GET /services/catalog/products?format=api&page=75123
Response information
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/vnd.api+json
Vary: Accept

{
    "links": {
        "first": "https://redshelf.com/services/catalog/products?format=api&page=1",
        "last": "https://redshelf.com/services/catalog/products?format=api&page=78424",
        "next": "https://redshelf.com/services/catalog/products?format=api&page=75124",
        "prev": "https://redshelf.com/services/catalog/products?format=api&page=75122"
    },
    "data": [
        {
            "type": "Product",
            "id": "00010000277224",
            "attributes": {
                "name": "Network Security Evaluation Using the NSA IEM",
                "subtitle": "",
                "description": "Network Security Evaluation provides a methodology for conducting technical security evaluations of all the critical components of a target network. The book describes how the methodology evolved and how to define the proper scope of an evaluation, including the consideration of legal issues that may arise during the evaluation. More detailed information is given in later chapters about the core technical processes that need to occur to ensure a comprehensive understanding of the networks security posture. <br><br>Ten baseline areas for evaluation are covered in detail. The tools and examples detailed within this book include both Freeware and Commercial tools that provide a detailed analysis of security vulnerabilities on the target network. The book ends with guidance on the creation of customer roadmaps to better security and recommendations on the format and delivery of the final report.<br><br>* There is no other book currently on the market that covers the National Security Agency's recommended methodology for conducting technical security evaluations<br>* The authors are well known in the industry for their work in developing and deploying network security evaluations using the NSA IEM<br>* The authors also developed the NSA's training class on this methodology",
                "author": "Russ Rogers, Ed Fuller, Greg Miles, Bryan Cunningham",
                "slug": "network-security-evaluation-using-the-nsa-iem-277224-9780080489438-russ-rogers-ed-fuller-greg-miles-bryan-cunningham",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080489438.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277224",
                "product_url": "/app/ecom/book/277224/network-security-evaluation-using-the-nsa-iem-277224-9780080489438-russ-rogers-ed-fuller-greg-miles-bryan-cunningham",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597490351",
                    "EISBN13": "9780080489438",
                    "EISBN10": "0080489435"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026348657"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277223",
            "attributes": {
                "name": "Microsoft Log Parser Toolkit",
                "subtitle": "A Complete Toolkit for Microsoft's Undocumented Log Analysis Tool",
                "description": "<p>Written by Microsoft's Log Parser developer, this is the first book available on Microsoft's popular yet undocumented log parser tool. The book and accompanying Web site contain hundreds of customized, working scripts and templates that system administrators will find invaluable for analyzing the log files from Windows Server, Snort IDS, ISA Server, IIS Server, Exchange Server, and other products.</p>  <p>System administrators running Windows, Unix, and Linux networks manage anywhere from 1 to thousands of operating systems (Windows, Unix, etc.), Applications (Exchange, Snort, IIS, etc.), and hardware devices (firewalls, routers, etc.) that generate incredibly long and detailed log files of all activity on the particular application or device. This book will teach administrators how to use Microsoft's Log Parser to data mine all of the information available within these countless logs. The book teaches readers how all queries within Log Parser work (for example: a Log Parser query to an Exchange log may provide information on the origin of spam, viruses, etc.). Also, Log Parser is completely scriptable and customizable so the book will provide the reader with hundreds of original, working scripts that will automate these tasks and provide formatted charts and reports detailing the results of the queries.</p> Written by Microsoft's sole developer of Log Parser, this is the first book available on the powerful yet completely undocumented product that ships with Microsoft's IIS, Windows Advanced Server 2003, and is available as a free download from the Microsoft Web site This book and accompanying scripts will save system administrators countless hours by scripting and automating the most common to the most complex log analysis tasks",
                "author": "Gabriele Giuseppini, Mark Burnett",
                "slug": "microsoft-log-parser-toolkit-277223-9780080489391-gabriele-giuseppini-mark-burnett",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080489391.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277223",
                "product_url": "/app/ecom/book/277223/microsoft-log-parser-toolkit-277223-9780080489391-gabriele-giuseppini-mark-burnett",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781932266528",
                    "EISBN13": "9780080489391",
                    "EISBN10": "0080489397"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026356171"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277222",
