GET /services/catalog/products?format=api&page=75113
Response information
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/vnd.api+json
Vary: Accept

{
    "links": {
        "first": "https://redshelf.com/services/catalog/products?format=api&page=1",
        "last": "https://redshelf.com/services/catalog/products?format=api&page=78423",
        "next": "https://redshelf.com/services/catalog/products?format=api&page=75114",
        "prev": "https://redshelf.com/services/catalog/products?format=api&page=75112"
    },
    "data": [
        {
            "type": "Product",
            "id": "00010000277425",
            "attributes": {
                "name": "Stealing the Network: How to Own an Identity",
                "subtitle": "",
                "description": "The first two books in this series Stealing the Network: How to Own the Box and Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques. <br><br>In this third installment, the all-star cast of authors tackle one of the fastest growing crimes in the world: Identity Theft. Now, the criminal hackers readers have grown to both love and hate try to cover their tracks and vanish into thin air... \"Stealing the Network: How to Own an Identity\" is the 3rd book in the \"Stealing\" series, and continues in the tradition created by its predecessors by delivering real-world network attack methodologies and hacking techniques within a context of unique and original fictional accounts created by some of the world's leading security professionals and computer technologists. The seminal works in TechnoFiction, this \"STN\" collection yet again breaks new ground by casting light upon the mechanics and methods used by those lurking on the darker side of the Internet, engaging in the fastest growing crime in the world: Identity theft. <br><br>Cast upon a backdrop of \"Evasion,\" surviving characters from \"How to Own a Continent\" find themselves on the run, fleeing from both authority and adversary, now using their technical prowess in a way they never expected--to survive.<br><br>*  The first two books in the series were best-sellers and have established a cult following within the Hacker and Infosec communities<br>*  Identity theft is the fastest growing crime in the world, and financial loss from identity theft is expected to reach $2 trillion by the end of 2005<br>*  All of the authors on the book are world renowned, highly visible information security experts who present at all of the top security conferences including Black Hat, DefCon, and RSA and write for the most popular magazines and Web sites including Information Security Magazine, and SecurityFocus.com. All of these outlets will be used to promote the book",
                "author": "Ryan Russell, Peter A Riley, Jay Beale, Chris Hurley, Tom Parker, Brian Hatch",
                "slug": "stealing-the-network-how-to-own-an-identity-277425-9780080517742-ryan-russell-peter-a-riley-jay-beale-chris-hurley-tom-parker-brian-hatch",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080517742.png",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277425",
                "product_url": "/app/ecom/book/277425/stealing-the-network-how-to-own-an-identity-277425-9780080517742-ryan-russell-peter-a-riley-jay-beale-chris-hurley-tom-parker-brian-hatch",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597490061",
                    "EISBN13": "9780080517742",
                    "EISBN10": "0080517749"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026355089"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277424",
            "attributes": {
                "name": "FISMA Certification and Accreditation Handbook",
                "subtitle": "",
                "description": "The only book that instructs IT Managers to adhere to federally mandated certification and accreditation requirements.<br><br>This book will explain what is meant by Certification and Accreditation and why the process is mandated by federal law. The different Certification and Accreditation laws will be cited and discussed including the three leading types of C&A: NIST, NIAP, and DITSCAP. Next, the book explains how to prepare for, perform, and document a C&A project. The next section to the book illustrates addressing security awareness, end-user rules of behavior, and incident response requirements. Once this phase of the C&A project is complete, the reader will learn to perform the security tests and evaluations, business impact assessments system risk assessments, business risk assessments, contingency plans, business impact assessments, and system security plans. Finally the reader will learn to audit their entire C&A project and correct any failures.<br><br>* Focuses on federally mandated certification and accreditation requirements<br>* Author Laura Taylor's research on Certification and Accreditation has been used by the FDIC, the FBI, and the Whitehouse<br>* Full of vital information on compliance for both corporate and government IT Managers",
                "author": "L. Taylor, Laura P. Taylor",
                "slug": "fisma-certification-and-accreditation-handbook-277424-9780080506531-l-taylor-laura-p-taylor",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080506531.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277424",
                "product_url": "/app/ecom/book/277424/fisma-certification-and-accreditation-handbook-277424-9780080506531-l-taylor-laura-p-taylor",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597491167",
                    "EISBN13": "9780080506531",
                    "EISBN10": "0080506534"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026355355"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277423",
            "attributes": {
