GET /services/catalog/products?format=api&page=75125
Response information
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/vnd.api+json
Vary: Accept

{
    "links": {
        "first": "https://redshelf.com/services/catalog/products?format=api&page=1",
        "last": "https://redshelf.com/services/catalog/products?format=api&page=78424",
        "next": "https://redshelf.com/services/catalog/products?format=api&page=75126",
        "prev": "https://redshelf.com/services/catalog/products?format=api&page=75124"
    },
    "data": [
        {
            "type": "Product",
            "id": "00010000277177",
            "attributes": {
                "name": "Configuring Check Point NGX VPN-1/Firewall-1",
                "subtitle": "",
                "description": "Check Point NGX VPN-1/Firewall-1 is the next major release of Check Point's flagship firewall software product, which has over 750,000 registered users. The most significant changes to this release are in the areas of Route Based VPN, Directional VPN, Link Selection & Tunnel Management, Multiple Entry Points, Route Injection Mechanism, Wire Mode, and SecurePlatform Pro. Many of the new features focus on how to configure and manage Dynamic Routing rules, which are essential to keeping an enterprise network both available *and* secure. Demand for this book will be strong because Check Point is requiring all of its 3rd party developers to certify their products for this release.<br><br>* Packed full with extensive coverage of features new to the product, allowing 3rd party partners to certify NGX add-on products quickly<br>* Protect your network from both internal and external threats and learn to recognize future threats<br>* All yuou need to securly and efficiently deploy, troubleshoot, and maintain Check Point NXG",
                "author": "Barry J Stiefel, Simon Desmeules",
                "slug": "configuring-check-point-ngx-vpn-1firewall-1-277177-9780080488561-barry-j-stiefel-simon-desmeules",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080488561.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277177",
                "product_url": "/app/ecom/book/277177/configuring-check-point-ngx-vpn-1firewall-1-277177-9780080488561-barry-j-stiefel-simon-desmeules",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597490313",
                    "EISBN13": "9780080488561",
                    "EISBN10": "0080488560"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026346660"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277176",
            "attributes": {
                "name": "Object-Oriented Design with UML and Java",
                "subtitle": "",
                "description": "<p>Object-Oriented Design with UML and Java provides an integrated introduction to object-oriented design with the Unified Modelling Language (UML) and the Java programming language. The book demonstrates how Java applications, no matter how small, can benefit from some design during their construction. Fully road-tested by students on the authors' own courses, the book shows how these complementary technologies can be used effectively to create quality software. It requires no prior knowledge of object orientation, though readers must have some experience of Java or other high level programming language.</p>  <p>This book covers object technology; object-oriented analysis and design; and implementation of objects with Java. It includes two case studies dealing with library applications. The UML has been incorporated into a graphical design tool called ROME, which can be downloaded from the book's website. This object modelling environment allows readers to prepare and edit various UML diagrams. ROME can be used alongside a Java compiler to generate Java code from a UML class diagram then compile and run the resulting application for hands-on learning.</p>  <p>This text would be a valuable resource for undergraduate students taking courses on O-O analysis and design, O-O modelling, Java programming, and modelling with UML.</p>* Integrates design and implementation, using Java and UML* Includes case studies and exercises * Bridges the gap between programming texts and high level analysis books on design",
                "author": "Kenneth Barclay, John Savage",
                "slug": "object-oriented-design-with-uml-and-java-277176-9780080497556-kenneth-barclay-john-savage",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080497556.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277176",
                "product_url": "/app/ecom/book/277176/object-oriented-design-with-uml-and-java-277176-9780080497556-kenneth-barclay-john-savage",
                "bisac_codes": [
                    "COM011000",
                    "COM051230"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780750660983",
                    "EISBN13": "9780080497556",
                    "EISBN10": "0080497551"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026363635"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277175",
            "attributes": {
                "name": "Cisco PIX Firewalls",
                "subtitle": "Configure / Manage / Troubleshoot",
