Product List
GET /services/catalog/products?format=api&page=75130
{ "links": { "first": "https://redshelf.com/services/catalog/products?format=api&page=1", "last": "https://redshelf.com/services/catalog/products?format=api&page=78429", "next": "https://redshelf.com/services/catalog/products?format=api&page=75131", "prev": "https://redshelf.com/services/catalog/products?format=api&page=75129" }, "data": [ { "type": "Product", "id": "00010000277171", "attributes": { "name": "Communication Networking", "subtitle": "An Analytical Approach", "description": "<p>Communication Networking is a comprehensive, effectively organized introduction to the realities of communication network engineering. Written for both the workplace and the classroom, this book lays the foundation and provides the answers required for building an efficient, state-of-the-art networkone that can expand to meet growing demand and evolve to capitalize on coming technological advances. It focuses on the three building blocks out of which a communication network is constructed: multiplexing, switching, and routing. The discussions are based on the viewpoint that communication networking is about efficient resource sharing.</p> <p>The progression is natural: the book begins with individual physical links and proceeds to their combination in a network. The approach is analytical: discussion is driven by mathematical analyses of and solutions to specific engineering problems. Fundamental concepts are explained in detail and design issues are placed in context through real world examples from current technologies. The text offers in-depth coverage of many current topics, including network calculus with deterministically-constrained traffic; congestion control for elastic traffic; packet switch queuing; switching architectures; virtual path routing; and routing for quality of service. It also includes more than 200 hands-on exercises and class-tested problems, dozens of schematic figures, a review of key mathematical concepts, and a glossary.</p> <p>This book will be of interest to networking professionals whose work is primarily architecture definition and implementation, i.e., network engineers and designers at telecom companies, industrial research labs, etc. It will also appeal to final year undergrad and first year graduate students in EE, CE, and CS programs.</p> Systematically uses mathematical models and analyses to drive the development of a practical understanding of core network engineering problems. Provides in-depth coverage of many current topics, including network calculus with deterministically-constrained traffic, congestion control for elastic traffic, packet switch queuing, switching architectures, virtual path routing, and routing for quality of service. Includes over 200 hands-on exercises and class-tested problems, dozens of schematic figures, a review of key mathematical concepts, and a glossary.", "author": "Anurag Kumar, D. Manjunath, Joy Kuri", "slug": "communication-networking-277171-9780080488516-anurag-kumar-d-manjunath-joy-kuri", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080488516.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277171", "product_url": "/app/ecom/book/277171/communication-networking-277171-9780080488516-anurag-kumar-d-manjunath-joy-kuri", "bisac_codes": [ "COM043000", "077" ], "items_count": null, "identifiers": { "ISBN13": "9780124287518", "EISBN13": "9780080488516", "EISBN10": "008048851X" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026368413" } } } }, { "type": "Product", "id": "00010000277170", "attributes": { "name": "Buffer Overflow Attacks", "subtitle": "Detect, Exploit, Prevent", "description": "The SANS Institute maintains a list of the \"Top 10 Software Vulnerabilities.\" At the current time, over half of these vulnerabilities are exploitable by Buffer Overflow attacks, making this class of attack one of the most common and most dangerous weapon used by malicious attackers. This is the first book specifically aimed at detecting, exploiting, and preventing the most common and dangerous attacks.<br><br>Buffer overflows make up one of the largest collections of vulnerabilities in existence; And a large percentage of possible remote exploits are of the overflow variety. Almost all of the most devastating computer attacks to hit the Internet in recent years including SQL Slammer, Blaster, and I Love You attacks. If executed properly, an overflow vulnerability will allow an attacker to run arbitrary code on the victims machine with the equivalent rights of whichever process was overflowed. This is often used to provide a remote shell onto the victim machine, which can be used for further exploitation.<br><br>A buffer overflow is an unexpected behavior that exists in certain programming languages. This book provides specific, real code examples on exploiting buffer overflow attacks from a hacker's perspective and defending against these attacks for the software developer. Over half of the \"SANS TOP 10 Software Vulnerabilities\" are related to buffer overflows. None of the current-best selling software security books focus exclusively on buffer overflows. This book provides specific, real code examples on exploiting buffer overflow attacks from a hacker's perspective and defending against these attacks for the software developer.", "author": "Jason Deckard", "slug": "buffer-overflow-attacks-277170-9780080488424-jason-deckard", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080488424.