                "name": "Firewall Policies and VPN Configurations",
                "subtitle": "",
                "description": "A firewall is as good as its policies and the security of its VPN connections. The latest generation of firewalls offers a dizzying array of powerful options; they key to success is to write concise policies that provide the appropriate level of access while maximizing security. <br><br>This book covers the leading firewall products: Cisco PIX, Check Point NGX, Microsoft ISA Server, Junipers NetScreen Firewall, and SonicWall. It describes in plain English what features can be controlled by a policy, and walks the reader through the steps for writing the policy to fit the objective. Because of their vulnerability and their complexity, VPN policies are covered in more depth with numerous tips for troubleshooting remote connections.<br><br> The only book that focuses on creating policies that apply to multiple products.<br> Included is a bonus chapter on using Ethereal, the most popular protocol analyzer, to monitor and analyze network traffic.<br> Shows what features can be controlled by a policy, and walks you through the steps for writing the policy to fit the objective at hand",
                "author": "Syngress, Dale Liu, Stephanie Miller, Mark Lucas, Abhishek Singh, Jennifer Davis",
                "slug": "firewall-policies-and-vpn-configurations-277423-9780080506517-syngress-dale-liu-stephanie-miller-mark-lucas-abhishek-singh-jennifer-davis",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080506517.png",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277423",
                "product_url": "/app/ecom/book/277423/firewall-policies-and-vpn-configurations-277423-9780080506517-syngress-dale-liu-stephanie-miller-mark-lucas-abhishek-singh-jennifer-davis",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597490887",
                    "EISBN13": "9780080506517",
                    "EISBN10": "0080506518"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026357148"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277422",
            "attributes": {
                "name": "Wireshark & Ethereal Network Protocol Analyzer Toolkit",
                "subtitle": "",
                "description": "Ethereal is the #2 most popular open source security tool used by system administrators and security professionals. This all new book builds on the success of Syngress best-selling book Ethereal Packet Sniffing.<br><br>Wireshark & Ethereal Network Protocol Analyzer Toolkit provides complete information and step-by-step Instructions for analyzing protocols and network traffic on Windows, Unix or Mac OS X networks. First, readers will learn about the types of sniffers available today and see the benefits of using Ethereal. Readers will then learn to install Ethereal in multiple environments including Windows, Unix and Mac OS X as well as building Ethereal from source and will also be guided through Ethereals graphical user interface. The following sections will teach readers to use command-line options of Ethereal as well as using Tethereal to capture live packets from the wire or to read saved capture files. This section also details how to import and export files between Ethereal and WinDump, Snort, Snoop, Microsoft Network Monitor, and EtherPeek. The book then teaches the reader to master advanced tasks such as creating sub-trees, displaying bitfields in a graphical view, tracking requests and reply packet pairs as well as exclusive coverage of MATE, Ethereals brand new configurable upper level analysis engine. The final section to the book teaches readers to enable Ethereal to read new Data sources, program their own protocol dissectors, and to create and customize Ethereal reports. Ethereal is the #2 most popular open source security tool, according to a recent study conducted by insecure.org Syngress' first Ethereal book has consistently been one of the best selling security books for the past 2 years",
                "author": "Jay Beale, Angela Orebaugh, Gilbert Ramirez",
                "slug": "wireshark-ethereal-network-protocol-analyzer-toolkit-277422-9780080506012-jay-beale-angela-orebaugh-gilbert-ramirez",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080506012.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277422",
                "product_url": "/app/ecom/book/277422/wireshark-ethereal-network-protocol-analyzer-toolkit-277422-9780080506012-jay-beale-angela-orebaugh-gilbert-ramirez",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597490733",
                    "EISBN13": "9780080506012",
                    "EISBN10": "0080506011"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026353731"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277421",
            "attributes": {
                "name": "Engineering Materials Science",
                "subtitle": "",
                "description": "Milton Ohring's Engineering Materials Science integrates the scientific nature and modern applications of all classes of engineering materials. This comprehensive, introductory textbook will provide undergraduate engineering students with the fundamental background needed to understand the science of structure-property relationships, as well as address the engineering concerns of materials selection in design, processing materials into useful products, andhow material degrade and fail in service. Specific topics include: physical and electronic structure; thermodynamics and kinetics; processing; mechanical, electrical, magnetic, and optical properties; degradation; and failure and reliability. The book offers superior coverage of electrical, optical, and magnetic materials than competing text.The author has taught introductory courses in material science and engineering both in academia and industry (AT&T; Bell Laboratories) and has also written the well-received book, The Material Science of Thin Films (Academic Press).<br><br>Key Features* Provides a modern treatment of materials exposing the interrelated themes of structure, properties, processing, and performance* Includes an interactive, computationally oriented, computer disk containing nine modules dealing with structure, phase diagrams, diffusion, and mechanical and electronic properties* Fundamentals are stressed* Of particular interest to students, researchers, and professionals in the field of electronic engineering",