                "description": "Umer Khan's first book, Cisco Security Specialist's Guide to PIX Firewalls, ISBN: 1931836639, has consistently maintained its spot as the #1 best-selling PIX book on amazon.com by providing readers with a clear, comprehensive, and independent introduction to PIX Firewall configuration. With the market for PIX Firewalls maintaining double digit growth and several major enhancements to both the PIX Firewall and VPN Client product lines, this book will have enormous appeal with the audience already familiar with his first book. The Cisco Pix firewall is the #1 market leading firewall, owning 43% market share. Cisco is poised to release the newest, completely re-designed version 7 of the Pix operating system in the first quarter of 2004 \"Cisco Pix Firewalls: configure",
                "author": "Umer Khan",
                "slug": "cisco-pix-firewalls-277175-9780080488486-umer-khan",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080488486.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277175",
                "product_url": "/app/ecom/book/277175/cisco-pix-firewalls-277175-9780080488486-umer-khan",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597490047",
                    "EISBN13": "9780080488486",
                    "EISBN10": "008048848X"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026347841"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277173",
            "attributes": {
                "name": "Configuring VMware ESX Server 2.5",
                "subtitle": "",
                "description": "This book will detail the default and custom installation of VMwares ESx server as well as basic and advanced virtual machine configurations. It will also discuss the requirements for a server virtualization and consolidation project and the cost savings surrounding such an effort. <br><br>Furthermore, the book will provide a thorough understanding of the benefits of a virtual infrastructure and a comprehensive examination of how VMware eases administration and lowers overall IT costs. <br><br>Lastly, the book delivers a thorough understanding of the virtual evolution which is underway in many IT organizations and how the reader will benefit from shifting from the physical to a virtual<br><br>* A detailed resource on the default and custom installation of VMware's ESx server<br>* Covers all the requirements for a server virtualization and consolidation project and the cost savings surrounding such an effort<br>* Delivers a thorough understanding of the virtual evolution occuring in the IT industry",
                "author": "Al Muller, Seburn Wilson",
                "slug": "configuring-vmware-esx-server-25-277173-9780080488578-al-muller-seburn-wilson",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080488578.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277173",
                "product_url": "/app/ecom/book/277173/configuring-vmware-esx-server-25-277173-9780080488578-al-muller-seburn-wilson",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597490191",
                    "EISBN13": "9780080488578",
                    "EISBN10": "0080488579"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026369255"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277172",
            "attributes": {
                "name": "C# 2.0",
                "subtitle": "Practical Guide for Programmers",
                "description": "<p>You dont need coddling; you dont need to be told what you already know. What you need is a book that uses your experience as a Java or C++ programmer to give you a leg up into the challenges and rewards of C#. And this Practical Guide is precisely what youre after.</p>  <p>Written by a team that boasts extensive experience teaching C# to professionals, this book provides a practical, efficient explanation of the language itself, covering basic to advanced features and calling out all thats new in 2.0. Its instruction is always firmly situated within the context of the .NET framework and bolstered by code examples, key lessons in object-oriented programming, and installments of a realistic application programming tutorial. Concise and incisive, this is the best way to master the worlds fastest-growing and most marketable programming language.</p>  <p>Features:</p>   Provides a carefully focused explanation of every aspect of  the C# language, including entire chapters on the unified type system, advanced types, collections, generics, reflection and attributes. Highlights all features new to the latest version of C# and organizes its presentation of C# according to the key principles of object-oriented programming and the .NET framework. Using end-of-chapter exercises, incrementally develops a cohesive application programming tutorial.  Provides a carefully focused explanation of every aspect of  the C# language, including entire chapters on the unified type system, advanced types, collections, generics, reflection and attributes. Highlights all features new to the latest version of C# and organizes its presentation of C# according to the key principles of object-oriented programming and the .NET framework. Using end-of-chapter exercises, incrementally develops a cohesive application programming tutorial.",
                "author": "Michel de Champlain, Brian G. Patrick",
                "slug": "c-20-277172-9780080488431-michel-de-champlain-brian-g-patrick",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080488431.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277172",
                "product_url": "/app/ecom/book/277172/c-20-277172-9780080488431-michel-de-champlain-brian-g-patrick",
                "bisac_codes": [
                    "COM051210",
                    "COM051010"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780121674519",
                    "EISBN13": "9780080488431",
