GET /services/catalog/products?format=api&page=75122
Response information
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/vnd.api+json
Vary: Accept

{
    "links": {
        "first": "https://redshelf.com/services/catalog/products?format=api&page=1",
        "last": "https://redshelf.com/services/catalog/products?format=api&page=78424",
        "next": "https://redshelf.com/services/catalog/products?format=api&page=75123",
        "prev": "https://redshelf.com/services/catalog/products?format=api&page=75121"
    },
    "data": [
        {
            "type": "Product",
            "id": "00010000277251",
            "attributes": {
                "name": "Software Piracy Exposed",
                "subtitle": "",
                "description": "This book is about software piracy--what it is and how it's done. Stealing software is not to be condoned, and theft of intellectual property and copyright infringement are serious matters, but it's totally unrealistic to pretend that it doesn't happen. Software piracy has reached epidemic proportions. Many computer users know this, the software companies know this, and once you've read the Introduction to this book, you'll understand why. Seeing how widespread software piracy is, learning how it's accomplished, and particularly how incredibly easy it is to do might surprise you. This book describes how software piracy is actually being carried out. This book is about software piracy--what it is and how it's done This is the first book ever to describe how software is actually stolen and traded over the internet Discusses security implications resulting from over 1/2 of the internet's computers running illegal, unpatched, pirated software",
                "author": "Ron Honick",
                "slug": "software-piracy-exposed-277251-9780080489735-ron-honick",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080489735.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277251",
                "product_url": "/app/ecom/book/277251/software-piracy-exposed-277251-9780080489735-ron-honick",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781932266986",
                    "EISBN13": "9780080489735",
                    "EISBN10": "0080489737"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026349771"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277250",
            "attributes": {
                "name": "SQL",
                "subtitle": "Practical Guide for Developers",
                "description": "<p>SQL is a solid guide and reference to the key elements of SQL and how to use it effectively. Developed by authors who needed a good resource for students in their database class, this is an ideal supplement for database courses  no matter what main text you use or what flavor of SQL is required.</p>  <p>It features a short and inexpensive introduction to SQL for students who have some programming experience and need to learn the main features of SQL; and suggested shortcuts for learning and practice, depending on the experience of the user.</p>  <p>This book is recommended for novice developers, programmers, and database administrators as well as students in database courses, business courses, and IT-related courses. </p> Provides tutorial-based instruction for the main features of SQL for programmers and other technical professionals in need of a brief but really good introduction to SQL. The approach is vendor-neutralso very adaptable and flexible The focus is on teaching concepts by walking through concrete examples and explanations, and self-review exercises are included at the end of each chapter. Coverage is on the key features of the language that are required to understand SQL and begin using it effectively. SQL 2003-compliant.",
                "author": "Michael J. Donahoo, Gregory D. Speegle",
                "slug": "sql-277250-9780080489742-michael-j-donahoo-gregory-d-speegle",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080489742.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277250",
                "product_url": "/app/ecom/book/277250/sql-277250-9780080489742-michael-j-donahoo-gregory-d-speegle",
                "bisac_codes": [
                    "COM021000",
                    "COM051010"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780122205316",
                    "EISBN13": "9780080489742",
                    "EISBN10": "0080489745"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026360781"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277249",
            "attributes": {
                "name": "Syngress IT Security Project Management Handbook",
                "subtitle": "",
                "description": "The definitive work for IT professionals responsible for the management of the design, configuration, deployment, and maintenance of enterprise wide security projects. Provides specialized coverage of key project areas including Penetration Testing, Intrusion Detection and Prevention Systems, and Access Control Systems. <br><br>The first and last word on managing IT security projects, this book provides the level of detail and content expertise required to competently handle highly complex security deployments. In most enterprises, be they corporate or governmental, these are generally the highest priority projects and the security of the entire business may depend on their success.<br><br>* The first book devoted exclusively to managing IT security projects <br><br>* Expert authors combine superb project management skills with in-depth coverage of highly complex security projects<br><br>* By mastering the content in this book, managers will realise shorter schedules, fewer cost over runs, and successful deployments",
                "author": "Susan Snedaker",