            "attributes": {
                "name": "IPv6 Advanced Protocols Implementation",
                "subtitle": "",
                "description": "<p>IPv6 Advanced Protocols Implementation is the second installment of a two-volume series on IPv6 and the KAME implementation. This book discusses those protocols that are found in more capable IPv6 devices, are commonly deployed in more complex IPv6 network environments, or are not specific to IPv6 but are extended to support IPv6. Specifically, this book engages the readers in advanced topics such as routing, multicasting, DNS, DHCPv6, mobility, and security.</p>  <p>This two-volume series covers a wide spectrum of the IPv6 technology, help the readers establish solid and empirical understanding on IPv6 and the KAME reference implementation paralleled by none.</p>  <p>Key Features:</p>   Extensive code listings with meticulous line-by-line explanation of rationale and use for KAME snapshot implementations on advanced IPv6 related protocols, including:   Unicast and multicast routing and DNS client based on KAME snapshot dated April 2003, which are a base of more recent versions of BSD variants Mobile IPv6 based on KAME snapshot dated July 2004, a predecessor version of the \"SHISA\" implementation DHCPv6 based on KAME snapshot dated May 2005, a base of the WIDE-DHCPv6 implementation available at SourceForge today Numerous diagrams and illustrations help in visualizing the implementation In-depth discussion of the standards provides intrinsic understanding of the specifications An introduction to the IP security protocols along with the use of the racoon key exchange daemon Two CD-ROMs filled with the complete KAME IPv6 protocol stack and FreeBSD software The only authoritative reference \"cookbook\" for anyone interested in advanced IPv6 topics and protocols Line-by-line walk through of real code helps the reader master IPv6 implementation Comprehensive in scope, based on a working standard, and thoroughly illustrated to bring the protocols alive",
                "author": "Qing Li, Jinmei Tatuya, Keiichi Shima",
                "slug": "ipv6-advanced-protocols-implementation-277222-9780080489308-qing-li-jinmei-tatuya-keiichi-shima",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080489308.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277222",
                "product_url": "/app/ecom/book/277222/ipv6-advanced-protocols-implementation-277222-9780080489308-qing-li-jinmei-tatuya-keiichi-shima",
                "bisac_codes": [
                    "COM043000",
                    "COM060000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780123704795",
                    "EISBN13": "9780080489308",
                    "EISBN10": "0080489303"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026358994"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277221",
            "attributes": {
                "name": "Advances in Heat Transfer",
                "subtitle": "",
                "description": "<p>Advances in Heat Transfer presents review articles on topics of current interest. Each contribution starts from widely understood principles and brings the reader up to the forefront of the topic being addressed.</p>  <p>The favorable response by the international scientific and engineering community to the 37 volumes published to date is an indication of the success of our authors in fulfilling this purpose. This is recommended reading for all mechanical engineers and researchers.</p> Provides an overview of review articles on topics of current interest Bridges the gap between academic researchers and practitioners in industry A long-running and prestigious series",
                "author": "James P. Hartnett, Young I. Cho, George A. Greene",
                "slug": "advances-in-heat-transfer-277221-9780080493558-james-p-hartnett",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080493558.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277221",
                "product_url": "/app/ecom/book/277221/advances-in-heat-transfer-277221-9780080493558-james-p-hartnett",
                "bisac_codes": [
                    "TEC009070",
                    "TEC009010"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780120200375",
                    "EISBN13": "9780080493558",
                    "EISBN10": "0080493556"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026367380"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277220",
            "attributes": {
                "name": "Successful Foreign Acquisitions",
                "subtitle": "The Pivotal Role of the Management Accountant",
                "description": "Successful Foreign Acquisitions investigates two cross-border acquisitions with the aim of looking at the role of management accounting in the process and drawing useful lessons about the acquistion and integration process for practioners. <br><br>The authors: <br>*identify the acquisition strategy and examine its added value <br>*evaluate the strategy in both cultural and economic terms <br>*consider the required management control systems needed to implement the strategy and compare this with the actual control systems used <br>* review what performance measures would be needed to encourage managers to deliver and compare these with the actual measures introduced <br>* consider how environmental and cultural differences impact on this process",
                "author": "Simon Pallett, Tony Appleyard",
