Product List
GET /services/catalog/products?format=api&page=75126
{ "links": { "first": "https://redshelf.com/services/catalog/products?format=api&page=1", "last": "https://redshelf.com/services/catalog/products?format=api&page=78424", "next": "https://redshelf.com/services/catalog/products?format=api&page=75127", "prev": "https://redshelf.com/services/catalog/products?format=api&page=75125" }, "data": [ { "type": "Product", "id": "00010000277156", "attributes": { "name": "Scene of the Cybercrime", "subtitle": "", "description": "<p>When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. When the first edition of \"Scene of the Cybercrime\" published in 2002, it was one of the first books that educated IT security professionals and law enforcement how to fight Cybercrime. Over the past 5 years a great deal has changed in how computer crimes are perpetrated and subsequently investigated. Also, the IT security and law enforcement communities have dramatically improved their ability to deal with Cybercrime, largely as a result of increased spending and training. According to the 2006 Computer Security Institute's and FBI's joint Cybercrime report: 52% of companies reported unauthorized use of computer systems in the prior 12 months. Each of these incidents is a Cybecrime requiring a certain level of investigation and remediation. And in many cases, an investigation is mandates by federal compliance regulations such as Sarbanes-Oxley, HIPAA, or the Payment Card Industry (PCI) Data Security Standard.</p> <p>Scene of the Cybercrime, Second Edition is a completely revised and updated book which covers all of the technological, legal, and regulatory changes, which have occurred since the first edition. The book is written for dual audience; IT security professionals and members of law enforcement. It gives the technical experts a little peek into the law enforcement world, a highly structured environment where the \"letter of the law\" is paramount and procedures must be followed closely lest an investigation be contaminated and all the evidence collected rendered useless. It also provides law enforcement officers with an idea of some of the technical aspects of how cyber crimes are committed, and how technology can be used to track down and build a case against the criminals who commit them. Scene of the Cybercrime, Second Editions provides a roadmap that those on both sides of the table can use to navigate the legal and technical landscape to understand, prevent, detect, and successfully prosecute the criminal behavior that is as much a threat to the online community as \"traditional\" crime is to the neighborhoods in which we live. Also included is an all new chapter on Worldwide Forensics Acts and Laws. </p> Companion Web site provides custom tools and scripts, which readers can download for conducting digital, forensic investigations Special chapters outline how Cybercrime investigations must be reported and investigated by corporate IT staff to meet federal mandates from Sarbanes Oxley, and the Payment Card Industry (PCI) Data Security Standard Details forensic investigative techniques for the most common operating systems (Windows, Linux and UNIX) as well as cutting edge devices including iPods, Blackberries, and cell phones", "author": "Debra Littlejohn Shinder, Michael Cross", "slug": "scene-of-the-cybercrime-277156-9780080486994-debra-littlejohn-shinder-michael-cross", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080486994.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277156", "product_url": "/app/ecom/book/277156/scene-of-the-cybercrime-277156-9780080486994-debra-littlejohn-shinder-michael-cross", "bisac_codes": [ "COM053000", "COM014000" ], "items_count": null, "identifiers": { "ISBN13": "9781597492768", "EISBN13": "9780080486994", "EISBN10": "0080486991" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026367784" } } } }, { "type": "Product", "id": "00010000277155", "attributes": { "name": "Google Hacking for Penetration Testers", "subtitle": "", "description": "This book helps people find sensitive information on the Web.<br><br>Google is one of the 5 most popular sites on the internet with more than 380 million unique users per month (Nielsen/NetRatings 8/05). But, Googles search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web including: social security numbers, credit card numbers, trade secrets, and federally classified documents. Google Hacking for Penetration Testers Volume 2 shows the art of manipulating Google used by security professionals and system administrators to find this sensitive information and self-police their own organizations.<br><br>Readers will learn how Google Maps and Google Earth provide pinpoint military accuracy, see how bad guys can manipulate Google to create super worms, and see how they can \"mash up\" Google with MySpace, LinkedIn, and more for passive reconaissance.<br><br> Learn Google Searching Basics<br>Explore Googles Web-based Interface, build Google queries, and work with Google URLs.<br> Use Advanced Operators to Perform Advanced Queries<br>Combine advanced operators and learn about colliding operators and bad search-fu.<br> Learn the Ways of the Google Hacker<br>See how to use caches for anonymity and review directory listings and traversal techniques.<br> Review Document Grinding and Database Digging<br>See the ways to use Google to locate documents and then search within the documents to locate information. <br> Understand Googles Part in an Information Collection Framework<br>Learn the principles of automating searches and the applications of data mining.