Api Usage
Once connected to our services you can use our api to retrieve book content for your prototype.
Basic usage​
To access the service, use the following endpoints.
Development endpoint​
You will want to set a base url of http://localhost:3000/service
when working locally.
Production endpoint​
You will want to set a base url of https://unify-xdmwx.ondigitalocean.app/service/service/
when deploying your application.
Find all books​
Perform a GET request to this endpoint to return an array of all available books meta data.
GET​
/find/all
RETURNS​
[
{
"_id": "602c53ff31da06294c42d0f9",
"author": "William L. Briggs, Lyle Cochran, Bernard Gillett, Eric Schulz",
"title": "Calculus: Early Transcendentals, 3/e",
"cover": "9780134763644_math_briggs_calculusea_3_cm-etext_v2.epub.jpg",
"toc": [...]
},
{
"_id": "60300a98f5c7ab1df9211eff",
"author": "J. Noland White",
"title": "Psychology: An Exploration, 3/e",
"cover": "ciccarelli-pae-3e-vsource_v1.epub.jpg",
"toc": [...]
},
]
View cover image​
The api only returns the cover filename and not the path. The path before the filename is
https://book-service.sfo2.digitaloceanspaces.com/public/
Find a single book​
Perform a GET request to this endpoint with the required query parameter of id
, to return a single book.
Replace the value of id with the ID of the book. You can find the id by going to:
http://localhost:3000/service
while your project is running.
GET​
/find/one?id=60300a98f5c7ab1df9211eff
RETURNS​
{
"_id": "60300a98f5c7ab1df9211eff",
"author": "J. Noland White",
"title": "Psychology: An Exploration, 3/e",
"subject": "Marketing",
"published": "2014-10-14",
"publisher": "Pearson",
"page": "meta",
"cover": "ciccarelli-pae-3e-vsource_v1.epub.jpg",
"createdAt": "2021-02-19T18:59:36.815Z",
"updatedAt": "2021-02-19T18:59:36.815Z",
"__v": 0,
"toc": [...]
}
Table of contents​
The table of contents (toc), is stored inside an array as part of the book object. Included in the array is a collection of objects that contain title, href and an optional hash property of the page.
Important note: The optional hash property contains the id of an html element on that page, once the page is generated you can use the hash as an anchor to view that content.
[
{
"title": "1: Information and Network Security Concepts",
"href": "ch01_pg0001.xhtml"
},
{
"title": "Introduction: Information and Network Security Concepts",
"href": "ch01_pg0001.xhtml",
"hash":"id_toc12"
}
]
Get content from TOC​
You can use the table of contents to generate links and open associated content. Send a get request to the following while adding a parameter of id and href.
Important note: You will most likely need to add
OPS/xhtml/
to value of the href property before sending.GET​
/find/toc/content?id=60304209e848d357a0f7a717&href=OPS/xhtml/ch01_pg0001.xhtml
RESULT​
{
"content": [
"<section data-chaucer-element-id=\"1a97c357-38e5-4c1d-a62b-f9ac990d081d\" id=\"P7001016513000000000000000000464\" class=\"level1\"><header data-chaucer-element-id=\"163467fb-bb02-4cce-99d4-3491800ec22b\"><h1 data-chaucer-element-id=\"dedf55d0-1e33-4b86-b948-a8c30b6e4391\" class=\"title\" id=\"P7001016513000000000000000000465\" data-uri=\"M01_STAL4039_08_LLV_C01.xhtml#P7001016513000000000000000000465\" epub:type=\"title\"><span class=\"pagebreak\" title=\"6\" epub:type=\"pagebreak\"></span><span data-chaucer-element-id=\"fbe6871b-6552-4f12-ad61-3c48b59bc354\" class=\"number\">1.2 </span>The OSI Security Architecture</h1></header>\n<p data-chaucer-element-id=\"5d1b353d-4ff7-43cd-bb4a-1528332f456c\" id=\"P7001016513000000000000000000466\" data-uri=\"M01_STAL4039_08_LLV_C01.xhtml#P7001016513000000000000000000466\">To assess effectively the security needs of an organization and to evaluate and choose various security products and policies, the manager responsible for security needs some systematic way of defining the requirements for security and characterizing the approaches to satisfying those requirements. This is difficult enough in a centralized data processing environment; with the use of local and wide area networks, the problems are compounded.