                "slug": "syngress-it-security-project-management-handbook-277249-9780080489773-susan-snedaker",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080489773.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277249",
                "product_url": "/app/ecom/book/277249/syngress-it-security-project-management-handbook-277249-9780080489773-susan-snedaker",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597490764",
                    "EISBN13": "9780080489773",
                    "EISBN10": "008048977X"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026350465"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277248",
            "attributes": {
                "name": "Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals",
                "subtitle": "",
                "description": "The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals:<br><br>1. Coding  The ability to program and script is quickly becoming a mainstream requirement for just about everyone in the security industry. This section covers the basics in coding complemented with a slue of programming tips and tricks in C/C++, Java, Perl and NASL. <br><br>2. Sockets  The technology that allows programs and scripts to communicate over a network is sockets. Even though the theory remains the same  communication over TCP and UDP, sockets are implemented differently in nearly ever language. <br><br>3. Shellcode  Shellcode, commonly defined as bytecode converted from Assembly, is utilized to execute commands on remote systems via direct memory access. <br><br>4. Porting  Due to the differences between operating platforms and language implementations on those platforms, it is a common practice to modify an original body of code to work on a different platforms. This technique is known as porting and is incredible useful in the real world environments since it allows you to not recreate the wheel.<br><br>5. Coding Tools  The culmination of the previous four sections, coding tools brings all of the techniques that you have learned to the forefront. With the background technologies and techniques you will now be able to code quick utilities that will not only make you more productive, they will arm you with an extremely valuable skill that will remain with you as long as you make the proper time and effort dedications.<br><br>*Contains never before seen chapters on writing and automating exploits on windows systems with all-new exploits. <br><br>*Perform zero-day exploit forensics by reverse engineering malicious code. <br><br>*Provides working code and scripts in all of the most common programming languages for readers to use TODAY to defend their networks.",
                "author": "James C Foster",
                "slug": "sockets-shellcode-porting-and-coding-reverse-engineering-exploits-and-tool-coding-for-security-professionals-277248-9780080489728-james-c-foster",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080489728.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277248",
                "product_url": "/app/ecom/book/277248/sockets-shellcode-porting-and-coding-reverse-engineering-exploits-and-tool-coding-for-security-professionals-277248-9780080489728-james-c-foster",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597490054",
                    "EISBN13": "9780080489728",
                    "EISBN10": "0080489729"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026369241"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277247",
            "attributes": {
                "name": "Skype Me! From Single User to Small Enterprise and Beyond",
                "subtitle": "",
                "description": "This book is divided into four parts. Part I begins with several chapters on the basics of Skype. Here the reader learns how to install and configure Skype on several platforms including Windows, Max OSX, Linux, and PocketPC. The reader will also learn how to begin making voice over IP calls immediately. Part II deals with the more advanced features of Skype. Here the reader learns how to use Skype on new Skype Ready cell phones, use Skype for more advanced, business-oriented tasks such as scheduling and file transfers, as well as using SkypeOut. Part III discusses how to integrate Skype with third party networking, communication, and security devices such as routers, firewalls, and mail servers, as well as using the brand new Skype for Business. Part IV covers the Skype Application Programming Interface, Plug-ins, Add-ons, and third party tools. Here the reader learns to develop and customize their own applications using the new, powerful, Skype API.<br><br>* Skype has over 70,000,0000 users worldwide, and 13 forums with over 25,000 members<br>* Skype's Application Programming Interface (API) allows users to develop their own applications and customize Skype with the information found in this book<br>* Makrus Daehne is one of the most recognized and respected authorities on Skype and he is the forum moderator on the Skype Web site",
                "author": "Markus Daehne",
                "slug": "skype-me-from-single-user-to-small-enterprise-and-beyond-277247-9780080489711-markus-daehne",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080489711.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277247",
                "product_url": "/app/ecom/book/277247/skype-me-from-single-user-to-small-enterprise-and-beyond-277247-9780080489711-markus-daehne",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597490320",
                    "EISBN13": "9780080489711",
                    "EISBN10": "0080489710"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026349739"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277246",
            "attributes": {
                "name": "Security Log Management",
