GET /services/catalog/products?format=api&page=75191
Response information
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/vnd.api+json
Vary: Accept

{
    "links": {
        "first": "https://redshelf.com/services/catalog/products?format=api&page=1",
        "last": "https://redshelf.com/services/catalog/products?format=api&page=78472",
        "next": "https://redshelf.com/services/catalog/products?format=api&page=75192",
        "prev": "https://redshelf.com/services/catalog/products?format=api&page=75190"
    },
    "data": [
        {
            "type": "Product",
            "id": "00010000276845",
            "attributes": {
                "name": "Artificial Intelligence",
                "subtitle": "A New Synthesis",
                "description": "<p>Intelligent agents are employed as the central characters in this new introductory text. Beginning with elementary reactive agents, Nilsson gradually increases their cognitive horsepower to illustrate the most important and lasting ideas in AI. Neural networks, genetic programming, computer vision, heuristic search, knowledge representation and reasoning, Bayes networks, planning, and language understanding are each revealed through the growing capabilities of these agents. The book provides a refreshing and motivating new synthesis of the field by one of AI's master expositors and leading researchers. Artificial Intelligence: A New Synthesis takes the reader on a complete tour of this intriguing new world of AI. An evolutionary approach provides a unifying theme  Thorough coverage of important AI ideas, old and new Frequent use of examples and illustrative diagrams Extensive coverage of machine learning methods throughout the text Citations to over 500 references Comprehensive index",
                "author": "Nils J. Nilsson",
                "slug": "artificial-intelligence-276845-9780080499451-nils-j-nilsson",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080499451.png",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "276845",
                "product_url": "/app/ecom/book/276845/artificial-intelligence-276845-9780080499451-nils-j-nilsson",
                "bisac_codes": [
                    "COM012000",
                    "COM004000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781558604674",
                    "EISBN13": "9780080499451",
                    "EISBN10": "0080499457"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026351602"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000276843",
            "attributes": {
                "name": "Foundation Vibration Analysis",
                "subtitle": "A Strength of Materials Approach",
                "description": "<p>Structural analysis is usually carried out by a strength-of-materials approach that allows complex 3-D structures to be modelled adequately for design needs in a single dimension. However, this approach is not extensively used in geotechnical engineering, partly because 3-D media (soil, rock) are present, but more importantly because until recently the methods necessary to carry out this form of analysis did not exist.</p>  <p>In the last ten years efforts at modelling practical problems in foundation analysis using a strength-of-materials approach have developed the concept of the conical bar or beam as a tool. Such cone models can be used to model a foundation in a dynamic soil-structure interaction analysis with a variation of the properties with depth.</p>  <p>This book develops this new approach from scratch in a readable and accessible manner. A systematic evaluation for a wide range of actual sites demonstrates sufficient engineering accuracy. A short computer program written in MATLAB and a user-friendly executable program are provided, while practical examples ensure a clear understanding of the topic.</p> Simplifies complex 3-D analysis of soil-structure interaction Applies strength-of-materials approach to geotechnical engineering Illustrated with practical examples Executable program and MATLAB program for foundation vibration analysis",
                "author": "John P Wolf, Andrew J. Deeks",
                "slug": "foundation-vibration-analysis-276843-9780080477893-john-p-wolf-andrew-j-deeks",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080477893.png",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "276843",
                "product_url": "/app/ecom/book/276843/foundation-vibration-analysis-276843-9780080477893-john-p-wolf-andrew-j-deeks",
                "bisac_codes": [
                    "TEC009020",
                    "TEC009000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780750661645",
                    "EISBN13": "9780080477893",
                    "EISBN10": "0080477895"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026348989"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000276842",
            "attributes": {
                "name": "High-Performance Communication Networks",
                "subtitle": "",
                "description": "<p>By focusing on the convergence of the telephone, computer networking, cable TV, and wireless industries, this fully revised second edition explains current and emerging networking technologies. The authors proceed from fundamental principles to develop a comprehensive understanding of network architectures, protocols, control, performance, and economics. Communications engineers, computer scientists, and network administrators and managers will appreciate the book for its perspectives on the innovations that impact their work. Students will be enriched by the descriptive and thorough coverage of networking, giving them the knowledge to explore rewarding career opportunities.<br><br>* Provides the most recent information on <br><br>* wide and local area networks, including WDM and optical networks, Fast and Gigabit Ethernets<br>* access networks, such as cable modems and DSL;<br>* approaches for quality-differentiated services in IP and ATM networks.<br><br>* Examines the Internet, including proposed advances for improved performance and quality of service.<br>* Presents a comprehensive discussion of wireless networks for voice and data.<br>* Explains the economic factors and technical tradeoffs that guide network development.<br>* Derives (in self-contained sections) the most important mathematical results of network performance",