                    "EISBN10": "0080488439"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026348007"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277171",
            "attributes": {
                "name": "Communication Networking",
                "subtitle": "An Analytical Approach",
                "description": "<p>Communication Networking is a comprehensive, effectively organized introduction to the realities of communication network engineering. Written for both the workplace and the classroom, this book lays the foundation and provides the answers required for building an efficient, state-of-the-art networkone that can expand to meet growing demand and evolve to capitalize on coming technological advances. It focuses on the three building blocks out of which a communication network is constructed: multiplexing, switching, and routing. The discussions are based on the viewpoint that communication networking is about efficient resource sharing.</p>  <p>The progression is natural: the book begins with individual physical links and proceeds to their combination in a network. The approach is analytical: discussion is driven by mathematical analyses of and solutions to specific engineering problems. Fundamental concepts are explained in detail and design issues are placed in context through real world examples from current technologies. The text offers in-depth coverage of many current topics, including network calculus with deterministically-constrained traffic; congestion control for elastic traffic; packet switch queuing; switching architectures; virtual path routing; and routing for quality of service. It also includes more than 200 hands-on exercises and class-tested problems, dozens of schematic figures, a review of key mathematical concepts, and a glossary.</p>  <p>This book will be of interest to networking professionals whose work is primarily architecture definition and implementation, i.e., network engineers and designers at telecom companies, industrial research labs, etc. It will also appeal to final year undergrad and first year graduate students in EE, CE, and CS programs.</p> Systematically uses mathematical models and analyses to drive the development of a practical understanding of core network engineering problems. Provides in-depth coverage of many current topics, including network calculus with deterministically-constrained traffic, congestion control for elastic traffic, packet switch queuing, switching architectures, virtual path routing, and routing for quality of service. Includes over 200 hands-on exercises and class-tested problems, dozens of schematic figures, a review of key mathematical concepts, and a glossary.",
                "author": "Anurag Kumar, D. Manjunath, Joy Kuri",
                "slug": "communication-networking-277171-9780080488516-anurag-kumar-d-manjunath-joy-kuri",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080488516.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277171",
                "product_url": "/app/ecom/book/277171/communication-networking-277171-9780080488516-anurag-kumar-d-manjunath-joy-kuri",
                "bisac_codes": [
                    "COM043000",
                    "077"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780124287518",
                    "EISBN13": "9780080488516",
                    "EISBN10": "008048851X"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026368413"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277170",
            "attributes": {
                "name": "Buffer Overflow Attacks",
                "subtitle": "Detect, Exploit, Prevent",
                "description": "The SANS Institute maintains a list of the \"Top 10 Software Vulnerabilities.\" At the current time, over half of these vulnerabilities are exploitable by Buffer Overflow attacks, making this class of attack one of the most common and most dangerous weapon used by malicious attackers. This is the first book specifically aimed at detecting, exploiting, and preventing the most common and dangerous attacks.<br><br>Buffer overflows make up one of the largest collections of vulnerabilities in existence; And a large percentage of possible remote exploits are of the overflow variety. Almost all of the most devastating computer attacks to hit the Internet in recent years including SQL Slammer, Blaster, and I Love You attacks. If executed properly, an overflow vulnerability will allow an attacker to run arbitrary code on the victims machine with the equivalent rights of whichever process was overflowed. This is often used to provide a remote shell onto the victim machine, which can be used for further exploitation.<br><br>A buffer overflow is an unexpected behavior that exists in certain programming languages. This book provides specific, real code examples on exploiting buffer overflow attacks from a hacker's perspective and defending against these attacks for the software developer. Over half of the \"SANS TOP 10 Software Vulnerabilities\" are related to buffer overflows.  None of the current-best selling software security books focus exclusively on buffer overflows. This book provides specific, real code examples on exploiting buffer overflow attacks from a hacker's perspective and defending against these attacks for the software developer.",
                "author": "Jason Deckard",
                "slug": "buffer-overflow-attacks-277170-9780080488424-jason-deckard",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080488424.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277170",