                "author": "Milton Ohring",
                "slug": "engineering-materials-science-277421-9780080505695-milton-ohring",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080505695.png",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277421",
                "product_url": "/app/ecom/book/277421/engineering-materials-science-277421-9780080505695-milton-ohring",
                "bisac_codes": [
                    "TEC021000",
                    "SCI055000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780125249959",
                    "EISBN13": "9780080505695",
                    "EISBN10": "0080505694"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026354629"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277420",
            "attributes": {
                "name": "Engineering Drawing for Manufacture",
                "subtitle": "",
                "description": "The processes of manufacture and assembly are based on the communication of engineering information via drawing. These drawings follow rules laid down in national and international standards. The organisation responsible for the international rules is the International Standards Organisation (ISO). There are hundreds of ISO standards on engineering drawing because drawing is very complicated and accurate transfer of information must be guaranteed. The information contained in an engineering drawing is a legal specification, which contractor and sub-contractor agree to in a binding contract. The ISO standards are designed to be independent of any one language and thus much symbology is used to overcome any reliance on any language. Companies can only operate efficiently if they can guarantee the correct transmission of engineering design information for manufacturing and assembly.This book is a short introduction to the subject of engineering drawing for manufacture. It should be noted that standards are updated on a 5-year rolling programme and therefore students of engineering drawing need to be aware of the latest standards. This book is unique in that it introduces the subject of engineering drawing in the context of standards.",
                "author": "Brian Griffiths",
                "slug": "engineering-drawing-for-manufacture-277420-9780080505664-brian-griffiths",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080505664.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277420",
                "product_url": "/app/ecom/book/277420/engineering-drawing-for-manufacture-277420-9780080505664-brian-griffiths",
                "bisac_codes": [
                    "TEC009070",
                    "034"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781857180336",
                    "EISBN13": "9780080505664",
                    "EISBN10": "008050566X"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026354756"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277419",
            "attributes": {
                "name": "Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security",
                "subtitle": "",
                "description": "Essential Computer Security provides the vast home user and small office computer market with the information they must know in order to understand the risks of computing on the Internet and what they can do to protect themselves.<br><br>Tony Bradley is the Guide for the About.com site for Internet Network Security. In his role managing the content for a site that has over 600,000 page views per month and a weekly newsletter with 25,000 subscribers, Tony has learned how to talk to people, everyday people, about computer security. Intended for the security illiterate, Essential Computer Security is a source of jargon-less advice everyone needs to operate their computer securely.<br><br>* Written in easy to understand non-technical language that novices can comprehend<br><br>* Provides detailed coverage of the essential security subjects that everyone needs to know <br><br>* Covers just enough information to educate without being overwhelming",
                "author": "T. Bradley",
                "slug": "essential-computer-security-everyones-guide-to-email-internet-and-wireless-security-277419-9780080505893-t-bradley",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080505893.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277419",
                "product_url": "/app/ecom/book/277419/essential-computer-security-everyones-guide-to-email-internet-and-wireless-security-277419-9780080505893-t-bradley",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597491143",
                    "EISBN13": "9780080505893",
                    "EISBN10": "0080505899"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026368949"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277417",
            "attributes": {
                "name": "Engineering Digital Design",
                "subtitle": "Revised Second Edition",