<br> Locate Exploits and Finding Targets<br>Locate exploit code and then vulnerable targets.<br> See Ten Simple Security Searches<br>Learn a few searches that give good results just about every time and are good for a security assessment.<br> Track Down Web Servers<br>Locate and profile web servers, login portals, network hardware and utilities.<br> See How Bad Guys Troll for Data<br>Find ways to search for usernames, passwords, credit card numbers, social security numbers, and other juicy information.<br> Hack Google Services<br>Learn more about the AJAX Search API, Calendar, Blogger, Blog Search, and more.", "author": "Bill Gardner, Johnny Long, Justin Brown", "slug": "google-hacking-for-penetration-testers-277155-9780080484266-bill-gardner-johnny-long-justin-brown", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080484266.png", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277155", "product_url": "/app/ecom/book/277155/google-hacking-for-penetration-testers-277155-9780080484266-bill-gardner-johnny-long-justin-brown", "bisac_codes": [ "COM060040", "COM014000" ], "items_count": null, "identifiers": { "ISBN13": "9781597491761", "EISBN13": "9780080484266", "EISBN10": "0080484263" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026345204" } } } }, { "type": "Product", "id": "00010000277154", "attributes": { "name": "Computer Organization and Design", "subtitle": "The Hardware/Software Interface", "description": "<p>This best selling text on computer organization has been thoroughly updated to reflect the newest technologies. Examples highlight the latest processor designs, benchmarking standards, languages and tools. </p> <p>As with previous editions, a MIPs processor is the core used to present the fundamentals of hardware technologies at work in a computer system. The book presents an entire MIPS instruction setinstruction by instructionthe fundamentals of assembly language, computer arithmetic, pipelining, memory hierarchies and I/O. </p> <p>A new aspect of the third edition is the explicit connection between program performance and CPU performance. The authors show how hardware and software components--such as the specific algorithm, programming language, compiler, ISA and processor implementation--impact program performance. Throughout the book a new feature focusing on program performance describes how to search for bottlenecks and improve performance in various parts of the system. The book digs deeper into the hardware/software interface, presenting a complete view of the function of the programming language and compiler--crucial for understanding computer organization. A CD provides a toolkit of simulators and compilers along with tutorials for using them.</p>For instructor resources click on the grey \"companion site\" button found on the right side of this page.This new edition represents a major revision. New to this edition:* Entire Text has been updated to reflect new technology* 70% new exercises.* Includes a CD loaded with software, projects and exercises to support courses using a number of tools * A new interior design presents defined terms in the margin for quick reference * A new feature, \"Understanding Program Performance\" focuses on performance from the programmer's perspective * Two sets of exercises and solutions, \"For More Practice\" and \"In More Depth,\" are included on the CD * \"Check Yourself\" questions help students check their understanding of major concepts * \"Computers In the Real World\" feature illustrates the diversity of uses for information technology *More detail below...", "author": "David A. Patterson, John L. Hennessy", "slug": "computer-organization-and-design-277154-9780080502571-david-a-patterson-john-l-hennessy", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080502571.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277154", "product_url": "/app/ecom/book/277154/computer-organization-and-design-277154-9780080502571-david-a-patterson-john-l-hennessy", "bisac_codes": [ "COM011000", "SCI000000" ], "items_count": null, "identifiers": { "EISBN13": "9780080502571", "EISBN10": "0080502571" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026363464" } } } }, { "type": "Product", "id": "00010000277153", "attributes": { "name": "Digital Signal Processing System Design", "subtitle": "LabVIEW-Based Hybrid Programming", "description": "<p>Digital Signal Processing System Design combines textual and graphical programming to form a hybrid programming approach, enabling a more effective means of building and analyzing DSP systems. The hybrid programming approach allows the use of previously developed textual programming solutions to be integrated into LabVIEWs highly interactive and visual environment, providing an easier and quicker method for building DSP systems. This book is an ideal introduction for engineers and students seeking to develop DSP systems in quick time.