</p>\n<p data-chaucer-element-id=\"5c720b65-3e85-4ee5-88d8-b2fc7be4f68e\" id=\"P7001016513000000000000000000467\" data-uri=\"M01_STAL4039_08_LLV_C01.xhtml#P7001016513000000000000000000467\">ITU-T Recommendation X.800, <cite data-chaucer-element-id=\"58603fa3-a489-44d1-91a6-50f4c98b38e5\">Security Architecture for OSI</cite>, defines such a systematic approach. The open systems interconnection (OSI) security architecture is useful to managers as a way of organizing the task of providing security. Furthermore, because this architecture was developed as an international standard, computer and communications vendors have developed security features for their products and services that relate to this structured definition of services and mechanisms.</p>\n<p data-chaucer-element-id=\"dba350a1-b48e-4d02-a7d2-768322052cad\" id=\"P7001016513000000000000000000468\" data-uri=\"M01_STAL4039_08_LLV_C01.xhtml#P7001016513000000000000000000468\">For our purposes, the OSI security architecture provides a useful, if abstract, overview of many of the concepts that this book deals with. The OSI security architecture focuses on security attacks, mechanisms, and services. These can be defined briefly as:</p>\n<ul data-chaucer-element-id=\"892e3581-b414-47b6-b9b2-14939f1bf136\" id=\"P7001016513000000000000000000469\" data-uri=\"M01_STAL4039_08_LLV_C01.xhtml#P7001016513000000000000000000469\"><li data-chaucer-element-id=\"6fc119b4-ef76-4c85-a19d-745247b9e65e\" id=\"P700101651300000000000000000046A\" data-uri=\"M01_STAL4039_08_LLV_C01.xhtml#P700101651300000000000000000046A\"><p data-chaucer-element-id=\"26f5f353-c331-4ef1-a06f-59d43ee9ab88\" id=\"P700101651300000000000000000046B\" data-uri=\"M01_STAL4039_08_LLV_C01.xhtml#P700101651300000000000000000046B\"><a data-chaucer-element-id=\"8f3306f9-4321-474a-8a01-19394732f8b6\" id=\"P700101651300000000000000000046C\" class=\"keyword\" data-uri=\"M01_STAL4039_08_LLV_C01.xhtml#P700101651300000000000000000046C\" epub:type=\"keyword\" href=\"glossary.xhtml#P7001016513000000000000000007F68\">Security attack</a>: Any action that compromises the security of information owned by an organization.</p></li>\n<li data-chaucer-element-id=\"2106d4c8-1ac1-4163-8549-aa05c5f8581c\" id=\"P700101651300000000000000000046D\" data-uri=\"M01_STAL4039_08_LLV_C01.xhtml#P700101651300000000000000000046D\"><p data-chaucer-element-id=\"71f42ee9-7ef1-4400-baae-9928ae4e2fec\" id=\"P700101651300000000000000000046E\" data-uri=\"M01_STAL4039_08_LLV_C01.xhtml#P700101651300000000000000000046E\"><a data-chaucer-element-id=\"934a96c3-22ba-4abe-a38f-4b5fcd05f8fb\" id=\"P700101651300000000000000000046F\" class=\"keyword\" data-uri=\"M01_STAL4039_08_LLV_C01.xhtml#P700101651300000000000000000046F\" epub:type=\"keyword\" href=\"glossary.xhtml#P7001016513000000000000000007F6B\">Security mechanism</a>: A process (or a device incorporating such a process) that is designed to detect, prevent, or recover from a security attack.