                "slug": "successful-foreign-acquisitions-277220-9780080489766-tony-appleyard-simon-pallett",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080489766.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277220",
                "product_url": "/app/ecom/book/277220/successful-foreign-acquisitions-277220-9780080489766-tony-appleyard-simon-pallett",
                "bisac_codes": [
                    "BUS001040",
                    "BUS001000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780750661720",
                    "EISBN13": "9780080489766",
                    "EISBN10": "0080489761"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026359732"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277219",
            "attributes": {
                "name": "Multiprocessor Systems-on-Chips",
                "subtitle": "",
                "description": "Modern system-on-chip (SoC) design shows a clear trend toward integration of multiple processor cores on a single chip. Designing a multiprocessor system-on-chip (MPSOC) requires an understanding of the various design styles and techniques used in the multiprocessor. Understanding the application area of the MPSOC is also critical to making proper tradeoffs and design decisions.<br><br>Multiprocessor Systems-on-Chips covers both design techniques and applications for MPSOCs. Design topics include multiprocessor architectures, processors, operating systems, compilers, methodologies, and synthesis algorithms, and application areas covered include telecommunications and multimedia. The majority of the chapters were collected from presentations made at the International Workshop on Application-Specific Multi-Processor SoC held over the past two years. The workshop assembled internationally recognized speakers on the range of topics relevant to MPSOCs. After having refined their material at the workshop, the speakers are now writing chapters and the editors are fashioning them into a unified book by making connections between chapters and developing common terminology.<br><br>*Examines several different architectures and the constraints imposed on them <br>*Discusses scheduling, real-time operating systems, and compilers <br>*Analyzes design trade-off and decisions in telecommunications and multimedia applications",
                "author": "Ahmed Jerraya, Wayne Wolf",
                "slug": "multiprocessor-systems-on-chips-277219-9780080512273-ahmed-jerraya-wayne-wolf",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080512273.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277219",
                "product_url": "/app/ecom/book/277219/multiprocessor-systems-on-chips-277219-9780080512273-ahmed-jerraya-wayne-wolf",
                "bisac_codes": [
                    "COM011000",
                    "077"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780123852519",
                    "EISBN13": "9780080512273",
                    "EISBN10": "0080512275"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026356154"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277217",
            "attributes": {
                "name": "Intrusion Prevention and Active Response",
                "subtitle": "Deploying Network and Host IPS",
                "description": "Intrusion Prevention and Active Response provides an introduction to the field of Intrusion Prevention and provides detailed information on various IPS methods and technologies. Specific methods are covered in depth, including both network and host IPS and response technologies such as port deactivation, firewall/router network layer ACL modification, session sniping, outright application layer data modification, system call interception, and application shims. Corporate spending for Intrusion Prevention systems increased dramatically by 11% in the last quarter of 2004 alone Lead author, Michael Rash, is well respected in the IPS Community, having authored FWSnort, which greatly enhances the intrusion prevention capabilities of the market-leading Snort IDS",
                "author": "Michael Rash, Angela Orebaugh, Graham Clark",
                "slug": "intrusion-prevention-and-active-response-277217-9780080489292-michael-rash-angela-orebaugh-graham-clark",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080489292.png",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277217",
                "product_url": "/app/ecom/book/277217/intrusion-prevention-and-active-response-277217-9780080489292-michael-rash-angela-orebaugh-graham-clark",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781932266474",
                    "EISBN13": "9780080489292",
                    "EISBN10": "008048929X"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026355986"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277216",
            "attributes": {
                "name": "Introduction to Quantum Mechanics",
                "subtitle": "in Chemistry, Materials Science, and Biology",
                "description": "<p>Introduction to Quantum Mechanics provides a lucid, up-to-date introduction to the principles of quantum mechanics at the level of undergraduates and first-year graduate students in chemistry, materials science, biology and related fields. It shows how the fundamental concepts of quantum theory arose from classic experiments in physics and chemistry, and presents the quantum-mechanical foundations of modern techniques including molecular spectroscopy, lasers and NMR.</p>  <p>Blinder also discusses recent conceptual developments in quantum theory, including Schrodinger's Cat, the Einstein-Podolsky-Rosen experiment, Bell's theorem and quantum computing.</p> Clearly presents the basics of quantum mechanics and modern developments in the field Explains applications to molecular spectroscopy, lasers, NMR, and MRI Introduces new concepts such as Schrodinger's Cat, Bell's Theorem, and quantum computing Includes full-color illustrations, proven pedagogical features, and links to online materials",