                "author": "Jean Walrand, Pravin Varaiya",
                "slug": "high-performance-communication-networks-276842-9780080508030-jean-walrand-pravin-varaiya",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080508030.png",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "276842",
                "product_url": "/app/ecom/book/276842/high-performance-communication-networks-276842-9780080508030-jean-walrand-pravin-varaiya",
                "bisac_codes": [
                    "COM043000",
                    "077"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781558605749",
                    "EISBN13": "9780080508030",
                    "EISBN10": "0080508030"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026361274"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000276841",
            "attributes": {
                "name": "Industrial Strength Parallel Computing",
                "subtitle": "",
                "description": "<p>Today, parallel computing experts can solve problems previously deemed impossible and make the \"merely difficult\" problems economically feasible to solve. This book presents and synthesizes the recent experiences of reknown expert developers who design robust and complex parallel computing applications. They demonstrate how to adapt and implement today's most advanced, most effective parallel computing techniques.  </p> <p>The book begins with a highly focused introductory course designed to provide a working knowledge of all the relevant architectures, programming models, and performance issues, as well as the basic approaches to assessment, optimization, scheduling, and debugging.</p> <p>Next comes a series of seventeen detailed case studiesall dealing with production-quality industrial and scientific applications, all presented firsthand by the actual code developers. Each chapter follows the same comparison-inviting format, presenting lessons learned and algorithms developed in the course of meeting real, non-academic challenges.  A final section highlights the case studies' most important insights and turns an eye to the future of the discipline.</p>* Provides in-depth case studies of seventeen parallel computing applications, some built from scratch, others developed through parallelizing existing applications.* Explains elements critical to all parallel programming environments, including:** Terminology and architectures** Programming models and methods** Performance analysis and debugging tools* Teaches primarily by example, showing how scientists in many fields have solved daunting problems using parallel computing.* Covers a wide range of application areasbiology, aerospace, semiconductor design, environmental modeling, data imaging and analysis, fluid dynamics, and more.* Summarizes the state of the art while looking to the future of parallel computing.Presents technical animations and visualizations from many of the applications detailed in the case studies via a companion web site.",
                "author": "Alice E. Koniges",
                "slug": "industrial-strength-parallel-computing-276841-9780080495385",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080495385.png",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "276841",
                "product_url": "/app/ecom/book/276841/industrial-strength-parallel-computing-276841-9780080495385",
                "bisac_codes": [
                    "COM011000",
                    "077"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781558605404",
                    "EISBN13": "9780080495385",
                    "EISBN10": "0080495389"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026365103"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000276840",
            "attributes": {
                "name": "Excel by Example",
                "subtitle": "A Microsoft Excel Cookbook for Electronics Engineers",
                "description": "The spreadsheet has become a ubiquitous engineering tool, and Microsoft Excel is the standard spreadsheet software package. Over the years, Excel has become such a complex program that most engineers understand and use only a tiny part of its power and features. This book is aimed at electronics engineers and technicians in particular, showing them how to best use Excel's features for computations, circuit modeling, graphing, and data analysis as applied to electronics design. Separate chapters cover lookup tables and file I/O, using macros, graphing, controls, using Analysis Toolpak for statistical analysis, databases, and linking into Excel from other sources, such as data from a serial port. The book is basically an engineering cookbook, with each chapter providing tutorial information along with several Excel \"recipes\" of interest to electronics engineers. The accompanying CD-ROM features ready-to-run, customizable Excel worksheets derived from the book examples, which will be useful tools to add to any electronics engineer's spreadsheet toolbox. Engineers are looking for any and all means to increase their efficiency and add to their \"bag of design tricks.\" Just about every electronics engineer uses Excel but most feel that the program has many more features to offer, if they only knew what they were! The Excel documentation is voluminous and electronics engineers don't have the time to read it all and sift through looking for those features that are directly applicable to their jobs and figure out how to use them. This book does that task for them-pulls out those features that they need to know about and shows them how to make use of them in specific design examples that they can then tailor to their own design needs.<br><br>*This is the ONLY book to deal with Excel specifically in the electronics field*Distills voluminous and time-consuming Excel documentation down to nitty-gritty explanations of those features that are directly applicable to the electronics engineer's daily job duties *The accompanying CD-ROM provides ready-to-use, fully-customizable worksheets from the book's examples",