                "description": "Engineering Digital Design, Second Edition provides the most extensive coverage of any available textbook in digital logic and design. The new REVISED Second Edition published in September of 2002 provides 5 productivity tools free on the accompanying CD ROM. This software is also included on the Instructor's Manual CD ROM and complete instructions accompany each software program.<br><br>In the REVISED Second Edition modern notation combines with state-of-the-art treatment of the most important subjects in digital design to provide the student with the background needed to enter industry or graduate study at a competitive level. Combinatorial logic design and synchronous and asynchronous sequential machine design methods are given equal weight, and new ideas and design approaches are explored. <br><br>The productivity tools provided on the accompanying CD are outlined below:<br>[1] EXL-Sim2002 logic simulator: EXL-Sim2002 is a full-featured, interactive, schematic-capture and simulation program that is ideally suited for use with the text at either the entry or advanced-level of logic design. Its many features include drag-and-drop capability, rubber banding, mixed logic and positive logic simulations, macro generation, individual and global (or randomized) delay assignments, connection features that eliminate the need for wire connections, schematic page sizing and zooming, waveform zooming and scrolling, a variety of printout capabilities, and a host of other useful features.  <br><br>[2] BOOZER logic minimizer:  BOOZER is a software minimization tool that is recommended for use with the text.  It accepts entered variable (EV) or canonical (1's and 0's) data from K-maps or truth tables, with or without don't cares, and returns an optimal or near optimal single or multi-output solution.  It can handle up to 12 functions Boolean functions and as many inputs when used on modern computers. <br><br>[3] ESPRESSO II logic minimizer:  ESPRESSO II is another software minimization tool widely used in schools and industry.  It supports advanced heuristic algorithms for minimization of two-level, multi-output Boolean functions but does not accept entered variables.  It is also readily available from the University of California, Berkeley, 1986 VLSI  Tools Distribution.   <br><br>[4] ADAM design software:  ADAM (for Automated Design of Asynchronous Machines) is a very powerful productivity tool that permits the automated design of very complex asynchronous state machines, all free of timing defects.  The input files are state tables for the desired state machines. The output files are given in the Berkeley format appropriate for directly programming PLAs.  ADAM also allows the designer to design synchronous state machines, timing-defect-free.  The options include the lumped path delay (LPD) model or NESTED CELL model for asynchronous FSM designs, and the use of D FLIP-FLOPs for synchronous FSM designs.  The background for the use of ADAM is covered in Chapters 11, 14 and 16 of the REVISED 2nd Edition.<br><br>[5] A-OPS design software: A-OPS (for Asynchronous One-hot Programmable Sequencers) is another very powerful productivity tool that permits the design of asynchronous and synchronous state machines by using a programmable sequencer kernel.  This software generates a PLA or PAL output file (in Berkeley format) or the VHDL code for the automated timing-defect-free designs of the following: (a) Any 1-Hot programmable sequencer up to 10 states.  (b) The 1-Hot design of multiple asynchronous or synchronous state machines driven by either PLDs or RAM.  The input file is that of a state table for the desired state machine.  This software can be used to design systems with the capability of instantly switching between several radically different controllers on a <br>time-shared basis.  The background for the use of A-OPS is covered in Chapters 13, 14 and 16 of the REVISED 2nd Edition.",
                "author": "Richard F. Tinder",
                "slug": "engineering-digital-design-277417-9780080505657-richard-f-tinder",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080505657.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277417",
                "product_url": "/app/ecom/book/277417/engineering-digital-design-277417-9780080505657-richard-f-tinder",
                "bisac_codes": [
                    "TEC008070",
                    "TEC007000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780126912951",
                    "EISBN13": "9780080505657",
                    "EISBN10": "0080505651"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026370053"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277416",
            "attributes": {
                "name": "Troubleshooting Centrifugal Pumps and their systems",
                "subtitle": "",
                "description": "<p>This book is intended for those new to the use and abuse of centrifugal pumps. It is also for those whose involvement with pumps is so occasional, that they need a reminder of the basics.</p>",
                "author": "Ron Palgrave",
                "slug": "troubleshooting-centrifugal-pumps-and-their-systems-277416-9780080519692-ron-palgrave",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080519692.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277416",
                "product_url": "/app/ecom/book/277416/troubleshooting-centrifugal-pumps-and-their-systems-277416-9780080519692-ron-palgrave",
                "bisac_codes": [
                    "TEC009070",
                    "034"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781856173919",
                    "EISBN13": "9780080519692",
                    "EISBN10": "0080519695"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026366781"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277415",
