Product List
GET /services/catalog/products?format=api&page=75190
{ "links": { "first": "https://redshelf.com/services/catalog/products?format=api&page=1", "last": "https://redshelf.com/services/catalog/products?format=api&page=78473", "next": "https://redshelf.com/services/catalog/products?format=api&page=75191", "prev": "https://redshelf.com/services/catalog/products?format=api&page=75189" }, "data": [ { "type": "Product", "id": "00010000276874", "attributes": { "name": "High Dynamic Range Imaging", "subtitle": "Acquisition, Display, and Image-Based Lighting", "description": "High dynamic range imaging produces images with a much greater range of light and color than conventional imaging. The effect is stunning, as great as the difference between black-and-white and color television. High Dynamic Range Imaging is the first book to describe this exciting new field that is transforming the media and entertainment industries. Written by the foremost researchers in HDRI, it will explain and define this new technology for anyone who works with images, whether it is for computer graphics, film, video, photography, or lighting design.<br><br>* Written by the leading researchers in HDRI<br>* Covers all the areas of high dynamic range imaging including capture devices, display devices, file formats, dynamic range reduction, and image-based lighting<br>* Includes a DVD with over 4 GB of HDR images as well as source code and binaries for numerous tone reproduction operators for Windows, Linux, and Mac OS X", "author": "Erik Reinhard, Greg Ward, Sumanta Pattanaik, Paul Debevec", "slug": "high-dynamic-range-imaging-276874-9780080478319-erik-reinhard-greg-ward-sumanta-pattanaik-paul-debevec", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080478319.png", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "276874", "product_url": "/app/ecom/book/276874/high-dynamic-range-imaging-276874-9780080478319-erik-reinhard-greg-ward-sumanta-pattanaik-paul-debevec", "bisac_codes": [ "COM012000", "COM012040" ], "items_count": null, "identifiers": { "ISBN13": "9780125852630", "EISBN13": "9780080478319", "EISBN10": "008047831X" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026345260" } } } }, { "type": "Product", "id": "00010000276872", "attributes": { "name": "Artificial Intelligence Planning Systems", "subtitle": "Proceedings of the First Conference (AIPS 92)", "description": "Artificial Intelligence Planning Systems documents the proceedings of the First International Conference on AI Planning Systems held in College Park, Maryland on June 15-17, 1992. This book discusses the abstract probabilistic modeling of action; building symbolic primitives with continuous control routines; and systematic adaptation for case-based planning. The analysis of ABSTRIPS; conditional nonlinear planning; and building plans to monitor and exploit open-loop and closed-loop dynamics are also elaborated. This text likewise covers the modular utility representation for decision-theoretic planning; reaction and reflection in tetris; and planning in intelligent sensor fusion. Other topics include the resource-bounded adaptive agent, critical look at Knoblock's hierarchy mechanism, and traffic laws for mobile robots. This publication is beneficial to students and researchers conducting work on AI planning systems.", "author": "James Hendler", "slug": "artificial-intelligence-planning-systems-276872-9780080499444", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080499444.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "276872", "product_url": "/app/ecom/book/276872/artificial-intelligence-planning-systems-276872-9780080499444", "bisac_codes": [ "COM004000", "077" ], "items_count": null, "identifiers": { "ISBN13": "9781558602502", "EISBN13": "9780080499444", "EISBN10": "0080499449" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026356788" } } } }, { "type": "Product", "id": "00010000276871", "attributes": { "name": "C4.5", "subtitle": "Programs for Machine Learning", "description": "<p>Classifier systems play a major role in machine learning and knowledge-based systems, and Ross Quinlan's work on ID3 and C4.5 is widely acknowledged to have made some of the most significant contributions to their development. This book is a complete guide to the C4.5 system as implemented in C for the UNIX environment. It contains a comprehensive guide to the system's use , the source code (about 8,800 lines), and implementation notes.</p> <p>C4.5 starts with large sets of cases belonging to known classes. The cases, described by any mixture of nominal and numeric properties, are scrutinized for patterns that allow the classes to be reliably discriminated. These patterns are then expressed as models, in the form of decision trees or sets of if-then rules, that can be used to classify new cases, with emphasis on making the models understandable as well as accurate. The system has been applied successfully to tasks involving tens of thousands of cases described by hundreds of properties. The book starts from simple core learning methods and shows how they can be elaborated and extended to deal with typical problems such as missing data and over hitting. Advantages and disadvantages of the C4.5 approach are discussed and illustrated with several case studies.