                "author": "Aubrey Kagan",
                "slug": "excel-by-example-276840-9780080477671-aubrey-kagan",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080477671.png",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "276840",
                "product_url": "/app/ecom/book/276840/excel-by-example-276840-9780080477671-aubrey-kagan",
                "bisac_codes": [
                    "TEC007000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780750677561",
                    "EISBN13": "9780080477671",
                    "EISBN10": "0080477674"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026364709"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000276839",
            "attributes": {
                "name": "Fatigue Testing and Analysis",
                "subtitle": "Theory and Practice",
                "description": "<p>Fatigue Testing and Analysis: Theory and Practice presents the latest, proven techniques for fatigue data acquisition, data analysis, and test planning and practice. More specifically, it covers the most comprehensive methods to capture the component load, to characterize the scatter of product fatigue resistance and loading, to perform the fatigue damage assessment of a product, and to develop an accelerated life test plan for reliability target demonstration. This book is most useful for test and design engineers in the ground vehicle industry.</p>  <p>Fatigue Testing and Analysis introduces the methods to account for variability of loads and statistical fatigue properties that are useful for further probabilistic fatigue analysis. The text incorporates and demonstrates approaches that account for randomness of loading and materials, and covers the applications and demonstrations of both linear and double-linear damage rules. The reader will benefit from summaries of load transducer designs and data acquisition techniques, applications of both linear and non-linear damage rules and methods, and techniques to determine the statistical fatigue properties for the nominal stress-life and the local strain-life methods.</p> Covers the useful techniques for component load measurement and data acquisition, fatigue properties determination, fatigue analysis, and accelerated life test criteria development, and, most importantly, test plans for reliability demonstrations Written from a practical point of view, based on the authors' industrial and academic experience in automotive engineering design Extensive practical examples are used to illustrate the main concepts in all chapters",
                "author": "Yung-Li Lee, Jwo Pan, Richard Hathaway, Mark Barkey",
                "slug": "fatigue-testing-and-analysis-276839-9780080477695-yung-li-lee-jwo-pan-richard-hathaway-mark-barkey",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080477695.png",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "276839",
                "product_url": "/app/ecom/book/276839/fatigue-testing-and-analysis-276839-9780080477695-yung-li-lee-jwo-pan-richard-hathaway-mark-barkey",
                "bisac_codes": [
                    "TEC009070",
                    "SCI041000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780750677196",
                    "EISBN13": "9780080477695",
                    "EISBN10": "0080477690"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026356453"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000276838",
            "attributes": {
                "name": "Ethereal Packet Sniffing",
                "subtitle": "",
                "description": "This book provides system administrators with all of the information as well as software they need to run Ethereal Protocol Analyzer on their networks. There are currently no other books published on Ethereal, so this book will begin with chapters covering the installation and configuration of Ethereal. From there the book quickly moves into more advanced topics such as optimizing Ethereal's performance and analyzing data output by Ethereal. <br><br>Ethereal is an extremely powerful and complex product, capable of analyzing over 350 different network protocols. As such, this book also provides readers with an overview of the most common network protocols used, as well as analysis of Ethereal reports on the various protocols. The last part of the book provides readers with advanced information on using reports generated by Ethereal to both fix security holes and optimize network performance. Provides insider information on how to optimize performance of Ethereal on enterprise networks. Book comes with a CD containing Ethereal, Tethereal, Nessus, Snort, ACID, Barnyard, and more! Includes coverage of popular command-line version, Tethereal.",
                "author": "Syngress",
                "slug": "ethereal-packet-sniffing-276838-9780080477664-syngress",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080477664.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "276838",
                "product_url": "/app/ecom/book/276838/ethereal-packet-sniffing-276838-9780080477664-syngress",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781932266825",
                    "EISBN13": "9780080477664",
                    "EISBN10": "0080477666"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026358309"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000276837",
            "attributes": {
                "name": "Computing Perspectives",
                "subtitle": "",