                "subtitle": "Identifying Patterns in the Chaos",
                "description": "This book teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can be use to make their networks more efficient and secure using primarily open source tools. The book begins by discussing the Top 10 security logs that every IT professional should be regularly analyzing. These 10 logs cover everything from the top workstations sending/receiving data through a firewall to the top targets of IDS alerts. The book then goes on to discuss the relevancy of all of this information. Next, the book describes how to script open source reporting tools like Tcpdstats to automatically correlate log files from the various network devices to the Top 10 list. By doing so, the IT professional is instantly made aware of any critical vulnerabilities or serious degradation of network performance. All of the scripts presented within the book will be available for download from the Syngress Solutions Web site.<br><br>Almost every operating system, firewall, router, switch, intrusion detection system, mail server, Web server, and database produces some type of log file. This is true of both open source tools and commercial software and hardware from every IT manufacturer. Each of these logs is reviewed and analyzed by a system administrator or security professional responsible for that particular piece of hardware or software. As a result, almost everyone involved in the IT industry works with log files in some capacity.<br><br>* Provides turn-key, inexpensive, open source solutions for system administrators to analyze and evaluate the overall performance and security of their network<br>* Dozens of working scripts and tools presented throughout the book are available for download from Syngress Solutions Web site. <br>* Will save system administrators countless hours by scripting and automating the most common to the most complex log analysis tasks",
                "author": "Jacob Babbin",
                "slug": "security-log-management-277246-9780080489704-jacob-babbin",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080489704.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277246",
                "product_url": "/app/ecom/book/277246/security-log-management-277246-9780080489704-jacob-babbin",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597490429",
                    "EISBN13": "9780080489704",
                    "EISBN10": "0080489702"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026357495"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277245",
            "attributes": {
                "name": "Securing IM and P2P Applications for the Enterprise",
                "subtitle": "",
                "description": "This book is for system administrators and security professionals who need to bring now ubiquitous IM and P2P applications under their control. Many businesses are now taking advantage of the speed and efficiency offered by both IM and P2P applications, yet are completely ill-equipped to deal with the management and security ramifications. <br><br>These companies are now finding out the hard way that these applications which have infiltrated their networks are now the prime targets for malicious network traffic. This book will provide specific information for IT professionals to protect themselves from these vulnerabilities at both the network and application layers by identifying and blocking this malicious traffic.<br><br>* A recent study by the Yankee group ranked \"managing and securing IM and P2P applications\" as the #3 priority for IT managers in 2004<br><br>* The recently updated SANS/FBI top 10 list of vulnerabilities for computers running Microsoft Windows contained both P2P and IM applications for the first time<br><br>* The recently released Symantec Threat Assessment report for the first half of 2004 showed that 19 of the top 50 virus threats targeted IM or P2P applications. Despite the prevalence of IM and P2P applications on corporate networks and the risks they pose, there are no other books covering these topics",
                "author": "Marcus Sachs, Paul Piccard",
                "slug": "securing-im-and-p2p-applications-for-the-enterprise-277245-9780080489698-marcus-sachs-paul-piccard",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080489698.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277245",
                "product_url": "/app/ecom/book/277245/securing-im-and-p2p-applications-for-the-enterprise-277245-9780080489698-marcus-sachs-paul-piccard",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597490177",
                    "EISBN13": "9780080489698",
                    "EISBN10": "0080489699"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026349510"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277243",
            "attributes": {
                "name": "Sarbanes-Oxley Compliance Using COBIT and Open Source Tools",
                "subtitle": "",
                "description": "This book illustrates the many Open Source cost savings opportunities available to companies seeking Sarbanes-Oxley compliance. It also provides examples of the Open Source infrastructure components that can and should be made compliant. In addition, the book clearly documents which Open Source tools you should consider using in the journey towards compliance. Although many books and reference material have been authored on the financial and business side of Sox compliance, very little material is available that directly address the information technology considerations, even less so on how Open Source fits into that discussion.<br><br>Each chapter begins with an analysis of the business and technical ramifications of Sarbanes-Oxley as regards to topics covered before moving into the detailed instructions on the use of the various Open Source applications and tools relating to the compliance objectives. Shows companies how to use Open Source tools to achieve SOX compliance, which dramatically lowers the cost of using proprietary, commercial applications Only SOX compliance book specifically detailing steps to achieve SOX compliance for IT Professionals",