                "author": "Sy M. Blinder",
                "slug": "introduction-to-quantum-mechanics-277216-9780080489285-sy-m-blinder",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080489285.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277216",
                "product_url": "/app/ecom/book/277216/introduction-to-quantum-mechanics-277216-9780080489285-sy-m-blinder",
                "bisac_codes": [
                    "SCI013050",
                    "TEC021000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780121060510",
                    "EISBN13": "9780080489285",
                    "EISBN10": "0080489281"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026363486"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277215",
            "attributes": {
                "name": "Cash Flow Forecasting",
                "subtitle": "",
                "description": "Budgets are like road maps -- they provide a direction for a corporates financial management. Balance sheets and statements of revenues also provide insights into how well a company is following that direction. But cash flow and cash flow forecasts are what guide the day-to-day itinerary for an organization. Budgets and cash flow are dynamic -- adjustments and changes can and should occur. If you understand what you are looking at, you can use cash flow to create better budgets and thus more accurate cash flow forecasting.Cash Flow Forecasting outlines the techniques required to undertake a detailed analysis of the cash flow dynamics of the business from both a historical and forward looking perspective. Cash Flow Forecasting explains how to: * Determine appropriate cash flow figures from pro forma financial statements * Interpret detailed cash flow forecasts and understand the difference between profit and cash flow * Conserve or generate cash in the short term * Evaluate different methods of project evaluation * Recognize the limitations of accounting information in valuing companies<br><br>*Inspired by basic entry level training courses that have been developed by major international banks worldwide* Will enable students and those already in the finance profession to gain an understanding of the basic information and principles of cash flow forecasting* Includes questions with answers, study topics, practical \"real world\" examples and extensive bibliography",
                "author": "Andrew Fight",
                "slug": "cash-flow-forecasting-277215-9780080492537-andrew-fight",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080492537.png",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277215",
                "product_url": "/app/ecom/book/277215/cash-flow-forecasting-277215-9780080492537-andrew-fight",
                "bisac_codes": [
                    "BUS027000",
                    "714"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780750661362",
                    "EISBN13": "9780080492537",
                    "EISBN10": "0080492533"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026363499"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277214",
            "attributes": {
                "name": "An Introduction to Programming with IDL",
                "subtitle": "Interactive Data Language",
                "description": "<p>In todays information age, scientists and engineers must quickly and efficiently analyze extremely large sets of data. One of the best tools to accomplish this is Interactive Data Language (IDL), a programming and visualization environment that facilitates numerical modeling, data analysis, and image processing. IDLs high-level language and powerful graphics capabilities allow users to write more flexible programs much faster than is possible with other programming languages.</p>  <p>An Introduction to Programming with IDL enables students new to programming, as well as those with experience in other programming languages, to rapidly harness IDLs capabilities: fast, interactive performance; array syntax; dynamic data typing; and built-in graphics. Each concept is illustrated with sample code, including many complete short programs.</p> Margin notes throughout the text quickly point readers to the relevant sections of IDL manuals End-of-chapter summaries and exercises help reinforce learning Students who purchase the book are eligible for a substantial discount on a student version of the IDL software",
                "author": "Kenneth P. Bowman",
                "slug": "an-introduction-to-programming-with-idl-277214-9780080489278-kenneth-p-bowman",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080489278.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277214",
                "product_url": "/app/ecom/book/277214/an-introduction-to-programming-with-idl-277214-9780080489278-kenneth-p-bowman",
                "bisac_codes": [
                    "SCI000000",
                    "SCI055000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780120885596",
                    "EISBN13": "9780080489278",
                    "EISBN10": "0080489273"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026369177"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277213",