</p></li>\n<li data-chaucer-element-id=\"80b4f539-2dbf-48f7-981d-b285fa75af52\" id=\"P7001016513000000000000000000470\" data-uri=\"M01_STAL4039_08_LLV_C01.xhtml#P7001016513000000000000000000470\"><p data-chaucer-element-id=\"de2faeee-bfc8-4fb4-b8b2-f5e6f15519c8\" id=\"P7001016513000000000000000000471\" data-uri=\"M01_STAL4039_08_LLV_C01.xhtml#P7001016513000000000000000000471\"><a data-chaucer-element-id=\"89ffa9b4-2e09-4303-9fb8-3ea51aa14a76\" id=\"P7001016513000000000000000000472\" class=\"keyword\" data-uri=\"M01_STAL4039_08_LLV_C01.xhtml#P7001016513000000000000000000472\" epub:type=\"keyword\" href=\"glossary.xhtml#P7001016513000000000000000007F6E\">Security service</a>: A processing or communication service that enhances the security of the data processing systems and the information transfers of an organization. The services are intended to counter security attacks, and they make use of one or more security mechanisms to provide the service.</p></li></ul>\n<p data-chaucer-element-id=\"9b7e281b-d74e-40ae-81d2-604abf67ce73\" id=\"P7001016513000000000000000000473\" data-uri=\"M01_STAL4039_08_LLV_C01.xhtml#P7001016513000000000000000000473\">In the literature, the terms <i data-chaucer-element-id=\"ae8d46d9-fdf2-497a-9855-9b571c7c5716\">threat</i> and <i data-chaucer-element-id=\"97576730-00fe-46e3-9749-0538a46903d7\">attack</i> are commonly used, with the following meanings:</p>\n<ul data-chaucer-element-id=\"ba1699c6-b045-47da-b973-e1ed1eae2dab\" id=\"P7001016513000000000000000000474\" data-uri=\"M01_STAL4039_08_LLV_C01.xhtml#P7001016513000000000000000000474\"><li data-chaucer-element-id=\"ac98d408-4fa3-40f5-84a0-12e5f37ab5e3\" id=\"P7001016513000000000000000000475\" data-uri=\"M01_STAL4039_08_LLV_C01.xhtml#P7001016513000000000000000000475\"><p data-chaucer-element-id=\"d569dc8a-b42a-4529-b3f4-c54ff6448481\" id=\"P7001016513000000000000000000476\" data-uri=\"M01_STAL4039_08_LLV_C01.xhtml#P7001016513000000000000000000476\"><a data-chaucer-element-id=\"1bcfdd76-59e5-46ee-a554-d0d87fcd6132\" id=\"P7001016513000000000000000000477\" class=\"keyword\" data-uri=\"M01_STAL4039_08_LLV_C01.xhtml#P7001016513000000000000000000477\" epub:type=\"keyword\" href=\"glossary.xhtml#P7001016513000000000000000007F9B\">Threat</a>: Any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, or the Nation through an information system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service.</p></li>\n<li data-chaucer-element-id=\"6c0b6007-c976-4ed2-947b-93fe4f933fb5\" id=\"P7001016513000000000000000000478\" data-uri=\"M01_STAL4039_08_LLV_C01.xhtml#P7001016513000000000000000000478\"><p data-chaucer-element-id=\"43d44bf7-f0dc-4151-8c3c-1481e57fd666\" id=\"P7001016513000000000000000000479\" data-uri=\"M01_STAL4039_08_LLV_C01.xhtml#P7001016513000000000000000000479\"><a data-chaucer-element-id=\"f3da18f9-e980-485d-b7b0-894b62bfafe5\" id=\"P700101651300000000000000000047A\" class=\"keyword\" data-uri=\"M01_STAL4039_08_LLV_C01.xhtml#P700101651300000000000000000047A\" epub:type=\"keyword\" href=\"glossary.xhtml#P7001016513000000000000000007D2E\">Attack</a>: Any kind of malicious activity that attempts to collect, disrupt, deny, degrade, or destroy information system resources or the information itself.</p></li></ul>\n<p data-chaucer-element-id=\"c5828b98-564c-4f07-a0e3-807a425358e8\" id=\"P700101651300000000000000000047B\" data-uri=\"M01_STAL4039_08_LLV_C01.xhtml#P700101651300000000000000000047B\">The following three sections provide an overview of the concepts of attacks, services, and mechanisms. The key concepts that are covered are summarized in <a data-chaucer-element-id=\"78f2c012-0230-4ce1-968a-6bc182bf0a4f\" class=\"xref\" href=\"ch01_pg0003.xhtml#P700101651300000000000000000047C\"><span data-chaucer-element-id=\"1393695e-4478-485e-9726-bc37c80b98c7\" class=\"label\">Figure </span><span data-chaucer-element-id=\"32ec88b5-c419-4086-98b5-b280d29e1641\" class=\"number\">1.2</span></a>.