</p> <p>This book should be of interest to developers of classification-based intelligent systems and to students in machine learning and expert systems courses.</p>", "author": "J. Ross Quinlan", "slug": "c45-276871-9780080500584-j-ross-quinlan", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080500584.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "276871", "product_url": "/app/ecom/book/276871/c45-276871-9780080500584-j-ross-quinlan", "bisac_codes": [ "COM000000", "077" ], "items_count": null, "identifiers": { "ISBN13": "9781558602380", "EISBN13": "9780080500584", "EISBN10": "0080500587" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026351047" } } } }, { "type": "Product", "id": "00010000276870", "attributes": { "name": "Hardware Hacking", "subtitle": "Have Fun while Voiding your Warranty", "description": "\"If I had this book 10 years ago, the FBI would never have found me!\" -- Kevin Mitnick This book has something for everyone---from the beginner hobbyist with no electronics or coding experience to the self-proclaimed \"gadget geek.\" Take an ordinary piece of equipment and turn it into a personal work of art. Build upon an existing idea to create something better. Have fun while voiding your warranty! Some of the hardware hacks in this book include: <br>* Don't toss your iPod away when the battery dies! Don't pay Apple the $99 to replace it! Install a new iPod battery yourself without Apple's \"help\"<br>* An Apple a day! Modify a standard Apple USB Mouse into a glowing UFO Mouse or build a FireWire terabyte hard drive and custom case<br>* Have you played Atari today? Create an arcade-style Atari 5200 paddle controller for your favorite retro videogames or transform the Atari 2600 joystick into one that can be used by left-handed players<br>* Modern game systems, too! Hack your PlayStation 2 to boot code from the memory card or modify your PlayStation 2 for homebrew game development<br>* Videophiles unite! Design, build, and configure your own Windows- or Linux-based Home Theater PC<br>* Ride the airwaves! Modify a wireless PCMCIA NIC to include an external antenna connector or load Linux onto your Access Point<br>* Stick it to The Man! Remove the proprietary barcode encoding from your CueCat and turn it into a regular barcode reader<br>* Hack your Palm! Upgrade the available RAM on your Palm m505 from 8MB to 16MB<br><br> Includes hacks of today's most popular gaming systems like Xbox and PS/2.<br> Teaches readers to unlock the full entertainment potential of their desktop PC.<br> Frees iMac owners to enhance the features they love and get rid of the ones they hate.", "author": "Joe Grand, Kevin D. Mitnick, Ryan Russell", "slug": "hardware-hacking-276870-9780080478258-joe-grand-kevin-d-mitnick-ryan-russell", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080478258.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "276870", "product_url": "/app/ecom/book/276870/hardware-hacking-276870-9780080478258-joe-grand-kevin-d-mitnick-ryan-russell", "bisac_codes": [ "COM053000", "COM014000" ], "items_count": null, "identifiers": { "ISBN13": "9781932266832", "EISBN13": "9780080478258", "EISBN10": "0080478255" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026343502" } } } }, { "type": "Product", "id": "00010000276868", "attributes": { "name": "Data Warehousing", "subtitle": "Using the Wal-Mart Model", "description": "<p> At 70 terabytes and growing, Wal-Mart's data warehouse is still the world's largest, most ambitious, and arguably most successful commercial database. Written by one of the key figures in its design and construction, Data Warehousing: Using the Wal-Mart Model gives you an insider's view of this enormous project. Continuously drawing from this example, the author teaches you the general principles and specific techniques you need to understand to be a valuable part of your organization's own data warehouse project, however large or small. You'll emerge with a practical understanding of both the business and technical aspects of building a data warehouse for storing and accessing data in a strategically useful way. <p> What further sets this book apart is its focus on the informational needs of retail companies-including both market and organizational issues that affect the data's collection and use. If retail is your field, this book will prove especially valuable as you develop and implement your company's ideal data warehouse solution.<br><br>* Written by a member of the team of four engineers who designed and built the Wal-Mart Data Warehouse database, a team whose database design was recognized internally in 1991 by Wal-Mart with the company's Team Innovational Technical award.<br>* Provides essential information for project managers, consultants, data warehouse managers, and data architects.<br>* Takes an in-depth look at a wide range of technical issues, including architecture, construction approaches, tool selection, database system selection, and maintenance.<br>* Addresses issues specific to retail business: vendors, inventory, sales analysis, geography, article categories, and more.