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277170", "product_url": "/app/ecom/book/277170/buffer-overflow-attacks-277170-9780080488424-jason-deckard", "bisac_codes": [ "COM053000", "COM014000" ], "items_count": null, "identifiers": { "ISBN13": "9781932266672", "EISBN13": "9780080488424", "EISBN10": "0080488420" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026353552" } } } }, { "type": "Product", "id": "00010000277169", "attributes": { "name": "Principles and Practices of Interconnection Networks", "subtitle": "", "description": "One of the greatest challenges faced by designers of digital systems is optimizing the communication and interconnection between system components. Interconnection networks offer an attractive and economical solution to this communication crisis and are fast becoming pervasive in digital systems. Current trends suggest that this communication bottleneck will be even more problematic when designing future generations of machines. Consequently, the anatomy of an interconnection network router and science of interconnection network design will only grow in importance in the coming years.This book offers a detailed and comprehensive presentation of the basic principles of interconnection network design, clearly illustrating them with numerous examples, chapter exercises, and case studies. It incorporates hardware-level descriptions of concepts, allowing a designer to see all the steps of the process from abstract design to concrete implementation. Case studies throughout the book draw on extensive author experience in designing interconnection networks over a period of more than twenty years, providing real world examples of what works, and what doesn't. Tightly couples concepts with implementation costs to facilitate a deeper understanding of the tradeoffs in the design of a practical network. A set of examples and exercises in every chapter help the reader to fully understand all the implications of every design decision.", "author": "William James Dally, Brian Patrick Towles", "slug": "principles-and-practices-of-interconnection-networks-277169-9780080497808-william-james-dally-brian-patrick-towles", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080497808.png", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277169", "product_url": "/app/ecom/book/277169/principles-and-practices-of-interconnection-networks-277169-9780080497808-william-james-dally-brian-patrick-towles", "bisac_codes": [ "COM011000", "TEC007000" ], "items_count": null, "identifiers": { "ISBN13": "9780122007514", "EISBN13": "9780080497808", "EISBN10": "0080497802" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026348961" } } } }, { "type": "Product", "id": "00010000277168", "attributes": { "name": "How to Cheat at Managing Microsoft Operations Manager 2005", "subtitle": "", "description": "Microsoft Operations Manager (MOM) is a network monitoring tool that provides enterprise-class event and performance management for Windows Server System technologies. MOM's event and performance management tools discover problems before system administrators would ever find them, thereby enabling administrators to lower their costs of operations and simplify management of their Windows Server System infrastructure. MOM can notify system administrators of overloaded processors, depleted memory, or failed network connections affecting their Windows servers long before these problems bother users.<br><br>Microsoft Operations Manager (MOM) 2005 delivers open and scalable enterprise-class operational management by providing comprehensive event management, proactive monitoring and alerting, reporting and trend analysis, and system and application specific knowledge and tasks to improve the manageability of Windows Server System environments, including Windows, Exchange, SQL, IIS, Active Directory etc.<br><br>* A users guide to Microsoft Operations Manager (MOM) enabling a cost reduction and simplification in managing your Windows Server System Infrastructure <br>* Companion Web site for book offers dozens of customized scripts and tools for automating MOM 2005 and many other Windows Server products <br>* There is no other compact resource like this for this core, Microsoft Server product", "author": "Anthony Piltzecker", "slug": "how-to-cheat-at-managing-microsoft-operations-manager-2005-277168-9780080488462-anthony-piltzecker", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080488462.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277168", "product_url": "/app/ecom/book/277168/how-to-cheat-at-managing-microsoft-operations-manager-2005-277168-9780080488462-anthony-piltzecker", "bisac_codes": [ "COM053000", "COM014000" ], "items_count": null, "identifiers": { "ISBN13": "9781597492515", "EISBN13": "9780080488462", "EISBN10": "0080488463" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026348019" } } } }, { "type": "Product", "id": "00010000277167", "attributes": { "name": "Architecture and Patterns for IT Service Management, Resource Planning, and Governance: Making Shoes for the Cobbler's Children", "subtitle": "", "description": "<p>Architecture and Patterns for IT Service Management, Resource Planning, and Governance: Making Shoes for the Cobbler's Children provides an independent examination of developments in Enterprise Resource Planning for Information.</p> <p>Major companies, research firms, and vendors are offering Enterprise Resource Planning for Information Technology, which they label as ERP for IT, IT Resource Planning and related terms.