                "product_url": "/app/ecom/book/277170/buffer-overflow-attacks-277170-9780080488424-jason-deckard",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781932266672",
                    "EISBN13": "9780080488424",
                    "EISBN10": "0080488420"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026353552"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277169",
            "attributes": {
                "name": "Principles and Practices of Interconnection Networks",
                "subtitle": "",
                "description": "One of the greatest challenges faced by designers of digital systems is optimizing the communication and interconnection between system components. Interconnection networks offer an attractive and economical solution to this communication crisis and are fast becoming pervasive in digital systems. Current trends suggest that this communication bottleneck will be even more problematic when designing future generations of machines. Consequently, the anatomy of an interconnection network router and science of interconnection network design will only grow in importance in the coming years.This book offers a detailed and comprehensive presentation of the basic principles of interconnection network design, clearly illustrating them with numerous examples, chapter exercises, and case studies. It incorporates hardware-level descriptions of concepts, allowing a designer to see all the steps of the process from abstract design to concrete implementation. Case studies throughout the book draw on extensive author experience in designing interconnection networks over a period of more than twenty years, providing real world examples of what works, and what doesn't. Tightly couples concepts with implementation costs to facilitate a deeper understanding of the tradeoffs in the design of a practical network. A set of examples and exercises in every chapter help the reader to fully understand all the implications of every design decision.",
                "author": "William James Dally, Brian Patrick Towles",
                "slug": "principles-and-practices-of-interconnection-networks-277169-9780080497808-william-james-dally-brian-patrick-towles",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080497808.png",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277169",
                "product_url": "/app/ecom/book/277169/principles-and-practices-of-interconnection-networks-277169-9780080497808-william-james-dally-brian-patrick-towles",
                "bisac_codes": [
                    "COM011000",
                    "TEC007000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780122007514",
                    "EISBN13": "9780080497808",
                    "EISBN10": "0080497802"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026348961"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277168",
            "attributes": {
                "name": "How to Cheat at Managing Microsoft Operations Manager 2005",
                "subtitle": "",
                "description": "Microsoft Operations Manager (MOM) is a network monitoring tool that provides enterprise-class event and performance management for Windows Server System technologies. MOM's event and performance management tools discover problems before system administrators would ever find them, thereby enabling administrators to lower their costs of operations and simplify management of their Windows Server System infrastructure. MOM can notify system administrators of overloaded processors, depleted memory, or failed network connections affecting their Windows servers long before these problems bother users.<br><br>Microsoft Operations Manager (MOM) 2005 delivers open and scalable enterprise-class operational management by providing comprehensive event management, proactive monitoring and alerting, reporting and trend analysis, and system and application specific knowledge and tasks to improve the manageability of Windows Server System environments, including Windows, Exchange, SQL, IIS, Active Directory etc.<br><br>* A users guide to Microsoft Operations Manager (MOM) enabling a cost reduction and simplification in managing your Windows Server System Infrastructure  <br>* Companion Web site for book offers dozens of customized scripts and tools for automating MOM 2005 and many other Windows Server products <br>* There is no other compact resource like this for this core, Microsoft Server product",
                "author": "Anthony Piltzecker",
                "slug": "how-to-cheat-at-managing-microsoft-operations-manager-2005-277168-9780080488462-anthony-piltzecker",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080488462.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277168",
                "product_url": "/app/ecom/book/277168/how-to-cheat-at-managing-microsoft-operations-manager-2005-277168-9780080488462-anthony-piltzecker",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597492515",
                    "EISBN13": "9780080488462",
                    "EISBN10": "0080488463"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026348019"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277167",
            "attributes": {
                "name": "Architecture and Patterns for IT Service Management, Resource Planning, and Governance: Making Shoes for the Cobbler's Children",
                "subtitle": "",