</p>\n<figure data-chaucer-element-id=\"fbe658f6-98ee-41d4-963e-56d58473ec09\" id=\"P700101651300000000000000000047C\" class=\"figure lc_img75\" data-uri=\"M01_STAL4039_08_LLV_C01.xhtml#P700101651300000000000000000047C\"><header data-chaucer-element-id=\"1114b437-27c0-4921-91ed-9e94d42093a7\"><h1 data-chaucer-element-id=\"25940d73-6276-4222-811d-9c609e59c0a4\" class=\"title\" id=\"P700101651300000000000000000047D\" data-uri=\"M01_STAL4039_08_LLV_C01.xhtml#P700101651300000000000000000047D\" epub:type=\"title\"><span data-chaucer-element-id=\"8fe1feac-55cc-483a-bb52-eeb7479c41ab\" class=\"label\">Figure </span><span data-chaucer-element-id=\"097da683-d949-4d7b-8270-74e13e90720b\" class=\"number\">1.2 </span>Key Concepts in Security</h1></header><img data-chaucer-element-id=\"74a5751e-f4aa-42dc-b4d2-b2cba672b933\" class=\"fx-lightbox\" height=\"734\" width=\"740\" alt=\"An image shows the elements included in key concepts of security like attacks, services, and mechanisms placed one below the other.\" aria-describedby=\"P7001016513000000000000000000480\" id=\"P700101651300000000000000000047E\" data-uri=\"P700101651300000000000000000A458\" src=\"../images/FG_01_002.png\"></img></figure><div data-chaucer-element-id=\"31437a2b-a64c-447d-a34f-7b6e04aa5ece\" class=\"longdesc\" id=\"P7001016513000000000000000000480\" data-uri=\"M01_STAL4039_08_LLV_C01.xhtml#P7001016513000000000000000000480\" aria-hidden=\"false\"><a data-chaucer-element-id=\"d054cfbb-a6d2-4fbd-854b-dc8215eafe83\" class=\"xref\" aria-hidden=\"false\" href=\"../longalt/la_fg_01_002.xhtml#la_fg_01_002\">Figure 1.2 Full Alternative Text</a></div>\n</section>"
],
"_id": "6030420ae848d357a0f7a722"
}
Get all book content​
This is a good option if you dont need to use the TOC and are able to use random snippets or full pages of content.
Make a request to the following changing the id to the book id of your choice.
GET​
/find/all/content?id=60304209e848d357a0f7a717
RETURNS​
[
{
"content": [
"<span id=\"id_toc2\"></span><span class=\"pagebreak\" title=\"i\" epub:type=\"pagebreak\"></span>\n<img data-chaucer-element-id=\"0b9f2923-cafc-4e61-8391-aaffc563bb23\" class=\"fx-lightbox\" src=\"../images/cover.jpg\" alt=\"Book Cover, Cryptography and Network Security: Principles and Practice, 8/e by William Stallings, Pearson, 2020\" data-chaucer-note-id=\"587934\" />"
],
"_id": "6030420ae848d357a0f7a718"
},
{
"content": [
"<section data-chaucer-element-id=\"9927fbb2-a0d7-40a3-815e-c6f63326aec9\" id=\"P7001016513000000000000000000308\" class=\"level2\"><header data-chaucer-element-id=\"05128ce5-8b44-4214-8012-0dedab95e306\"><h1 data-chaucer-element-id=\"72a9e8e9-fc59-44b4-86df-5c17a1704122\" class=\"title\" id=\"P7001016513000000000000000000309\" data-uri=\"A01_STAL4039_08_LLV_FM.xhtml#P7001016513000000000000000000309\" epub:type=\"title\"><span class=\"pagebreak\" title=\"ix\" epub:type=\"pagebreak\"></span>Books by William Stallings<a data-chaucer-element-id=\"31546956-1b19-4b9a-9d22-7a304c6b4b7d\" class=\"noteref noteref_footnote\" id=\"r__P700101651300000000000000000032F\" epub:type=\"noteref\" role=\"doc-noteref\" href=\"fm01_pg0006.xhtml#P700101651300000000000000000032F\">*</a></h1></header>\n<section data-chaucer-element-id=\"4f7910ef-6f64-4686-a1b4-15673a86c362\" id=\"P700101651300000000000000000030A\" data-uri=\"A01_STAL4039_08_LLV_FM.xhtml#P700101651300000000000000000030A\" class=\"level3\"><header data-chaucer-element-id=\"efb75989-aa89-4a44-a7ea-7fc23cf3bb66\"><h1 data-chaucer-element-id=\"0e253457-ed06-4cc4-9985-270917ba2386\" class=\"title\" id=\"P700101651300000000000000000030B\" data-uri=\"A01_STAL4039_08_LLV_FM.xhtml#P700101651300000000000000000030B\" epub:type=\"title\">Computer Security, Fourth