<br>* Explains how to determine business requirements at the outset of the project-and how to develop return on investment analyses after the warehouse has been brought online.", "author": "Paul Westerman", "slug": "data-warehousing-276868-9780080503721-paul-westerman", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080503721.png", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "276868", "product_url": "/app/ecom/book/276868/data-warehousing-276868-9780080503721-paul-westerman", "bisac_codes": [ "COM030000", "COM021000" ], "items_count": null, "identifiers": { "ISBN13": "9781558606845", "EISBN13": "9780080503721", "EISBN10": "0080503721" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026350077" } } } }, { "type": "Product", "id": "00010000276865", "attributes": { "name": "Hackproofing Your Wireless Network", "subtitle": "", "description": "<p>The only way to stop a hacker is to think like one!</p> <p>Wireless technology is a new and rapidly growing field of concentration for network engineers and administrators. Innovative technology is now making the communication between computers a cordless affair. Wireless devices and networks are vulnerable to additional security risks because of their presence in the mobile environment.</p> <p>Hack Proofing Your Wireless Network is the only book written specifically for architects, engineers, and administrators responsible for securing their wireless networks. From making sense of the various acronyms (WAP, WEP, SSL, PKE, PKI, SSL, SSH, IPSEC) to the implementation of security policies, plans, and recovery protocols, this book will help users secure their wireless network before its security is compromised. The only way to stop a hacker is to think like one...this book details the multiple ways a hacker can attack a wireless network - and then provides users with the knowledge they need to prevent said attacks.</p> Uses forensic-based analysis to give the reader an insight into the mind of a hacker With the growth of wireless networks architects, engineers and administrators will need this book Up to the minute Web based support at [email protected]", "author": "Syngress", "slug": "hackproofing-your-wireless-network-276865-9780080478180-syngress", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080478180.png", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "276865", "product_url": "/app/ecom/book/276865/hackproofing-your-wireless-network-276865-9780080478180-syngress", "bisac_codes": [ "COM053000", "COM014000" ], "items_count": null, "identifiers": { "ISBN13": "9781928994596", "EISBN13": "9780080478180", "EISBN10": "0080478182" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026349535" } } } }, { "type": "Product", "id": "00010000276863", "attributes": { "name": "Hacking the Code", "subtitle": "Auditor's Guide to Writing Secure Code for the Web", "description": "<p>Hacking the Code has over 400 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits, Hacking the Code dives right into deep code analysis. Previously undisclosed security research in combination with superior programming techniques from Foundstone and other respected organizations is included in both the Local and Remote Code sections of the book.</p> <p>The book is accompanied with a FREE COMPANION CD containing both commented and uncommented versions of the source code examples presented throughout the book. In addition to the book source code, the CD also contains a copy of the author-developed Hacker Code Library v1.0. The Hacker Code Library includes multiple attack classes and functions that can be utilized to quickly create security programs and scripts. These classes and functions simplify exploit and vulnerability tool development to an extent never before possible with publicly available software.</p> Learn to quickly create security tools that ease the burden of software testing and network administration Find out about key security issues regarding vulnerabilities, exploits, programming flaws, and secure code development Discover the differences in numerous types of web-based attacks so that developers can create proper quality assurance testing procedures and tools Learn to automate quality assurance, management, and development tasks and procedures for testing systems and applications Learn to write complex Snort rules based solely upon traffic generated by network tools and exploits", "author": "Mark Burnett", "slug": "hacking-the-code-276863-9780080478173-mark-burnett", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080478173.png", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "276863", "product_url": "/app/ecom/book/276863/hacking-the-code-276863-9780080478173-mark-burnett", "bisac_codes": [ "COM053000", "COM014000" ], "items_count": null, "identifiers": { "ISBN13": "9781932266658", "EISBN13": "9780080478173", "EISBN10": "0080478174" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026359411" } } } }, { "type": "Product", "id": "00010000276862", "attributes": { "name": "Hack Proofing XML", "subtitle": "", "description": "The only way to stop a hacker is to think like one!<br>The World Wide Web Consortium's Extensible Markup Language (XML) is quickly becoming the new standard for data formatting and Internet development. XML is expected to be as important to the future of the Web as HTML has been to the foundation of the Web, and has proven itself to be the most common tool for all data manipulation and data transmission. <br>Hack Proofing XML provides readers with hands-on instruction for how to secure the Web transmission and access of their XML data. This book will also introduce database administrators, web developers and web masters to ways they can use XML to secure other applications and processes.