            "attributes": {
                "name": "Intelligent Sensor Design Using the Microchip dsPIC",
                "subtitle": "",
                "description": "Intelligent seonsors are revolutionizing the world of system design in everything from sports cars to assembly lines. These new sensors have abilities that leave their predecessors in the dust! They not only measure parameters efficiently and precisely, but they also have the ability to enhance and interupt those measurements, thereby transforming raw data into truly useful information.<br><br>Unlike many embedded systems books that confine themselves strictly to firmware and software, this book also delves into the supporting electronic hardware, providing the reader with a complete understanding of the issues involved when interfacing to specific types of sensor and offering insight into the real-world problems designers will face. The examples provide a complete, easily extensible code framework for sensor-based applications as well as basic support routines that are often ignored or treated superficially. The goal throughout is to make readers truly productive as quickly as possible while providing the thorough understanding necessary to design robust systems.<br><br>Readers will gain in-depth, real-world design information that will help them be more productive and get up to speed on sensor design skills more quickly. The book provides designers and students a leg up in a relatively new design area, imparting knowledge about a new microcontroller that offers some of the functionality of a DSP chip. Quickly teaches the reader to design the new wave in sensor technology, \"intelligent\" sensors In-depth design techniques, real-world examples, detailed figures and usable code Application chapters thoroughly exploring temperature, pressure and load, and flow sensors",
                "author": "Creed Huddleston",
                "slug": "intelligent-sensor-design-using-the-microchip-dspic-277213-9780080491578-creed-huddleston",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080491578.png",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277213",
                "product_url": "/app/ecom/book/277213/intelligent-sensor-design-using-the-microchip-dspic-277213-9780080491578-creed-huddleston",
                "bisac_codes": [
                    "TEC007000",
                    "TEC008060"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780750677554",
                    "EISBN13": "9780080491578",
                    "EISBN10": "008049157X"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026354090"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277211",
            "attributes": {
                "name": "Troubleshooting Optical Fiber Networks",
                "subtitle": "Understanding and Using Optical Time-Domain Reflectometers",
                "description": "Troubleshooting Optical Fiber Networks offers comprehensive, state-of-the-art information about time-domain fiber-optic testing. Readers will gain an understanding of how to troubleshoot optical-fiber networks using an optical time-domain reflectometer (OTDR), while learning the fundamental principles underlying the operation of these powerful testing instruments. From basic fiber optics and fiber testing, to detailed event-analysis techniques, this book covers the entire spectrum of time-domain optical cable test theory and applications. Only book available focusing solely on OTDR theory and practice Covers the entire spectrum of time-domain optical cable test theory and applications Designed to be accessible to both engineers and system technicians",
                "author": "Duwayne R. Anderson, Larry M. Johnson, Florian G. Bell",
                "slug": "troubleshooting-optical-fiber-networks-277211-9780080492360-duwayne-r-anderson-larry-m-johnson-florian-g-bell",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080492360.png",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277211",
                "product_url": "/app/ecom/book/277211/troubleshooting-optical-fiber-networks-277211-9780080492360-duwayne-r-anderson-larry-m-johnson-florian-g-bell",
                "bisac_codes": [
                    "TEC011000",
                    "TEC007000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780120586615",
                    "EISBN13": "9780080492360",
                    "EISBN10": "0080492363"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026359658"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277210",
            "attributes": {
                "name": "Introductory Statistics for Engineering Experimentation",
                "subtitle": "",
                "description": "The Accreditation Board for Engineering and Technology (ABET) introduced a criterion starting with their 1992-1993 site visits that  \"Students must demonstrate a knowledge of the application of statistics to engineering problems.\" Since most engineering curricula are filled with requirements in their own discipline, they generally do not have time for a traditional two semesters of probability and statistics. Attempts to condense that material into a single semester often results in so much time being spent on probability that the statistics useful for designing and analyzing engineering/scientific experiments is never covered.  In developing a one-semester course whose purpose was to introduce engineering/scientific students to the most useful statistical methods, this book was created to satisfy those needs. Provides the statistical design and analysis of engineering experiments & problems Presents a student-friendly approach through providing statistical models for advanced learning techniques Covers essential and useful statistical methods used by engineers and scientists",