</p> <p>Features:</p> The only DSP laboratory book that combines textual and graphical programming 12 lab experiments that incorporate C/MATLAB code blocks into the LabVIEW graphical programming environment via the MathScripting feature Lab experiments covering basic DSP implementation topics including sampling, digital filtering, fixed-point data representation, frequency domain processing Interesting applications using the hybrid programming approach, such as a software-defined radio system, a 4-QAM Modem, and a cochlear implant simulator The only DSP project book that combines textual and graphical programming 12 Lab projects that incorporate MATLAB code blocks into the LabVIEW graphical programming environment via the MathScripting feature Interesting applications such as the design of a cochlear implant simulator and a software-defined radio system", "author": "Nasser Kehtarnavaz", "slug": "digital-signal-processing-system-design-277153-9780080483450-nasser-kehtarnavaz", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080483450.png", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277153", "product_url": "/app/ecom/book/277153/digital-signal-processing-system-design-277153-9780080483450-nasser-kehtarnavaz", "bisac_codes": [ "COM018000", "TEC008070" ], "items_count": null, "identifiers": { "ISBN13": "9780123744906", "EISBN13": "9780080483450", "EISBN10": "0080483453" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026363926" } } } }, { "type": "Product", "id": "00010000277152", "attributes": { "name": "A Behavioral Approach to Asset Pricing", "subtitle": "", "description": "Behavioral finance is the study of how psychology affects financial decision making and financial markets. It is increasingly becoming the common way of understanding investor behavior and stock market activity. Incorporating the latest research and theory, Shefrin offers both a strong theory and efficient empirical tools that address derivatives, fixed income securities, mean-variance efficient portfolios, and the market portfolio. The book provides a series of examples to illustrate the theory. The second edition continues the tradition of the first edition by being the one and only book to focus completely on how behavioral finance principles affect asset pricing, now with its theory deepened and enriched by a plethora of research since the first edition", "author": "Hersh Shefrin", "slug": "a-behavioral-approach-to-asset-pricing-277152-9780080482248-hersh-shefrin", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080482248.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277152", "product_url": "/app/ecom/book/277152/a-behavioral-approach-to-asset-pricing-277152-9780080482248-hersh-shefrin", "bisac_codes": [ "BUS027000", "BUS069000" ], "items_count": null, "identifiers": { "ISBN13": "9780123743565", "EISBN13": "9780080482248", "EISBN10": "0080482244" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026361797" } } } }, { "type": "Product", "id": "00010000277150", "attributes": { "name": "Wireless Networks", "subtitle": "From the Physical Layer to Communication, Computing, Sensing and Control", "description": "Awarded by the International Calabria's Prize!This multidisciplinary volume originates from lectures presented at a short course on wireless communications in Capri, Italy. This globally attended conference has produced an exceptional book written by pioneers in the field. Lecturers at Capri included pillars in the fields of electromagnetics, communications, information technology and mathematics. As communications technology becomes increasingly wireless, an interdisciplinary viewpoint is necessary for professionals to correct problems and avoid others before they occur.Wireless Networks covers critical technology within WLAN, ad hoc networks, data distribution, TV, radio, and personal mobile devices. As networks become wireless, engineers face increased difficulty securing its malleable boundaries. This book discusses security solutions such as sensor technology that prevent unwanted intrusion. Connectivity is also addressed, featuring chapters on antennas, bandwidth and frequencies. Editors Franceschetti and Stornelli have done a great service to the wireless communications community in creating a compendium that delivers this spectrum of essential information in one reference.<br><br>*Presents a uniquely panoramic view of wireless networks with viewpoints from engineering, computing, and mathematics *The technology is discussed in theory as well as in practice to help engineers design and modify networks *Globally recognized experts share their critical insight on sensor technology, transfering protocol, ad-hoc networks, and more", "author": "Giorgio Franceschetti, Sabatino Stornelli", "slug": "wireless-networks-277150-9780080481791", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080481791.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277150", "product_url": "/app/ecom/book/277150/wireless-networks-277150-9780080481791", "bisac_codes": [ "TEC007000", "TEC041000" ], "items_count": null, "identifiers": { "ISBN13": "9780123694263", "EISBN13": "9780080481791", "EISBN10": "0080481795" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026369425" } } } }, { "type": "Product", "id": "00010000277151", "attributes": { "name": "XML Net Developers Guide", "subtitle": "", "description": "Compete with the big players in today's E-commerce marketplace<br><br>Electronic Data Interchange (EDI) has long been the standard for large business enterprises to communicate in the B2B marketplace. However, EDI is a difficult technology - the cost and support of EDI standards is often too much for a small or medium business enterprise to bear. To compete in the current E-commerce marketplace, many organizations are beginning to take an interest in the interoperability that exists between XML (Extensible Markup Language) and EDI. <br> <br>XML .NET Developers Guide is written for information technology professionals responsible for supporting data management in both small and large organizations. This book appeals to both individuals working with an existing EDI environment, and small to medium businesses looking to increase their market presence by competing with current EDI players using XML/EDI.