<br><br>The first book to incorporate standards from both the Security Services Markup Language (S2ML) and the Organization for the Advancement of Structured Information Standards (OASIS) in one comprehensive book<br>Covers the four primary security objectives: Confidentiality, Integrity, Authentication and Non-repudiation<br>Not only shows readers how to secure their XML data, but describes how to provide enhanced security for a broader range of applications and processes", "author": "Syngress", "slug": "hack-proofing-xml-276862-9780080478159-syngress", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080478159.png", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "276862", "product_url": "/app/ecom/book/276862/hack-proofing-xml-276862-9780080478159-syngress", "bisac_codes": [ "COM053000", "COM014000" ], "items_count": null, "identifiers": { "ISBN13": "9781931836500", "EISBN13": "9780080478159", "EISBN10": "0080478158" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026369098" } } } }, { "type": "Product", "id": "00010000276861", "attributes": { "name": "Hack Proofing Your Network", "subtitle": "", "description": "<p>A new edition the most popular Hack Proofing book around!</p> <p>IT professionals who want to run secure networks, or build secure software, need to know about the methods of hackers. The second edition of the best seller Hack Proofing Your Network, teaches about those topics, including: The Politics, Laws of Security, Classes of Attack, Methodology, Diffing, Decrypting, Brute Force, Unexpected Input, Buffer Overrun, Sniffing, Session Hijacking, Spoofing, Server Holes, Client Holes, Trojans and Viruses, Reporting Security Problems, Choosing Secure Systems The central idea of this book is that it's better for you to find the holes in your network than it is for someone else to find them, someone that would use them against you. The complete, authoritative guide to protecting your Windows 2000 Network.</p> Updated coverage of an international bestseller and series flagship Covers more methods of attack and hacker secrets Interest in topic continues to grow - network architects, engineers and administrators continue to scramble for security books Written by the former security manager for Sybase and an expert witness in the Kevin Mitnick trials A great addition to the bestselling \"Hack Proofing...\" series Windows 2000 sales have surpassed those of Windows NT Critical topic. The security of an organization's data and communications is crucial to its survival and these topics are notoriously difficult to grasp Unrivalled web support at [email protected]", "author": "Syngress", "slug": "hack-proofing-your-network-276861-9780080478166-syngress", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080478166.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "276861", "product_url": "/app/ecom/book/276861/hack-proofing-your-network-276861-9780080478166-syngress", "bisac_codes": [ "COM053000", "COM014000" ], "items_count": null, "identifiers": { "ISBN13": "9781928994701", "EISBN13": "9780080478166", "EISBN10": "0080478166" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026350041" } } } }, { "type": "Product", "id": "00010000276860", "attributes": { "name": "Hack Proofing Your Web Applications", "subtitle": "The Only Way to Stop a Hacker Is to Think Like One", "description": "From the authors of the bestselling Hack Proofing Your Network!<br><br>OPEC, Amazon, Yahoo! and E-bay: If these large, well-established and security-conscious web sites have problems, how can anyone be safe? How can any programmer expect to develop web applications that are secure? <br><br>Hack Proofing Your Web Applications is the only book specifically written for application developers and webmasters who write programs that are used on web sites. It covers Java applications, XML, ColdFusion, and other database applications. Most hacking books focus on catching the hackers once they've entered the site; this one shows programmers how to design tight code that will deter hackers from the word go.<br><br>Comes with up-to-the-minute web based support and a CD-ROM containing source codes and sample testing programs<br>Unique approach: Unlike most hacking books this one is written for the application developer to help them build less vulnerable programs", "author": "Syngress", "slug": "hack-proofing-your-web-applications-276860-9780080478135-syngress", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080478135.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "276860", "product_url": "/app/ecom/book/276860/hack-proofing-your-web-applications-276860-9780080478135-syngress", "bisac_codes": [ "COM053000", "COM014000" ], "items_count": null, "identifiers": { "ISBN13": "9781928994312", "EISBN13": "9780080478135", "EISBN10": "0080478131" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026349956" } } } }, { "type": "Product", "id": "00010000276859", "attributes": { "name": "Hack Proofing Windows 2000 Server", "subtitle": "", "description": "The complete, authoritative guide to protecting your Windows 2000 Network<br>\"Essential reading for your IT security organization.