Product List
GET /services/catalog/products?format=api&page=75124
{ "links": { "first": "https://redshelf.com/services/catalog/products?format=api&page=1", "last": "https://redshelf.com/services/catalog/products?format=api&page=78424", "next": "https://redshelf.com/services/catalog/products?format=api&page=75125", "prev": "https://redshelf.com/services/catalog/products?format=api&page=75123" }, "data": [ { "type": "Product", "id": "00010000277200", "attributes": { "name": "Laser Processing of Engineering Materials", "subtitle": "Principles, Procedure and Industrial Application", "description": "The complete guide to understanding and using lasers in material processing!Lasers are now an integral part of modern society, providing extraordinary opportunities for innovation in an ever-widening range of material processing and manufacturing applications. The study of laser material processing is a core element of many materials and manufacturing courses at undergraduate and postgraduate level. As a consequence, there is now a vast amount of research on the theory and application of lasers to be absorbed by students, industrial researchers, practising engineers and production managers. Written by an acknowledged expert in the field with over twenty years' experience in laser processing, John Ion distils cutting-edge information and research into a single key text. Essential for anyone studying or working with lasers, Laser Processing of Engineering Materials provides a clear explanation of the underlying principles, including physics, chemistry and materials science, along with a framework of available laser processes and their distinguishing features and variables. This book delivers the knowledge needed to understand and apply lasers to the processing of engineering materials, and is highly recommended as a valuable guide to this revolutionary manufacturing technology. The first single volume text that treats this core engineering subject in a systematic manner Covers the principles, practice and application of lasers in all contemporary industrial processes; packed with examples, materials data and analysis, and modelling techniques", "author": "John Ion", "slug": "laser-processing-of-engineering-materials-277200-9780080492803-john-ion", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080492803.png", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277200", "product_url": "/app/ecom/book/277200/laser-processing-of-engineering-materials-277200-9780080492803-john-ion", "bisac_codes": [ "TEC021000", "ARC009000" ], "items_count": null, "identifiers": { "ISBN13": "9780750660792", "EISBN13": "9780080492803", "EISBN10": "0080492800" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026360813" } } } }, { "type": "Product", "id": "00010000277199", "attributes": { "name": "Host Integrity Monitoring Using Osiris and Samhain", "subtitle": "", "description": "This book will walk the reader through the process of preparing and deploying open source host integrity monitoring software, specifically, Osiris and Samhain. From the configuration and installation to maintenance, testing, and fine-tuning, this book will cover everything needed to correctly deploy a centralized host integrity monitoring solution. The domain includes home networks on up to large-scale enterprise environments.<br><br><br>Throughout the book, realistic and practical configurations will be provided for common server and desktop platforms. By the end of the book, the reader will not only understand the strengths and limitations of host integrity tools, but also understand how to effectively make use of them in order to integrate them into a security policy.<br><br>* Brian Wotring is the creator of Osiris. He speaks and writes frequently on Osiris for major magazines, Web sites, and trade shows. And, the book can be prominently marketed from the Osiris Web site<br><br>* This is the first book published on host integrity monitoring, despite the widespread deployment of <br>Osiris and Samhain<br><br>* Host Integrity Monitoring is the only way to accurately determine if a malicious attacker has successfully compromised the security measures of your network", "author": "Brian Wotring", "slug": "host-integrity-monitoring-using-osiris-and-samhain-277199-9780080488943-brian-wotring", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080488943.png", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277199", "product_url": "/app/ecom/book/277199/host-integrity-monitoring-using-osiris-and-samhain-277199-9780080488943-brian-wotring", "bisac_codes": [ "COM053000", "COM014000" ], "items_count": null, "identifiers": { "ISBN13": "9781597490184", "EISBN13": "9780080488943", "EISBN10": "0080488943" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026361512" } } } }, { "type": "Product", "id": "00010000277198", "attributes": { "name": "How to Cheat at Configuring ISA Server 2004", "subtitle": "", "description": "How to Cheat at Configuring ISA (Internet Security and Acceleration) Server 2004 meets the needs of system administrators for a concise, step-by-step guide to getting one of Microsoft's most complex server products up and running. While books twice its size may be perfect for network designers and security specialists, this is written for the person in the trenches actually running the network day to day.