Product List
GET /services/catalog/products?format=api&page=75114
{ "links": { "first": "https://redshelf.com/services/catalog/products?format=api&page=1", "last": "https://redshelf.com/services/catalog/products?format=api&page=78423", "next": "https://redshelf.com/services/catalog/products?format=api&page=75115", "prev": "https://redshelf.com/services/catalog/products?format=api&page=75113" }, "data": [ { "type": "Product", "id": "00010000277411", "attributes": { "name": "Decanter Centrifuge Handbook", "subtitle": "", "description": "Scope of PublicationA reference work for process designers and users of decanters, this book aims to bridge the information gap in this field - that between academic theory promoted in student textbooks and case study data in manufacturers sales literature. <p>DesignIt includes information on design and specification, preparing the reader to select and correctly size equipment. <p>PurchaseAs a design or project engineer working with vendors to make final equipment selection, this work provides the readers with the full facts before they start talking to product vendors. <p>SupplyIn an environment of industry consolidation, the handbook allows you to track suppliers old and new, providing a basis on which users can find the new relevant company for the parts/service he/she wishes to purchase. <p>OperationOnce an equipment purchase is made, the user needs to be made aware of how to optimally operate decanters. The Decanter Centrifuge Handbook covers relevant (process) operating issues such as instrumentation and control and the use of flocculents.", "author": "A. Records, K Sutherland", "slug": "decanter-centrifuge-handbook-277411-9780080503820", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080503820.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277411", "product_url": "/app/ecom/book/277411/decanter-centrifuge-handbook-277411-9780080503820", "bisac_codes": [ "TEC009010", "TEC009070" ], "items_count": null, "identifiers": { "ISBN13": "9781856173698", "EISBN13": "9780080503820", "EISBN10": "0080503829" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026356599" } } } }, { "type": "Product", "id": "00010000277410", "attributes": { "name": "Designing and Building Enterprise DMZs", "subtitle": "", "description": "This is the only book available on building network DMZs, which are the cornerstone of any good enterprise security configuration. It covers market-leading products from Microsoft, Cisco, and Check Point.<br><br>One of the most complicated areas of network technology is designing, planning, implementing, and constantly maintaining a demilitarized zone (DMZ) segment. This book is divided into four logical parts. First the reader will learn the concepts and major design principles of all DMZs. Next the reader will learn how to configure the actual hardware that makes up DMZs for both newly constructed and existing networks. Next, the reader will learn how to securely populate the DMZs with systems and services. The last part of the book deals with troubleshooting, maintaining, testing, and implementing security on the DMZ. The only book published on Network DMZs on the components of securing enterprise networks This is the only book available on building network DMZs, which are the cornerstone of any good enterprise security configuration. It covers market-leading products from Microsoft, Cisco, and Check Point Provides detailed examples for building Enterprise DMZs from the ground up and retro-fitting existing infrastructures", "author": "Hal Flynn", "slug": "designing-and-building-enterprise-dmzs-277410-9780080504001-hal-flynn", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080504001.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277410", "product_url": "/app/ecom/book/277410/designing-and-building-enterprise-dmzs-277410-9780080504001-hal-flynn", "bisac_codes": [ "COM053000", "COM014000" ], "items_count": null, "identifiers": { "ISBN13": "9781597491006", "EISBN13": "9780080504001", "EISBN10": "0080504000" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026360224" } } } }, { "type": "Product", "id": "00010000277408", "attributes": { "name": "Developer's Guide to Web Application Security", "subtitle": "", "description": "Over 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vulnerable applications.<br><br>This book defines Web application security, why it should be addressed earlier in the lifecycle in development and quality assurance, and how it differs from other types of Internet security. Additionally, the book examines the procedures and technologies that are essential to developing, penetration testing and releasing a secure Web application. Through a review of recent Web application breaches, the book will expose the prolific methods hackers use to execute Web attacks using common vulnerabilities such as SQL Injection, Cross-Site Scripting and Buffer Overflows in the application layer. By taking an in-depth look at the techniques hackers use to exploit Web applications, readers will be better equipped to protect confidential. The Yankee Group estimates the market for Web application-security products and services will grow to $1.74 billion by 2007 from $140 million in 2002 Author Michael Cross is a highly sought after speaker who regularly delivers Web Application presentations at leading conferences including: Black Hat, TechnoSecurity, CanSec West, Shmoo Con, Information Security, RSA Conferences, and more", "author": "Michael Cross", "slug": "developers-guide-to-web-application-security-277408-9780080504094-michael-cross", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080504094.