                "description": "<p>In this insightful collection of essays, Maurice Wilkes shares his unique perspective on the development of computers and the current state of the art.  These enlightening essays discuss the foundational ideas behind modern computing and provide a solid grounding for the appreciation of emerging computer technologies.</p><p>Wilkes, one of the founders of computing, has provided enormous contributions to the development of computers, including the design and construction of the EDSAC computer and early development of programming for a stored program computer.  He was responsible for the concept of microprogramming.  Wilkes also wrote the first paper to appear on cache memories and was an early worker in the field of wide bandwidth local area networks.  In 1992 he was awarded the prestigious Kyoto Prize for Advanced Technology.</p><p>These essays will be of interest to everyone involved with computers and how they arrived at their present state.  Wilkes presents his perspectives with keen historical sensibility and engineering practicality.  Readers are invited to consider these observations and form their own perspectives on the present state of the computer art.</p>",
                "author": "Maurice V. Wilkes",
                "slug": "computing-perspectives-276837-9780080502687-maurice-v-wilkes",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080502687.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "276837",
                "product_url": "/app/ecom/book/276837/computing-perspectives-276837-9780080502687-maurice-v-wilkes",
                "bisac_codes": [
                    "COM013000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781558603172",
                    "EISBN13": "9780080502687",
                    "EISBN10": "0080502687"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026364686"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000276836",
            "attributes": {
                "name": "Enemy at the Water Cooler",
                "subtitle": "True Stories of Insider Threats and Enterprise Security Management Countermeasures",
                "description": "The book covers a decade of work with some of the largest commercial and government agencies around the world in addressing cyber security related to malicious insiders (trusted employees, contractors, and partners). It explores organized crime, terrorist threats, and hackers. It addresses the steps organizations must take to address insider threats at a people, process, and technology level. <br><br>Todays headlines are littered with news of identity thieves, organized cyber criminals, corporate espionage, nation-state threats, and terrorists. They represent the next wave of security threats but still possess nowhere near the devastating potential of the most insidious threat: the insider. This is not the bored 16-year-old hacker. We are talking about insiders like you and me, trusted employees with access to information - consultants, contractors, partners, visitors, vendors, and cleaning crews. Anyone in an organizations building or networks that possesses some level of trust.<br><br>*  Full coverage of this hot topic for virtually every global 5000 organization, government agency, and individual interested in security.<br><br>*  Brian Contos is the Chief Security Officer for one of the most well known, profitable and respected security software companies in the U.S.ArcSight.",
                "author": "Brian T Contos",
                "slug": "enemy-at-the-water-cooler-276836-9780080477602-brian-t-contos",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080477602.png",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "276836",
                "product_url": "/app/ecom/book/276836/enemy-at-the-water-cooler-276836-9780080477602-brian-t-contos",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781597491297",
                    "EISBN13": "9780080477602",
                    "EISBN10": "0080477607"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026358537"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000276835",
            "attributes": {
                "name": "Emergency Response Planning for Corporate and Municipal Managers",
                "subtitle": "",
                "description": "<p>Emergency Response Planning for Corporate and Municipal Managers, Second Edition, outlines the essential roles of corporate and municipal managers when responding to a wide range of natural and man-made disasters. It demonstrates the importance of their relationships with federal, state, and local government agencies as well as public and private community sectors.</p>  <p>Author Paul Erickson, one of the leading experts in the field, focuses on proactively planning for emergencies, particularly in the recognition and advanced coordination of response to incidents instead of simply implementing emergency measures.</p>  <p>This book provides specific recommendations regarding the immediate and long-term health and safety of emergency response. End of chapter summaries and questions provide concise information on learning objectives and a review of important concepts.</p>  <p>This book is recommended for graduate and undergraduate students studying emergency planning, management, and response; security, disaster recovery, loss prevention, and business continuity professionals and consultants; municipal managers involved in emergency planning and response; and corporate risk management/hazard professionals.</p> Helps you to develop and implement an Emergency Response Plan Provides specific recommendations regarding the immediate and long-term health and safety of emergency response personnel End of Chapter summaries and questions provide concise information on learning objectives and a review of important concepts",
                "author": "Paul A. Erickson",