<br><br>How to Cheat at Configuring ISA Server 2004 is written for the vast majority of Windows System Administrators with too much to do and too little time in which to do it. Unlike books twice its size, this is a concise, to-the-point guide.<br><br>* Administrators daily jobs - too many mission critical tasks in too little time. A quick reference to ISA Server<br><br>* Written by Dr. Tom Shinder, the undisputed authority on Installing, Configuring, Managing and Troubleshooting ISA Server<br><br>* Includes independent advice on when the \"Microsoft Way\" works, and when another approach might be more appropriate to your situation", "author": "Debra Littlejohn Shinder, Thomas W Shinder", "slug": "how-to-cheat-at-configuring-isa-server-2004-277198-9780080488950-debra-littlejohn-shinder-thomas-w-shinder", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080488950.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277198", "product_url": "/app/ecom/book/277198/how-to-cheat-at-configuring-isa-server-2004-277198-9780080488950-debra-littlejohn-shinder-thomas-w-shinder", "bisac_codes": [ "COM053000", "COM014000" ], "items_count": null, "identifiers": { "ISBN13": "9781597490573", "EISBN13": "9780080488950", "EISBN10": "0080488951" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026353272" } } } }, { "type": "Product", "id": "00010000277197", "attributes": { "name": "Face Processing: Advanced Modeling and Methods", "subtitle": "", "description": "<p>Major strides have been made in face processing in the last ten years due to the fast growing need for security in various locations around the globe. A human eye can discern the details of a specific face with relative ease. It is this level of detail that researchers are striving to create with ever evolving computer technologies that will become our perfect mechanical eyes. The difficulty that confronts researchers stems from turning a 3D object into a 2D image. That subject is covered in depth from several different perspectives in this volume.</p> <p>Face Processing: Advanced Modeling and Methods begins with a comprehensive introductory chapter for those who are new to the field. A compendium of articles follows that is divided into three sections. The first covers basic aspects of face processing from human to computer. The second deals with face modeling from computational and physiological points of view. The third tackles the advanced methods, which include illumination, pose, expression, and more. Editors Zhao and Chellappa have compiled a concise and necessary text for industrial research scientists, students, and professionals working in the area of image and signal processing.</p> Contributions from over 35 leading experts in face detection, recognition and image processing Over 150 informative images with 16 images in FULL COLOR illustrate and offer insight into the most up-to-date advanced face processing methods and techniques Extensive detail makes this a need-to-own book for all involved with image and signal processing", "author": "Wenyi Zhao, Rama Chellappa", "slug": "face-processing-advanced-modeling-and-methods-277197-9780080488844", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080488844.png", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277197", "product_url": "/app/ecom/book/277197/face-processing-advanced-modeling-and-methods-277197-9780080488844", "bisac_codes": [ "COM016000", "COM004000" ], "items_count": null, "identifiers": { "ISBN13": "9780120884520", "EISBN13": "9780080488844", "EISBN10": "0080488846" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026368508" } } } }, { "type": "Product", "id": "00010000277195", "attributes": { "name": "Monitoring and Managing Microsoft Exchange Server 2003", "subtitle": "", "description": "This authoritative book teaches IT professionals responsible for Exchange messaging systems how to efficiently manage the program's many and complex system capabilities and features. Once you've designed and implemented a messaging system, the bulk of the day-to-day work involves monitoring to ensure an optimum traffic flow, accomplished by continuously reviewing and fine-tuning dozens of system specifications and components. Monitoring and Managing Microsoft Exchange 2003 teaches readers proven and innovative techniques, tools, and procedures for managing and optimizing systems of all sizes and types built on Exchange 2003. Based on the author's own twenty years of messaging system experience and the collective experience of HP, the leading implementer of Exchange Server systems, this book will be a leading resource for Exchange administrators and designers.<br><br>*Provides best practices and innovative everyday techniques for managing the enterprise Exchange environment<br>*Teaches readers proven procedures for managing and optimizing systems of all sizes and types<br>*Based on the author's own twenty years of messaging system experience", "author": "Mike Daugherty", "slug": "monitoring-and-managing-microsoft-exchange-server-2003-277195-9780080491929-mike-daugherty", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080491929.