            "attributes": {
                "name": "Palladium in Heterocyclic Chemistry",
                "subtitle": "A Guide for the Synthetic Chemist",
                "description": "Palladium in Heterocyclic Chemistry",
                "author": "Gordon Gribble, Jie Jack Li",
                "slug": "palladium-in-heterocyclic-chemistry-277415-9780080513485-gordon-gribble-jie-jack-li",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080513485.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277415",
                "product_url": "/app/ecom/book/277415/palladium-in-heterocyclic-chemistry-277415-9780080513485-gordon-gribble-jie-jack-li",
                "bisac_codes": [
                    "SCI013000",
                    "SCI013040"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780080437057",
                    "EISBN13": "9780080513485",
                    "EISBN10": "0080513484"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026366284"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277414",
            "attributes": {
                "name": "Elements of Polymer Science & Engineering",
                "subtitle": "An Introductory Text and Reference for Engineers and Chemists",
                "description": "Tremendous developments in the field of polymer science, its growing importance, and an increase in the number of polymer science courses in both physics and chemistry departments have led to the revision of the First Edition. This new edition addresses subjects as spectroscopy (NMR), dynamic light scattering, and other modern techniques unknown before the publication of the First Edition. The Second Edition focuses on both theory (physics and chemistry) and engineering applications which make it useful for chemistry, physics, and chemical engineering departments.",
                "author": "Alfred Rudin",
                "slug": "elements-of-polymer-science-engineering-277414-9780080505473-alfred-rudin",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080505473.png",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277414",
                "product_url": "/app/ecom/book/277414/elements-of-polymer-science-engineering-277414-9780080505473-alfred-rudin",
                "bisac_codes": [
                    "TEC055000",
                    "SCI013040"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780126016857",
                    "EISBN13": "9780080505473",
                    "EISBN10": "0080505473"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026356712"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277413",
            "attributes": {
                "name": "Elements of Space Technology",
                "subtitle": "",
                "description": "This book is written for an introductory course in space technology. It is intended for senior or graduate level aerospace engineering students and professional engineers seeking a thorough understanding of the aerospace aspects of space systems. As such it focuses on the primary physics and engineering fundamentals necessary to understand and design space based systems. The book does not include the basics of spacecraft electronics, because this is covered in many systems and electronics books and is typically covered in follow-up courses.<br><br>* Derived from the author's thirty years of experience in the aerospace industry and several years of university teaching experience<br>* More than 130 illustrations<br>* Advanced subjects and problems indicated by asterisks(*)allow the reader and the instructor to omit topics without losing continuity<br>* All chapters correspond to the engineering subdivisions typically found in the aerospace industry<br>* Includes United States and international technologies<br>* Extensive appendix of important data, not easily located in other sources<br>* The book does not include the basics of spacecraft electronics",
                "author": "Rudolph X. Meyer",
                "slug": "elements-of-space-technology-277413-9780080505480-rudolph-x-meyer",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080505480.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277413",
                "product_url": "/app/ecom/book/277413/elements-of-space-technology-277413-9780080505480-rudolph-x-meyer",
                "bisac_codes": [
                    "TEC002000",
                    "TEC009000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780124929401",
                    "EISBN13": "9780080505480",
                    "EISBN10": "0080505481"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026357156"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277412",
            "attributes": {
                "name": "Intermediate Financial Theory",
                "subtitle": "",
                "description": "The second edition of this authoritative textbook continues the tradition of providing clear and concise descriptions of the new and classic concepts in financial theory. The authors keep the theory accessible by requiring very little mathematical background.  <br><br>First edition published by Prentice-Hall in 2001- ISBN 0130174467.<br><br>The second edition includes new structure emphasizing the distinction between the equilibrium and the arbitrage perspectives on valuation and pricing, as well as a new chapter on asset management for the long term investor.<br><br>\"This book does admirably what it sets out to do - provide a bridge between MBA-level finance texts and PhD-level texts....<br>many books claim to require little prior mathematical training, but this one actually does so. <br>This book may be a good one for Ph.D students outside finance who need some basic training in financial theory or for those looking for a more user-friendly introduction to advanced theory. <br>The exercises are very good.\" <br>--Ian Gow, Student, Graduate School of Business, Stanford University Completely updated edition of classic textbook that fills a gap between MBA level texts and PHD level texts Focuses on clear explanations of key concepts and requires limited mathematical prerequisites Updates includes new structure emphasizing the distinction between the equilibrium and the arbitrage perspectives on valuation and pricing, as well as a new chapter on asset management for the long term investor",