<br><br>XML/EDI is quickly becoming an industry standard, however there is a noticeable lack of quality reference material for programmers looking to adopt these standards.<br>You can take it with you. The book comes with Syngress' revolutionary Wallet CD containing a printable HTML version of the book, all of the source code, and demo versions of popular XML/EDI translation tools <br>Up to the minute web-based support with [email protected]", "author": "Syngress", "slug": "xml-net-developers-guide-277151-9780080481814-syngress", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080481814.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277151", "product_url": "/app/ecom/book/277151/xml-net-developers-guide-277151-9780080481814-syngress", "bisac_codes": [ "COM051000", "COM014000" ], "items_count": null, "identifiers": { "ISBN13": "9781928994473", "EISBN13": "9780080481814", "EISBN10": "0080481817" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026360524" } } } }, { "type": "Product", "id": "00010000277149", "attributes": { "name": "Wireless Hacking: Projects for Wi-Fi Enthusiasts", "subtitle": "Cut the cord and discover the world of wireless hacks!", "description": "Sales of wireless LANs to home users and small businesses will soar this year, with products using IEEE 802.11 (Wi-Fi) technology leading the way, according to a report by Cahners research. Worldwide, consumers will buy 7.3 million wireless LAN nodes--which include client and network hub devices--up from about 4 million last year. This third book in the \"HACKING\" series from Syngress is written by the SoCalFreeNet Wireless Users Group and will cover 802.11a/b/g (Wi-Fi) projects teaching these millions of Wi-Fi users how to \"mod\" and \"hack\" Wi-Fi access points, network cards, and antennas to run various Linux distributions and create robust Wi-Fi networks.<br><br>Cahners predicts that wireless LANs next year will gain on Ethernet as the most popular home network technology. Consumers will hook up 10.9 million Ethernet nodes and 7.3 million wireless out of a total of 14.4 million home LAN nodes shipped. This book will show Wi-Fi enthusiasts and consumers of Wi-Fi LANs who want to modify their Wi-Fi hardware how to build and deploy homebrew Wi-Fi networks, both large and small. Wireless LANs next year will gain on Ethernet as the most popular home network technology. Consumers will hook up 10.9 million Ethernet nodes and 7.3 million wireless clients out of a total of 14.4 million home LAN nodes shipped. This book will use a series of detailed, inter-related projects to teach readers how to modify their Wi-Fi hardware to increase power and performance to match that of far more expensive enterprise networking products. Also features hacks to allow mobile laptop users to actively seek wireless connections everywhere they go! The authors are all members of the San Diego Wireless Users Group, which is famous for building some of the most innovative and powerful \"home brew\" Wi-Fi networks in the world.", "author": "Lee Barken", "slug": "wireless-hacking-projects-for-wi-fi-enthusiasts-277149-9780080481784-lee-barken", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080481784.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277149", "product_url": "/app/ecom/book/277149/wireless-hacking-projects-for-wi-fi-enthusiasts-277149-9780080481784-lee-barken", "bisac_codes": [ "COM053000", "COM014000" ], "items_count": null, "identifiers": { "ISBN13": "9781931836371", "EISBN13": "9780080481784", "EISBN10": "0080481787" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026363373" } } } }, { "type": "Product", "id": "00010000277148", "attributes": { "name": "Windows to Linux Migration Toolkit", "subtitle": "Your Windows to Linux Extreme Makeover", "description": "This book will teach people how to migrate systems from Windows to Linux. It provides migration process planning, automated migration scripts, anti-virus / anti-spam solutions, and specific migration and deployment details for all relevant technologies. IT professionals who wish to maximize the value of their Windows to Linux migration services will find this book valuable. The book will help them fine-tune their migration services to make them more efficient, thorough, feature-enhanced, and cost-effective by utilizing migration scripts and best practices gleaned from the author's many years of real-world migrations in large and small companies.<br><br>* The book and fully functioning scripts on the CD-ROM work for migrations from Windows NT or Windows 2000 to any Linux distribution. <br>* David Allen has done over 25,000 user migrations from Windows to Linux. <br>* Microsoft will stop supporting Windows NT in December 2004 forcing over 2 million enterprise customers to migrate from Windows NT to a new sever operating system. Both IBM and Dell are offering enterprise servers running Linux which will allow customers to realize a 50% reduction in TCO. In 2003 Linux servers represented the largest growth segment in the Server market, and all the major research groups indicate this trend will continue through t least 2007.", "author": "David Allen", "slug": "windows-to-linux-migration-toolkit-277148-9780080481760-david-allen", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080481760.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277148", "product_url": "/app/ecom/book/277148/windows-to-linux-migration-toolkit-277148-9780080481760-david-allen", "bisac_codes": [ "COM053000", "COM014000" ], "items_count": null, "identifiers": { "ISBN13": "9781931836395", "EISBN13": "9780080481760", "EISBN10": "0080481760" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026358781" } } } }, { "type": "Product", "id": "00010000277147", "attributes": { "name": "Windows 2000 Active Directory", "subtitle": "", "description": "Updated coverage of the most confusing Windows 2000 component in this new edition of a Syngress bestseller.