\" -Deena Joyce, Director of Information Technology and Network Security, Casino Magic <br>Pick up a newspaper or watch the evening news and you will find a major news story involving a breech of network security. Windows 2000, as the premier network platform, has many important security features but they are difficult to configure and manage. Hack Proofing Windows 2000 Server has totally up-to-date coverage of Service Pack 2 (SP2), Kerberos and Public Key Infrastructure and also addresses newer topics such as Virtual Private Networks (VPNs), remote access and web site security. The book also has complete coverage of Internet Information Server (IIS) release 5.<br><br>A great addition to the bestselling \"Hack Proofing...\" series<br>Windows 2000 sales have surpassed those of Windows NT<br>Critical topic. The security of an organization's data and communications is crucial to its survival and these topics are notoriously difficult to grasp<br>Unrivalled web support at [email protected]", "author": "Syngress", "slug": "hack-proofing-windows-2000-server-276859-9780080478142-syngress", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080478142.png", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "276859", "product_url": "/app/ecom/book/276859/hack-proofing-windows-2000-server-276859-9780080478142-syngress", "bisac_codes": [ "COM053000", "COM014000" ], "items_count": null, "identifiers": { "ISBN13": "9781931836494", "EISBN13": "9780080478142", "EISBN10": "008047814X" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026349356" } } } }, { "type": "Product", "id": "00010000276858", "attributes": { "name": "Hack Proofing Linux", "subtitle": "A Guide to Open Source Security", "description": "<p>From the authors of the bestselling E-Mail Virus Protection Handbook! The Linux operating system continues to gain market share based largely on its reputation as being the most secure operating system available. The challenge faced by system administrators installing Linux is that it is secure only if installed and configured properly, constantly and meticulously updated, and carefully integrated with a wide variety of Open Source security tools. The fact that Linux source code is readily available to every hacker means that system administrators must continually learn security and anti-hacker techniques. Hack Proofing Linux will provide system administrators with all of the techniques necessary to properly configure and maintain Linux systems and counter malicious attacks.</p> Linux operating systems and Open Source security tools are incredibly powerful, complex, and notoriously under-documented - this book addresses a real need Uses forensics-based analysis to give the reader an insight to the mind of a hacker", "author": "James Stanger, Patrick T. Lane", "slug": "hack-proofing-linux-276858-9780080478111-james-stanger-patrick-t-lane", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080478111.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "276858", "product_url": "/app/ecom/book/276858/hack-proofing-linux-276858-9780080478111-james-stanger-patrick-t-lane", "bisac_codes": [ "COM053000", "COM014000" ], "items_count": null, "identifiers": { "ISBN13": "9781928994343", "EISBN13": "9780080478111", "EISBN10": "0080478115" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026349291" } } } }, { "type": "Product", "id": "00010000276857", "attributes": { "name": "Hack Proofing Your E-commerce Web Site", "subtitle": "The Only Way to Stop a Hacker is to Think Like One", "description": "From the authors of the bestselling Hack Proofing Your Network!<br>Yahoo!, E-Bay, Amazon. Three of the most popular, well-established, and lavishly funded Web sites in existence, yet hackers managed to penetrate their security systems and cripple these and many other Web giants for almost 24 hours. E-Commerce giants, previously thought to be impenetrable are now being exposed as incredibly vulnerable. This book will give e-commerce architects and engineers insight into the tools and techniques used by hackers to compromise their sites. The security of e-commerce sites is even more imperative than non-commerce sites, because the site has the added responsibility of maintaining the security of their customer's personal and financial information.<br><br>Hack Proofing Your E-Commerce Site will provide computer architects and engineers all of the information they need to design and implement security measures. <br>* Heightened media awareness of malicious attacks against \"secure\" sites guarantees a wide audience <br>* Uses forensics-based analysis to give the reader insight to the mind of a hacker. This understanding is crucial for security professionals to defend against attacks", "author": "Syngress", "slug": "hack-proofing-your-e-commerce-web-site-276857-9780080478104-syngress", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080478104.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "276857", "product_url": "/app/ecom/book/276857/hack-proofing-your-e-commerce-web-site-276857-9780080478104-syngress", "bisac_codes": [ "COM053000", "COM014000" ], "items_count": null, "identifiers": { "ISBN13": "9781928994275", "EISBN13": "9780080478104", "EISBN10": "0080478107" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026348766" } } } }, { "type": "Product", "id": "00010000276856", "attributes": { "name": "Hack Proofing Sun Solaris 8", "subtitle": "", "description": "<p>The only way to stop a hacker is to think like one!