                "description": "<p>Architecture and Patterns for IT Service Management, Resource Planning, and Governance: Making Shoes for the Cobbler's Children provides an independent examination of developments in Enterprise Resource Planning for Information.</p>  <p>Major companies, research firms, and vendors are offering Enterprise Resource Planning for Information Technology, which they label as ERP for IT, IT Resource Planning and related terms.</p>  <p>This book presents on-the-ground coverage of enabling IT governance in architectural detail, which can be used to define a strategy for immediate execution. It fills the gap between high-level guidance on IT governance and detailed discussions about specific vendor technologies. It provides a unique value chain approach to integrating the COBIT, ITIL, and CMM frameworks into a coherent, unified whole. It presents a field-tested, detailed conceptual information model with definitions and usage scenarios, mapped to both process and system architectures.</p>  <p>This book is recommended for practitioners and managers engaged in IT support in large companies, particularly those who are information architects, enterprise architects, senior software engineers, program/project managers, and IT managers/directors. </p>",
                "author": "Charles T. Betz",
                "slug": "architecture-and-patterns-for-it-service-management-resource-planning-and-governance-making-shoes-for-the-cobblers-children-277167-9780080488349-charles-t-betz",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080488349.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277167",
                "product_url": "/app/ecom/book/277167/architecture-and-patterns-for-it-service-management-resource-planning-and-governance-making-shoes-for-the-cobblers-children-277167-9780080488349-charles-t-betz",
                "bisac_codes": [
                    "COM021000",
                    "COM005000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780123705938",
                    "EISBN13": "9780080488349",
                    "EISBN10": "008048834X"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026347926"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277166",
            "attributes": {
                "name": "Black Hat Physical Device Security: Exploiting Hardware and Software",
                "subtitle": "",
                "description": "<p>Black Hat, Inc. is the premier, worldwide provider of security training, consulting, and conferences. In Black Hat Physical Device Security: Exploiting Hardware and Software, the Black Hat experts show readers the types of attacks that can be done to physical devices such as motion detectors, video monitoring and closed circuit systems, authentication systems, thumbprint and voice print devices, retina scans, and more.</p>  <p>The Black Hat Briefings held every year in Las Vegas, Washington DC, Amsterdam, and Singapore continually expose the greatest threats to cyber security and provide IT mind leaders with ground breaking defensive techniques. There are no books that show security and networking professionals how to protect physical security devices. This unique book provides step-by-step instructions for assessing the vulnerability of a security device such as a retina scanner, seeing how it might be compromised, and taking protective measures. The book covers the actual device as well as the software that runs it. By way of example, a thumbprint scanner that allows the thumbprint to remain on the glass from the last person could be bypassed by pressing a \"gummy bear\" piece of candy against the glass so that the scan works against the last thumbprint that was used on the device. This is a simple example of an attack against a physical authentication system.</p> First book by world-renowned Black Hat, Inc. security consultants and trainers First book that details methods for attacking and defending physical security devices Black Hat, Inc. is the premier, worldwide provider of security training, consulting, and conferences",
                "author": "Drew Miller",
                "slug": "black-hat-physical-device-security-exploiting-hardware-and-software-277166-9780080488400-drew-miller",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080488400.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277166",
                "product_url": "/app/ecom/book/277166/black-hat-physical-device-security-exploiting-hardware-and-software-277166-9780080488400-drew-miller",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781932266818",
                    "EISBN13": "9780080488400",
                    "EISBN10": "0080488404"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026369257"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277165",
            "attributes": {
                "name": "Aircraft Structures for Engineering Students",
                "subtitle": "",
                "description": "Aircraft Structures for Engineering Students is the leading self contained aircraft structures course text. It covers all fundamental subjects, including elasticity, structural analysis, airworthiness and aeroelasticity. Now in its fourth edition, the author has revised and updated the text throughout and added new case study and worked example material to make the text even more accessible. The leading Aircraft Structures text, covering a complete course from basic structural mechanics to finite element analysis Enhanced pedagogy with additional case studies, worked examples and home work exercises",
                "author": "T.H.G. Megson",