<br>Active Directory Services dramatically changes the way IT professionals design, plan, configure and administer their Windows NT networks. The primary benefits of Active Directory Services are its extensibility, scalability, and ease of management as compared to prior generations of Windows NT. Systems Engineers will probably spend much of their time over the next several years planning for and deploying Active Directory Services in many different environments. Windows 2000 Active Directory, Second Edition gives IT professionals a head start; it provides updated coverage of everything they will need to succeed. Many Windows 2000 administrators are struggling with Active Directory and need a comprehensive book on the subject The first completely updated book on Active Directory to hit the market", "author": "Syngress", "slug": "windows-2000-active-directory-277147-9780080481746-syngress", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080481746.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277147", "product_url": "/app/ecom/book/277147/windows-2000-active-directory-277147-9780080481746-syngress", "bisac_codes": [ "COM043000", "COM014000" ], "items_count": null, "identifiers": { "ISBN13": "9781928994602", "EISBN13": "9780080481746", "EISBN10": "0080481744" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026346518" } } } }, { "type": "Product", "id": "00010000277146", "attributes": { "name": "Webmasters Guide To The Wireless Internet", "subtitle": "", "description": "The wireless Web is a reality - don't get left behind!<br><br>The wireless Web is not a future dream. It is here today. Already, more than 20 million people have access the Internet through PDAs, mobile phones, pagers and other wireless devices. <br>What will people find on the Wireless Internet? This is the question that every Webmaster and Web developer is being challenged to answer. The Webmaster's Guide to the Wireless Internet provides the Wireless Webmaster with all of the tools necessary to build the next generation Internet. Packed with the essential information they need to design, develop, and secure robust, e-commerce enabled wireless Web sites. This book is written for advanced Webmasters who are experienced with conventional Web site design and are now faced with the challenge of creating sites that fit on the display of a Web enabled phone or PDA.<br><br>The rapid expansion of wireless devices presents a huge challenge for Webmasters - this book addresses that need for reliable information<br>There are lots of books for wireless developers - this is the first designed specifically for Webmasters <br>Looks at security issues in a Wireless environment", "author": "Syngress", "slug": "webmasters-guide-to-the-wireless-internet-277146-9780080481715-syngress", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080481715.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277146", "product_url": "/app/ecom/book/277146/webmasters-guide-to-the-wireless-internet-277146-9780080481715-syngress", "bisac_codes": [ "COM043000", "COM014000" ], "items_count": null, "identifiers": { "ISBN13": "9781928994466", "EISBN13": "9780080481715", "EISBN10": "008048171X" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026364866" } } } }, { "type": "Product", "id": "00010000277144", "attributes": { "name": "WarDriving: Drive, Detect, Defend", "subtitle": "A Guide to Wireless Security", "description": "The practice of WarDriving is a unique combination of hobby, sociological research, and security assessment. The act of driving or walking through urban areas with a wireless-equipped laptop to map both protected and un-protected wireless networks has sparked intense debate amongst lawmakers, security professionals, and the telecommunications industry. This first ever book on WarDriving is written from the inside perspective of those who have created the tools that make WarDriving possible and those who gather, analyze, and maintain data on all secured and open wireless access points in very major, metropolitan area worldwide. These insiders also provide the information to secure your wireless network before it is exploited by criminal hackers.<br><br>* Provides the essential information needed to protect and secure wireless networks<br>* Written from the inside perspective of those who have created the tools for WarDriving and those who gather, maintain and analyse data on wireless networks<br>* This is the first book to deal with the hot topic of WarDriving", "author": "Chris Hurley", "slug": "wardriving-drive-detect-defend-277144-9780080481685-chris-hurley", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080481685.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277144", "product_url": "/app/ecom/book/277144/wardriving-drive-detect-defend-277144-9780080481685-chris-hurley", "bisac_codes": [ "COM053000", "COM014000" ], "items_count": null, "identifiers": { "ISBN13": "9781931836036", "EISBN13": "9780080481685", "EISBN10": "008048168X" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026371220" } } } }, { "type": "Product", "id": "00010000277143", "attributes": { "name": "Vulnerability Assessment of Physical Protection Systems", "subtitle": "", "description": "<p>Vulnerability Assessment of Physical Protection Systems guides the reader through the topic of physical security with a unique, detailed and scientific approach. The book describes the entire vulnerability assessment (VA) process, from the start of planning through final analysis and out brief to senior management. It draws heavily on the principles introduced in the authors best-selling Design and Evaluation of Physical Protection Systems and allows readers to apply those principles and conduct a VA that is aligned with system objectives and achievable with existing budget and personnel resources.