Edition (with Lawrie Brown)</h1></header>\n<p data-chaucer-element-id=\"c1106e9c-9d02-43e7-ae1a-247d8c194911\" id=\"P700101651300000000000000000030C\" data-uri=\"A01_STAL4039_08_LLV_FM.xhtml#P700101651300000000000000000030C\">A comprehensive treatment of computer security technology, including algorithms, protocols, and applications. Covers cryptography, authentication, access control, database security, cloud security, intrusion detection and prevention, malicious software, denial of service, firewalls, software security, physical security, human factors, auditing, legal and ethical aspects, and trusted systems. <b data-chaucer-element-id=\"1085bf4d-27a9-4cd2-976b-948ba80b7ce2\">Received the 2008 TAA award for the best Computer Science and Engineering Textbook of the year.</b></p></section>\n<section data-chaucer-element-id=\"2939f71a-fa61-4c08-96f1-408a6124748d\" id=\"P700101651300000000000000000030D\" data-uri=\"A01_STAL4039_08_LLV_FM.xhtml#P700101651300000000000000000030D\" class=\"level3\"><header data-chaucer-element-id=\"1aa23f53-5d60-4102-bf54-f6f602983eb0\"><h1 data-chaucer-element-id=\"3227a717-fda3-4024-81cc-7f3e73c962a5\" class=\"title\" id=\"P700101651300000000000000000030E\" data-uri=\"A01_STAL4039_08_LLV_FM.xhtml#P700101651300000000000000000030E\" epub:type=\"title\">Effective Cybersecurity: A Guide to Using Best Practices and Standards</h1></header>\n<p data-chaucer-element-id=\"b71d62d8-968c-4e44-89bf-8bd39de8f3c1\" id=\"P700101651300000000000000000030F\" data-uri=\"A01_STAL4039_08_LLV_FM.xhtml#P700101651300000000000000000030F\">This book provides a practical guide to applying the vast body of Best Practices and Standards documents related to the implementation of cybersecurity. The objective of this book is to organize, consolidate, and explain all of this material to enable the reader to make effective use of it. The book covers the planning, managing, designing, implementing, and assessing cybersecurity functions and services in IT systems.</p></section>\n<section data-chaucer-element-id=\"79e2481f-ca5b-46c5-aa01-109b2bf28c69\" id=\"P7001016513000000000000000000310\" data-uri=\"A01_STAL4039_08_LLV_FM.xhtml#P7001016513000000000000000000310\" class=\"level3\"><header data-chaucer-element-id=\"c237b332-0e74-4fab-97ea-f10708660767\"><h1 data-chaucer-element-id=\"caab5f14-b4b2-4261-ae98-0ef68d4e7bfb\" class=\"title\" id=\"P7001016513000000000000000000311\" data-uri=\"A01_STAL4039_08_LLV_FM.xhtml#P7001016513000000000000000000311\" epub:type=\"title\">Information Privacy Engineering And Privacy By Design</h1></header>\n<p data-chaucer-element-id=\"060d1bed-a656-4dc5-961b-f8adb073f0f9\" id=\"P7001016513000000000000000000312\" data-uri=\"A01_STAL4039_08_LLV_FM.xhtml#P7001016513000000000000000000312\">This book provides a practical guide to designing and implementing information privacy in IT systems. The book introduces information privacy concepts and discusses privacy requirements, threats, and vulnerabilities. The book discusses in detail the implementation of privacy controls, privacy management, and privacy monitoring and auditing. Finally, the book discusses legal and regulatory requirements, especially the EU General Data Protection Regulation and the body of U.S. privacy laws and regulations.