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277195", "product_url": "/app/ecom/book/277195/monitoring-and-managing-microsoft-exchange-server-2003-277195-9780080491929-mike-daugherty", "bisac_codes": [ "COM043000", "077" ], "items_count": null, "identifiers": { "ISBN13": "9781555583026", "EISBN13": "9780080491929", "EISBN10": "0080491928" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026348790" } } } }, { "type": "Product", "id": "00010000277194", "attributes": { "name": "Google Talking", "subtitle": "", "description": "Nationwide and around the world, instant messaging use is growing, with more than 7 billion instant messages being sent every day worldwide, according to IDC. comScore Media Metrix reports that there are 250 million people across the globe--and nearly 80 million Americans--who regularly use instant messaging as a quick and convenient communications tool. <br><br>Google Talking takes communication to the next level, combining the awesome power of Text and Voice! This book teaches readers how to blow the lid off of Instant Messaging and Phone calls over the Internet.<br><br>This book will cover the program Google Talk in its entirety. From detailed information about each of its features, to a deep-down analysis of how it works. Also, we will cover real techniques from the computer programmers and hackers to bend and tweak the program to do exciting and unexpected things. Google has 41% of the search engine market making it by far the most commonly used search engine The Instant Messaging market has 250 million users world wide Google Talking will be the first book to hit the streets about Google Talk", "author": "Johnny Long, Joshua Brashars", "slug": "google-talking-277194-9780080488875-johnny-long-joshua-brashars", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080488875.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277194", "product_url": "/app/ecom/book/277194/google-talking-277194-9780080488875-johnny-long-joshua-brashars", "bisac_codes": [ "COM053000", "COM014000" ], "items_count": null, "identifiers": { "ISBN13": "9781597490559", "EISBN13": "9780080488875", "EISBN10": "0080488870" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026348884" } } } }, { "type": "Product", "id": "00010000277193", "attributes": { "name": "Hacking a Terror Network: The Silent Threat of Covert Channels", "subtitle": "", "description": "Written by a certified Arabic linguist from the Defense Language Institute with extensive background in decoding encrypted communications, this cyber-thriller uses a fictional narrative to provide a fascinating and realistic \"insider's look\" into technically sophisticated covert terrorist communications over the Internet. The accompanying CD-ROM allows readers to \"hack along\" with the story line, by viewing the same Web sites described in the book containing encrypted, covert communications.<br><br>Hacking a Terror NETWORK addresses the technical possibilities of Covert Channels in combination with a very real concern: Terrorism. The fictional story follows the planning of a terrorist plot against the United States where the terrorists use various means of Covert Channels to communicate and hide their trail. Loyal US agents must locate and decode these terrorist plots before innocent American citizens are harmed. The technology covered in the book is both real and thought provoking. Readers can realize the threat posed by these technologies by using the information included in the CD-ROM. The fictional websites, transfer logs, and other technical information are given exactly as they would be found in the real world, leaving the reader to test their own ability to decode the terrorist plot.<br><br>Cyber-Thriller focusing on increasing threat of terrorism throughout the world. <br>Provides a fascinating look at covert forms of communications used by terrorists over the Internet. <br>Accompanying CD-ROM allows users to \"hack along\" with the fictional narrative within the book to decrypyt.", "author": "Russ Rogers, Matthew G Devost", "slug": "hacking-a-terror-network-the-silent-threat-of-covert-channels-277193-9780080488882-russ-rogers-matthew-g-devost", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080488882.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277193", "product_url": "/app/ecom/book/277193/hacking-a-terror-network-the-silent-threat-of-covert-channels-277193-9780080488882-russ-rogers-matthew-g-devost", "bisac_codes": [ "COM053000", "COM014000" ], "items_count": null, "identifiers": { "ISBN13": "9781928994985", "EISBN13": "9780080488882", "EISBN10": "0080488889" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026352742" } } } }, { "type": "Product", "id": "00010000277190", "attributes": { "name": "ESL Design and Verification", "subtitle": "A Prescription for Electronic System Level Methodology", "description": "Visit the authors' companion site! http://www.electronicsystemlevel.com/ - Includes interactive forum with the authors!Electronic System Level (ESL) design has mainstreamed it is now an established approach at most of the worlds leading system-on-chip (SoC) design companies and is being used increasingly in system design. From its genesis as an algorithm modeling methodology with no links to implementation, ESL is evolving into a set of complementary methodologies that enable embedded system design, verification and debug through to the hardware and software implementation