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277408", "product_url": "/app/ecom/book/277408/developers-guide-to-web-application-security-277408-9780080504094-michael-cross", "bisac_codes": [ "COM053000", "COM014000" ], "items_count": null, "identifiers": { "ISBN13": "9781597490610", "EISBN13": "9780080504094", "EISBN10": "0080504094" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026356622" } } } }, { "type": "Product", "id": "00010000277406", "attributes": { "name": "Computer Networks ISE", "subtitle": "A Systems Approach", "description": "<p>Computer Networks ISE, Fourth Edition, is the only introductory computer networking book written by authors who have had first-hand experience with many of the protocols discussed in the book, who have actually designed some of them as well, and who are still actively designing the computer networks today.</p> <p>This newly revised edition continues to provide an enduring, practical understanding of networks and their building blocks through rich, example-based instruction. The authors' focus is on the why of network design, not just the specifications comprising today's systems but how key technologies and protocols actually work in the real world to solve specific problems. The new edition makes less use of computer code to explain protocols than earlier editions.</p> <p>Moreover, this new edition shifts the focus somewhat higher in the protocol stack where there is generally more innovative and exciting work going on at the application and session layers than at the link and physical layers.</p> Completely updated with NEW sidebars discussing successes/failures of previously deployed networks Thorough companion website with downloadable OpNet network simulation software and lab experiments manual Expanded coverage of topics of utmost importance to today's networking professionals, e.g., security, wireless, multimedia applications", "author": "Larry L. Peterson, Bruce S. Davie", "slug": "computer-networks-ise-277406-9780080502564-larry-l-peterson-bruce-s-davie", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080502564.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277406", "product_url": "/app/ecom/book/277406/computer-networks-ise-277406-9780080502564-larry-l-peterson-bruce-s-davie", "bisac_codes": [ "COM043000", "077" ], "items_count": null, "identifiers": { "ISBN13": "9780123740137", "EISBN13": "9780080502564", "EISBN10": "0080502563" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026366800" } } } }, { "type": "Product", "id": "00010000277405", "attributes": { "name": "Cryptography for Developers", "subtitle": "", "description": "The only guide for software developers who must learn and implement cryptography safely and cost effectively.<br><br>Cryptography for Developers begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent chapters discuss the implementation of symmetric ciphers, one-way hashes, message authentication codes, combined authentication and encryption modes, public key cryptography and finally portable coding practices. Each chapter includes in-depth discussion on memory/size/speed performance trade-offs as well as what cryptographic problems are solved with the specific topics at hand. The author is the developer of the industry standard cryptographic suite of tools called LibTom A regular expert speaker at industry conferences and events on this development", "author": "Tom St Denis", "slug": "cryptography-for-developers-277405-9780080503455-tom-st-denis", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080503455.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277405", "product_url": "/app/ecom/book/277405/cryptography-for-developers-277405-9780080503455-tom-st-denis", "bisac_codes": [ "COM053000", "COM014000" ], "items_count": null, "identifiers": { "ISBN13": "9781597491044", "EISBN13": "9780080503455", "EISBN10": "0080503454" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026364319" } } } }, { "type": "Product", "id": "00010000277404", "attributes": { "name": "Configuring Juniper Networks NetScreen and SSG Firewalls", "subtitle": "", "description": "Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. This comprehensive configuration guide will allow system administrators and security professionals to configure these appliances to allow remote and mobile access for employees. If you manage and secure a larger enterprise, this book will help you to provide remote and/or extranet access for employees, partners, and customers from a single platform. Configure Junipers Instant Virtual Extranet (IVE) Install and set up IVE through either the command