                "author": "Peter R. Nelson, Karen A.F. Copeland, Marie Coffin",
                "slug": "introductory-statistics-for-engineering-experimentation-277210-9780080491653-peter-r-nelson-karen-af-copeland-marie-coffin",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080491653.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277210",
                "product_url": "/app/ecom/book/277210/introductory-statistics-for-engineering-experimentation-277210-9780080491653-peter-r-nelson-karen-af-copeland-marie-coffin",
                "bisac_codes": [
                    "TEC009000",
                    "TEC009070"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780125154239",
                    "EISBN13": "9780080491653",
                    "EISBN10": "0080491650"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026357821"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277208",
            "attributes": {
                "name": "Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft",
                "subtitle": "",
                "description": "The Secret Service, FBI, NSA, CERT (Computer Emergency Response Team) and George Washington University have all identified Insider Threats as one of the most significant challenges facing IT, security, law enforcement, and intelligence professionals today. <br><br>This book will teach IT professional and law enforcement officials about the dangers posed by insiders to their IT infrastructure and how to mitigate these risks by designing and implementing secure IT systems as well as security and human resource policies. The book will begin by identifying the types of insiders who are most likely to pose a threat. Next, the reader will learn about the variety of tools and attacks used by insiders to commit their crimes including: encryption, steganography, and social engineering. The book will then specifically address the dangers faced by corporations and government agencies. Finally, the reader will learn how to design effective security systems to prevent insider attacks and how to investigate insider security breeches that do occur. <br><br>Throughout the book, the authors will use their backgrounds in the CIA to analyze several, high-profile cases involving insider threats.<br><br>* Tackles one of the most significant challenges facing IT, security, law enforcement, and intelligence professionals today<br><br>* Both co-authors worked for several years at the CIA, and they use this experience to analyze several high-profile cases involving insider threat attacks <br><br>* Despite the frequency and harm caused by insider attacks, there are no competing books on this topic.books on this topic",
                "author": "Eric Cole, Sandra Ring",
                "slug": "insider-threat-protecting-the-enterprise-from-sabotage-spying-and-theft-277208-9780080489056-eric-cole-sandra-ring",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080489056.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277208",
                "product_url": "/app/ecom/book/277208/insider-threat-protecting-the-enterprise-from-sabotage-spying-and-theft-277208-9780080489056-eric-cole-sandra-ring",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597490481",
                    "EISBN13": "9780080489056",
                    "EISBN10": "0080489052"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026353611"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277207",
            "attributes": {
                "name": "Network Processor Design",
                "subtitle": "Issues and Practices",
                "description": "<p>Responding to ever-escalating requirements for performance, flexibility, and economy, the networking industry has opted to build products around network processors. To help meet the formidable challenges of this emerging field, the editors of this volume created the first Workshop on Network Processors, a forum for scientists and engineers to discuss latest research in the architecture, design, programming, and use of these devices. This series of volumes contains not only the results of the annual workshops but also specially commissioned material that highlights industry's latest network processors.</p>  <p>Like its predecessor volume, Network Processor Design: Principles and Practices, Volume 2 defines and advances the field of network processor design. Volume 2 contains 20 chapters written by the field's leading academic and industrial researchers, with topics ranging from architectures to programming models, from security to quality of service.</p> Describes current research at UNC Chapel Hill, University of Massachusetts, George Mason University, UC Berkeley, UCLA, Washington University in St. Louis, Linkopings Universitet, IBM, Kayamba Inc., Network Associates, and University of Washington. Reports the latest applications of the technology at Intel, IBM, Agere, Motorola, AMCC, IDT, Teja, and Network Processing Forum.",
                "author": "Mark A. Franklin, Patrick Crowley, Haldun Hadimioglu, Peter Z. Onufryk",
                "slug": "network-processor-design-277207-9780080491943",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080491943.png",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277207",
