Service Pack 1 and 2 are supported but not required)<br>Windows XP (Service Pack 1 is required)<br><br>*Written by an instructor who has used OPNET simulation tools in his classroom for numerous demonstrations and real-world scenarios. <br>*Software download based on an award-winning product made by OPNET Technologies, Inc., whose software is used by thousands of commercial and government organizations worldwide, and by over 500 universities. <br>*Useful experimentation for professionals in the workplace who are interested in learning & demonstrating the capability of evaluating different commercial networking products, i.e., Cisco routers. <br>*Covers the core networking topologies and includes assignments on the ethernet, token rings, ATM, Switched LANs, Network Design, RIP, TCP, Queuing Disciplines, QoS, etc. <br>*Instructors can download the solutions manual to the exercises in the Network Simulation Experiments Manual by clicking on the \"Instructors\" resource link in the upper right corner of the screen and searching for author \"Aboelela.\"",
                "author": "Emad Aboelela",
                "slug": "network-simulation-experiments-manual-277095-9780080490748-emad-aboelela",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080490748.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277095",
                "product_url": "/app/ecom/book/277095/network-simulation-experiments-manual-277095-9780080490748-emad-aboelela",
                "bisac_codes": [
                    "COM043000",
                    "COM060000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780120421718",
                    "EISBN13": "9780080490748",
                    "EISBN10": "0080490743"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026369408"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277094",
            "attributes": {
                "name": "Security + Study Guide and DVD Training System",
                "subtitle": "",
                "description": "<p>Why has CompTIA (the high-profile Computer Technology Industry Association behind the wildly popular A+ and Network+ certifications) targeted security for its latest credential? Thanks to soaring e-business initiatives and worldwide Internet connectivity, recent survey stats from the Computer Security Institute (CSI) show we need more network security specialists-fast! </p>  <p>Boasting a one-of-a-kind integration of text, DVD-quality instructor-led training, and Web-based exam simulation and remediation, Security+ Study Guide & DVD Training System gives students 100% coverage of official CompTIA Security+ exam objectives plus realistic test prep.</p>  <p>Security+ is sure to become an instant industry standard. Leading cert industry publications and Web portals forecast the rapid rise of security certifications in 2003, and CompTIA's growth curve of A+ and Network+ technicians suggests that Security+ certified engineers could easily number 100,000 by the end of next year</p>The first Security+ study resource to market, Security+ Study Guide & DVD Training System bundles all 3 of these teaching technologies to give Security+ candidates the edge they need to pass this career-boosting new exam-and achieve certification-on their very first try.<br>Syngress has become a leader in IT certification-blending innovative teaching methodologies with such groundbreaking tools as exam simulators, instructor-led DVDs, and integrated Web-based support.",
                "author": "Syngress",
                "slug": "security-study-guide-and-dvd-training-system-277094-9780080480817-syngress",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080480817.png",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277094",
                "product_url": "/app/ecom/book/277094/security-study-guide-and-dvd-training-system-277094-9780080480817-syngress",
                "bisac_codes": [
                    "COM055000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781931836722",
                    "EISBN13": "9780080480817",
                    "EISBN10": "0080480810"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026358495"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277093",
            "attributes": {
                "name": "Understanding Your Users",
                "subtitle": "A Practical Guide to User Requirements Methods, Tools, and Techniques",
                "description": "Today many companies are employing a user-centered design (UCD) process, but for most companies, usability begins and ends with the usability test.  Although usability testing is a critical part of an effective user-centered life cycle, it is only one component of the UCD process.  This book is focused on the requirements gathering stage, which often receives less attention than usability testing, but is equally as important.  Understanding user requirements is critical to the development of a successful product.  <br><br>Understanding Your Users is an easy to read, easy to implement, how-to guide on usability in the real world. It focuses on the \"user requirements gathering\" stage of product development and it provides a variety of techniques, many of which may be new to usability professionals. For each technique, readers will learn how to prepare for and conduct the activity, as well as analyze and present the data all in a practical and hands-on way. In addition, each method presented provides different information about the user and their requirements (e.g., functional requirements, information architecture, task flows). The techniques can be used together to form a complete picture of the users requirements or they can be used separately to address specific product questions. These techniques have helped product teams understand the value of user requirements gathering by providing insight into how users work and what they need to be successful at their tasks. Case studies from industry-leading companies demonstrate each method in action.  In addition, readers are provided with the foundation to conduct any usability activity (e.g., getting buy-in from management, legal and ethical considerations, setting up your facilities, recruiting, moderating activities) and to ensure the incorporation of the results into their products.<br><br>Covers all of the significant requirements gathering methods in a readable, practical way<br>Presents the foundation readers need to prepare for any requirements gathering activity and ensure that the results are incorporated into their products <br>Includes invaluable worksheet and template appendices<br>Includes a case study for each method from industry leaders<br>Written by experienced authors who teach conference courses on this subject to usability professionals and new product designers alike",
                "author": "Kathy Baxter, Catherine Courage",
                "slug": "understanding-your-users-277093-9780080520087-kathy-baxter-catherine-courage",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080520087.png",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277093",