                "slug": "aircraft-structures-for-engineering-students-277165-9780080488318-thg-megson",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080488318.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277165",
                "product_url": "/app/ecom/book/277165/aircraft-structures-for-engineering-students-277165-9780080488318-thg-megson",
                "bisac_codes": [
                    "TEC002000",
                    "TEC009070"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780750667395",
                    "EISBN13": "9780080488318",
                    "EISBN10": "0080488315"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026367549"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277164",
            "attributes": {
                "name": "Biometric Technologies and Verification Systems",
                "subtitle": "",
                "description": "Biometric Technologies and Verification Systems is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of-the-art in biometric verification/authentication, identification and system design principles. It also provides a step-by-step discussion of how biometrics works; how biometric data in human beings can be collected and analyzed in a number of ways; how biometrics are currently being used as a method of personal identification in which people are recognized by their own unique corporal or behavioral characteristics; and how to create detailed menus for designing a biometric verification system. <br><br>Only biometrics verification/authentication is based on the identification of an intrinsic part of a human being. Tokens, such as smart cards, magnetic stripe cards, and physical keys can be lost, stolen, or duplicated. Passwords can be forgotten, shared, or unintentionally observed by a third party. Forgotten passwords and lost \"smart cards\" are a nuisance for users and an expensive time-waster for system administrators. Biometric security solutions offer some unique advantages for identifying and verifying/ authenticating human beings over more traditional security methods. This book will serve to identify the various security applications biometrics can play a highly secure and specific role in.<br><br>* Contains elements such as Sidebars, Tips, Notes and URL links<br>* Heavily illustrated with over 150 illustrations, screen captures, and photographs<br>* Details the various biometric technologies and how they work while providing a discussion of the economics, privacy issues and challenges of implementing biometric security solutions",
                "author": "John R. Vacca",
                "slug": "biometric-technologies-and-verification-systems-277164-9780080488394-john-r-vacca",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080488394.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277164",
                "product_url": "/app/ecom/book/277164/biometric-technologies-and-verification-systems-277164-9780080488394-john-r-vacca",
                "bisac_codes": [
                    "COM070000",
                    "785"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780750679671",
                    "EISBN13": "9780080488394",
                    "EISBN10": "0080488390"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026360899"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277163",
            "attributes": {
                "name": "BigNum Math",
                "subtitle": "Implementing Cryptographic Multiple Precision Arithmetic",
                "description": "Implementing cryptography requires integers of significant magnitude to resist cryptanalytic attacks. Modern programming languages only provide support for integers which are relatively small and single precision. The purpose of this text is to instruct the reader regarding how to implement efficient multiple precision algorithms.<br><br>Bignum math is the backbone of modern computer security algorithms. It is the ability to work with hundred-digit numbers efficiently using techniques that are both elegant and occasionally bizarre. This book introduces the reader to the concept of bignum algorithms and proceeds to build an entire library of functionality from the ground up. Through the use of theory, pseudo-code and actual fielded C source code the book explains each and every algorithm that goes into a modern bignum library. Excellent for the student as a learning tool and practitioner as a reference alike BigNum Math is for anyone with a background in computer science who has taken introductory level mathematic courses. The text is for students learning mathematics and cryptography as well as the practioner who needs a reference for any of the algorithms documented within.<br><br>* Complete coverage of Karatsuba Multiplication, the Barrett Algorithm, Toom-Cook 3-Way Multiplication, and More <br><br>* Tom St Denis is the developer of the industry standard cryptographic suite of tools called LibTom. <br><br>* This book provides step-by-step exercises to enforce concepts",
                "author": "Tom St Denis",
                "slug": "bignum-math-277163-9780080488387-tom-st-denis",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080488387.png",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277163",
                "product_url": "/app/ecom/book/277163/bignum-math-277163-9780080488387-tom-st-denis",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597491129",
                    "EISBN13": "9780080488387",