                "product_url": "/app/ecom/book/277207/network-processor-design-277207-9780080491943",
                "bisac_codes": [
                    "COM011000",
                    "COM043000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780121981570",
                    "EISBN13": "9780080491943",
                    "EISBN10": "0080491944"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026353490"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277206",
            "attributes": {
                "name": "InfoSec Career Hacking: Sell Your Skillz, Not Your Soul",
                "subtitle": "",
                "description": "InfoSec Career Hacking starts out by describing the many, different InfoSec careers available including Security Engineer, Security Analyst, Penetration Tester, Auditor, Security Administrator, Programmer, and Security Program Manager. The particular skills required by each of these jobs will be described in detail, allowing the reader to identify the most appropriate career choice for them. <br><br>Next, the book describes how the reader can build his own test laboratory to further enhance his existing skills and begin to learn new skills and techniques. The authors also provide keen insight on how to develop the requisite soft skills to migrate form the hacker to corporate world.<br><br>* The InfoSec job market will experience explosive growth over the next five years, and many candidates for these positions will come from thriving, hacker communities <br><br>* Teaches these hackers how to build their own test networks to develop their skills to appeal to corporations and government agencies <br><br>* Provides specific instructions for developing time, management, and personal skills to build a successful InfoSec career",
                "author": "Chris Hurley, Johnny Long, Aaron W Bayles, Ed Brindley",
                "slug": "infosec-career-hacking-sell-your-skillz-not-your-soul-277206-9780080489032-chris-hurley-johnny-long-aaron-w-bayles-ed-brindley",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080489032.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277206",
                "product_url": "/app/ecom/book/277206/infosec-career-hacking-sell-your-skillz-not-your-soul-277206-9780080489032-chris-hurley-johnny-long-aaron-w-bayles-ed-brindley",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597490115",
                    "EISBN13": "9780080489032",
                    "EISBN10": "0080489036"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026353718"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277205",
            "attributes": {
                "name": "How to Cheat at IT Project Management",
                "subtitle": "",
                "description": "This book is written with the IT professional in mind. It provides a clear, concise system for managing IT projects, regardless of the size or complexity of the project. It avoids the jargon and complexity of traditional project management (PM) books. Instead, it provides a unique approach to IT project management, combining strategic business concepts (project ROI, strategic alignment, etc.) with the very practical, step-by-step instructions for developing and managing a successful IT project. Its short enough to be easily read and used but long enough to be comprehensive in the right places.<br><br>* Essential information on how to provide a clear, concise system for managing IT projects, regardless of the size or complexity of the project<br>* As IT jobs are outsourced, there is a growing demand for project managers to manage outsourced IT projects<br>* Companion Web site for the book provides dozens of working templates to help readers manage their own IT projects",
                "author": "Susan Snedaker",
                "slug": "how-to-cheat-at-it-project-management-277205-9780080488974-susan-snedaker",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080488974.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277205",
                "product_url": "/app/ecom/book/277205/how-to-cheat-at-it-project-management-277205-9780080488974-susan-snedaker",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597490375",
                    "EISBN13": "9780080488974",
                    "EISBN10": "0080488978"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026370782"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277203",
            "attributes": {
                "name": "How to Cheat at Managing Windows Server Update Services",
                "subtitle": "",
                "description": "Over 95% of computers around the world are running at least one Microsoft product. Microsoft Windows Software Update Service is designed to provide patches and updates to every one of these computers. <br><br>The book will begin by describing the feature set of WSUS, and the benefits it provides to system administrators. Next, the reader will learn the steps that must be taken to configure their servers and workstations to make the compatible with WSUS. A special section then follows to help readers migrate from Microsofts earlier update service, Software Update Service (SUS) to WSUS. The next chapters will then address the particular needs and complexities of managing WSUS on an enterprise network. Although WSUS is designed to streamline the update process, this service can still be a challenge for administrators to use effectively. To address these issues, the next chapters deal specifically with common problems that occur and the reader is provides with invaluable troubleshooting information. One of the other primary objectives of WSUS is to improve the overall security of Windows networks by ensuring that all systems have the most recent security updates and patches. To help achieve this goal, the next sections cover securing WSUS itself, so that critical security patches are always applied and cannot be compromised by malicious hackers.<br><br>* Only book available on Microsoft's brand new, Windows Server Update Services<br><br>* Employs Syngress' proven \"How to Cheat\" methodology providing readers with everything they need and nothing they don't<br><br>* WSUS works with every Microsoft product, meaning any system administrator running a Windows-based network is a potential customer for this book",