line interface (CLI) or Web-based console Master the \"3 Rs\": Realms, Roles, and Resources Realize the potential of the \"3Rs\" for endpoint security, sign-in policies, and authorization of servers Get Inside both the Windows and Java Versions of Secure Application Manager (SAM) Learn to implement SAM, manage the end-user experience, and troubleshoot SAM in the field Integrate IVE with Terminal Services and Citrix Enable terminal services proxy and configure role options, configure Citrix using a custom ICA, configure terminal services resource policies and profiles, and configure terminal services and Citrix using a hosted Java applet Ensure Endpoint Security Use Host Checker, Cache Cleaner, Secure Virtual Workspace, and IVE/IDP integration to secure your network Manage the Remote Access Needs of Your Organization Configure Web access, file access and telnet/SSH access for remote users and offices Configure Core Networking Components through the System Menu Create clusters, manage virtual systems, and monitor logs, reports, and alerts Create Bullet-Proof Sign-in Policies Create standard and custom sign-in pages for both user and administrator access and Secure Meeting pages Use the IVE for Log-Related Tasks Perform log filtering, log management, syslog exporting, SNMP management, and system resource monitoring and reporting.", "author": "Rob Cameron, Chris Cantrell, Anne Hemni, Lisa Lorenzin", "slug": "configuring-juniper-networks-netscreen-and-ssg-firewalls-277404-9780080502847-rob-cameron-chris-cantrell-anne-hemni-lisa-lorenzin", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080502847.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277404", "product_url": "/app/ecom/book/277404/configuring-juniper-networks-netscreen-and-ssg-firewalls-277404-9780080502847-rob-cameron-chris-cantrell-anne-hemni-lisa-lorenzin", "bisac_codes": [ "COM053000", "COM014000" ], "items_count": null, "identifiers": { "ISBN13": "9781597491181", "EISBN13": "9780080502847", "EISBN10": "0080502849" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026356268" } } } }, { "type": "Product", "id": "00010000277403", "attributes": { "name": "Combating Spyware in the Enterprise", "subtitle": "Discover, Detect, and Eradicate the Internet's Greatest Threat", "description": "Combating Spyware in the Enterprise is the first book published on defending enterprise networks from increasingly sophisticated and malicious spyware.<br><br>Combating Spyware in the Enterprise begins by examining the various types of insidious spyware and adware currently propagating across the internet and infiltrating enterprise networks. This section closely examines Spywares ongoing transformation from nuisance to malicious, sophisticated attack vector. Next, the book uncovers spywares intricate economy and network of malicious hackers and criminals. Forensic investigations presented in this section of the book reveal how increasingly sophisticated spyware can compromise enterprise networks via trojans, keystroke loggers, system monitoring, distributed denial of service attacks, backdoors, viruses, and worms. After close examination of these attack vectors, the book begins to detail both manual and automated techniques for scanning your network for the presence of spyware, and customizing your IDS and IPS to detect spyware. From here, the book goes on to detail how to prevent spyware from being initially installed to mitigating the damage inflicted by spyware should your network become infected. Techniques discussed in this section include slowing the exposure rate; web filtering; using FireFox, MacOSX, or Linux; patching and updating, machine restrictions, shielding, deploying anti-spyware, and re-imaging. The book concludes with an analysis of the future of spyware and what the security community must accomplish to win the ware against spyware.<br><br>* A recent survey published by Information Security Magazine stated that \"combating spyare\" was the #2 priority for security professionals in 2005<br>* Despite the high priority placed on combating spyware by security professionals, there are no other books published or announced that address this market * Author Paul Piccard is Director of Research for Webroot, which is a market leader for pure-play anti-spyware vendors", "author": "Paul Piccard", "slug": "combating-spyware-in-the-enterprise-277403-9780080502229-paul-piccard", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080502229.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277403", "product_url": "/app/ecom/book/277403/combating-spyware-in-the-enterprise-277403-9780080502229-paul-piccard", "bisac_codes": [ "COM053000", "COM014000" ], "items_count": null, "identifiers": { "ISBN13": "9781597490641", "EISBN13": "9780080502229", "EISBN10": "0080502229" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026362322" } } } }, { "type": "Product", "id": "00010000277402", "attributes": { "name": "Computerization and Controversy", "subtitle": "Value Conflicts and Social Choices", "description": "<p>The Second Edition of Computerization and Controversy: Value Conflicts and Social Choices is a collection of 78 articles that examine the social aspects of computerization from a variety of perspectives, many presenting important viewpoints not often discussed in the conventional literature. A number of paired articles comprise thought-provoking head-on debate. Fields represented include computer science, information systems, management, journalism, psychology, law, library science, and sociology.