                    "EISBN10": "0080488382"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026369259"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277162",
            "attributes": {
                "name": "Aggressive Network Self-Defense",
                "subtitle": "",
                "description": "Over the past year there has been a shift within the computer security world away from passive, reactive defense towards more aggressive, proactive countermeasures. Although such tactics are extremely controversial, many security professionals are reaching into the dark side of their tool box to identify, target, and suppress their adversaries. This book will provide a detailed analysis of the most timely and dangerous attack vectors targeted at operating systems, applications, and critical infrastructure and the cutting-edge counter-measures used to nullify the actions of an attacking, criminal hacker.<br><br>*First book to demonstrate and explore controversial network strike back and countermeasure techniques. <br><br>*Provides tightly guarded secrets to find out WHO is really attacking you over the internet. <br><br>*Provides security professionals and forensic specialists with invaluable information for finding and prosecuting criminal hackers.",
                "author": "Neil R. Wyler",
                "slug": "aggressive-network-self-defense-277162-9780080488295-neil-r-wyler",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080488295.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277162",
                "product_url": "/app/ecom/book/277162/aggressive-network-self-defense-277162-9780080488295-neil-r-wyler",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781931836203",
                    "EISBN13": "9780080488295",
                    "EISBN10": "0080488293"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026353976"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277161",
            "attributes": {
                "name": "The Foundations of Magnetic Recording",
                "subtitle": "",
                "description": "This expanded and updated new edition provides a comprehensive overview of the science and technology of magnetic recording.  In the six years since the publication of the first edition, the magnetic recording and storage industry has burgeoned with the introduction of a host of new ideas and technologies.  His book contains a discussion of almost every technologically important aspect of recording. Continas complete coverage of the current technology of magnetic recording and storage Written in a non-mathematical but scientifically accurate style Permits intelligent evaluations to be made of both the past evolution and the future trends in a wide variety of magnetic storage devices",
                "author": "John C. Mallinson",
                "slug": "the-foundations-of-magnetic-recording-277161-9780080506821-john-c-mallinson",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080506821.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277161",
                "product_url": "/app/ecom/book/277161/the-foundations-of-magnetic-recording-277161-9780080506821-john-c-mallinson",
                "bisac_codes": [
                    "TEC041000",
                    "034"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780124666269",
                    "EISBN13": "9780080506821",
                    "EISBN10": "0080506828"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026367156"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277160",
            "attributes": {
                "name": "Advances in Imaging and Electron Physics",
                "subtitle": "",
                "description": "Advances in Imaging and Electron Physics merges two long-running serials-Advances in Electronics and Electron Physics and Advances in Optical and Electron Microscopy. This series features extended articles on the physics of electron devices (especially semiconductor devices), particle optics at high and low energies, microlithography, image science and digital image processing, electromagnetic wave propagation, electron microscopy, and the computing methods used in all these domains.",
                "author": "Peter W. Hawkes",
                "slug": "advances-in-imaging-and-electron-physics-277160-9780080488127-peter-w-hawkes",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080488127.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277160",
                "product_url": "/app/ecom/book/277160/advances-in-imaging-and-electron-physics-277160-9780080488127-peter-w-hawkes",
                "bisac_codes": [
                    "TEC008070",
                    "TEC021000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780123739087",
                    "EISBN13": "9780080488127",
                    "EISBN10": "0080488129"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026345959"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277159",
            "attributes": {
                "name": "Advanced Computer-Aided Fixture Design",
                "subtitle": "",