                "author": "Jean-Pierre Danthine, John B. Donaldson",
                "slug": "intermediate-financial-theory-277412-9780080509020-jean-pierre-danthine-john-b-donaldson",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080509020.png",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277412",
                "product_url": "/app/ecom/book/277412/intermediate-financial-theory-277412-9780080509020-jean-pierre-danthine-john-b-donaldson",
                "bisac_codes": [
                    "BUS027000",
                    "BUS091000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780123693808",
                    "EISBN13": "9780080509020",
                    "EISBN10": "0080509029"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026370232"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277411",
            "attributes": {
                "name": "Decanter Centrifuge Handbook",
                "subtitle": "",
                "description": "Scope of PublicationA reference work for process designers and users of decanters, this book aims to bridge the information gap in this field - that between academic theory promoted in student textbooks and case study data in manufacturers sales literature. <p>DesignIt includes information on design and specification, preparing the reader to select and correctly size equipment. <p>PurchaseAs a design or project engineer working with vendors to make final equipment selection, this work provides the readers with the full facts before they start talking to product vendors. <p>SupplyIn an environment of industry consolidation, the handbook allows you to track suppliers old and new, providing a basis on which users can find the new relevant company for the parts/service he/she wishes to purchase. <p>OperationOnce an equipment purchase is made, the user needs to be made aware of how to optimally operate decanters.  The Decanter Centrifuge Handbook covers relevant (process) operating issues such as instrumentation and control and the use of flocculents.",
                "author": "A. Records, K Sutherland",
                "slug": "decanter-centrifuge-handbook-277411-9780080503820",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080503820.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277411",
                "product_url": "/app/ecom/book/277411/decanter-centrifuge-handbook-277411-9780080503820",
                "bisac_codes": [
                    "TEC009010",
                    "TEC009070"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781856173698",
                    "EISBN13": "9780080503820",
                    "EISBN10": "0080503829"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026356599"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277410",
            "attributes": {
                "name": "Designing and Building Enterprise DMZs",
                "subtitle": "",
                "description": "This is the only book available on building network DMZs, which are the cornerstone of any good enterprise security configuration. It covers market-leading products from Microsoft, Cisco, and Check Point.<br><br>One of the most complicated areas of network technology is designing, planning, implementing, and constantly maintaining a demilitarized zone (DMZ) segment. This book is divided into four logical parts. First the reader will learn the concepts and major design principles of all DMZs. Next the reader will learn how to configure the actual hardware that makes up DMZs for both newly constructed and existing networks. Next, the reader will learn how to securely populate the DMZs with systems and services. The last part of the book deals with troubleshooting, maintaining, testing, and implementing security on the DMZ. The only book published on Network DMZs on the components of securing enterprise networks This is the only book available on building network DMZs, which are the cornerstone of any good enterprise security configuration. It covers market-leading products from Microsoft, Cisco, and Check Point Provides detailed examples for building Enterprise DMZs from the ground up and retro-fitting existing infrastructures",
                "author": "Hal Flynn",
                "slug": "designing-and-building-enterprise-dmzs-277410-9780080504001-hal-flynn",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080504001.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277410",
                "product_url": "/app/ecom/book/277410/designing-and-building-enterprise-dmzs-277410-9780080504001-hal-flynn",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597491006",
                    "EISBN13": "9780080504001",
                    "EISBN10": "0080504000"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026360224"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277408",
            "attributes": {
                "name": "Developer's Guide to Web Application Security",
                "subtitle": "",