</p> <p>The text covers the full spectrum of a VA, including negotiating tasks with the customer; project management and planning of the VA; team membership; and step-by-step details for performing the VA, data collection and analysis. It also provides important notes on how to use the VA to suggest design improvements and generate multiple design options. The text ends with a discussion of how to out brief the results to senior management in order to gain their support and demonstrate the return on investment of their security dollar. Several new tools are introduced to help readers organize and use the information at their sites and allow them to mix the physical protection system with other risk management measures to reduce risk to an acceptable level at an affordable cost and with the least operational impact.</p> <p>This book will be of interest to physical security professionals, security managers, security students and professionals, and government officials.</p> Guides the reader through the topic of physical security doing so with a unique, detailed and scientific approach Takes the reader from beginning to end and step-by-step through a Vulnerability Assessment Over 150 figures and tables to illustrate key concepts", "author": "Mary Lynn Garcia", "slug": "vulnerability-assessment-of-physical-protection-systems-277143-9780080481678-mary-lynn-garcia", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080481678.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277143", "product_url": "/app/ecom/book/277143/vulnerability-assessment-of-physical-protection-systems-277143-9780080481678-mary-lynn-garcia", "bisac_codes": [ "TEC009060", "SCI070000" ], "items_count": null, "identifiers": { "ISBN13": "9780750677882", "EISBN13": "9780080481678", "EISBN10": "0080481671" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026359819" } } } }, { "type": "Product", "id": "00010000277142", "attributes": { "name": "Voice Over IPv6", "subtitle": "Architectures for Next Generation VoIP Networks", "description": "IPv6 (Internet Protocol version 6) is the future of Internet telephony. And this book is your guide to that future.IPv6 is the replacement for the currently used IPv4 (Internet Protocol version 4). IPv6 will offer increased IP addresses (full 128-bit addresses, compared to the 32-bit addresses of IPv4), enhanced security, and greater robustness. It will also be fully backwards compatible with existing IPv4 systems. These capabilities will finally make Internet telephony a viable competitor to conventional switched telephone networks. In this book, Dan Minoli clearly explains IPv6 and how telephone networks can be built on its foundations.This is not just another IPv6 book; instead, it focuses on those aspects of IPv6 relevant to Internet telephony systems and voice networks. Minoli uses a compare/contrast approach, exploring where IPv6 is similar to IPv4 and where it differs, to let you quickly grasp the essence of IPv6 and the similarities (and differences) between current IPv4-based systems and IPv6-based systems. If you will be designing, implementing, or maintaining the next generation of Internet telephony systems, then you need the information in this book!*Explains the essential concepts of IPv6 and how they relate to Internet telephony*Describes how Internet telephony systems using IPv6 are different from, and better than, Internet telephony systems based on the older IPv4 standard*Discusses how to transition existing IPv4 Internet telephony systems and conventional switched systems to IPv6-based systems*Extensive treatment of security issues, including IP layer encryption and authentication methods*Explains connection techniques, including plug and play approaches, for equipment used in IPv6 systems<br><br>* The first title describing how the next generation Internet protocolIPv6can be used for Internet telephony* Explains IPv6 as it applies to Internet telephony (VoIP) * Shows how IPv6 gives better security, QoS, and signal integrity in Internet telephony", "author": "Daniel Minoli", "slug": "voice-over-ipv6-277142-9780080481654-daniel-minoli", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080481654.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277142", "product_url": "/app/ecom/book/277142/voice-over-ipv6-277142-9780080481654-daniel-minoli", "bisac_codes": [ "TEC007000", "TEC041000" ], "items_count": null, "identifiers": { "ISBN13": "9780750682060", "EISBN13": "9780080481654", "EISBN10": "0080481655" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026360743" } } } }, { "type": "Product", "id": "00010000277141", "attributes": { "name": ".NET Mobile Web Developers Guide", "subtitle": "", "description": "Introducing Microsoft's flagship wireless development tool<br>The .NET Mobile Web Developer's Guide will provide readers with a solid guide to developing mobile applications using Microsoft technologies. The focus of this book is on using ASP.NET and the .NET mobile SDK. It provides an introduction to the .NET platform and goes into moderate details on ASP.NET to allow readers to start developing ASP.NET applications. In addition, this book will give the readers the insight to use the various Microsoft technologies for developing mobile applications.