</p> <p>This book presents on-the-ground coverage of enabling IT governance in architectural detail, which can be used to define a strategy for immediate execution. It fills the gap between high-level guidance on IT governance and detailed discussions about specific vendor technologies. It provides a unique value chain approach to integrating the COBIT, ITIL, and CMM frameworks into a coherent, unified whole. It presents a field-tested, detailed conceptual information model with definitions and usage scenarios, mapped to both process and system architectures.</p> <p>This book is recommended for practitioners and managers engaged in IT support in large companies, particularly those who are information architects, enterprise architects, senior software engineers, program/project managers, and IT managers/directors. </p>", "author": "Charles T. Betz", "slug": "architecture-and-patterns-for-it-service-management-resource-planning-and-governance-making-shoes-for-the-cobblers-children-277167-9780080488349-charles-t-betz", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080488349.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277167", "product_url": "/app/ecom/book/277167/architecture-and-patterns-for-it-service-management-resource-planning-and-governance-making-shoes-for-the-cobblers-children-277167-9780080488349-charles-t-betz", "bisac_codes": [ "COM021000", "COM005000" ], "items_count": null, "identifiers": { "ISBN13": "9780123705938", "EISBN13": "9780080488349", "EISBN10": "008048834X" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026347926" } } } }, { "type": "Product", "id": "00010000277166", "attributes": { "name": "Black Hat Physical Device Security: Exploiting Hardware and Software", "subtitle": "", "description": "<p>Black Hat, Inc. is the premier, worldwide provider of security training, consulting, and conferences. In Black Hat Physical Device Security: Exploiting Hardware and Software, the Black Hat experts show readers the types of attacks that can be done to physical devices such as motion detectors, video monitoring and closed circuit systems, authentication systems, thumbprint and voice print devices, retina scans, and more.</p> <p>The Black Hat Briefings held every year in Las Vegas, Washington DC, Amsterdam, and Singapore continually expose the greatest threats to cyber security and provide IT mind leaders with ground breaking defensive techniques. There are no books that show security and networking professionals how to protect physical security devices. This unique book provides step-by-step instructions for assessing the vulnerability of a security device such as a retina scanner, seeing how it might be compromised, and taking protective measures. The book covers the actual device as well as the software that runs it. By way of example, a thumbprint scanner that allows the thumbprint to remain on the glass from the last person could be bypassed by pressing a \"gummy bear\" piece of candy against the glass so that the scan works against the last thumbprint that was used on the device. This is a simple example of an attack against a physical authentication system.</p> First book by world-renowned Black Hat, Inc. security consultants and trainers First book that details methods for attacking and defending physical security devices Black Hat, Inc. is the premier, worldwide provider of security training, consulting, and conferences", "author": "Drew Miller", "slug": "black-hat-physical-device-security-exploiting-hardware-and-software-277166-9780080488400-drew-miller", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080488400.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277166", "product_url": "/app/ecom/book/277166/black-hat-physical-device-security-exploiting-hardware-and-software-277166-9780080488400-drew-miller", "bisac_codes": [ "COM053000", "COM014000" ], "items_count": null, "identifiers": { "ISBN13": "9781932266818", "EISBN13": "9780080488400", "EISBN10": "0080488404" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026369257" } } } }, { "type": "Product", "id": "00010000277165", "attributes": { "name": "Aircraft Structures for Engineering Students", "subtitle": "", "description": "Aircraft Structures for Engineering Students is the leading self contained aircraft structures course text. It covers all fundamental subjects, including elasticity, structural analysis, airworthiness and aeroelasticity. Now in its fourth edition, the author has revised and updated the text throughout and added new case study and worked example material to make the text even more accessible. The leading Aircraft Structures text, covering a complete course from basic structural mechanics to finite element analysis Enhanced pedagogy with additional case studies, worked examples and home work exercises", "author": "T.H.G. Megson", "slug": "aircraft-structures-for-engineering-students-277165-9780080488318-thg-megson", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080488318.