                "product_url": "/app/ecom/book/277093/understanding-your-users-277093-9780080520087-kathy-baxter-catherine-courage",
                "bisac_codes": [
                    "COM079010",
                    "COM051230"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781558609358",
                    "EISBN13": "9780080520087",
                    "EISBN10": "0080520081"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026356475"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277092",
            "attributes": {
                "name": "The Mobile Connection",
                "subtitle": "The Cell Phone's Impact on Society",
                "description": "Has the cell phone forever changed the way people communicate? The mobile phone is used for real time coordination while on the run, adolescents use it to manage their freedom, and teens text to each other day and night. The mobile phone is more than a simple technical innovation or social fad, more than just an intrusion on polite society. This book, based on world-wide research involving tens of thousands of interviews and contextual observations, looks into the impact of the phone on our daily lives. The mobile phone has fundamentally affected our accessibility, safety and security, coordination of social and business activities, and use of public places. <br><br>Based on research conducted in dozens of countries, this insightful and entertaining book examines the once unexpected interaction between humans and cell phones, and between humans, period. The compelling discussion and projections about the future of the telephone should give designers everywhere a more informed practice and process, and provide researchers with new ideas to last years.<br><br>*Rich Ling (an American working in Norway) is a prominent researcher, interviewed in the new technology article in the November 9 issue of the New York Times Magazine. <br>*A particularly \"good read\", this book will be important to the designers, information designers, social psychologists, and others who will have an impact on the development of the new third generation of mobile telephones. <br>*Carefully and wittily written by a senior research scientist at Telenor, Norway's largest telecommunications company, and developer of the first mobile telephone system that allowed for international roaming.",
                "author": "Rich Ling",
                "slug": "the-mobile-connection-277092-9780080518930-rich-ling",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080518930.png",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277092",
                "product_url": "/app/ecom/book/277092/the-mobile-connection-277092-9780080518930-rich-ling",
                "bisac_codes": [
                    "COM079010",
                    "COM051230"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781558609365",
                    "EISBN13": "9780080518930",
                    "EISBN10": "0080518931"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026357202"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277091",
            "attributes": {
                "name": "Scene of the Cybercrime: Computer Forensics Handbook",
                "subtitle": "",
                "description": "\"Cybercrime and cyber-terrorism represent a serious challenge to society as a whole.\" - Hans Christian Kruger, Deputy Secretary General of the Council of Europe<br>Crime has been with us as long as laws have existed, and modern technology has given us a new type of criminal activity: cybercrime. Computer and network related crime is a problem that spans the globe, and unites those in two disparate fields: law enforcement and information technology. <br><br>This book will help both IT pros and law enforcement specialists understand both their own roles and those of the other, and show why that understanding and an organized, cooperative effort is necessary to win the fight against this new type of crime.<br><br>62% of US companies reported computer-related security breaches resulting in damages of $124 million dollars. This data is an indication of the massive need for Cybercrime training within the IT and law enforcement communities.<br>The only book that covers Cybercrime from forensic investigation through prosecution. <br>Cybercrime is one of the battlefields in the war against terror.",
                "author": "Syngress",
                "slug": "scene-of-the-cybercrime-computer-forensics-handbook-277091-9780080480787-syngress",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080480787.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277091",
                "product_url": "/app/ecom/book/277091/scene-of-the-cybercrime-computer-forensics-handbook-277091-9780080480787-syngress",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781931836654",
                    "EISBN13": "9780080480787",
                    "EISBN10": "0080480780"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026355614"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277090",
            "attributes": {
                "name": "Advanced Reservoir Engineering",
                "subtitle": "",
                "description": "Advanced Reservoir Engineering offers the practicing engineer and engineering student a full description, with worked examples, of all of the kinds of reservoir engineering topics that the engineer will use in day-to-day activities.  In an industry where there is often a lack of information, this timely volume gives a comprehensive account of the physics of reservoir engineering, a thorough knowledge of which is essential in the petroleum industry for the efficient recovery of hydrocarbons.<br><br>Chapter one deals exclusively with the theory and practice of transient flow analysis and offers a brief but thorough hands-on guide to gas and oil well testing.  Chapter two documents water influx models and their practical applications in conducting comprehensive field studies, widely used throughout the industry.  Later chapters include unconventional gas reservoirs and the classical adaptations of the material balance equation.<br><br>* An essential tool for the petroleum and reservoir engineer, offering information not available anywhere else<br><br><br>* Introduces the reader to cutting-edge new developments in Type-Curve Analysis, unconventional gas reservoirs, and gas hydrates <br><br>* Written by two of the industry's best-known and respected reservoir engineers",
                "author": "Tarek Ahmed, Paul McKinney",
                "slug": "advanced-reservoir-engineering-277090-9780080498836-tarek-ahmed-paul-mckinney",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080498836.png",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277090",
                "product_url": "/app/ecom/book/277090/advanced-reservoir-engineering-277090-9780080498836-tarek-ahmed-paul-mckinney",
                "bisac_codes": [
                    "TEC047000",
                    "034"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780750677332",