                "author": "Christian B Lahti, Roderick Peterson",
                "slug": "sarbanes-oxley-compliance-using-cobit-and-open-source-tools-277243-9780080489674-christian-b-lahti-roderick-peterson",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080489674.png",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277243",
                "product_url": "/app/ecom/book/277243/sarbanes-oxley-compliance-using-cobit-and-open-source-tools-277243-9780080489674-christian-b-lahti-roderick-peterson",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597490368",
                    "EISBN13": "9780080489674",
                    "EISBN10": "0080489672"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026349203"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277242",
            "attributes": {
                "name": "Configuring SonicWALL Firewalls",
                "subtitle": "",
                "description": "SonicWALL firewalls are the number 3 in sales worldwide in the security appliance market space as of 2004. This accounts for 15% total market share in the security appliance sector. The SonicWALL firewall appliance has had the largest annual growth in the security appliance sector for the last two years. <br><br>This is the first book on the market covering the #3 best-selling firewall appliances in the world from SonicWALL. This book continues Syngress' history from ISA Server to Check Point to Cisco Pix of being first to market with best-selling firewall books for security professionals.<br><br>Configuring SonicWALL Firewalls is the first book to deliver an in-depth look at the SonicWALL firewall product line. It covers all of the aspects of the SonicWALL product line from the SOHO devices to the Enterprise SonicWALL firewalls. Also covered are advanced troubleshooting techniques and the SonicWALL Security Manager. This book offers novice users a complete opportunity to learn the SonicWALL firewall appliance. Advanced users will find it a rich technical resource.<br><br>* First book to deliver an in-depth look at the SonicWALL firewall product line <br><br>* Covers all of the aspects of the SonicWALL product line from the SOHO devices to the Enterprise SonicWALL firewalls <br><br>* Includes advanced troubleshooting techniques and the SonicWALL Security Manager",
                "author": "Dan Bendell",
                "slug": "configuring-sonicwall-firewalls-277242-9780080489667-dan-bendell",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080489667.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277242",
                "product_url": "/app/ecom/book/277242/configuring-sonicwall-firewalls-277242-9780080489667-dan-bendell",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597492508",
                    "EISBN13": "9780080489667",
                    "EISBN10": "0080489664"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026369247"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277241",
            "attributes": {
                "name": "TCP/IP Sockets in C#",
                "subtitle": "Practical Guide for Programmers",
                "description": "\"TCP/IP sockets in C# is an excellent book for anyone interested in writing network applications using Microsoft .Net frameworks. It is a unique combination of well written concise text and rich carefully selected set of working examples. For the beginner of network programming, it's a good starting book; on the other hand professionals could also take advantage of excellent handy sample code snippets and material on topics like message parsing and asynchronous programming.\"<br>Adarsh Khare, SDT, .Net Frameworks Team, Microsoft Corporation<br><br><br>The popularity of the C# language and the .NET framework is ever rising due to its ease of use, the extensive class libraries available in the .NET Framework, and the ubiquity of the Microsoft Windows operating system, to name a few advantages. TCP/IP Sockets in C# focuses on the Sockets API, the de facto standard for writing network applications in any programming language. Starting with simple client and server programs that use TCP/IP (the Internet protocol suite), students and practitioners quickly learn the basics and move on to firsthand experience with advanced topics including non-blocking sockets, multiplexing, threads, asynchronous programming, and multicasting. Key network programming concepts such as framing, performance and deadlocks are illustrated through hands-on examples.  Using a detailed yet clear, concise approach, this book includes numerous code examples and focused discussions to provide a solid understanding of programming TCP/IP sockets in C#.<br><br>Features<br>*Tutorial-based instruction in key sockets programming techniques complemented by numerous code examples throughout <br>*Discussion moves quickly into the C# Sockets API definition and code examples, desirable for those who want to get up-to-speed quickly<br>*Important coverage of \"under the hood\" details that developers will find useful when creating and using a socket or a higher level TCP class that utilizes sockets<br>*Includes end-of-chapter exercises to facilitate learning, as well as sample code available for download at the books companion web site<br><br>*Tutorial-based instruction in key sockets programming techniques complemented by numerous code examples throughout <br><br>*Discussion moves quickly into the C# Sockets API definition and code examples, desirable for those who want to get up-to-speed quickly<br><br>*Important coverage of \"under the hood\" details that developers will find useful when creating and using a socket or a higher level TCP class that utilizes sockets<br><br>*Includes end-of-chapter exercises to facilitate learning, as well as sample code available for download at the book's companion web site",