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277165", "product_url": "/app/ecom/book/277165/aircraft-structures-for-engineering-students-277165-9780080488318-thg-megson", "bisac_codes": [ "TEC002000", "TEC009070" ], "items_count": null, "identifiers": { "ISBN13": "9780750667395", "EISBN13": "9780080488318", "EISBN10": "0080488315" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026367549" } } } }, { "type": "Product", "id": "00010000277164", "attributes": { "name": "Biometric Technologies and Verification Systems", "subtitle": "", "description": "Biometric Technologies and Verification Systems is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of-the-art in biometric verification/authentication, identification and system design principles. It also provides a step-by-step discussion of how biometrics works; how biometric data in human beings can be collected and analyzed in a number of ways; how biometrics are currently being used as a method of personal identification in which people are recognized by their own unique corporal or behavioral characteristics; and how to create detailed menus for designing a biometric verification system. <br><br>Only biometrics verification/authentication is based on the identification of an intrinsic part of a human being. Tokens, such as smart cards, magnetic stripe cards, and physical keys can be lost, stolen, or duplicated. Passwords can be forgotten, shared, or unintentionally observed by a third party. Forgotten passwords and lost \"smart cards\" are a nuisance for users and an expensive time-waster for system administrators. Biometric security solutions offer some unique advantages for identifying and verifying/ authenticating human beings over more traditional security methods. This book will serve to identify the various security applications biometrics can play a highly secure and specific role in.<br><br>* Contains elements such as Sidebars, Tips, Notes and URL links<br>* Heavily illustrated with over 150 illustrations, screen captures, and photographs<br>* Details the various biometric technologies and how they work while providing a discussion of the economics, privacy issues and challenges of implementing biometric security solutions", "author": "John R. Vacca", "slug": "biometric-technologies-and-verification-systems-277164-9780080488394-john-r-vacca", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080488394.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277164", "product_url": "/app/ecom/book/277164/biometric-technologies-and-verification-systems-277164-9780080488394-john-r-vacca", "bisac_codes": [ "COM070000", "785" ], "items_count": null, "identifiers": { "ISBN13": "9780750679671", "EISBN13": "9780080488394", "EISBN10": "0080488390" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026360899" } } } }, { "type": "Product", "id": "00010000277163", "attributes": { "name": "BigNum Math", "subtitle": "Implementing Cryptographic Multiple Precision Arithmetic", "description": "Implementing cryptography requires integers of significant magnitude to resist cryptanalytic attacks. Modern programming languages only provide support for integers which are relatively small and single precision. The purpose of this text is to instruct the reader regarding how to implement efficient multiple precision algorithms.<br><br>Bignum math is the backbone of modern computer security algorithms. It is the ability to work with hundred-digit numbers efficiently using techniques that are both elegant and occasionally bizarre. This book introduces the reader to the concept of bignum algorithms and proceeds to build an entire library of functionality from the ground up. Through the use of theory, pseudo-code and actual fielded C source code the book explains each and every algorithm that goes into a modern bignum library. Excellent for the student as a learning tool and practitioner as a reference alike BigNum Math is for anyone with a background in computer science who has taken introductory level mathematic courses. The text is for students learning mathematics and cryptography as well as the practioner who needs a reference for any of the algorithms documented within.<br><br>* Complete coverage of Karatsuba Multiplication, the Barrett Algorithm, Toom-Cook 3-Way Multiplication, and More <br><br>* Tom St Denis is the developer of the industry standard cryptographic suite of tools called LibTom. <br><br>* This book provides step-by-step exercises to enforce concepts", "author": "Tom St Denis", "slug": "bignum-math-277163-9780080488387-tom-st-denis", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080488387.png", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277163", "product_url": "/app/ecom/book/277163/bignum-math-277163-9780080488387-tom-st-denis", "bisac_codes": [ "COM053000", "COM014000" ], "items_count": null, "identifiers": { "ISBN13": "9781597491129", "EISBN13": "9780080488387", "EISBN10": "0080488382" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026369259" } } } }, { "type": "Product", "id": "00010000277162", "attributes": { "name": "Aggressive Network Self-Defense", "subtitle": "", "description": "Over the past year there has been a shift within the computer security world away from passive, reactive defense towards more aggressive, proactive countermeasures. Although such tactics are extremely controversial, many security professionals are reaching into the dark side of their tool box to identify, target, and suppress their adversaries. This book will provide a detailed analysis of the most timely and dangerous attack vectors targeted at operating systems, applications, and critical infrastructure and the cutting-edge counter-measures used to nullify the actions of an attacking, criminal hacker.