<br>This book assumes the readers have experience in developing web applications and are familiar with any one of the server-side technologies like ASP, JSP or PHP. The first book available on Microsoft's cornerstone wireless development tool Best selling, high profile authors. Wei Meng Lee and Shelley Powers are frequent speakers at all of the major developer conferences have previously authored best selling books for O'Reilly and Associates, Wrox Press, SAMS and Que Comes with wallet-sized CD containing a printable HTML version of the book, all of the source code examples and demos of popular ASP .NET and .NET Mobile programming tools Comprehensive Coverage of the .NET Mobile SDK and ASP.NET for Mobile Web developers", "author": "Syngress", "slug": "net-mobile-web-developers-guide-277141-9780080481838-syngress", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080481838.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277141", "product_url": "/app/ecom/book/277141/net-mobile-web-developers-guide-277141-9780080481838-syngress", "bisac_codes": [ "COM051000", "COM014000" ], "items_count": null, "identifiers": { "ISBN13": "9781928994565", "EISBN13": "9780080481838", "EISBN10": "0080481833" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026354874" } } } }, { "type": "Product", "id": "00010000277140", "attributes": { "name": "Value Creation from E-Business Models", "subtitle": "", "description": "Value Creation from E-Business Models provides a thorough analysis of what constitutes an e-business model. Unlike many e-business books available, this text draws together theoretical and empirical contributions from leading academic scholars in the field of management information systems. Divided into four parts, E-Business Models and Taxonomies; E-Business Markets; E-Business Customer Performance Measurement; and E-Business Vendor Applications and Services, this book is the critical dissection of E-Business that today's academic community needs.<br><br>* World class academic contributors brought together in one volume <br>* Demonstrates that there are e-business models which create value for customers and vendors alike<br>* Learn from the lessons of the past five years in developing and implementing e-business models", "author": "Wendy Currie", "slug": "value-creation-from-e-business-models-277140-9780080481562", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080481562.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277140", "product_url": "/app/ecom/book/277140/value-creation-from-e-business-models-277140-9780080481562", "bisac_codes": [ "COM039000", "COM014000" ], "items_count": null, "identifiers": { "ISBN13": "9780750661409", "EISBN13": "9780080481562", "EISBN10": "0080481566" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026362305" } } } }, { "type": "Product", "id": "00010000277139", "attributes": { "name": "Video Demystified", "subtitle": "", "description": "This international bestseller and essential reference is the \"bible\" for digital video engineers and programmers worldwide. This is by far the most informative analog and digital video reference available, includes the hottest new trends and cutting-edge developments in the field.Video Demystified, Fourth Edition is a \"one stop\" reference guide for the various digital video technologies. The fourth edition is completely updated with all new chapters on MPEG-4, H.264, SDTV/HDTV, ATSC/DVB, and Streaming Video (Video over DSL, Ethernet, etc.), as well as discussions of the latest standards throughout. The accompanying CD-ROM is updated to include a unique set of video test files in the newest formats.<br><br>*This essential reference is the \"bible\" for digital video engineers and programmers worldwide *Contains all new chapters on MPEG-4, H.264, SDTV/HDTV, ATSC/DVB, and Streaming Video *Completely revised with all the latest and most up-to-date industry standards", "author": "Keith Jack", "slug": "video-demystified-277139-9780080481623-keith-jack", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080481623.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277139", "product_url": "/app/ecom/book/277139/video-demystified-277139-9780080481623-keith-jack", "bisac_codes": [ "TEC008000", "TEC007000" ], "items_count": null, "identifiers": { "ISBN13": "9780750678223", "EISBN13": "9780080481623", "EISBN10": "0080481620" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026357581" } } } }, { "type": "Product", "id": "00010000277138", "attributes": { "name": "VB.Net Web Developer's Guide", "subtitle": "", "description": "Visual Basic has long been the language of choice when designing Windows-based applications and the Web. Touted as both the most popular and productive computing language, Visual Basic has amassed quite a following of devoted programmers, and is a sought after programming skill. With the introduction of .NET Enterprise, Microsoft launch VB.NET, offering a streamlined, simplified version of Visual Basic language. With increased power, scalability, functionality and reliability, VB.NET is positioned to be the most productive tool in a programmer's toolbox. <br><br>VB.NET Developer's Guide is written for previous Visual Basic Programmers looking to harness the power of the new features and functionality incorporated in Visual Basic.NET.