</p> <p>Sun Microsystem's venerable and well-respected operating system Solaris is currently in version 8, and runs on both Intel and Sun Hardware. Solaris is one of the most comprehensive and popular UNIX operating systems available. Hundreds of thousands of business enterprises, both small and large, depend on Sun Solaris to keep their business alive - but have they protected themselves against hackers?</p> <p>Hack Proofing Sun Solaris 8 is the latest addition to the popular Hack Proofing series from Syngress Publishing. Providing hands-on information written by both security professionals and self-proclaimed hackers, this book will give system administrators the edge they need to fortify their Sun Solaris operating system against the never-ending threat of hackers.</p> The fifth title in the popular series that brought us the bestseller Hack Proofing Your Network Teaches strategy and techniques using forensic-based analysis Up to the minute Web-based support with [email protected]", "author": "Syngress", "slug": "hack-proofing-sun-solaris-8-276856-9780080478128-syngress", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080478128.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "276856", "product_url": "/app/ecom/book/276856/hack-proofing-sun-solaris-8-276856-9780080478128-syngress", "bisac_codes": [ "COM053000", "COM014000" ], "items_count": null, "identifiers": { "ISBN13": "9781928994442", "EISBN13": "9780080478128", "EISBN10": "0080478123" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026348730" } } } }, { "type": "Product", "id": "00010000276855", "attributes": { "name": "Hack Proofing Your Identity In The Information Age", "subtitle": "", "description": "Identity-theft is the fastest growing crime in America, affecting approximately 900,000 new victims each year. Protect your assets and personal information online with this comprehensive guide.<br><br>Hack Proofing Your Identity will provide readers with hands-on instruction for how to secure their personal information on multiple devices. It will include simple measures as well as advanced techniques gleaned from experts in the field who have years of experience with identity theft and fraud. This book will also provide readers with instruction for identifying cyber-crime and the different ways they can report it if it occurs.<br><br>Hot Topic. Hack Proofing Your Identity will provide readers with both simple and advanced steps they can take to protect themselves from cyber-crime.<br>Expert Advice. This book will present security measures gathered from experts in both the federal government and the private sector to help secure your personal information and assets online.<br>Unique Coverage. Hack Proofing Your Identity will be the only book to include security measure for multiple devices like laptops, PDAs and mobile phones to allow users to protect themselves while taking advantage of the newest ways to access the Internet.", "author": "Syngress", "slug": "hack-proofing-your-identity-in-the-information-age-276855-9780080478081-syngress", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080478081.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "276855", "product_url": "/app/ecom/book/276855/hack-proofing-your-identity-in-the-information-age-276855-9780080478081-syngress", "bisac_codes": [ "COM053000", "COM014000" ], "items_count": null, "identifiers": { "ISBN13": "9781931836517", "EISBN13": "9780080478081", "EISBN10": "0080478085" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026369276" } } } }, { "type": "Product", "id": "00010000276854", "attributes": { "name": "Hack Proofing ColdFusion", "subtitle": "", "description": "<p>The only way to stop a hacker is to think like one!</p> <p>ColdFusion is a Web application development tool that allows programmers to quickly build robust applications using server-side markup language. It is incredibly popular and has both an established user base and a quickly growing number of new adoptions. It has become the development environment of choice for e-commerce sites and content sites where databases and transactions are the most vulnerable and where security is of the utmost importance. Several security concerns exist for ColdFusion due to its unique approach of designing pages using dynamic-page templates rather than static HTML documents. Because ColdFusion does not require that developers have expertise in Visual Basic, Java and C++; Web applications created using ColdFusion Markup language are vulnerable to a variety of security breaches. </p> <p>Hack Proofing ColdFusion 5.0 is the seventh edition in the popular Hack Proofing series and provides developers with step-by-step instructions for developing secure web applications. </p> Teaches strategy and techniques: Using forensics-based analysis this book gives the reader insight to the mind of a hacker Interest in topic continues to grow: Network architects, engineers and administrators are scrambling for security books to help them protect their new networks and applications powered by ColdFusion Unrivalled Web-based support: Up-to-the minute