<br><br>*First book to demonstrate and explore controversial network strike back and countermeasure techniques. <br><br>*Provides tightly guarded secrets to find out WHO is really attacking you over the internet. <br><br>*Provides security professionals and forensic specialists with invaluable information for finding and prosecuting criminal hackers.", "author": "Neil R. Wyler", "slug": "aggressive-network-self-defense-277162-9780080488295-neil-r-wyler", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080488295.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277162", "product_url": "/app/ecom/book/277162/aggressive-network-self-defense-277162-9780080488295-neil-r-wyler", "bisac_codes": [ "COM053000", "COM014000" ], "items_count": null, "identifiers": { "ISBN13": "9781931836203", "EISBN13": "9780080488295", "EISBN10": "0080488293" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026353976" } } } }, { "type": "Product", "id": "00010000277161", "attributes": { "name": "The Foundations of Magnetic Recording", "subtitle": "", "description": "This expanded and updated new edition provides a comprehensive overview of the science and technology of magnetic recording. In the six years since the publication of the first edition, the magnetic recording and storage industry has burgeoned with the introduction of a host of new ideas and technologies. His book contains a discussion of almost every technologically important aspect of recording. Continas complete coverage of the current technology of magnetic recording and storage Written in a non-mathematical but scientifically accurate style Permits intelligent evaluations to be made of both the past evolution and the future trends in a wide variety of magnetic storage devices", "author": "John C. Mallinson", "slug": "the-foundations-of-magnetic-recording-277161-9780080506821-john-c-mallinson", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080506821.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277161", "product_url": "/app/ecom/book/277161/the-foundations-of-magnetic-recording-277161-9780080506821-john-c-mallinson", "bisac_codes": [ "TEC041000", "034" ], "items_count": null, "identifiers": { "ISBN13": "9780124666269", "EISBN13": "9780080506821", "EISBN10": "0080506828" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026367156" } } } }, { "type": "Product", "id": "00010000277160", "attributes": { "name": "Advances in Imaging and Electron Physics", "subtitle": "", "description": "Advances in Imaging and Electron Physics merges two long-running serials-Advances in Electronics and Electron Physics and Advances in Optical and Electron Microscopy. This series features extended articles on the physics of electron devices (especially semiconductor devices), particle optics at high and low energies, microlithography, image science and digital image processing, electromagnetic wave propagation, electron microscopy, and the computing methods used in all these domains.", "author": "Peter W. Hawkes", "slug": "advances-in-imaging-and-electron-physics-277160-9780080488127-peter-w-hawkes", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080488127.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277160", "product_url": "/app/ecom/book/277160/advances-in-imaging-and-electron-physics-277160-9780080488127-peter-w-hawkes", "bisac_codes": [ "TEC008070", "TEC021000" ], "items_count": null, "identifiers": { "ISBN13": "9780123739087", "EISBN13": "9780080488127", "EISBN10": "0080488129" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026345959" } } } }, { "type": "Product", "id": "00010000277159", "attributes": { "name": "Advanced Computer-Aided Fixture Design", "subtitle": "", "description": "Fixtures--the component or assembly that holds a part undergoing machining--must be designed to fit the shape of that part and the type of machining being done. This book discusses the fundamentals of Computer-Aided Fixture Design (CAFD) techniques and covers fixture planning, fixture design (both modular and dedicated fixtures), fixture design verifications, and the overall integration with CAD/CAM. The book shows how CAFD may lead to a significant reduction of product and process development time and production cost, and how CAFD can increase quality assurance through simulation and science-based technical specification and cost estimation in business quoting, especially in current supplier-based manufacturing. It also provides case study examples. This book provides a total solution of CAFD, including planning, design, and design verification Practical and comprehensive theoretical analysis of fixturing from real industrial application projects Introduces the integration of fixture design and analysis with CAD/CAM so that detailed geometric information can be processed and complex fixture designs can be designed and analyzed", "author": "Yiming (Kevin) Rong, Samuel Huang", "slug": "advanced-computer-aided-fixture-design-277159-9780080488271-yiming-kevin-rong-samuel-huang", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080488271.