                "description": "Fixtures--the component or assembly that holds a part undergoing machining--must be designed to fit the shape of that part and the type of machining being done.  This book discusses the fundamentals of Computer-Aided Fixture Design (CAFD) techniques and covers fixture planning, fixture design (both modular and dedicated fixtures), fixture design verifications, and the overall integration with CAD/CAM.  The book shows how CAFD may lead to a significant reduction of product and process development time and production cost, and how CAFD can increase quality assurance through simulation and science-based technical specification and cost estimation in business quoting, especially in current supplier-based manufacturing. It also provides case study examples. This book provides a total solution of CAFD, including planning, design, and design verification Practical and comprehensive theoretical analysis of fixturing from real industrial application projects Introduces the integration of fixture design and analysis with CAD/CAM so that detailed geometric information can be processed and complex fixture designs can be designed and analyzed",
                "author": "Yiming (Kevin) Rong, Samuel Huang",
                "slug": "advanced-computer-aided-fixture-design-277159-9780080488271-yiming-kevin-rong-samuel-huang",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080488271.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277159",
                "product_url": "/app/ecom/book/277159/advanced-computer-aided-fixture-design-277159-9780080488271-yiming-kevin-rong-samuel-huang",
                "bisac_codes": [
                    "TEC009000",
                    "TEC009070"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780125947510",
                    "EISBN13": "9780080488271",
                    "EISBN10": "0080488277"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026360248"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277158",
            "attributes": {
                "name": "Advanced Fixed Income Analysis",
                "subtitle": "",
                "description": "This book is aimed at experienced practitioners in the corporate bond markets and is a specialised text for investors and traders. The author relates from both personal experience as well as his own research to bring together subjects of practical importance to bond market practitioners. He introduces the latest techniques used for analysis and interpretation, including:Relative value tradingApproaches to trading and hedgingDynamic analysis of spot and forward ratesInterest rate modellingFitting the yield curveAnalysing the long bond yieldIndex-linked bond analyticsCorporate bond defaults<br><br>* Aspects of advanced analysis for experienced bond market practitioners* Complex topics described in an accessible style* Brings together a wide range of topics in one volume",
                "author": "Moorad Choudhry, Michele Lizzio",
                "slug": "advanced-fixed-income-analysis-277158-9780080488189-moorad-choudhry-michele-lizzio",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080488189.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277158",
                "product_url": "/app/ecom/book/277158/advanced-fixed-income-analysis-277158-9780080488189-moorad-choudhry-michele-lizzio",
                "bisac_codes": [
                    "BUS027000",
                    "BUS004000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780750662635",
                    "EISBN13": "9780080488189",
                    "EISBN10": "0080488188"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026370244"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000277157",
            "attributes": {
                "name": "Electronic Excitations in Organic Based Nanostructures",
                "subtitle": "",
                "description": "The first book devoted to a systematic consideration of electronic excitations and electronic energy transfer in organic <br>crystalline multilayers and organics based nanostructures(quantum wells, quantum wires, <br>quantum dots, microcavities). The ingenious combination of organic with inorganic materials in one and the <br>same hybrid structure is shown to give qualitatively new opto-electronic phenomena, potentially important for <br>applications in nonlinear optics, light emitting devices, photovoltaic cells, lasers and so on. The book will be useful not only <br>for physicists but also for chemists and biologists.To help the nonspecialist reader, <br>three Chapters which contain a tutorial and updated introduction to the physics of electronic excitations in organic <br>and inorganic solids have been included.<br><br>* hybrid Frenkel-Wannier-Mott excitons<br>* microcavities with crystalline and disordered organics <br>* electronic excitation at donor-acceptor interfaces <br>* cold photoconductivity at donor-acceptor interface<br>* cummulative photovoltage<br>* Feorster transfer energy in microcavity<br>* New concepts for LEDs",
                "author": "G. Franco Bassani, V. M. Agranovich",
                "slug": "electronic-excitations-in-organic-based-nanostructures-277157-9780080519210",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080519210.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "277157",
                "product_url": "/app/ecom/book/277157/electronic-excitations-in-organic-based-nanostructures-277157-9780080519210",
                "bisac_codes": [
                    "SCI055000",
                    "TEC021000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780125330312",
                    "EISBN13": "9780080519210",
                    "EISBN10": "0080519210"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026369258"
                    }
                }
            }
        }
    ],
    "meta": {
        "pagination": {
            "page": 75125,
            "pages": 78424,
            "count": 1568477
        }
    }
}

Response Info

Default: None