of custom SoC, system-on-FPGA, system-on-board, and entire multi-board systems. This book arises from experience the authors have gained from years of work as industry practitioners in the Electronic System Level design area; they have seen \"SLD\" or \"ESL\" go through many stages and false starts, and have observed that the shift in design methodologies to ESL is finally occurring. This is partly because of ESL technologies themselves are stabilizing on a useful set of languages being standardized (SystemC is the most notable), and use models are being identified that are beginning to get real adoption. ESL DESIGN & VERIFICATION offers a true prescriptive guide to ESL that reviews its past and outlines the best practices of today.Table of ContentsCHAPTER 1: WHAT IS ESL? CHAPTER 2: TAXONOMY AND DEFINITIONS FOR THE ELECTRONIC SYSTEM LEVEL CHAPTER 3: EVOLUTION OF ESL DEVELOPMENT CHAPTER 4: WHAT ARE THE ENABLERS OF ESL? CHAPTER 5: ESL FLOW CHAPTER 6: SPECIFICATIONS AND MODELING CHAPTER 7: PRE-PARTITIONING ANALYSIS CHAPTER 8: PARTITIONING CHAPTER 9: POST-PARTITIONING ANALYSIS AND DEBUG CHAPTER 10: POST-PARTITIONING VERIFICATION CHAPTER 11: HARDWARE IMPLEMENTATION CHAPTER 12: SOFTWARE IMPLEMENTATION CHAPTER 13: USE OF ESL FOR IMPLEMENTATION VERIFICATION CHAPTER 14: RESEARCH, EMERGING AND FUTURE PROSPECTS APPENDIX: LIST OF ACRONYMS<br><br>* Provides broad, comprehensive coverage not available in any other such book * Massive global appeal with an internationally recognised author team * Crammed full of state of the art content from notable industry experts", "author": "Grant Martin, Brian Bailey, Andrew Piziali, Mark Burton, John Sanguinetti, Florian Schaefer, Jack Greenbaum, Kamal Hashmi, Anssi Haverinen, Luciano Lavagno, Michael Meredith, Bill Murray, Ian Oliver, Claudio Passerone", "slug": "esl-design-and-verification-277190-9780080488837-grant-martin-brian-bailey-andrew-piziali", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080488837.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277190", "product_url": "/app/ecom/book/277190/esl-design-and-verification-277190-9780080488837-grant-martin-brian-bailey-andrew-piziali", "bisac_codes": [ "TEC008070", "TEC007000" ], "items_count": null, "identifiers": { "ISBN13": "9780123735515", "EISBN13": "9780080488837", "EISBN10": "0080488838" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026367786" } } } }, { "type": "Product", "id": "00010000277189", "attributes": { "name": "XML in Data Management", "subtitle": "Understanding and Applying Them Together", "description": "<p>XML in Data Management is for IT managers and technical staff involved in the creation, administration, or maintenance of a data management infrastructure that includes XML. For most IT staff, XML is either just a buzzword that is ignored or a silver bullet to be used in every nook and cranny of their organization. The truth is in between the two. This book provides the guidance necessary for data managers to make measured decisions about XML within their organizations. Readers will understand the uses of XML, its component architecture, its strategic implications, and how these apply to data management.</p> Takes a data-centric view of XML Explains how, when, and why to apply XML to data management systems Covers XML component architecture, data engineering, frameworks, metadata, legacy systems, and more Discusses the various strengths and weaknesses of XML technologies in the context of organizational data management and integration", "author": "Peter Aiken, M. David Allen", "slug": "xml-in-data-management-277189-9780080521442-peter-aiken-m-david-allen", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080521442.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277189", "product_url": "/app/ecom/book/277189/xml-in-data-management-277189-9780080521442-peter-aiken-m-david-allen", "bisac_codes": [ "COM021000", "COM051010" ], "items_count": null, "identifiers": { "ISBN13": "9780120455997", "EISBN13": "9780080521442", "EISBN10": "0080521444" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026371343" } } } }, { "type": "Product", "id": "00010000277187", "attributes": { "name": "Dictionary of Information Security", "subtitle": "", "description": "The Dictionary of Information Security is a compilation of security terms and definitions that working security professionals and IT students will find helpful.<br><br>IT professionals and IT students will find this a handy reference to help them identify terms used in practice, in journals and articles, and on websites. The dictionary has complete coverage of security terms and includes cutting-edge technologies and newer terminology only now becoming accepted use amongst security practitioners. Certification candidates for security specializations like CISSP and Security+ will also find this a valuable resource.<br><br>* Your one stop shop coverage of malware, wireless technologies, and phishing <br><br>*An easy to use tol featuring the ability to cross references makeing navigation easy<br><br>* Includes special coverage of military and government terms for the latest hot topics", "author": "Robert Slade", "slug": "dictionary-of-information-security-277187-9780080488714-robert-slade", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080488714.