</p> <p>This volume introduces some of the major controversies surrounding the computerization of society and helps readers recognize the social processes that drive and shape computerization. Division into eight provocatively titled sections facilitates course planning for classroom or seminar use. A lead article for each section frames the major controversies, locates the selections within the debates, and points to other relevant literature.</p> A fully revised and updated version of the first anthological treatment of the subject Organized to facilitate course planning for classroom or seminar use Provides coverage of the influence of computers on a wide variety of fields including computer science, information systems, management, journalism, psychology, law, library science, and sociology", "author": "Rob Kling", "slug": "computerization-and-controversy-277402-9780080502632", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080502632.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277402", "product_url": "/app/ecom/book/277402/computerization-and-controversy-277402-9780080502632", "bisac_codes": [ "COM014000", "SOC015000" ], "items_count": null, "identifiers": { "ISBN13": "9780124150409", "EISBN13": "9780080502632", "EISBN10": "0080502636" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026352339" } } } }, { "type": "Product", "id": "00010000277400", "attributes": { "name": "CIMA Exam Practice Kit Management Accounting Risk and Control Strategy", "subtitle": "", "description": "CIMA Exam Practice Kits consolidate learning by providing an extensive bank of practice questions. Each solution provides an in depth analysis of the correct answer and highlights why the alternatives are incorrect. CIMA Exam Practice Kits are ideal for students studying independently or attending a tutored revision course. It supplements the Official CIMA Study Systems and CIMA Revision Cards with a wealth of additional questions and material focused purely on applying what has been learnt to passing the exam. CIMA Exam Practice Kits help students prepare with confidence for exam day, and to pass the new syllabus first time.<br><br>* Helps CIMA students to prepare and pass the new syllabus first time * Practice applying and displaying knowledge so CIMA examiners can award you marks * Provides worked answers to fully explain the correct answer, and analysis of incorrect answers - helping CIMA students avoid common pitfalls", "author": "Stephen Foster", "slug": "cima-exam-practice-kit-management-accounting-risk-and-control-strategy-277400-9780080501505-stephen-foster", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080501505.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277400", "product_url": "/app/ecom/book/277400/cima-exam-practice-kit-management-accounting-risk-and-control-strategy-277400-9780080501505-stephen-foster", "bisac_codes": [ "BUS001040", "BUS001000" ], "items_count": null, "identifiers": { "ISBN13": "9780750669375", "EISBN13": "9780080501505", "EISBN10": "0080501508" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026369232" } } } }, { "type": "Product", "id": "00010000277398", "attributes": { "name": "CIMA Exam Practice Kit Management Accounting Decision Management", "subtitle": "", "description": "CIMA Exam Practice Kits consolidate learning by providing an extensive bank of practice questions. Each solution provides an in depth analysis of the correct answer and highlights why the alternatives are incorrect. CIMA Exam Practice Kits are ideal for students studying independently or attending a tutored revision course. It supplements the Official CIMA Learning Systems and CIMA Revision Cards with a wealth of additional questions and material focused purely on applying what has been learnt to passing the exam. CIMA Exam Practice Kits help students prepare with confidence for exam day, and to pass first time.CIMA Exam Practice Kits are the only books endorsed by CIMA.<br><br>* Helps CIMA students to prepare and pass the new syllabus first time * Practice applying and displaying knowledge so CIMA examiners can award you marks * Provides worked answers to fully explain the correct answer, and analysis of incorrect answers - helping CIMA students avoid common pitfalls", "author": "Ian Barnett, Simon Dawkins", "slug": "cima-exam-practice-kit-management-accounting-decision-management-277398-9780080501451-ian-barnett-simon-dawkins", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080501451.png", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277398", "product_url": "/app/ecom/book/277398/cima-exam-practice-kit-management-accounting-decision-management-277398-9780080501451-ian-barnett-simon-dawkins", "bisac_codes": [ "BUS001040", "BUS001000" ], "items_count": null, "identifiers": { "ISBN13": "9780750669290", "EISBN13": "9780080501451", "EISBN10": "0080501451" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026363502" } } } }, { "type": "Product", "id": "00010000277397", "attributes": { "name": "CIMA Exam Practice Kit Organisational Management and Information Systems", "subtitle": "", "description": "CIMA Exam Practice Kits consolidate learning by providing an extensive bank of practice questions. Each solution provides an in depth analysis of the correct answer and highlights why the alternatives are incorrect. CIMA Exam Practice Kits are ideal for students studying independently or attending a tutored revision course. It supplements the Official CIMA Study Systems and CIMA Revision Cards with a wealth of additional questions and material focused purely on applying what has been learnt to passing the exam. CIMA Exam Practice Kits help students prepare with confidence for exam day, and to pass the new syllabus first time.<br><br>* Helps CIMA students to prepare and pass the new syllabus first time * Practice applying and displaying knowledge so CIMA examiners can award you marks * Provides worked answers to fully explain the correct answer, and analysis of incorrect answers - helping CIMA students avoid common pitfalls", "author": "Jaspar Robertson, Walter Allan", "slug": "cima-exam-practice-kit-organisational-management-and-information-systems-277397-9780080501512-jaspar-robertson", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080501512.png", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277397", "product_url": "/app/ecom/book/277397/cima-exam-practice-kit-organisational-management-and-information-systems-277397-9780080501512-jaspar-robertson", "bisac_codes": [ "BUS001040", "BUS001000" ], "items_count": null, "identifiers": { "ISBN13": "9780750669306", "EISBN13": "9780080501512", "EISBN10": "0080501516" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026363492" } } } }, { "type": "Product", "id": "00010000277396", "attributes": { "name": "CD and DVD Forensics", "subtitle": "", "description": "CD and DVD Forensics will take the reader through all facets of handling, examining, and processing CD and DVD evidence for computer forensics. At a time where data forensics is becoming a major part of law enforcement and prosecution in the public sector, and corporate and system security in the private sector, the interest in this subject has just begun to blossom.<br><br>CD and DVD Forensics is a how to book that will give the reader tools to be able to open CDs and DVDs in an effort to identify evidence of a crime. These tools can be applied in both the public and private sectors. Armed with this information, law enforcement, corporate security, and private investigators will be able to be more effective in their evidence related tasks. To accomplish this the book is divided into four basic parts: (a) CD and DVD physics dealing with the history, construction and technology of CD and DVD media, (b) file systems present on CDs and DVDs and how these are different from that which is found on hard disks, floppy disks and other media, (c) considerations for handling CD and DVD evidence to both recover the maximum amount of information present on a disc and to do so without destroying or altering the disc in any way, and (d) using the InfinaDyne product CD/DVD Inspector to examine discs in detail and collect evidence. This is the first book addressing using the CD/DVD Inspector product in a hands-on manner with a complete step-by-step guide for examining evidence discs See how to open CD's and DVD'd and extract all the crucial evidence they may contain", "author": "Paul Crowley", "slug": "cd-and-dvd-forensics-277396-9780080500805-paul-crowley", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080500805.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277396", "product_url": "/app/ecom/book/277396/cd-and-dvd-forensics-277396-9780080500805-paul-crowley", "bisac_codes": [ "COM053000", "COM014000" ], "items_count": null, "identifiers": { "ISBN13": "9781597491280", "EISBN13": "9780080500805", "EISBN10": "0080500803" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026367208" } } } }, { "type": "Product", "id": "00010000277395", "attributes": { "name": "How to Cheat at Designing a Windows Server 2003 Active Directory Infrastructure", "subtitle": "", "description": "Windows 2003 Server is unquestionably the dominant enterprise level operating system in the industry, with 95% of all companies running it. And for the last tow years, over 50% of all product upgrades have been security related. Securing Windows Server, according to bill gates, is the company's #1 priority.<br><br>The book will start off by teaching readers to create the conceptual design of their Active Directory infrastructure by gathering and analyzing business and technical requirements. Next, readers will create the logical design for an Active Directory infrastructure. Here the book starts to drill deeper and focus on aspects such as group policy design. Finally, readers will learn to create the physical design for an active directory and network Infrastructure including DNS server placement; DC and GC placements and Flexible Single Master Operations (FSMO) role placement. <br><br>The next book in our best selling and critically acclaimed How to Cheat series. This is the perfect book for users who have already purchased How to Cheat at Managing Windows 2003 Small Business Server.