                    "EISBN13": "9780080498836",
                    "EISBN10": "0080498833"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026357829"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277089",
            "attributes": {
                "name": "Ruby Developers Guide",
                "subtitle": "",
                "description": "An expert guide to Ruby, a popular new Object-Oriented Programming Language<br><br>Ruby is quickly becoming a favourite among developers who need a simple, straight forward, portable programming language. Ruby is ideal for quick and easy object-oriented programming such as processing text files or performing system management. Having been compared with other programming languages such as Perl, Python, PCL, Java, Eiffel, and C++; Ruby is popular because of its straight forward syntax and transparent semantics.<br>Using step-by-step examples and real world applications, the Ruby Developer's Guide is designed for programmers and developer's looking to embrace the object-oriented features and functionality of this robust programming language. Readers will learn how to develop, implement, organize and deploy applications using Ruby. Ruby is currently experiencing a rapid rise in popularity in the object-oriented programming community Readers receive up-to-the minute links, white papers, and analysis for two years at [email protected] Comes with a wallet-sized CD containing a printable HTML version of the book, all of the source code examples and demos of popular Ruby third-party programming tools and applications",
                "author": "Syngress",
                "slug": "ruby-developers-guide-277089-9780080480763-syngress",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080480763.png",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277089",
                "product_url": "/app/ecom/book/277089/ruby-developers-guide-277089-9780080480763-syngress",
                "bisac_codes": [
                    "COM051000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781928994640",
                    "EISBN13": "9780080480763",
                    "EISBN10": "0080480764"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026357927"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277088",
            "attributes": {
                "name": "Richard Thieme's Islands in the Clickstream",
                "subtitle": "Reflections on Life in a Virtual World",
                "description": "CNN called Richard Thieme \"a member of the cyber avant-garde\". Digital Delirium named him \"one of the most creative minds of the digital generation\". Now Richard Thieme's wisdom on the social and cultural dimensions of technology is available in a single volume. \"Islands in the Clickstream\" ranges beyond the impact of technology to spirituality, psychological insight, and social commentary. Now that people are used to living in virtual worlds and move easily between online and offline worlds, they want to connect that experience to the deeper issues of our lives, including spiritual issues. Some examples include \"Dreams Engineers Have\", \"The Crazy Lady on the Treadmill\", and \"Whistleblowers and Team Players\". These essays raise serious questions for thoughtful readers. They have attracted favorable commentary from around the world and a fanatic, almost rabid fan base.<br><br>* This author has become an extremely popular and highly visible talking head. He is a rare \"personality\" in the otherwise bland world of technology commentators.<br><br>* The book leverages the loyalty of his audience in the same way Bill O'Reilly's \"The O'Reilly Factor\" and Al Franken's \"Lies and the Lying Liars Who Tell Them\" do.<br><br>* The book is an easy read intended to provoke thought, discussion and disagreement.",
                "author": "Richard Thieme",
                "slug": "richard-thiemes-islands-in-the-clickstream-277088-9780080480701-richard-thieme",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080480701.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277088",
                "product_url": "/app/ecom/book/277088/richard-thiemes-islands-in-the-clickstream-277088-9780080480701-richard-thieme",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781931836227",
                    "EISBN13": "9780080480701",
                    "EISBN10": "0080480705"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026357571"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277087",
            "attributes": {
                "name": "Risk Analysis and the Security Survey",
                "subtitle": "",
                "description": "<p>Risk Analysis and the Security Survey, Third Edition, provides an understanding of the basic principles of risk analysis.</p>  <p>Addressing such topics as cost/benefit analysis, crime prediction, and business continuity planning, the book gives an overview of the security survey, and instructs its readers on ways to effectively produce a survey that will address the needs of any organization. This edition has been thoroughly revised and updated, with an eye toward the growing threat of global terrorism. It includes two new chapters, addressing such topics as disaster recovery planning, mitigation, and the evolving methodologies that are a result of the Homeland Security Act. The book will serve as a core textbook on understanding risk to the growing number of security and Homeland Security programs.</p>  <p>It is designed for students in security management courses, security managers, other security professionals as well as business professionals at all levels concerned with security, risk mitigation, and the management aspects of security operations. </p>- Covers Business Impact Analysis (BIA), Project Planning, Data Collection, Data Analysis and Report of Findings, and Prediction of Criminal Behavior- Presents updated statistical information and practical case examples - Helps professionals and students produce more effective results-oriented security surveys",
                "author": "James F. Broder, Eugene Tucker",
                "slug": "risk-analysis-and-the-security-survey-277087-9780080480725-james-f-broder-eugene-tucker",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080480725.png",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277087",
                "product_url": "/app/ecom/book/277087/risk-analysis-and-the-security-survey-277087-9780080480725-james-f-broder-eugene-tucker",
                "bisac_codes": [
                    "TEC017000",
                    "POL037000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780750679220",
                    "EISBN13": "9780080480725",
                    "EISBN10": "0080480721"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026361652"
                    }
                }
            }
        }
    ],
    "meta": {
        "pagination": {
            "page": 75095,
            "pages": 78391,
            "count": 1567817
        }
    }
}

Response Info

Default: None