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277187", "product_url": "/app/ecom/book/277187/dictionary-of-information-security-277187-9780080488714-robert-slade", "bisac_codes": [ "COM053000", "COM014000" ], "items_count": null, "identifiers": { "ISBN13": "9781597491150", "EISBN13": "9780080488714", "EISBN10": "0080488714" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026360754" } } } }, { "type": "Product", "id": "00010000277186", "attributes": { "name": "Advances in Imaging and Electron Physics", "subtitle": "", "description": "The subjects reviewed in the 'Advances' series cover a broad range of themes including microscopy, electromagnetic fields and image coding. Volume 128 concentrates on regularization, a vital aspect of restoration on low voltage scanning electron microscopy.<br><br>This Book looks at theory and it's application in a practical sense, with a full account of the methods used and realistic detailed application. The authors do this by examining the latest developments, historic illustrations and mathematical fundamentals of the exciting developments in imaging and applying them to realistic practical situations<br>The text bridges the gap between academic researchers and R&D designers by addressing and solving daily issues, which makes this book essential reading.<br><br>\tEmphasizes broad and in depth article collaborations between world-renowned scientists in the field of image and electron physics<br>\tPresents theory and it's application in a practical sense, providing long awaited solutions and new findings<br>\tBridges the gap between academic researchers and practitioners in industry", "author": "Peter W. Hawkes", "slug": "advances-in-imaging-and-electron-physics-277186-9780080493251-peter-w-hawkes", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080493251.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277186", "product_url": "/app/ecom/book/277186/advances-in-imaging-and-electron-physics-277186-9780080493251-peter-w-hawkes", "bisac_codes": [ "TEC007000", "TEC021000" ], "items_count": null, "identifiers": { "ISBN13": "9780120147700", "EISBN13": "9780080493251", "EISBN10": "0080493254" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026348155" } } } }, { "type": "Product", "id": "00010000277185", "attributes": { "name": "Deploying Citrix MetaFrame Presentation Server 3.0 with Windows Server 2003 Terminal Services", "subtitle": "", "description": "<p>Almost 100% of all Fortune 500 and Fortune 1000 companies use Citrix. Deploying Citrix MetaFrame Presentation Server 3.0 with Windows Server 2003 Terminal Services covers the new release to Citrix MetaFrame and how companies can deploy it in their disaster recovery plans.</p> <p>Server Based Computing has been established as a solid networking model for any size business. Why? Because it guarantees cost savings, fast deployment, scalability, performance, security and fast recoverability. Think \"mainframe,\" but updated, pretty, shiny, and effective! Server based computing is the mainframe with a vengeance. Terminal Server and Citrix MetaFrame offer the advantages of the old mainframe coupled with the benefits, gadgets, and appeal of the personal computer.</p> Manage applications from a central location and access them from anywhere Build scalable, flexible, and secure access solutions that reduce computing costs and increase the utility of your network The first book that covers Citrix MetaFrame Presentation Server 3.0 and Windows Server 2003 Terminal Services", "author": "Melissa Craft", "slug": "deploying-citrix-metaframe-presentation-server-30-with-windows-server-2003-terminal-services-277185-9780080488691-melissa-craft", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080488691.png", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277185", "product_url": "/app/ecom/book/277185/deploying-citrix-metaframe-presentation-server-30-with-windows-server-2003-terminal-services-277185-9780080488691-melissa-craft", "bisac_codes": [ "COM053000", "COM014000" ], "items_count": null, "identifiers": { "ISBN13": "9781932266504", "EISBN13": "9780080488691", "EISBN10": "0080488692" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026347334" } } } }, { "type": "Product", "id": "00010000277184", "attributes": { "name": "Passive RF and Microwave Integrated Circuits", "subtitle": "", "description": "The growth in RF and wireless/mobile computing devices that operate at microwave frequencies has resulted in explosive demand for integrated circuits capable of operating at such frequencies in order to accomplish functions like frequency division, phase shifting, attenuation, and isolators and circulators for antennas. This book is an introduction to such ICs, combining theory and practical applications of those devices. In addition to this combined theory and application approach, the author discusses the critical importance of differing fabrication materials on the performance of ICs at different frequencies. This is an area often overlooked when choosing ICs for RF and microwave applications, yet it can be a crucial factor in how an IC performs in a given application. Gives reader a solid background in an increasingly important area of circuit design Emphasis on combination of theoretical discussions with practical application examples In-depth discussion of critical, but often overlooked topic of different fabrication material performances at varying frequencies", "author": "Leo Maloratsky", "slug": "passive-rf-and-microwave-integrated-circuits-277184-9780080492056-leo-maloratsky", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080492056.