<br><br>* Active Directory is the market leader in the directory services space, and 57% of all Microsoft corporate customers have deployed AD<br>* Follows Syngress's proven \"How To Cheat\" methodology<br>* Companion Web site offers dozens of templates, \"Cheat Sheets\", and checklists for readers", "author": "Melissa M. Meyer, Michael Cross, Hal Kurz, Brian Barber", "slug": "how-to-cheat-at-designing-a-windows-server-2003-active-directory-infrastructure-277395-9780080500928-melissa-m-meyer-michael-cross-hal-kurz-brian-barber", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080500928.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277395", "product_url": "/app/ecom/book/277395/how-to-cheat-at-designing-a-windows-server-2003-active-directory-infrastructure-277395-9780080500928-melissa-m-meyer-michael-cross-hal-kurz-brian-barber", "bisac_codes": [ "COM053000", "COM014000" ], "items_count": null, "identifiers": { "ISBN13": "9781597490580", "EISBN13": "9780080500928", "EISBN10": "0080500927" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026355203" } } } }, { "type": "Product", "id": "00010000277394", "attributes": { "name": "Building a VoIP Network with Nortel's Multimedia Communication Server 5100", "subtitle": "", "description": "The first book published on deploying Voice Over IP (VoIP) products from Nortel Networks, the largest supplier of voice products in the world.<br><br>This book begins with a discussion of the current protocols used for transmitting converged data over IP as well as an overview of Nortels hardware and software solutions for converged networks. In this section, readers will learn how H.323 allows dissimilar communication devices to communicate with each other, and how SIP (Session Initiation Protocol) is used to establish, modify, and terminate multimedia sessions including VOIP telephone calls. This section next introduces the reader to the Multimedia Concentration Server 5100, and Nortels entire suite of Multimedia Communications Portfolio (MCP) products. The remaining chapters of the book teach the reader how to design, install, configure, and troubleshoot the entire Nortel product line.<br><br> If you are tasked with designing, installing, configuring, and troubleshooting a converged network built with Nortel's Multimedia Concentration Server 5100, and Multimedia Communications Portfolio (MCP) products, then this is the only book you need. <br><br> It shows how you'll be able to design, build, secure, and maintaining a cutting-edge converged network to satisfy all of your business requirements<br><br> Also covers how to secure your entire multimedia network from malicious attacks", "author": "Larry Chaffin", "slug": "building-a-voip-network-with-nortels-multimedia-communication-server-5100-277394-9780080500171-larry-chaffin", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080500171.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277394", "product_url": "/app/ecom/book/277394/building-a-voip-network-with-nortels-multimedia-communication-server-5100-277394-9780080500171-larry-chaffin", "bisac_codes": [ "COM053000", "COM014000" ], "items_count": null, "identifiers": { "ISBN13": "9781597490788", "EISBN13": "9780080500171", "EISBN10": "008050017X" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026354814" } } } }, { "type": "Product", "id": "00010000277393", "attributes": { "name": "Botnets", "subtitle": "The Killer Web Applications", "description": "The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world examples. These chapters will cover what they are, how they operate, and the environment and technology that makes them possible. The following chapters will analyze botnets for opportunities to detect, track, and remove them. Then the book will describe intelligence gathering efforts and results obtained to date. Public domain tools like OurMon, developed by Jim Binkley of Portland State University, will be described in detail along with discussions of other tools and resources that are useful in the fight against Botnets. This is the first book to explain the newest internet threat - Botnets, zombie armies, bot herders, what is being done, and what you can do to protect your enterprise Botnets are the most complicated and difficult threat the hacker world has unleashed - read how to protect yourself", "author": "Craig Schiller, James R. Binkley, Michael Cross, Gadi Evron, Anthony Bradley, David Harley, Chris Ries, Carsten Willems", "slug": "botnets-277393-9780080500232-craig-schiller-james-r-binkley", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080500232.