links, white papers and analysis for two years at [email protected]", "author": "Syngress", "slug": "hack-proofing-coldfusion-276854-9780080478098-syngress", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080478098.png", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "276854", "product_url": "/app/ecom/book/276854/hack-proofing-coldfusion-276854-9780080478098-syngress", "bisac_codes": [ "COM053000", "COM014000" ], "items_count": null, "identifiers": { "ISBN13": "9781928994770", "EISBN13": "9780080478098", "EISBN10": "0080478093" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026348692" } } } }, { "type": "Product", "id": "00010000276853", "attributes": { "name": "Google Hacking for Penetration Testers", "subtitle": "", "description": "Google, the most popular search engine worldwide, provides web surfers with an easy-to-use guide to the Internet, with web and image searches, language translation, and a range of features that make web navigation simple enough for even the novice user. What many users dont realize is that the deceptively simple components that make Google so easy to use are the same features that generously unlock security flaws for the malicious hacker. Vulnerabilities in website security can be discovered through Google hacking, techniques applied to the search engine by computer criminals, identity thieves, and even terrorists to uncover secure information. This book beats Google hackers to the punch, equipping web administrators with penetration testing applications to ensure their site is invulnerable to a hackers search. <br><br>Penetration Testing with Google Hacks explores the explosive growth of a technique known as \"Google Hacking.\" When the modern security landscape includes such heady topics as \"blind SQL injection\" and \"integer overflows,\" it's refreshing to see such a deceptively simple tool bent to achieve such amazing results; this is hacking in the purest sense of the word. Readers will learn how to torque Google to detect SQL injection points and login portals, execute port scans and CGI scans, fingerprint web servers, locate incredible information caches such as firewall and IDS logs, password databases, SQL dumps and much more - all without sending a single packet to the target! Borrowing the techniques pioneered by malicious \"Google hackers,\" this talk aims to show security practitioners how to properly protect clients from this often overlooked and dangerous form of information leakage.<br><br>*First book about Google targeting IT professionals and security leaks through web browsing. <br><br>*Author Johnny Long, the authority on Google hacking, will be speaking about \"Google Hacking\" at the Black <br>Hat 2004 Briefing. His presentation on penetrating security flaws with Google is expected to create a lot of buzz and exposure for the topic. <br><br>*Johnny Long's Web site hosts the largest repository of Google security exposures and is the most popular destination for security professionals who want to learn about the dark side of Google.", "author": "Johnny Long", "slug": "google-hacking-for-penetration-testers-276853-9780080478050-johnny-long", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080478050.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "276853", "product_url": "/app/ecom/book/276853/google-hacking-for-penetration-testers-276853-9780080478050-johnny-long", "bisac_codes": [ "COM053000", "COM014000" ], "items_count": null, "identifiers": { "ISBN13": "9781931836364", "EISBN13": "9780080478050", "EISBN10": "0080478050" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026367731" } } } }, { "type": "Product", "id": "00010000276852", "attributes": { "name": "Geometry and Its Applications", "subtitle": "", "description": "<p>Meyer's Geometry and Its Applications, Second Edition, combines traditional geometry with current ideas to present a modern approach that is grounded in real-world applications. It balances the deductive approach with discovery learning, and introduces axiomatic, Euclidean geometry, non-Euclidean geometry, and transformational geometry. The text integrates applications and examples throughout and includes historical notes in many chapters.</p> <p>The Second Edition of Geometry and Its Applications is a significant text for any college or university that focuses on geometry's usefulness in other disciplines. It is especially appropriate for engineering and science majors, as well as future mathematics teachers.</p> Realistic applications integrated throughout the text, including (but not limited to): Symmetries of artistic patterns Physics Robotics Computer vision Computer graphics Stability of architectural structures Molecular biology Medicine Pattern recognition Historical notes included in many chapters", "author": "Walter A. Meyer", "slug": "geometry-and-its-applications-276852-9780080478036-walter-a-meyer", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080478036.png", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "276852", "product_url": "/app/ecom/book/276852/geometry-and-its-applications-276852-9780080478036-walter-a-meyer", "bisac_codes": [ "MAT012000", "MAT000000" ], "items_count": null, "identifiers": { "ISBN13": "9780123694270", "EISBN13": "9780080478036", "EISBN10": "0080478034" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026363666" } } } }, { "type": "Product", "id": "00010000276851", "attributes": { "name": "Multicast