                "author": "David Makofske, Michael J. Donahoo, Kenneth L. Calvert",
                "slug": "tcpip-sockets-in-c-277241-9780080492322-david-makofske-michael-j-donahoo-kenneth-l-calvert",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080492322.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277241",
                "product_url": "/app/ecom/book/277241/tcpip-sockets-in-c-277241-9780080492322-david-makofske-michael-j-donahoo-kenneth-l-calvert",
                "bisac_codes": [
                    "COM051310",
                    "COM043040"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780124660519",
                    "EISBN13": "9780080492322",
                    "EISBN10": "0080492320"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026368176"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277240",
            "attributes": {
                "name": "RFID Security",
                "subtitle": "",
                "description": "RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from food, dogs, beer kegs to library books. <br><br>RFID tags use a standard that has already been hacked by several researchers. RFID Security discusses the motives for someone wanting to hack an RFID system and shows how to protect systems. <br><br>Coverage includes: security breaches for monetary gain (hacking a shops RFID system would allow a hacker to lower the pricing on any product products). How to protect the supply chain (malicous/mischievous hackers can delete/alter/modify all identifying information for an entire shipment of products). How to protect personal privacy (privacy advocates fear that RFID tags embedded in products, which continue to transmit information after leaving a store, will be used to track consumer habits).<br><br>The purpose of an RFID system is to enable data to be transmitted by a portable device, called a tag, which is read by an RFID reader and processed according to the needs of a particular application. The data transmitted by the tag may provide identification or location information, or specifics about the product tagged, such as price, colour, date of purchase, etc. .<br><br>* Deloitte & Touche expects over 10 billion RFID tags to be in circulation by the end of 2005 <br>* Parties debating the security issue of RFID need information on the pros and cons of the technology and this is that information<br>* Little competition in a market desperate for information",
                "author": "Frank Thornton, Chris Lanthem",
                "slug": "rfid-security-277240-9780080489650-frank-thornton-chris-lanthem",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080489650.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277240",
                "product_url": "/app/ecom/book/277240/rfid-security-277240-9780080489650-frank-thornton-chris-lanthem",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597490474",
                    "EISBN13": "9780080489650",
                    "EISBN10": "0080489656"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026369248"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277237",
            "attributes": {
                "name": "Simulation",
                "subtitle": "",
                "description": "Ross's Simulation, Fourth Edition introduces aspiring and practicing actuaries, engineers, computer scientists and others to the practical aspects of constructing computerized simulation studies to analyze and interpret real phenomena. Readers learn to apply results of these analyses to problems in a wide variety of fields to obtain effective, accurate solutions and make predictions about future outcomes. This text explains how a computer can be used to generate random numbers, and how to use these random numbers to generate the behavior of a stochastic model over time. It presents the statistics needed to analyze simulated data as well as that needed for validating the simulation model. More focus on variance reduction, including control variables and their use in estimating the expected return at blackjack and their relation to regression analysis A chapter on Markov chain monte carlo methods with many examples Unique material on the alias method for generating discrete random variables",
                "author": "Sheldon M. Ross",
                "slug": "simulation-277237-9780080517223-sheldon-m-ross",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080517223.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277237",
                "product_url": "/app/ecom/book/277237/simulation-277237-9780080517223-sheldon-m-ross",
                "bisac_codes": [
                    "MAT029000",
                    "COM023000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780125980630",
                    "EISBN13": "9780080517223",
                    "EISBN10": "0080517226"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026354071"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277235",
            "attributes": {
                "name": "Public-Private Partnerships",
                "subtitle": "Principles of Policy and Finance",