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277159", "product_url": "/app/ecom/book/277159/advanced-computer-aided-fixture-design-277159-9780080488271-yiming-kevin-rong-samuel-huang", "bisac_codes": [ "TEC009000", "TEC009070" ], "items_count": null, "identifiers": { "ISBN13": "9780125947510", "EISBN13": "9780080488271", "EISBN10": "0080488277" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026360248" } } } }, { "type": "Product", "id": "00010000277158", "attributes": { "name": "Advanced Fixed Income Analysis", "subtitle": "", "description": "This book is aimed at experienced practitioners in the corporate bond markets and is a specialised text for investors and traders. The author relates from both personal experience as well as his own research to bring together subjects of practical importance to bond market practitioners. He introduces the latest techniques used for analysis and interpretation, including:Relative value tradingApproaches to trading and hedgingDynamic analysis of spot and forward ratesInterest rate modellingFitting the yield curveAnalysing the long bond yieldIndex-linked bond analyticsCorporate bond defaults<br><br>* Aspects of advanced analysis for experienced bond market practitioners* Complex topics described in an accessible style* Brings together a wide range of topics in one volume", "author": "Moorad Choudhry, Michele Lizzio", "slug": "advanced-fixed-income-analysis-277158-9780080488189-moorad-choudhry-michele-lizzio", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080488189.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277158", "product_url": "/app/ecom/book/277158/advanced-fixed-income-analysis-277158-9780080488189-moorad-choudhry-michele-lizzio", "bisac_codes": [ "BUS027000", "BUS004000" ], "items_count": null, "identifiers": { "ISBN13": "9780750662635", "EISBN13": "9780080488189", "EISBN10": "0080488188" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026370244" } } } }, { "type": "Product", "id": "00010000277157", "attributes": { "name": "Electronic Excitations in Organic Based Nanostructures", "subtitle": "", "description": "The first book devoted to a systematic consideration of electronic excitations and electronic energy transfer in organic <br>crystalline multilayers and organics based nanostructures(quantum wells, quantum wires, <br>quantum dots, microcavities). The ingenious combination of organic with inorganic materials in one and the <br>same hybrid structure is shown to give qualitatively new opto-electronic phenomena, potentially important for <br>applications in nonlinear optics, light emitting devices, photovoltaic cells, lasers and so on. The book will be useful not only <br>for physicists but also for chemists and biologists.To help the nonspecialist reader, <br>three Chapters which contain a tutorial and updated introduction to the physics of electronic excitations in organic <br>and inorganic solids have been included.<br><br>* hybrid Frenkel-Wannier-Mott excitons<br>* microcavities with crystalline and disordered organics <br>* electronic excitation at donor-acceptor interfaces <br>* cold photoconductivity at donor-acceptor interface<br>* cummulative photovoltage<br>* Feorster transfer energy in microcavity<br>* New concepts for LEDs", "author": "G. Franco Bassani, V. M. Agranovich", "slug": "electronic-excitations-in-organic-based-nanostructures-277157-9780080519210", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080519210.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277157", "product_url": "/app/ecom/book/277157/electronic-excitations-in-organic-based-nanostructures-277157-9780080519210", "bisac_codes": [ "SCI055000", "TEC021000" ], "items_count": null, "identifiers": { "ISBN13": "9780125330312", "EISBN13": "9780080519210", "EISBN10": "0080519210" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026369258" } } } }, { "type": "Product", "id": "00010000277156", "attributes": { "name": "Scene of the Cybercrime", "subtitle": "", "description": "<p>When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. When the first edition of \"Scene of the Cybercrime\" published in 2002, it was one of the first books that educated IT security professionals and law enforcement how to fight Cybercrime. Over the past 5 years a great deal has changed in how computer crimes are perpetrated and subsequently investigated. Also, the IT security and law enforcement communities have dramatically improved their ability to deal with Cybercrime, largely as a result of increased spending and training. According to the 2006 Computer Security Institute's and FBI's joint Cybercrime report: 52% of companies reported unauthorized use of computer systems in the prior 12 months. Each of these incidents is a Cybecrime requiring a certain level of investigation and remediation. And in many cases, an investigation is mandates by federal compliance regulations such as Sarbanes-Oxley, HIPAA, or the Payment Card Industry (PCI) Data Security Standard.</p> <p>Scene of the Cybercrime, Second Edition is a completely revised and updated book which covers all of the technological, legal, and regulatory changes, which have occurred since the first edition. The book is written for dual audience; IT security professionals and members of law enforcement. It gives the technical experts a little peek into the law enforcement world, a highly structured environment where the \"letter of the law\" is paramount and procedures must be followed closely lest an investigation be contaminated and all the evidence collected rendered useless. It also provides law enforcement officers with an idea of some of the technical aspects of how cyber crimes are committed, and how technology can be used to track down and build a case against the criminals who commit them. Scene of the Cybercrime, Second Editions provides a roadmap that those on both sides of the table can use to navigate the legal and technical landscape to understand, prevent, detect, and successfully prosecute the criminal behavior that is as much a threat to the online community as \"traditional\" crime