</p></section>\n<section data-chaucer-element-id=\"ace40f84-6024-459f-a3a4-6260d8468c33\" id=\"P7001016513000000000000000000313\" data-uri=\"A01_STAL4039_08_LLV_FM.xhtml#P7001016513000000000000000000313\" class=\"level3\"><header data-chaucer-element-id=\"40eda724-af88-4364-a5dc-b4144b40472a\"><h1 data-chaucer-element-id=\"adc45e65-45d6-42c8-8e50-df279d6cd8c9\" class=\"title\" id=\"P7001016513000000000000000000314\" data-uri=\"A01_STAL4039_08_LLV_FM.xhtml#P7001016513000000000000000000314\" epub:type=\"title\">Cryptography And Network Security, Eighth Edition</h1></header>\n<p data-chaucer-element-id=\"ad3ebcdf-994b-479a-ae9b-c1281e98b739\" id=\"P7001016513000000000000000000315\" data-uri=\"A01_STAL4039_08_LLV_FM.xhtml#P7001016513000000000000000000315\">A tutorial and survey on network security technology. Each of the basic building blocks of network security, including conventional and public-key cryptography, authentication, and digital signatures, is covered. Provides a thorough mathematical background for such algorithms as AES and RSA. The book also covers the recent development of lightweight cryptography and post-quantum cryptography. The book covers important network security tools and applications, including S/MIME, IP Security, Kerberos, SSL/TLS, network access control, and Wi-Fi security. <b data-chaucer-element-id=\"5c9bad7a-13a2-41dc-89da-8245384221df\">The second edition of this book received the TAA award for the best Computer Science and Engineering Textbook of 1999.</b></p></section>\n<section data-chaucer-element-id=\"b70ac283-5e93-4b1a-b856-733305e8b1df\" id=\"P7001016513000000000000000000316\" data-uri=\"A01_STAL4039_08_LLV_FM.xhtml#P7001016513000000000000000000316\" class=\"level3\"><header data-chaucer-element-id=\"5c382f11-a076-4081-852a-c06aa405546e\"><h1 data-chaucer-element-id=\"f92bd437-9da4-4049-90fe-c04951911e7c\" class=\"title\" id=\"P7001016513000000000000000000317\" data-uri=\"A01_STAL4039_08_LLV_FM.xhtml#P7001016513000000000000000000317\" epub:type=\"title\">Network Security Essentials, Seventh Edition</h1></header>\n<p data-chaucer-element-id=\"173c5c12-114c-4973-962e-14c2cf098b96\" id=\"P7001016513000000000000000000318\" data-uri=\"A01_STAL4039_08_LLV_FM.xhtml#P7001016513000000000000000000318\">A tutorial and survey on network security technology. The book covers important network security tools and applications, including S/MIME, IP Security, Kerberos, SSL/TLS, network access control, and Wi-Fi security. In addition, methods for countering hackers and viruses are explored.</p></section>\n<section data-chaucer-element-id=\"5ad362ee-3464-4fc0-9fe8-25f20009b499\" id=\"P7001016513000000000000000000319\" data-uri=\"A01_STAL4039_08_LLV_FM.xhtml#P7001016513000000000000000000319\" class=\"level3\"><header data-chaucer-element-id=\"b41e4e68-1996-4f7c-8eee-5f8355a313a8\"><h1 data-chaucer-element-id=\"2fb32c20-8db1-48c3-b3b2-b1ead81eae18\" class=\"title\" id=\"P700101651300000000000000000031A\" data-uri=\"A01_STAL4039_08_LLV_FM.xhtml#P700101651300000000000000000031A\" epub:type=\"title\">Operating Systems, Ninth Edition</h1></header>\n<p data-chaucer-element-id=\"a5bb6a6b-b58c-4daa-b0c8-c6b0f17eab24\" id=\"P700101651300000000000000000031B\" data-uri=\"A01_STAL4039_08_LLV_FM.xhtml#P700101651300000000000000000031B\">A state-of-the art survey of operating system principles. Covers fundamental technology as well as contemporary design issues, such as threads, SMPs, multicore, real-time systems, multiprocessor scheduling, embedded OSs, distributed systems, clusters, security, and object-oriented design. <b data-chaucer-element-id=\"aa61c6c1-1980-4a9d-9e94-eb77b218e797\">The third, fourth, and sixth editions received the TAA award for the best Computer Science and Engineering Textbook of the year.