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277184", "product_url": "/app/ecom/book/277184/passive-rf-and-microwave-integrated-circuits-277184-9780080492056-leo-maloratsky", "bisac_codes": [ "TEC007000", "TEC008070" ], "items_count": null, "identifiers": { "ISBN13": "9780750676991", "EISBN13": "9780080492056", "EISBN10": "0080492053" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026361969" } } } }, { "type": "Product", "id": "00010000277183", "attributes": { "name": "Hydrogen and Fuel Cells", "subtitle": "Emerging Technologies and Applications", "description": "The next several years will see a massive emergence of hydrogen fuel cells as an alterative energy option in both transportation and domestic use. The long-range expectation is that hydrogen will be used as a fuel, produced either from renewable energy, fossil, or nuclear sources, offering an environmentally acceptable and efficient source of power/energy. Hydrogen and Fuel Cells describes in detail the techniques associated with all the production and conversion steps and the set-up of systems at a level suited for both academic and professional use. The book not only describes the \"how\" and \"where\" aspects hydrogen fuels cells may be used, but also the obstacles and benefits of its use, as well as the social implications (both economically and environmental). Thoroughly illustrated and cross-referenced, this is the ultimate reference for researchers, professionals and students in the field of renewable energy.<br><br>* Written by a world-renowned leader in the study of renewable energy.* Thoroughly illustrated with cross-references for easy use and reference.* Written at a level suited for both academic and professional use.", "author": "Bent Sorensen", "slug": "hydrogen-and-fuel-cells-277183-9780080508429-bent-sorensen", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080508429.png", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277183", "product_url": "/app/ecom/book/277183/hydrogen-and-fuel-cells-277183-9780080508429-bent-sorensen", "bisac_codes": [ "TEC031000", "TEC009000" ], "items_count": null, "identifiers": { "EISBN13": "9780080508429", "EISBN10": "0080508421" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026363372" } } } }, { "type": "Product", "id": "00010000277182", "attributes": { "name": "Data Hiding Fundamentals and Applications", "subtitle": "Content Security in Digital Multimedia", "description": "<p>Multimedia technologies are becoming more sophisticated, enabling the Internet to accommodate a rapidly growing audience with a full range of services and efficient delivery methods. Although the Internet now puts communication, education, commerce and socialization at our finger tips, its rapid growth has raised some weighty security concerns with respect to multimedia content. The owners of this content face enormous challenges in safeguarding their intellectual property, while still exploiting the Internet as an important resource for commerce.</p> <p>Data Hiding Fundamentals and Applications focuses on the theory and state-of-the-art applications of content security and data hiding in digital multimedia. One of the pillars of content security solutions is the imperceptible insertion of information into multimedia data for security purposes; the idea is that this inserted information will allow detection of unauthorized usage.</p> Provides a theoretical framework for data hiding, in a signal processing context Realistic applications in secure, multimedia delivery Compression robust data hiding Data hiding for proof of ownership--WATERMARKING Data hiding algorithms for image and video watermarking", "author": "Husrev T. Sencar, Mahalingam Ramkumar, Ali N. Akansu", "slug": "data-hiding-fundamentals-and-applications-277182-9780080488660-husrev-t-sencar-mahalingam-ramkumar-ali-n-akansu", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080488660.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277182", "product_url": "/app/ecom/book/277182/data-hiding-fundamentals-and-applications-277182-9780080488660-husrev-t-sencar-mahalingam-ramkumar-ali-n-akansu", "bisac_codes": [ "TEC007000", "COM034000" ], "items_count": null, "identifiers": { "ISBN13": "9780120471447", "EISBN13": "9780080488660", "EISBN10": "0080488668" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026347103" } } } }, { "type": "Product", "id": "00010000277181", "attributes": { "name": "Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives", "subtitle": "", "description": "Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues involved in spying on someone online. It begins with an explanation of reasons and ethics, covers the psychology of spying, describes computer and network basics, and takes readers step-by-step through many common online activities, and shows what can be done to compromise them. The book's final section describes personal privacy and counter-spy techniques. By teaching by both theory and example this book empowers