is to the neighborhoods in which we live. Also included is an all new chapter on Worldwide Forensics Acts and Laws. </p> Companion Web site provides custom tools and scripts, which readers can download for conducting digital, forensic investigations Special chapters outline how Cybercrime investigations must be reported and investigated by corporate IT staff to meet federal mandates from Sarbanes Oxley, and the Payment Card Industry (PCI) Data Security Standard Details forensic investigative techniques for the most common operating systems (Windows, Linux and UNIX) as well as cutting edge devices including iPods, Blackberries, and cell phones", "author": "Debra Littlejohn Shinder, Michael Cross", "slug": "scene-of-the-cybercrime-277156-9780080486994-debra-littlejohn-shinder-michael-cross", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080486994.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277156", "product_url": "/app/ecom/book/277156/scene-of-the-cybercrime-277156-9780080486994-debra-littlejohn-shinder-michael-cross", "bisac_codes": [ "COM053000", "COM014000" ], "items_count": null, "identifiers": { "ISBN13": "9781597492768", "EISBN13": "9780080486994", "EISBN10": "0080486991" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026367784" } } } }, { "type": "Product", "id": "00010000277155", "attributes": { "name": "Google Hacking for Penetration Testers", "subtitle": "", "description": "This book helps people find sensitive information on the Web.<br><br>Google is one of the 5 most popular sites on the internet with more than 380 million unique users per month (Nielsen/NetRatings 8/05). But, Googles search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web including: social security numbers, credit card numbers, trade secrets, and federally classified documents. Google Hacking for Penetration Testers Volume 2 shows the art of manipulating Google used by security professionals and system administrators to find this sensitive information and self-police their own organizations.<br><br>Readers will learn how Google Maps and Google Earth provide pinpoint military accuracy, see how bad guys can manipulate Google to create super worms, and see how they can \"mash up\" Google with MySpace, LinkedIn, and more for passive reconaissance.<br><br> Learn Google Searching Basics<br>Explore Googles Web-based Interface, build Google queries, and work with Google URLs.<br> Use Advanced Operators to Perform Advanced Queries<br>Combine advanced operators and learn about colliding operators and bad search-fu.<br> Learn the Ways of the Google Hacker<br>See how to use caches for anonymity and review directory listings and traversal techniques.<br> Review Document Grinding and Database Digging<br>See the ways to use Google to locate documents and then search within the documents to locate information. <br> Understand Googles Part in an Information Collection Framework<br>Learn the principles of automating searches and the applications of data mining.<br> Locate Exploits and Finding Targets<br>Locate exploit code and then vulnerable targets.<br> See Ten Simple Security Searches<br>Learn a few searches that give good results just about every time and are good for a security assessment.<br> Track Down Web Servers<br>Locate and profile web servers, login portals, network hardware and utilities.<br> See How Bad Guys Troll for Data<br>Find ways to search for usernames, passwords, credit card numbers, social security numbers, and other juicy information.<br> Hack Google Services<br>Learn more about the AJAX Search API, Calendar, Blogger, Blog Search, and more.", "author": "Bill Gardner, Johnny Long, Justin Brown", "slug": "google-hacking-for-penetration-testers-277155-9780080484266-bill-gardner-johnny-long-justin-brown", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080484266.png", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277155", "product_url": "/app/ecom/book/277155/google-hacking-for-penetration-testers-277155-9780080484266-bill-gardner-johnny-long-justin-brown", "bisac_codes": [ "COM060040", "COM014000" ], "items_count": null, "identifiers": { "ISBN13": "9781597491761", "EISBN13": "9780080484266", "EISBN10": "0080484263" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026345204" } } } }, { "type": "Product", "id": "00010000277154", "attributes": { "name": "Computer Organization and Design", "subtitle": "The Hardware/Software Interface", "description": "<p>This best selling text on computer organization has been thoroughly updated to reflect the newest technologies. Examples highlight the latest processor designs, benchmarking standards, languages and tools. </p> <p>As with previous editions, a MIPs processor is the core used to present the fundamentals of hardware technologies at work in a computer system. The book presents an entire MIPS instruction setinstruction by instructionthe fundamentals of assembly language, computer arithmetic, pipelining, memory hierarchies and I/O. </p> <p>A new aspect of the third edition is the explicit connection between program performance and CPU performance. The authors show how hardware and software components--such as the specific algorithm, programming language, compiler, ISA and processor implementation--impact program performance. Throughout the book a new feature focusing on program performance describes how to search for bottlenecks and improve performance in various parts of the system. The book digs deeper into the hardware/software interface, presenting a complete view of the function of the programming language and compiler--crucial for understanding computer organization. A CD provides a toolkit of simulators and compilers along with tutorials for using them.