                "description": "Over the last decade or so, private-sector financing through public-private partnerships (PPPs) has become increasingly popular around the world as a way of procuring and maintaining public-sector infrastructure, in sectors such as transportation (roads, bridges, tunnels, railways, ports, airports), social infrastructure (hospitals, schools, prisons, social housing) public utilities (water supply, waste water treatment, waste disposal), government offices and other accommodation, and other specialised services (communications networks or defence equipment). <br>This book, based on the author's practical experience on the public- and private-sector sides of the table, reviews the key policy issues which arise for the public sector in considering whether to adopt the PPP procurement route, and the specific application of this policy approach in PPP contracts, comparing international practices in this respect. It offers a systematic and integrated approach to financing PPPs within this public-policy framework, and explains the project-finance techniques used for this purpose. The book deals with both the Concession and PFI models of PPP, and provides a structured introduction for those who are new to the subject, whether in the academic, public-sector, investment, finance or contracting fields, as well as an aide memoire for those developing PPP policies or negotiating PPPs.   <br><br>The author focuses on practical concepts, issues and techniques, and does not assume any prior knowledge of PPP policy issues or financing techniques. The book describes and explains:<br>* The different types of PPPs and how these have developed<br>* Why PPPs are attractive to governments<br>* General policy issues for the public sector in developing a PPP programme<br>* PPP procurement procedures and bid evaluation<br>* The use of project-finance techniques for PPPs<br>* Sources of funding<br>* Typical PPP contracts and sub-contracts, and their relationship with the projects financial structure <br>* Risk assessment from the points of view of the public sector, investors, lenders and other project parties<br>* Structuring the investment and debt financing<br>* The key issues in negotiating a project-finance debt facility. <br>In addition the book includes an extensive glossary, as well as cross-referencing.<br><br>*Reviews the PPP policy framework and development from an international perspective<br>*Covers public- and private-sector financial analysis, structuring and investment in PPPs<br>*No prior knowledge of project financing required",
                "author": "E. R. Yescombe",
                "slug": "public-private-partnerships-277235-9780080489575-e-r-yescombe",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080489575.png",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277235",
                "product_url": "/app/ecom/book/277235/public-private-partnerships-277235-9780080489575-e-r-yescombe",
                "bisac_codes": [
                    "BUS027000",
                    "BUS051000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780750680547",
                    "EISBN13": "9780080489575",
                    "EISBN10": "0080489575"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026369095"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277234",
            "attributes": {
                "name": "Practical VoIP Security",
                "subtitle": "",
                "description": "Voice Over IP (VoIP) phone lines now represent over 50% of all new phone line installations. Every one of these new VoIP phone lines and handsets must now be protected from malicious hackers because these devices now reside on the network and are accessible from the Internet just like any server or workstation.<br><br>This book will cover a wide variety of the publicly available exploit tools and how they can be used specifically against VoIP (Voice over IP) Telephony systems. The book will cover the attack methodologies that are used against the SIP and H.323 protocols as well as VoIP network infrastructure. Significant emphasis will be placed on both attack and defense techniques. This book is designed to be very hands on and scenario intensive<br><br> More VoIP phone lines are being installed every day than traditional PBX phone lines<br><br> VoIP is vulnerable to the same range of attacks of any network device<br><br> VoIP phones can receive as many Spam voice mails as your e-mail can receive Spam e-mails, and as result must have the same types of anti-spam capabilities",
                "author": "Thomas Porter CISSP CCNP CCDA CCS",
                "slug": "practical-voip-security-277234-9780080489551-thomas-porter-cissp-ccnp-ccda-ccs",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080489551.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277234",
                "product_url": "/app/ecom/book/277234/practical-voip-security-277234-9780080489551-thomas-porter-cissp-ccnp-ccda-ccs",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597490603",
                    "EISBN13": "9780080489551",
                    "EISBN10": "0080489559"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026349011"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277233",
            "attributes": {
                "name": "Phishing Exposed",
                "subtitle": "",