                "author": "B. Barber",
                "slug": "how-to-cheat-at-managing-windows-server-update-services-277203-9780080488981-b-barber",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080488981.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277203",
                "product_url": "/app/ecom/book/277203/how-to-cheat-at-managing-windows-server-update-services-277203-9780080488981-b-barber",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597490276",
                    "EISBN13": "9780080488981",
                    "EISBN10": "0080488986"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026353354"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277202",
            "attributes": {
                "name": "How to Cheat at Designing Security for a Windows Server 2003 Network",
                "subtitle": "",
                "description": "Windows 2003 Server is unquestionably the dominant enterprise level operating system in the industry, with 95% of all companies running it. And for the last tow years, over 50% of all product upgrades have been security related. Securing Windows Server, according to bill gates, is the company's #1 priority.<br><br>While considering the security needs of your organiztion, you need to balance the human and the technical in order to create the best security design for your organization. Securing a Windows Server 2003 enterprise network is hardly a small undertaking, but it becomes quite manageable if you approach it in an organized and systematic way. This includes configuring software, services, and protocols to meet an organizations security needs.<br><br>* The Perfect Guide if \"System Administrator is NOT your primary job function <br><br>* Avoid \"time drains\" configuring the many different security standards built into Windows 2003 <br><br>* Secure VPN and Extranet Communications",
                "author": "Chris Peiris, Chris Ruston",
                "slug": "how-to-cheat-at-designing-security-for-a-windows-server-2003-network-277202-9780080488967-chris-peiris-chris-ruston",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080488967.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277202",
                "product_url": "/app/ecom/book/277202/how-to-cheat-at-designing-security-for-a-windows-server-2003-network-277202-9780080488967-chris-peiris-chris-ruston",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597492430",
                    "EISBN13": "9780080488967",
                    "EISBN10": "008048896X"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026371597"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277201",
            "attributes": {
                "name": "Debugging by Thinking",
                "subtitle": "A Multidisciplinary Approach",
                "description": "Debugging by Thinking: A Multi-Disciplinary Approach is the first book to apply the wisdom of six disciplineslogic, mathematics, psychology, safety analysis, computer science, and engineeringto the problem of debugging. It uses the methods of literary detectives such as Sherlock Holmes, the techniques of mathematical problem solving, the results of research into the cognitive psychology of human error, the root cause analyses of safety experts, the compiler analyses of computer science, and the processes of modern engineering to define a systematic approach to identifying and correcting software errors.<br><br>* Language Independent Methods: Examples are given in Java and C++<br>* Complete source code shows actual bugs, rather than contrived examples<br>* Examples are accessible with no more knowledge than a course in Data Structures and Algorithms requires <br>* A \"thought process diary\" shows how the author actually resolved the problems as they occurred",
                "author": "Robert Charles Metzger",
                "slug": "debugging-by-thinking-277201-9780080503813-robert-charles-metzger",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080503813.png",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277201",
                "product_url": "/app/ecom/book/277201/debugging-by-thinking-277201-9780080503813-robert-charles-metzger",
                "bisac_codes": [
                    "COM051230",
                    "077"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781555583071",
                    "EISBN13": "9780080503813",
                    "EISBN10": "0080503810"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026362138"
                    }
                }
            }
        }
    ],
    "meta": {
        "pagination": {
            "page": 75123,
            "pages": 78424,
            "count": 1568476
        }
    }
}

Response Info

Default: None