                "slug": "emergency-response-planning-for-corporate-and-municipal-managers-276835-9780080477589-paul-a-erickson",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080477589.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "276835",
                "product_url": "/app/ecom/book/276835/emergency-response-planning-for-corporate-and-municipal-managers-276835-9780080477589-paul-a-erickson",
                "bisac_codes": [
                    "POL017000",
                    "POL020000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780123705037",
                    "EISBN13": "9780080477589",
                    "EISBN10": "0080477585"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026358496"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000276834",
            "attributes": {
                "name": "Readings in Human-Computer Interaction",
                "subtitle": "Toward the Year 2000",
                "description": "<p>The effectiveness of the user-computer interface has become increasingly important as computer systems have become useful tools for persons not trained in computer science. In fact, the interface is often the most important factor in the success or failure of any computer system. Dealing with the numerous subtly interrelated issues and technical, behavioral, and aesthetic considerations consumes a large and increasing share of development time and a corresponding percentage of the total code for any given application. A revision of one of the most successful books on human-computer interaction, this compilation gives students, researchers, and practitioners an overview of the significant concepts and results in the field and a comprehensive guide to the research literature.</p>  <p>Like the first edition, this book combines reprints of key research papers and case studies with synthesizing survey material and analysis by the editors. It is significantly reorganized, updated, and enhanced; over 90% of the papers are new.</p>  <p>An invaluable resource for systems designers, cognitive scientists, computer scientists, managers, and anyone concerned with the effectiveness of user-computer interfaces, it is also designed for use as a primary or supplementary text for graduate and advanced undergraduate courses in human-computer interaction and interface design.</p> Human computer interaction--historical, intellectual, and social Developing interactive systems, including design, evaluation methods, and development tools The interaction experience, through a variety of sensory modalities including vision, touch, gesture, audition, speech, and language Theories of information processing and issues of human-computer fit and adaptation",
                "author": "Ronald M. Baecker",
                "slug": "readings-in-human-computer-interaction-276834-9780080515748",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080515748.png",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "276834",
                "product_url": "/app/ecom/book/276834/readings-in-human-computer-interaction-276834-9780080515748",
                "bisac_codes": [
                    "COM013000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781558602465",
                    "EISBN13": "9780080515748",
                    "EISBN10": "0080515746"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026358151"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000276833",
            "attributes": {
                "name": "E-Mail Virus Protection Handbook",
                "subtitle": "Protect Your E-mail from Trojan Horses, Viruses, and Mobile Code Attacks",
                "description": "<p>The E-mail Virus Protection Handbook is organised around specific e-mail clients, server environments, and anti-virus software. The first eight chapters are useful to both users and network professionals; later chapters deal with topics relevant mostly to professionals with an emphasis on how to use e-mail filtering software to monitor all incoming documents for malicious behaviour. In addition, the handbook shows how to scan content and counter email address forgery attacks. A chapter on mobile code applications, which use Java applets and Active X controls to infect email and, ultimately, other applications and whole systems is presented.</p>  <p>The book covers spamming and spoofing: Spam is the practice of sending unsolicited email to users. One spam attack can bring down an entire enterprise email system by sending thousands of bogus messages or \"mailbombing,\" which can overload servers. Email spoofing means that users receive messages that appear to have originated from one user, but in actuality were sent from another user. Email spoofing can be used to trick users into sending sensitive information, such as passwords or account numbers, back to the spoofer.</p> Highly topical! Recent events such as the LoveBug virus means the demand for security solutions has never been higher Focuses on specific safeguards and solutions that are readily available to users",
                "author": "Syngress",
                "slug": "e-mail-virus-protection-handbook-276833-9780080477534-syngress",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080477534.png",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "276833",
                "product_url": "/app/ecom/book/276833/e-mail-virus-protection-handbook-276833-9780080477534-syngress",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781928994237",
                    "EISBN13": "9780080477534",
                    "EISBN10": "0080477534"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026347299"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000276832",
            "attributes": {
                "name": "Embedded Computing",
                "subtitle": "A VLIW Approach to Architecture, Compilers and Tools",