                "description": "Phishing Exposed unveils the techniques phishers employ that enable them to successfully commit fraudulent acts against the global financial industry. <br><br>Also highlights the motivation, psychology and legal aspects encircling this deceptive art of exploitation. The External Threat Assessment Team will outline innovative forensic techniques employed in order to unveil the identities of these organized individuals, and does not hesitate to remain candid about the legal complications that make prevention and apprehension so difficult today. <br><br>This title provides an in-depth, high-tech view from both sides of the playing field, and is a real eye-opener for the average internet user, the advanced security engineer, on up through the senior executive management of a financial institution. This is the book to provide the intelligence necessary to stay one step ahead of the enemy, and to successfully employ a pro-active and confident strategy against the evolving attacks against e-commerce and its customers.<br><br>* Unveils the techniques phishers employ that enable them to successfully commit fraudulent acts <br>* Offers an in-depth, high-tech view from both sides of the playing field to this current epidemic<br>* Stay one step ahead of the enemy with all the latest information",
                "author": "Lance James, Dave Jevans",
                "slug": "phishing-exposed-277233-9780080489537-lance-james",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080489537.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277233",
                "product_url": "/app/ecom/book/277233/phishing-exposed-277233-9780080489537-lance-james",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597490306",
                    "EISBN13": "9780080489537",
                    "EISBN10": "0080489532"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026349098"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277232",
            "attributes": {
                "name": "Perfect Password",
                "subtitle": "Selection, Protection, Authentication",
                "description": "User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals.<br><br>Every computer user must face the problems of password security. According to a recent British study, passwords are usually obvious: around 50 percent of computer users select passwords based on names of a family member, spouse, partner, or a pet. Many users face the problem of selecting strong passwords that meet corporate security requirements. Too often, systems reject user-selected passwords because they are not long enough or otherwise do not meet complexity requirements. This book teaches users how to select passwords that always meet complexity requirements. <br><br>A typical computer user must remember dozens of passwords and they are told to make them all unique and never write them down. For most users, the solution is easy passwords that follow simple patterns. This book teaches users how to select strong passwords they can easily remember.<br><br>* Examines the password problem from the perspective of the administrator trying to secure their network<br>* Author Mark Burnett has accumulated and analyzed over 1,000,000 user passwords and through his research has discovered what works, what doesn't work, and how many people probably have dogs named Spot<br>* Throughout the book, Burnett sprinkles interesting and humorous password ranging from the Top 20 dog names to the number of references to the King James Bible in passwords",
                "author": "Mark Burnett",
                "slug": "perfect-password-277232-9780080489513-mark-burnett",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080489513.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277232",
                "product_url": "/app/ecom/book/277232/perfect-password-277232-9780080489513-mark-burnett",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597490412",
                    "EISBN13": "9780080489513",
                    "EISBN10": "0080489516"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026360351"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277231",
            "attributes": {
                "name": "OS X for Hackers at Heart",
                "subtitle": "",
                "description": "The sexy, elegant design of the Apple PowerBook combined with the Unix-like OS X operating system based on FreeBSD, have once again made OS X the Apple of every hackers eye. In this unique and engaging book covering the brand new OS X 10.4 Tiger, the worlds foremost true hackers unleash the power of OS X for everything form cutting edge research and development to just plain old fun.<br><br>OS X 10.4 Tiger is a major upgrade for Mac OS X for running Apples Macintosh computers and laptops. This book is not a reference to every feature and menu item for OS X. Rather, it teaches hackers of all types from software developers to security professionals to hobbyists, how to use the most powerful (and often obscure) features of OS X for wireless networking, WarDriving, software development, penetration testing, scripting administrative tasks, and much more.<br><br>* Analyst reports indicate that OS X sales will double in 2005. OS X Tiger is currently the #1 selling software product on Amazon and the 12-inch PowerBook is the #1 selling laptop <br><br>* Only book on the market directly appealing to groundswell of hackers migrating to OS X <br><br>* Each chapter written by hacker most commonly associated with that topic, such as Chris Hurley (Roamer) organizer of the World Wide War Drive",
                "author": "Chris Hurley, Russ Rogers, Johnny Long, Tom Owad, Bruce Potter",
                "slug": "os-x-for-hackers-at-heart-277231-9780080489483-chris-hurley-russ-rogers-johnny-long-tom-owad-bruce-potter",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080489483.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277231",
                "product_url": "/app/ecom/book/277231/os-x-for-hackers-at-heart-277231-9780080489483-chris-hurley-russ-rogers-johnny-long-tom-owad-bruce-potter",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597490405",
                    "EISBN13": "9780080489483",
                    "EISBN10": "0080489486"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026360735"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277230",
            "attributes": {