                "description": "Over 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vulnerable applications.<br><br>This book defines Web application security, why it should be addressed earlier in the lifecycle in development and quality assurance, and how it differs from other types of Internet security. Additionally, the book examines the procedures and technologies that are essential to developing, penetration testing and releasing a secure Web application. Through a review of recent Web application breaches, the book will expose the prolific methods hackers use to execute Web attacks using common vulnerabilities such as SQL Injection, Cross-Site Scripting and Buffer Overflows in the application layer. By taking an in-depth look at the techniques hackers use to exploit Web applications, readers will be better equipped to protect confidential. The Yankee Group estimates the market for Web application-security products and services will grow to $1.74 billion by 2007 from $140 million in 2002  Author Michael Cross is a highly sought after speaker who regularly delivers Web Application presentations at leading conferences including: Black Hat, TechnoSecurity, CanSec West, Shmoo Con, Information Security, RSA Conferences, and more",
                "author": "Michael Cross",
                "slug": "developers-guide-to-web-application-security-277408-9780080504094-michael-cross",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080504094.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277408",
                "product_url": "/app/ecom/book/277408/developers-guide-to-web-application-security-277408-9780080504094-michael-cross",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597490610",
                    "EISBN13": "9780080504094",
                    "EISBN10": "0080504094"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026356622"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277406",
            "attributes": {
                "name": "Computer Networks ISE",
                "subtitle": "A Systems Approach",
                "description": "<p>Computer Networks ISE, Fourth Edition, is the only introductory computer networking book written by authors who have had first-hand experience with many of the protocols discussed in the book, who have actually designed some of them as well, and who are still actively designing the computer networks today.</p>  <p>This newly revised edition continues to provide an enduring, practical understanding of networks and their building blocks through rich, example-based instruction. The authors' focus is on the why of network design, not just the specifications comprising today's systems but how key technologies and protocols actually work in the real world to solve specific problems. The new edition makes less use of computer code to explain protocols than earlier editions.</p>  <p>Moreover, this new edition shifts the focus somewhat higher in the protocol stack where there is generally more innovative and exciting work going on at the application and session layers than at the link and physical layers.</p> Completely updated with NEW sidebars discussing successes/failures of previously deployed networks Thorough companion website with downloadable OpNet network simulation software and lab experiments manual Expanded coverage of topics of utmost importance to today's networking professionals, e.g., security, wireless, multimedia applications",
                "author": "Larry L. Peterson, Bruce S. Davie",
                "slug": "computer-networks-ise-277406-9780080502564-larry-l-peterson-bruce-s-davie",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080502564.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277406",
                "product_url": "/app/ecom/book/277406/computer-networks-ise-277406-9780080502564-larry-l-peterson-bruce-s-davie",
                "bisac_codes": [
                    "COM043000",
                    "077"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780123740137",
                    "EISBN13": "9780080502564",
                    "EISBN10": "0080502563"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026366800"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277405",
            "attributes": {
                "name": "Cryptography for Developers",
                "subtitle": "",
                "description": "The only guide for software developers who must learn and implement cryptography safely and cost effectively.<br><br>Cryptography for Developers begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent chapters discuss the implementation of symmetric ciphers, one-way hashes, message authentication codes, combined authentication and encryption modes, public key cryptography and finally portable coding practices. Each chapter includes in-depth discussion on memory/size/speed performance trade-offs as well as what cryptographic problems are solved with the specific topics at hand. The author is the developer of the industry standard cryptographic suite of tools called LibTom A regular expert speaker at industry conferences and events on this development",
                "author": "Tom St Denis",
                "slug": "cryptography-for-developers-277405-9780080503455-tom-st-denis",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080503455.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277405",
                "product_url": "/app/ecom/book/277405/cryptography-for-developers-277405-9780080503455-tom-st-denis",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597491044",
                    "EISBN13": "9780080503455",
                    "EISBN10": "0080503454"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026364319"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277404",
            "attributes": {
                "name": "Configuring Juniper Networks NetScreen and SSG Firewalls",
                "subtitle": "",