                "description": "The fact that there are more embedded computers than general-purpose computers and that we are impacted by hundreds of them every day is no longer news.  What is news is that their increasing performance requirements, complexity and capabilities demand a new approach to their design.  Fisher, Faraboschi, and Young describe a new age of embedded computing design, in which the processor is central, making the approach radically distinct from contemporary practices of embedded systems design.  They demonstrate why it is essential to take a computing-centric and system-design approach to the traditional elements of nonprogrammable components, peripherals, interconnects and buses.  These elements must be unified in a system design with high-performance processor architectures, microarchitectures and compilers, and with the compilation tools, debuggers and simulators needed for application development. In this landmark text, the authors apply their expertise in highly interdisciplinary hardware/software development and VLIW processors to illustrate this change in embedded computing.  VLIW architectures have long been a popular choice in embedded systems design, and while VLIW is a running theme throughout the book, embedded computing is the core topic. Embedded Computing examines both in a book filled with fact and opinion based on the authors many years of R&D experience.<br><br> Complemented by a unique, professional-quality embedded tool-chain on the authors' website, http://www.vliw.org/book Combines technical depth with real-world experience  Comprehensively explains the differences between general purpose computing systems and embedded systems at the hardware, software, tools and operating system levels.  Uses concrete examples to explain and motivate the trade-offs.",
                "author": "Joseph A. Fisher, Paolo Faraboschi, Cliff Young",
                "slug": "embedded-computing-276832-9780080477541-joseph-a-fisher-paolo-faraboschi-cliff-young",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080477541.png",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "276832",
                "product_url": "/app/ecom/book/276832/embedded-computing-276832-9780080477541-joseph-a-fisher-paolo-faraboschi-cliff-young",
                "bisac_codes": [
                    "COM011000",
                    "TEC008070"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781558607668",
                    "EISBN13": "9780080477541",
                    "EISBN10": "0080477542"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026358178"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000276831",
            "attributes": {
                "name": "Transmission and Distribution Electrical Engineering",
                "subtitle": "",
                "description": "This comprehensive treatment of the theory and practice encountered in the installation and design of transmission and distribution systems for electrical power has been updated and revised to provide the project engineer with all the latest, relevant information to design and specify the correct system for a particular application. Thoroughly updated and revised to include latest developments Learn from and Author with extensive experience in managing international projects Find out the reasoning and implications behind the different specifications and methods",
                "author": "Colin Bayliss, Brian Hardy",
                "slug": "transmission-and-distribution-electrical-engineering-276831-9780080477497-colin-bayliss-brian-hardy",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080477497.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "276831",
                "product_url": "/app/ecom/book/276831/transmission-and-distribution-electrical-engineering-276831-9780080477497-colin-bayliss-brian-hardy",
                "bisac_codes": [
                    "TEC007000",
                    "034"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780750640596",
                    "EISBN13": "9780080477497",
                    "EISBN10": "0080477496"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026350335"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000276830",
            "attributes": {
                "name": "Developing Web Services with Java APIs for XML Using WSDP",
                "subtitle": "",
                "description": "The Holy War between Microsoft Corporation and Sun Microsystems is heating up as Sun unveils JAX Pack to compete with Microsoft's .NET initiative<br>JAX Pack is an all-in-one development kit that utilizes XML to build cross platform Web services. For companies that are developing Web services to collaborate with business partners, JAX Pack offers a faster way to develop applications while maintaining independence from any particular vendor's XML technologies. <br>Developing Web Services with Java APIs for XML (JAX Pack) provides exhaustive coverage of Sun's recently released JAX Pack. The book assumes that readers are experienced Java developers with a solid understanding of XML. As such, the book contains five parts covering each component of JAX Pack. JAX Pack is a major product release for the most popular Web development environment First book out covering all five components of JAX Pack (JAXP, JAXR, JAXM, JAXB, and JAX-RPC) Unrivalled Web-based support with [email protected]; up-to-the minute links, white papers and analysis for one year",
                "author": "Syngress",
                "slug": "developing-web-services-with-java-apis-for-xml-using-wsdp-276830-9780080477435-syngress",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080477435.png",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "276830",
                "product_url": "/app/ecom/book/276830/developing-web-services-with-java-apis-for-xml-using-wsdp-276830-9780080477435-syngress",
                "bisac_codes": [
                    "COM051280",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781928994855",
                    "EISBN13": "9780080477435",
                    "EISBN10": "0080477437"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026357857"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000276829",