                "name": "Penetration Tester's Open Source Toolkit",
                "subtitle": "",
                "description": "Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This book provides both the art and the science. <br><br>The authors of the book are expert penetration testers who have developed many of the leading pen testing tools; such as the Metasploit framework. The authors allow the reader inside their heads to unravel the mysteries of thins like identifying targets, enumerating hosts, application fingerprinting, cracking passwords, and attacking exposed vulnerabilities. Along the way, the authors provide an invaluable reference to the hundreds of tools included on the bootable-Linux CD for penetration testing.<br><br>* Covers both the methodology of penetration testing and all of the tools used by malicious hackers and penetration testers <br><br>* The book is authored by many of the tool developers themselves <br><br>* This is the only book that comes packaged with the \"Auditor Security Collection\"; a bootable Linux CD with over 300 of the most popular open source penetration testing tools",
                "author": "Jeremy Faircloth, Jay Beale, Roelof Temmingh, Haroon Meer, Charl van der Walt, HD Moore",
                "slug": "penetration-testers-open-source-toolkit-277230-9780080489520-jeremy-faircloth-jay-beale-roelof-temmingh-haroon-meer-charl-van-der-walt-hd-moore",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080489520.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277230",
                "product_url": "/app/ecom/book/277230/penetration-testers-open-source-toolkit-277230-9780080489520-jeremy-faircloth-jay-beale-roelof-temmingh-haroon-meer-charl-van-der-walt-hd-moore",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597490214",
                    "EISBN13": "9780080489520",
                    "EISBN10": "0080489524"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026349066"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277227",
            "attributes": {
                "name": "Network+ Study Guide & Practice Exams",
                "subtitle": "",
                "description": "The Network+ Study Guide covers all the objectives on the CompTIA exam, including the features and functions of networking components, and ensuring that readers have the knowledge and skills needed to install, configure and troubleshoot basic networking hardware, protocols and services. It covers exam topics such as media and topologies, protocols and standards, network implementation, and network support, as well as new exam topics on technologies such as wireless networking and Ethernet.<br><br>* Complete coverage of the new 2005 exam, written from the ground up <br>* Competitively priced with additional interactive exams online <br>* Popular exam being revised for first time since 2001",
                "author": "Robert Shimonski",
                "slug": "network-study-guide-practice-exams-277227-9780080489445-robert-shimonski",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080489445.png",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277227",
                "product_url": "/app/ecom/book/277227/network-study-guide-practice-exams-277227-9780080489445-robert-shimonski",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781931836425",
                    "EISBN13": "9780080489445",
                    "EISBN10": "0080489443"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026365451"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277226",
            "attributes": {
                "name": "Nessus, Snort, and Ethereal Power Tools",
                "subtitle": "Customizing Open Source Security Applications",
                "description": "Nessus, Snort, and Ethereal Power Tools covers customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to sniff their network for malicious or unusual traffic. The book contains an appendix detailing the best of the rest open source security tools. Each of these tools is intentionally designed to be highly customizable so that users can torque the programs to suit their particular needs. Users can code their own custom rules, plug-ins, and filters that are tailor-made to fit their own networks and the threats which they most commonly face. The book describes the most important concepts of coding and customizing tools, and then provides readers with invaluable working scripts that can either be used as is or further refined by using knowledge gained from the book. Snort, Nessus, and Ethereal are the three most popular open source security tools in the world Only book that teaches readers how to customize these tools for their specific needs by coding rules, plugins, and filters Companion Web site provides all working code and scripts from the book for download",
                "author": "Brian Caswell, Jay Beale, Gilbert Ramirez, Noam Rathaus",
                "slug": "nessus-snort-and-ethereal-power-tools-277226-9780080489421-brian-caswell-jay-beale-gilbert-ramirez-noam-rathaus",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080489421.png",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277226",
                "product_url": "/app/ecom/book/277226/nessus-snort-and-ethereal-power-tools-277226-9780080489421-brian-caswell-jay-beale-gilbert-ramirez-noam-rathaus",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597490207",
                    "EISBN13": "9780080489421",
                    "EISBN10": "0080489427"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026356213"
                    }
                }
            }
        }
    ],
    "meta": {
        "pagination": {
            "page": 75122,
            "pages": 78424,
            "count": 1568476
        }
    }
}

Response Info

Default: None