<br><br>Timely coverage of newly released product which Visual Basic users will be eager to learn<br>VB.NET Developer's Guide is one of the first comprehensive reference for programmers and developers anxious to learn about the new technology", "author": "Syngress", "slug": "vbnet-web-developers-guide-277138-9780080481593-syngress", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080481593.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277138", "product_url": "/app/ecom/book/277138/vbnet-web-developers-guide-277138-9780080481593-syngress", "bisac_codes": [ "COM051200", "COM014000" ], "items_count": null, "identifiers": { "ISBN13": "9781928994480", "EISBN13": "9780080481593", "EISBN10": "0080481590" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026355668" } } } }, { "type": "Product", "id": "00010000277137", "attributes": { "name": "User-Centered Design Stories", "subtitle": "Real-World UCD Case Studies", "description": "<p>User-Centered Design Stories is the first user-centered design casebook with cases covering the key tasks and issues facing UCD practitioners today. Intended for both students and practitioners, this book follows the Harvard Case study method, where the reader is placed in the role of the decision-maker in a real-life professional situation.</p> <p>In this book, the reader is asked to analyze dozens of UCD work situations and propose solutions for the problem set. The problems posed in the cases cover a wide variety of key tasks and issues faced by practitioners, including those related to organizational/managerial topics, UCD methods and processes, and technical/ project issues.</p> <p>The benefit of the casebook and its organization is that it offers new practitioners (as well as experienced practitioners working in new settings) valuable practice in decision-making that cannot be obtained by simply reading a book or attending a seminar.</p> The first User-Centered Design Casebook, with cases covering the key tasks and issues facing UCD practitioners today. Each chapter based on real world cases with complex problems, giving readers as close to a real-world experience as possible. Offers \"the things you don't learn in school,\" such as innovative and hybrid solutions that were actually used on the problems discussed.", "author": "Carol Righi, Janice James", "slug": "user-centered-design-stories-277137-9780080481555-carol-righi-janice-james", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080481555.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277137", "product_url": "/app/ecom/book/277137/user-centered-design-stories-277137-9780080481555-carol-righi-janice-james", "bisac_codes": [ "COM070000", "077" ], "items_count": null, "identifiers": { "ISBN13": "9780123706089", "EISBN13": "9780080481555", "EISBN10": "0080481558" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026359499" } } } }, { "type": "Product", "id": "00010000277136", "attributes": { "name": "A Unified Framework for Video Summarization, Browsing & Retrieval", "subtitle": "with Applications to Consumer and Surveillance Video", "description": "Large volumes of video content can only be easily accessed by the use of rapid browsing and retrieval techniques. Constructing a video table of contents (ToC) and video highlights to enable end users to sift through all this data and find what they want, when they want are essential. This reference puts forth a unified framework to integrate these functions supporting efficient browsing and retrieval of video content. The authors have developed a cohesive way to create a video table of contents, video highlights, and video indices that serve to streamline the use of applications in consumer and surveillance video applications. The authors discuss the generation of table of contents, extraction of highlights, different techniques for audio and video marker recognition, and indexing with low-level features such as color, texture, and shape. Current applications including this summarization and browsing technology are also reviewed. Applications such as event detection in elevator surveillance, highlight extraction from sports video, and image and video database management are considered within the proposed framework. This book presents the latest in research and readers will find their search for knowledge completely satisfied by the breadth of the information covered in this volume.<br><br>* Offers the latest in cutting edge research and applications in surveillance and consumer video* Presentation of a novel unified framework aimed at successfully sifting through the abundance of footage gathered daily at shopping malls, airports, and other commercial facilities* Concisely written by leading contributors in the signal processing industry with step-by-step instruction in building video ToC and indices", "author": "Ziyou Xiong, Regunathan Radhakrishnan, Ajay Divakaran, Zou Yong-Rui, Thomas S. Huang", "slug": "a-unified-framework-for-video-summarization-browsing-retrieval-277136-9780080481531-ziyou-xiong-regunathan-radhakrishnan-ajay-divakaran-zou-yong-rui-thomas-s-huang", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080481531.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277136", "product_url": "/app/ecom/book/277136/a-unified-framework-for-video-summarization-browsing-retrieval-277136-9780080481531-ziyou-xiong-regunathan-radhakrishnan-ajay-divakaran-zou-yong-rui-thomas-s-huang", "bisac_codes": [ "TEC007000", "COM018000" ], "items_count": null, "identifiers": { "ISBN13": "9780123693877", "EISBN13": "9780080481531", "EISBN10": "0080481531" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026359473" } } } } ], "meta": { "pagination": { "page": 75126, "pages": 78424, "count": 1568477 } } }
Response Info
Default: None