readers to take charge of their computers and feel confident they can be aware of the different online activities their families engage in. Expert authors have worked at Fortune 500 companies, NASA, CIA, NSA and all reside now at Sytex, one of the largest government providers of IT services Targets an area that is not addressed by other books: black hat techniques for computer security at the personal computer level Targets a wide audience: personal computer users, specifically those interested in the online activities of their families", "author": "Eric Cole, Michael Nordfelt, Sandra Ring, Ted Fair", "slug": "cyber-spying-tracking-your-familys-sometimes-secret-online-lives-277181-9780080488653-eric-cole-michael-nordfelt-sandra-ring-ted-fair", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080488653.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277181", "product_url": "/app/ecom/book/277181/cyber-spying-tracking-your-familys-sometimes-secret-online-lives-277181-9780080488653-eric-cole-michael-nordfelt-sandra-ring-ted-fair", "bisac_codes": [ "COM053000", "COM014000" ], "items_count": null, "identifiers": { "ISBN13": "9781931836418", "EISBN13": "9780080488653", "EISBN10": "008048865X" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026346941" } } } }, { "type": "Product", "id": "00010000277180", "attributes": { "name": "Data Modeling Essentials", "subtitle": "", "description": "<p>Data Modeling Essentials, Third Edition, covers the basics of data modeling while focusing on developing a facility in techniques, rather than a simple familiarization with \"the rules\". In order to enable students to apply the basics of data modeling to real models, the book addresses the realities of developing systems in real-world situations by assessing the merits of a variety of possible solutions as well as using language and diagramming methods that represent industry practice.</p> <p>This revised edition has been given significantly expanded coverage and reorganized for greater reader comprehension even as it retains its distinctive hallmarks of readability and usefulness. Beginning with the basics, the book provides a thorough grounding in theory before guiding the reader through the various stages of applied data modeling and database design. Later chapters address advanced subjects, including business rules, data warehousing, enterprise-wide modeling and data management. It includes an entirely new section discussing the development of logical and physical modeling, along with new material describing a powerful technique for model verification. It also provides an excellent resource for additional lectures and exercises.</p> <p>This text is the ideal reference for data modelers, data architects, database designers, DBAs, and systems analysts, as well as undergraduate and graduate-level students looking for a real-world perspective.</p> Thorough coverage of the fundamentals and relevant theory Recognition and support for the creative side of the process Expanded coverage of applied data modeling includes new chapters on logical and physical database design New material describing a powerful technique for model verification Unique coverage of the practical and human aspects of modeling, such as working with business specialists, managing change, and resolving conflict", "author": "Graeme Simsion, Graham Witt", "slug": "data-modeling-essentials-277180-9780080488677-graeme-simsion-graham-witt", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080488677.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277180", "product_url": "/app/ecom/book/277180/data-modeling-essentials-277180-9780080488677-graeme-simsion-graham-witt", "bisac_codes": [ "COM021000", "077" ], "items_count": null, "identifiers": { "ISBN13": "9780126445510", "EISBN13": "9780080488677", "EISBN10": "0080488676" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026347185" } } } }, { "type": "Product", "id": "00010000277179", "attributes": { "name": "Deploying IP and MPLS QoS for Multiservice Networks", "subtitle": "Theory and Practice", "description": "QoS, short for quality of service, is one of the most important goals a network designer or administrator will have. Ensuring that the network runs at optimal precision with data remaining accurate, traveling fast, and to the correct user are the main objectives of QoS. The various media that fly across the network including voice, video, and data have different idiosyncrasies that try the dimensions of the network. This malleable network architecture poses an always moving potential problem for the network professional.<br><br>The authors have provided a comprehensive treatise on this subject. They have included topics such as traffic engineering, capacity planning, and admission control. This book provides real world case studies of QoS in multiservice networks. These case studies remove the mystery behind QoS by illustrating the how, what, and why of implementing QoS within networks. Readers will be able to learn from the successes and failures of these actual working designs and configurations. Helps readers understand concepts of IP QoS by presenting clear descriptions of QoS components, architectures, and protocols Directs readers in the design and deployment of IP QoS networks through fully explained examples of actual working designs Contains real life case studies which focus on implementation", "author": "John William Evans, Clarence Filsfils", "slug": "deploying-ip-and-mpls-qos-for-multiservice-networks-277179-9780080488684-john-william-evans-clarence-filsfils", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080488684.