                "description": "Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. This comprehensive configuration guide will allow system administrators and security professionals to configure these appliances to allow remote and mobile access for employees. If you manage and secure a larger enterprise, this book will help you to provide remote and/or extranet access for employees, partners, and customers from a single platform. Configure Junipers Instant Virtual Extranet (IVE) Install and set up IVE through either the command line interface (CLI) or Web-based console Master the \"3 Rs\": Realms, Roles, and Resources Realize the potential of the \"3Rs\" for endpoint security, sign-in policies, and authorization of servers Get Inside both the Windows and Java Versions of Secure Application Manager (SAM) Learn to implement SAM, manage the end-user experience, and troubleshoot SAM in the field Integrate IVE with Terminal Services and Citrix Enable terminal services proxy and configure role options, configure Citrix using a custom ICA, configure terminal services resource policies and profiles, and configure terminal services and Citrix using a hosted Java applet Ensure Endpoint Security Use Host Checker, Cache Cleaner, Secure Virtual Workspace, and IVE/IDP integration to secure your network Manage the Remote Access Needs of Your Organization Configure Web access, file access and telnet/SSH access for remote users and offices Configure Core Networking Components through the System Menu Create clusters, manage virtual systems, and monitor logs, reports, and alerts Create Bullet-Proof Sign-in Policies Create standard and custom sign-in pages for both user and administrator access and Secure Meeting pages Use the IVE for Log-Related Tasks Perform log filtering, log management, syslog exporting, SNMP management, and system resource monitoring and reporting.",
                "author": "Rob Cameron, Chris Cantrell, Anne Hemni, Lisa Lorenzin",
                "slug": "configuring-juniper-networks-netscreen-and-ssg-firewalls-277404-9780080502847-rob-cameron-chris-cantrell-anne-hemni-lisa-lorenzin",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080502847.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277404",
                "product_url": "/app/ecom/book/277404/configuring-juniper-networks-netscreen-and-ssg-firewalls-277404-9780080502847-rob-cameron-chris-cantrell-anne-hemni-lisa-lorenzin",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597491181",
                    "EISBN13": "9780080502847",
                    "EISBN10": "0080502849"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026356268"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277403",
            "attributes": {
                "name": "Combating Spyware in the Enterprise",
                "subtitle": "Discover, Detect, and Eradicate the Internet's Greatest Threat",
                "description": "Combating Spyware in the Enterprise is the first book published on defending enterprise networks from increasingly sophisticated and malicious spyware.<br><br>Combating Spyware in the Enterprise begins by examining the various types of insidious spyware and adware currently propagating across the internet and infiltrating enterprise networks. This section closely examines Spywares ongoing transformation from nuisance to malicious, sophisticated attack vector. Next, the book uncovers spywares intricate economy and network of malicious hackers and criminals. Forensic investigations presented in this section of the book reveal how increasingly sophisticated spyware can compromise enterprise networks via trojans, keystroke loggers, system monitoring, distributed denial of service attacks, backdoors, viruses, and worms. After close examination of these attack vectors, the book begins to detail both manual and automated techniques for scanning your network for the presence of spyware, and customizing your IDS and IPS to detect spyware. From here, the book goes on to detail how to prevent spyware from being initially installed to mitigating the damage inflicted by spyware should your network become infected. Techniques discussed in this section include slowing the exposure rate; web filtering; using FireFox, MacOSX, or Linux; patching and updating, machine restrictions, shielding, deploying anti-spyware, and re-imaging. The book concludes with an analysis of the future of spyware and what the security community must accomplish to win the ware against spyware.<br><br>* A recent survey published by Information Security Magazine stated that \"combating spyare\" was the #2 priority for security professionals in 2005<br>* Despite the high priority placed on combating spyware by security professionals, there are no other books published or announced that address this market * Author Paul Piccard is Director of Research for Webroot, which is a market leader for pure-play anti-spyware vendors",
                "author": "Paul Piccard",
                "slug": "combating-spyware-in-the-enterprise-277403-9780080502229-paul-piccard",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080502229.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277403",
                "product_url": "/app/ecom/book/277403/combating-spyware-in-the-enterprise-277403-9780080502229-paul-piccard",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597490641",
                    "EISBN13": "9780080502229",
                    "EISBN10": "0080502229"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026362322"
                    }
                }
            }
        }
    ],
    "meta": {
        "pagination": {
            "page": 75113,
            "pages": 78423,
            "count": 1568447
        }
    }
}

Response Info

Default: None