            "attributes": {
                "name": "Elasticity",
                "subtitle": "Theory, Applications, and Numerics",
                "description": "Although there are several books in print dealing with elasticity, many focus on specialized topics such as mathematical foundations, anisotropic materials, two-dimensional problems, thermoelasticity, non-linear theory, etc. As such they are not appropriate candidates for a general textbook. This book provides a concise and organized presentation and development of general theory of elasticity. This text is an excellent book teaching guide. Contains exercises for student engagement as well as the integration and use of MATLAB Software Provides development of common solution methodologies and a systematic review of analytical solutions useful in applications of",
                "author": "Martin H. Sadd",
                "slug": "elasticity-276829-9780080477473-martin-h-sadd",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080477473.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "276829",
                "product_url": "/app/ecom/book/276829/elasticity-276829-9780080477473-martin-h-sadd",
                "bisac_codes": [
                    "TEC009000",
                    "TEC021000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780126058116",
                    "EISBN13": "9780080477473",
                    "EISBN10": "008047747X"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026357937"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000276828",
            "attributes": {
                "name": "Dr Tom Shinder's ISA Server and Beyond",
                "subtitle": "Real World Security Solutions for Microsoft Enterprise Networks",
                "description": "The terrorist attacks of September 11 signaled the dawn of a new age of warfare: InfoWar. The greatest challenge facing the IT community in the 21st Century is securing networks from malicious attacks. The problem for the Microsoft network administrators and engineers is that securing Microsoft networks is an extremely complex task. <br><br>Dr Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks is designed to help network administrators meet the challenge of securing Microsoft enterprise networks. This is not another Windows \"security book.\" It is written, reviewed, and field tested by Microsoft network and security engineers who bring their real-world experiences to provide an entertaining, thought provoking, and imminently practical guide to securing Microsoft networks. Dr Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks also provides scenario based, practical examples, with detailed step-by-step explanations on how to carry out the most complex and obscure security configurations on Windows NT 4.0, Windows 2000 and Windows .Net computers.<br><br>The only all-encompassing book on securing Microsoft networks. <br>\tWindows NT, Windows 2000, Microsoft Internet Information Server (IIS), Microsoft Proxy Server, Microsoft Internet Security Accelerator, Microsoft Explorer are usually running simultaneously in some form on most enterprise networks. Other books deal with these components individually, but no other book provides a comprehensive solution like Dr Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks<br>Invaluable CD provides the weapons to defend your network. <br>\tThe accompanying CD is packed with third party tools, utilities, and software to defend your network.",
                "author": "Syngress",
                "slug": "dr-tom-shinders-isa-server-and-beyond-276828-9780080477398-syngress",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080477398.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "276828",
                "product_url": "/app/ecom/book/276828/dr-tom-shinders-isa-server-and-beyond-276828-9780080477398-syngress",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781931836661",
                    "EISBN13": "9780080477398",
                    "EISBN10": "0080477399"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026357617"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000276827",
            "attributes": {
                "name": "Drilling Fluids Processing Handbook",
                "subtitle": "",
                "description": "Written by the Shale Shaker Committee of the American Society of Mechanical Engineers, originally of the American Association of Drilling Engineers, the authors of this book are some of the most well-respected names in the world for drilling.  The first edition, Shale Shakers and Drilling Fluid Systems, was only on shale shakers, a very important piece of machinery on a drilling rig that removes drill cuttings.  The original book has been much expanded to include many other aspects of drilling solids control, including chapters on drilling fluids, cut-point curves, mud cleaners, and many other pieces of equipment that were not covered in the original book. Written by a team of more than 20 of the world's foremost drilling experts, from such companies as Shell, Conoco, Amoco, and BP There has never been a book that pulls together such a vast array of materials and depth of topic coverage in the area of drilling fluids Covers quickly changing technology that updates the drilling engineer on all of the latest equipment, fluids, and techniques",
                "author": "ASME Shale Shaker ASME Shale Shaker Committee",
                "slug": "drilling-fluids-processing-handbook-276827-9780080477411-asme-shale-shaker-asme-shale-shaker-committee",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/9780080477411.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "276827",
                "product_url": "/app/ecom/book/276827/drilling-fluids-processing-handbook-276827-9780080477411-asme-shale-shaker-asme-shale-shaker-committee",
                "bisac_codes": [
                    "TEC047000",