Communication", "subtitle": "Protocols, Programming, & Applications", "description": "<p>The Internet is quickly becoming the backbone for the worldwide information society of the future. Point-to-point communication dominates the network today, however, group communication--using multicast technology--will rapidly gain importance as digital, audio, and video transmission, push technology for the Web, and distribution of software updates to millions of end users become ubiquitous. <p>Multicast Communication: Protocols and Applications explains how and why multicast technology is the key to this transition. This book provides network engineers, designers, and administrators with the underlying concepts as well as a complete and detailed description of the protocols and algorithms that comprise multicast.<br><br>* Presents information on the entire range of multicast protocols, including, PIM-SM, MFTP, and PGM and explains their mechanisms, trade-offs, and solid approaches to their implementation* Provides an in-depth examination of Quality of Service concepts, including: RSVP, ST2, IntServ, and DiffServ* Discusses group address allocation and scoping* Discusses multicast implementation in ATM networks* Builds a solid understanding of the Mbone and surveys the successes and current limitations of real multicast applications on the Internet such as videoconferencing, whiteboards, and distance learning", "author": "Ralph Wittmann, Martina Zitterbart", "slug": "multicast-communication-276851-9780080497341-ralph-wittmann-martina-zitterbart", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080497341.jpg", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "276851", "product_url": "/app/ecom/book/276851/multicast-communication-276851-9780080497341-ralph-wittmann-martina-zitterbart", "bisac_codes": [ "COM043000", "COM051230" ], "items_count": null, "identifiers": { "ISBN13": "9781558606456", "EISBN13": "9780080497341", "EISBN10": "0080497349" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026355427" } } } }, { "type": "Product", "id": "00010000276849", "attributes": { "name": "Geometric Tools for Computer Graphics", "subtitle": "", "description": "<p>Do you spend too much time creating the building blocks of your graphics applications or finding and correcting errors? Geometric Tools for Computer Graphics is an extensive, conveniently organized collection of proven solutions to fundamental problems that you'd rather not solve over and over again, including building primitives, distance calculation, approximation, containment, decomposition, intersection determination, separation, and more. <p>If you have a mathematics degree, this book will save you time and trouble. If you don't, it will help you achieve things you may feel are out of your reach. Inside, each problem is clearly stated and diagrammed, and the fully detailed solutions are presented in easy-to-understand pseudocode. You also get the mathematics and geometry background needed to make optimal use of the solutions, as well as an abundance of reference material contained in a series of appendices. <p>Features Filled with robust, thoroughly tested solutions that will save you time and help you avoid costly errors.Covers problems relevant for both 2D and 3D graphics programming.Presents each problem and solution in stand-alone form allowing you the option of reading only those entries that matter to you.Provides the math and geometry background you need to understand the solutions and put them to work.Clearly diagrams each problem and presents solutions in easy-to-understand pseudocode.Resources associated with the book are available at the companion Web site www.mkp.com/gtcg.* Filled with robust, thoroughly tested solutions that will save you time and help you avoid costly errors.* Covers problems relevant for both 2D and 3D graphics programming.* Presents each problem and solution in stand-alone form allowing you the option of reading only those entries that matter to you.* Provides the math and geometry background you need to understand the solutions and put them to work.* Clearly diagrams each problem and presents solutions in easy-to-understand pseudocode.* Resources associated with the book are available at the companion Web site www.mkp.com/gtcg.", "author": "Philip Schneider, David H. Eberly", "slug": "geometric-tools-for-computer-graphics-276849-9780080478029-philip-schneider-david-h-eberly", "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080478029.png", "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg", "product_type": "book", "product_id": "276849", "product_url": "/app/ecom/book/276849/geometric-tools-for-computer-graphics-276849-9780080478029-philip-schneider-david-h-eberly", "bisac_codes": [ "COM012000", "077" ], "items_count": null, "identifiers": { "ISBN13": "9781558605947", "EISBN13": "9780080478029", "EISBN10": "0080478026" }, "drm": null, "cover_image": null, "default_cover_image": null, "book_type": null }, "relationships": { "lowest_offering": { "data": { "type": "offerings", "id": "00010026356032" } } } } ], "meta": { "pagination": { "page": 75190, "pages": 78473, "count": 1569441 } } }
Response Info
Default: None