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277393", "product_url": "/app/ecom/book/277393/botnets-277393-9780080500232-craig-schiller-james-r-binkley", "bisac_codes": [ "COM053000", "COM014000" ], "items_count": null, "identifiers": { "ISBN13": "9781597491358", "EISBN13": "9780080500232", "EISBN10": "0080500234" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026355171" } } } }, { "type": "Product", "id": "00010000277391", "attributes": { "name": "Aircraft Design Projects", "subtitle": "For Engineering Students", "description": "Written with students of aerospace or aeronautical engineering firmly in mind, this is a practical and wide-ranging book that draws together the various theoretical elements of aircraft design - structures, aerodynamics, propulsion, control and others - and guides the reader in applying them in practice. Based on a range of detailed real-life aircraft design projects, including military training, commercial and concept aircraft, the experienced UK and US based authors present engineering students with an essential toolkit and reference to support their own project work.All aircraft projects are unique and it is impossible to provide a template for the work involved in the design process. However, with the knowledge of the steps in the initial design process and of previous experience from similar projects, students will be freer to concentrate on the innovative and analytical aspects of their course project. The authors bring a unique combination of perspectives and experience to this text. It reflects both British and American academic practices in teaching aircraft design. Lloyd Jenkinson has taught aircraft design at both Loughborough and Southampton universities in the UK and Jim Marchman has taught both aircraft and spacecraft design at Virginia Tech in the US.<br><br>* Demonstrates how basic aircraft design processes can be successfully applied in reality* Case studies allow both student and instructor to examine particular design challenges * Covers commercial and successful student design projects, and includes over 200 high quality illustrations", "author": "Lloyd R. Jenkinson, Jim Marchman", "slug": "aircraft-design-projects-277391-9780080498959-lloyd-r-jenkinson-jim-marchman", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080498959.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277391", "product_url": "/app/ecom/book/277391/aircraft-design-projects-277391-9780080498959-lloyd-r-jenkinson-jim-marchman", "bisac_codes": [ "TEC002000", "TEC009070" ], "items_count": null, "identifiers": { "ISBN13": "9780750657723", "EISBN13": "9780080498959", "EISBN10": "0080498957" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026354376" } } } }, { "type": "Product", "id": "00010000277390", "attributes": { "name": "Apple I Replica Creation", "subtitle": "Back to the Garage", "description": "The perfect book for computer hobbyists, Apple I Replica Creation: Back to the Garage is sure to equally appeal both to kids with gift certificates looking for fun on a snowy January day as well as to adults eager to learn the basics of simple microcomputer design. The book will begin by teaching readers the basics of computer processing by discussing the functionality of the 9 chip on the Apple I motherboard. From there, readers will be taught the basics of memory access and video input and output. Readers then learn how to assemble the various hardware components into a fully functioning Apple I replica. Finally, readers will learn how to write their own applications to take run on their new/old computer.<br><br>*Written by the webmaster of AppleFritter.com, which is the most popular Mac hobbyist Web site on the internet with over 10,000 visitors a day. <br><br>*Interest in vintage Apple I Computers is extremely high, with original machines selling for as much as $50,000. <br><br>*The only modern-day book to address general microcomputer design from a hobbyist perspective", "author": "Tom Owad", "slug": "apple-i-replica-creation-277390-9780080499215-tom-owad", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080499215.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277390", "product_url": "/app/ecom/book/277390/apple-i-replica-creation-277390-9780080499215-tom-owad", "bisac_codes": [ "COM053000", "COM041000" ], "items_count": null, "identifiers": { "ISBN13": "9781931836401", "EISBN13": "9780080499215", "EISBN10": "008049921X" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026367365" } } } }, { "type": "Product", "id": "00010000277388", "attributes": { "name": "Additives for Plastics Handbook", "subtitle": "", "description": "<p>Both technically and economically, additives form a large and increasingly significant part of the polymer industry, both plastics and elastomers. Since the first edition of this book was published, there have been wide-ranging developments, covering chemistry and formulation of new and more efficient additive systems and the safer use of additives, both by processors in the factory and, in the wider field, as they affect the general public.