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277179", "product_url": "/app/ecom/book/277179/deploying-ip-and-mpls-qos-for-multiservice-networks-277179-9780080488684-john-william-evans-clarence-filsfils", "bisac_codes": [ "COM059000", "COM060000" ], "items_count": null, "identifiers": { "ISBN13": "9780123705495", "EISBN13": "9780080488684", "EISBN10": "0080488684" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026347232" } } } }, { "type": "Product", "id": "00010000277178", "attributes": { "name": "Routing, Flow, and Capacity Design in Communication and Computer Networks", "subtitle": "", "description": "In network design, the gap between theory and practice is woefully broad. This book narrows it, comprehensively and critically examining current network design models and methods. You will learn where mathematical modeling and algorithmic optimization have been under-utilized. At the opposite extreme, you will learn where they tend to fail to contribute to the twin goals of network efficiency and cost-savings. Most of all, you will learn precisely how to tailor theoretical models to make them as useful as possible in practice.Throughout, the authors focus on the traffic demands encountered in the real world of network design. Their generic approach, however, allows problem formulations and solutions to be applied across the board to virtually any type of backbone communication or computer network. For beginners, this book is an excellent introduction. For seasoned professionals, it provides immediate solutions and a strong foundation for further advances in the use of mathematical modeling for network design. Written by leading researchers with a combined 40 years of industrial and academic network design experience. Considers the development of design models for different technologies, including TCP/IP, IDN, MPLS, ATM, SONET/SDH, and WDM. Discusses recent topics such as shortest path routing and fair bandwidth assignment in IP/MPLS networks. Addresses proper multi-layer modeling across network layers using different technologiesfor example, IP over ATM over SONET, IP over WDM, and IDN over SONET. Covers restoration-oriented design methods that allow recovery from failures of large-capacity transport links and transit nodes. Presents, at the end of each chapter, exercises useful to both students and practitioners.", "author": "Michal Pioro, Deep Medhi", "slug": "routing-flow-and-capacity-design-in-communication-and-computer-networks-277178-9780080516431-michal-pioro-deep-medhi", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080516431.png", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277178", "product_url": "/app/ecom/book/277178/routing-flow-and-capacity-design-in-communication-and-computer-networks-277178-9780080516431-michal-pioro-deep-medhi", "bisac_codes": [ "COM043000", "077" ], "items_count": null, "identifiers": { "ISBN13": "9780125571890", "EISBN13": "9780080516431", "EISBN10": "0080516432" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026343043" } } } }, { "type": "Product", "id": "00010000277177", "attributes": { "name": "Configuring Check Point NGX VPN-1/Firewall-1", "subtitle": "", "description": "Check Point NGX VPN-1/Firewall-1 is the next major release of Check Point's flagship firewall software product, which has over 750,000 registered users. The most significant changes to this release are in the areas of Route Based VPN, Directional VPN, Link Selection & Tunnel Management, Multiple Entry Points, Route Injection Mechanism, Wire Mode, and SecurePlatform Pro. Many of the new features focus on how to configure and manage Dynamic Routing rules, which are essential to keeping an enterprise network both available *and* secure. Demand for this book will be strong because Check Point is requiring all of its 3rd party developers to certify their products for this release.<br><br>* Packed full with extensive coverage of features new to the product, allowing 3rd party partners to certify NGX add-on products quickly<br>* Protect your network from both internal and external threats and learn to recognize future threats<br>* All yuou need to securly and efficiently deploy, troubleshoot, and maintain Check Point NXG", "author": "Barry J Stiefel, Simon Desmeules", "slug": "configuring-check-point-ngx-vpn-1firewall-1-277177-9780080488561-barry-j-stiefel-simon-desmeules", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080488561.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277177", "product_url": "/app/ecom/book/277177/configuring-check-point-ngx-vpn-1firewall-1-277177-9780080488561-barry-j-stiefel-simon-desmeules", "bisac_codes": [ "COM053000", "COM014000" ], "items_count": null, "identifiers": { "ISBN13": "9781597490313", "EISBN13": "9780080488561", "EISBN10": "0080488560" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026346660" } } } } ], "meta": { "pagination": { "page": 75124, "pages": 78424, "count": 1568476 } } }
Response Info
Default: None