</p>For instructor resources click on the grey \"companion site\" button found on the right side of this page.This new edition represents a major revision. New to this edition:* Entire Text has been updated to reflect new technology* 70% new exercises.* Includes a CD loaded with software, projects and exercises to support courses using a number of tools * A new interior design presents defined terms in the margin for quick reference * A new feature, \"Understanding Program Performance\" focuses on performance from the programmer's perspective * Two sets of exercises and solutions, \"For More Practice\" and \"In More Depth,\" are included on the CD * \"Check Yourself\" questions help students check their understanding of major concepts * \"Computers In the Real World\" feature illustrates the diversity of uses for information technology *More detail below...", "author": "David A. Patterson, John L. Hennessy", "slug": "computer-organization-and-design-277154-9780080502571-david-a-patterson-john-l-hennessy", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080502571.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277154", "product_url": "/app/ecom/book/277154/computer-organization-and-design-277154-9780080502571-david-a-patterson-john-l-hennessy", "bisac_codes": [ "COM011000", "SCI000000" ], "items_count": null, "identifiers": { "EISBN13": "9780080502571", "EISBN10": "0080502571" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026363464" } } } }, { "type": "Product", "id": "00010000277153", "attributes": { "name": "Digital Signal Processing System Design", "subtitle": "LabVIEW-Based Hybrid Programming", "description": "<p>Digital Signal Processing System Design combines textual and graphical programming to form a hybrid programming approach, enabling a more effective means of building and analyzing DSP systems. The hybrid programming approach allows the use of previously developed textual programming solutions to be integrated into LabVIEWs highly interactive and visual environment, providing an easier and quicker method for building DSP systems. This book is an ideal introduction for engineers and students seeking to develop DSP systems in quick time.</p> <p>Features:</p> The only DSP laboratory book that combines textual and graphical programming 12 lab experiments that incorporate C/MATLAB code blocks into the LabVIEW graphical programming environment via the MathScripting feature Lab experiments covering basic DSP implementation topics including sampling, digital filtering, fixed-point data representation, frequency domain processing Interesting applications using the hybrid programming approach, such as a software-defined radio system, a 4-QAM Modem, and a cochlear implant simulator The only DSP project book that combines textual and graphical programming 12 Lab projects that incorporate MATLAB code blocks into the LabVIEW graphical programming environment via the MathScripting feature Interesting applications such as the design of a cochlear implant simulator and a software-defined radio system", "author": "Nasser Kehtarnavaz", "slug": "digital-signal-processing-system-design-277153-9780080483450-nasser-kehtarnavaz", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080483450.png", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277153", "product_url": "/app/ecom/book/277153/digital-signal-processing-system-design-277153-9780080483450-nasser-kehtarnavaz", "bisac_codes": [ "COM018000", "TEC008070" ], "items_count": null, "identifiers": { "ISBN13": "9780123744906", "EISBN13": "9780080483450", "EISBN10": "0080483453" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026363926" } } } }, { "type": "Product", "id": "00010000277152", "attributes": { "name": "A Behavioral Approach to Asset Pricing", "subtitle": "", "description": "Behavioral finance is the study of how psychology affects financial decision making and financial markets. It is increasingly becoming the common way of understanding investor behavior and stock market activity. Incorporating the latest research and theory, Shefrin offers both a strong theory and efficient empirical tools that address derivatives, fixed income securities, mean-variance efficient portfolios, and the market portfolio. The book provides a series of examples to illustrate the theory. The second edition continues the tradition of the first edition by being the one and only book to focus completely on how behavioral finance principles affect asset pricing, now with its theory deepened and enriched by a plethora of research since the first edition", "author": "Hersh Shefrin", "slug": "a-behavioral-approach-to-asset-pricing-277152-9780080482248-hersh-shefrin", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080482248.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "277152", "product_url": "/app/ecom/book/277152/a-behavioral-approach-to-asset-pricing-277152-9780080482248-hersh-shefrin", "bisac_codes": [ "BUS027000", "BUS069000" ], "items_count": null, "identifiers": { "ISBN13": "9780123743565", "EISBN13": "9780080482248", "EISBN10": "0080482244" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026361797" } } } } ], "meta": { "pagination": { "page": 75130, "pages": 78429, "count": 1568572 } } }
Response Info
Default: None