                    "034"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9780750677752",
                    "EISBN13": "9780080477411",
                    "EISBN10": "0080477410"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026360584"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000276826",
            "attributes": {
                "name": "Dr. Tom Shinder's Configuring ISA Server 2004",
                "subtitle": "",
                "description": "Dr. Tom and Debra Shinder have become synonymous with Microsoft's flagship firewall product ISA Server, as a result of Tom's prominent role as a member of the beta development team, and Tom and Deb's featured placement on both Microsoft's ISA Server Web site and ISAserver.org. Tom and Deb's book on the first release of the product \"Configuring ISA Server 2000\" dominated the ISA Server 2000 book market having sold over 40,000 copies worldwide, and the ISA Server community is eagerly awaiting Tom and Deb's book on ISA Server 2004, which is the dramatically upgraded new release from Microsoft.<br><br>Dr. Tom and Debra Shinder have become synonymous with Microsoft's flagship firewall product ISA Server, as a result of Tom's prominent role as a member of the beta development team, and Tom and Deb's featured placement on both Microsoft's ISA Server Web site and ISAserver.org. Tom and Deb's book on the first release of the product \"Configuring ISA Server 2000\" dominated the ISA Server 2000 book market having sold over 40,000 copies worldwide, and the ISA Server community is eagerly awaiting Tom and Deb's book on ISA Server 2004, which is the dramatically upgraded new release from Microsoft. This book will be featured prominently on the ISAserver.org home page as well as referenced on Microsoft TechNet and ISA Server Web pages. Tom and Deb's unparalleled technical expertise combined with prime on-line marketing opportunities will make this the #1 book again in the ISA Server market.<br><br>*  This book will provide readers with unparalleled information on installing, confiuguring, and troubleshooting ISA Server 2004 by teaching readers to: * Deploy ISA Server 2004 in small businesses and large organizations.<br><br>*  Learn how to configure complex DMZ configurations using ISA Server 2004's new network awareness features and built-in multinetworking capabilities.<br><br>*  Learn how to take advantage of ISA Server 2004's new VPN capabilities!",
                "author": "Debra Littlejohn Shinder, Thomas W Shinder",
                "slug": "dr-tom-shinders-configuring-isa-server-2004-276826-9780080477404-debra-littlejohn-shinder-thomas-w-shinder",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080477404.png",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "276826",
                "product_url": "/app/ecom/book/276826/dr-tom-shinders-configuring-isa-server-2004-276826-9780080477404-debra-littlejohn-shinder-thomas-w-shinder",
                "bisac_codes": [
                    "COM053000",
                    "COM014000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781931836197",
                    "EISBN13": "9780080477404",
                    "EISBN10": "0080477402"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026357115"
                    }
                }
            }
        },
        {
            "type": "Product",
            "id": "00010000276825",
            "attributes": {
                "name": "Foundations of Genetic Algorithms 1991 (FOGA 1)",
                "subtitle": "",
                "description": "<p>Foundations of Genetic Algorithms 1991 (FOGA 1) discusses the theoretical foundations of genetic algorithms (GA) and classifier systems.</p>  <p>This book compiles research papers on selection and convergence, coding and representation, problem hardness, deception, classifier system design, variation and recombination, parallelization, and population divergence. Other topics include the non-uniform Walsh-schema transform; spurious correlations and premature convergence in genetic algorithms; and variable default hierarchy separation in a classifier system. The grammar-based genetic algorithm; conditions for implicit parallelism; and analysis of multi-point crossover are also elaborated. This text likewise covers the genetic algorithms for real parameter optimization and isomorphisms of genetic algorithms. This publication is a good reference for students and researchers interested in genetic algorithms. </p>",
                "author": "Gregory J.E. Rawlins",
                "slug": "foundations-of-genetic-algorithms-1991-foga-1-276825-9780080506845",
                "thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/cover_image/9780080506845.jpg",
                "default_thumbnail_image": "//redshelf-images.s3-external-1.amazonaws.com/thumbnail/default_book_thumbnail.jpg",
                "product_type": "book",
                "product_id": "276825",
                "product_url": "/app/ecom/book/276825/foundations-of-genetic-algorithms-1991-foga-1-276825-9780080506845",
                "bisac_codes": [
                    "MAT003000",
                    "MAT029000"
                ],
                "items_count": null,
                "identifiers": {
                    "ISBN13": "9781558601703",
                    "EISBN13": "9780080506845",
                    "EISBN10": "0080506844"
                },
                "drm": null,
                "cover_image": null,
                "default_cover_image": null,
                "book_type": null
            },
            "relationships": {
                "lowest_offering": {
                    "data": {
                        "type": "offerings",
                        "id": "00010026357382"
                    }
                }
            }
        }
    ],
    "meta": {
        "pagination": {
            "page": 75191,
            "pages": 78472,
            "count": 1569438
        }
    }
}

Response Info

Default: None