</p> <p>This new edition follows the successful formula of its predecessor, it provides a comprehensive view of all types of additives, concentrating mainly on their technical aspects (chemistry/formulation, structure, function, main applications) with notes on the commercial background of each. The field has been expanded to include any substance that is added to a polymer to improve its use, so including reinforcing materials (such as glass fibre), carbon black and titanium dioxide. This is a book which has been planned for ease of use and the information is presented in a way which is appropriate to the users' needs.</p>", "author": "J. Murphy", "slug": "additives-for-plastics-handbook-277388-9780080498614", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080498614.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277388", "product_url": "/app/ecom/book/277388/additives-for-plastics-handbook-277388-9780080498614", "bisac_codes": [ "TEC055000", "TEC021000" ], "items_count": null, "identifiers": { "ISBN13": "9781856173704", "EISBN13": "9780080498614", "EISBN10": "0080498612" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026354604" } } } }, { "type": "Product", "id": "00010000277386", "attributes": { "name": "Risk Management Technology in Financial Services", "subtitle": "Risk Control, Stress Testing, Models, and IT Systems and Structures", "description": "Written for professionals in financial services with responsibility for IT and risk management, Dimitris Chorafas surveys the methodology required and IT systems and structures to support it according to Basel II. The book is consistent with the risk management certification process of GARP, as well as the accounting rules of IFRS, based on research the author conducted with IASB. The author provices an in-depth discussion of the types of risk, stress analysis and the use of scenarios, mathematical models, and IT systems and infrastructure requirements.<br><br>* Written in clear, straightforward style for financial industry executives to provide necessary information for risk control decisionmaking* Consistent with GARP, IFRS and IASB risk management processes and procedures* Explains stress testing and its place in risk control", "author": "Dimitris N. Chorafas", "slug": "risk-management-technology-in-financial-services-277386-9780080498096-dimitris-n-chorafas", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080498096.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277386", "product_url": "/app/ecom/book/277386/risk-management-technology-in-financial-services-277386-9780080498096-dimitris-n-chorafas", "bisac_codes": [ "BUS027000", "516" ], "items_count": null, "identifiers": { "ISBN13": "9780750683043", "EISBN13": "9780080498096", "EISBN10": "0080498094" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026358690" } } } }, { "type": "Product", "id": "00010000277385", "attributes": { "name": "So You Wanna Be an Embedded Engineer", "subtitle": "The Guide to Embedded Engineering, From Consultancy to the Corporate Ladder", "description": "In this new, highly practical guide, expert embedded designer and manager Lewin Edwards answers the question, How do I become an embedded engineer? Embedded professionals agree that there is a treacherous gap between graduating from school and becoming an effective engineer in the workplace, and that there are few resources available for newbies to turn to when in need of advice and direction. This book provides that much-needed guidance for engineers fresh out of school, and for the thousands of experienced engineers now migrating into the popular embedded arena.<br>This book helps new embedded engineers to get ahead quickly by preparing them for the technical and professional challenges they will face. Detailed instructions on how to achieve successful designs using a broad spectrum of different microcontrollers and scripting languages are provided. The author shares insights from a lifetime of experience spent in-the-trenches, covering everything from small vs. large companies, and consultancy work vs. salaried positions, to which types of training will prove to be the most lucrative investments. This book provides an experts authoritative answers to questions that pop up constantly on Usenet newsgroups and in break rooms all over the world.<br><br>* An approachable, friendly introduction to working in the world of embedded design<br>* Full of design examples using the most common languages and hardware that new embedded engineers will be likely to use every day<br>* Answers important basic questions on which are the best products to learn, trainings to get, and kinds of companies to work for", "author": "Lewin Edwards", "slug": "so-you-wanna-be-an-embedded-engineer-277385-9780080498157-lewin-edwards", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080498157.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277385", "product_url": "/app/ecom/book/277385/so-you-wanna-be-an-embedded-engineer-277385-9780080498157-lewin-edwards", "bisac_codes": [ "TEC007000", "TEC008070" ], "items_count": null, "identifiers": { "ISBN13": "9780750679534", "EISBN13": "9780080498157", "EISBN10": "0080498159" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026359918" } } } } ], "meta": { "pagination": { "page": 75114, "pages": 78423, "count": 1568454 } } }
Response Info
Default: None