</b></p></section>\n<section data-chaucer-element-id=\"8e06ebd3-6f1d-4d61-9f3e-e660468915e5\" id=\"P700101651300000000000000000031C\" data-uri=\"A01_STAL4039_08_LLV_FM.xhtml#P700101651300000000000000000031C\" class=\"level3\"><header data-chaucer-element-id=\"8a0e62a6-8082-496e-9d97-2d8d571410c6\"><h1 data-chaucer-element-id=\"b95aa5a6-0ded-49a9-9b3a-864f8dc8b8af\" class=\"title\" id=\"P700101651300000000000000000031D\" data-uri=\"A01_STAL4039_08_LLV_FM.xhtml#P700101651300000000000000000031D\" epub:type=\"title\">Computer Organization And Architecture, Eleventh Edition</h1></header>\n<p data-chaucer-element-id=\"a56bb6b4-1c1a-4acd-a7fc-99673497e7b9\" id=\"P700101651300000000000000000031E\" data-uri=\"A01_STAL4039_08_LLV_FM.xhtml#P700101651300000000000000000031E\">A unified view of this broad field. Covers fundamentals such as CPU, control unit, microprogramming, instruction set, I/O, and memory. Also covers advanced topics such as multicore, superscalar, and parallel organization. <b data-chaucer-element-id=\"bf15d1e1-9fda-4f4a-8c53-8bb7be9b3c49\">This book is five-time winner of the TAA award for the best Computer Science and Engineering Textbook of the year.</b></p></section>\n<section data-chaucer-element-id=\"0575bbe4-a488-48ec-beb5-5db76146ee1d\" id=\"P700101651300000000000000000031F\" data-uri=\"A01_STAL4039_08_LLV_FM.xhtml#P700101651300000000000000000031F\" class=\"level3\"><header data-chaucer-element-id=\"e892d9a4-3ad9-403a-a223-538009ff2326\"><h1 data-chaucer-element-id=\"25b3b0f1-721c-491e-8bbe-19c62660d163\" class=\"title\" id=\"P7001016513000000000000000000320\" data-uri=\"A01_STAL4039_08_LLV_FM.xhtml#P7001016513000000000000000000320\" epub:type=\"title\">Data And Computer Communications, Tenth Edition</h1></header>\n<p data-chaucer-element-id=\"d5769423-15cb-4a3a-87ab-414cca16a241\" id=\"P7001016513000000000000000000321\" data-uri=\"A01_STAL4039_08_LLV_FM.xhtml#P7001016513000000000000000000321\">A comprehensive survey that has become the standard in the field, covering (1) data communications, including transmission, media, signal encoding, link control, and multiplexing; (2) communication networks, including circuit- and packet-switched, frame relay, ATM, and LANs; (3) the TCP/IP protocol suite, including IPv6, TCP, MIME, and HTTP, as well as a detailed treatment of network security. <b data-chaucer-element-id=\"15e011ed-2b11-4ac8-849b-1250c1a4f3b7\">Received the 2007 Text and Academic Authors Association (TAA) award for the best Computer Science and Engineering Textbook of the year.</b></p></section>\n<section data-chaucer-element-id=\"6e42f4b3-e819-4c1d-a656-a6478a64a09f\" id=\"P7001016513000000000000000000322\" data-uri=\"A01_STAL4039_08_LLV_FM.xhtml#P7001016513000000000000000000322\" class=\"level3\"><header data-chaucer-element-id=\"c3636332-ba3e-4d82-bbb9-733b5d7360ec\"><h1 data-chaucer-element-id=\"3c18848d-0e46-407a-9103-ecd82b74465a\" class=\"title\" id=\"P7001016513000000000000000000323\" data-uri=\"A01_STAL4039_08_LLV_FM.xhtml#P7001016513000000000000000000323\" epub:type=\"title\">Wireless Communication Networks And Systems (with Cory Beard)</h1></header>\n<p data-chaucer-element-id=\"7d77361d-e5d1-4685-90ea-d468dd563c05\" id=\"P7001016513000000000000000000324\" data-uri=\"A01_STAL4039_08_LLV_FM.xhtml#P7001016513000000000000000000324\">A comprehensive, state-of-the art survey. Covers fundamental wireless communications topics, including antennas and propagation, signal encoding techniques, spread spectrum, and error correction techniques. Examines satellite, cellular, wireless local loop networks and wireless LANs, including Bluetooth and 802.11. Covers wireless mobile networks and applications.</p></section>\n<section data-chaucer-element-id=\"20053fbf-2ff6-4980-a883-c64ae7b3a241\" id=\"P7001016513000000000000000000325\" data-uri=\"A01_STAL4039_08_LLV_FM.xhtml#P7001016513000000000000000000325\" class=\"level3\"><header data-chaucer-element-id=\"18ac3fec-54be-42fc-9c9b-c0652e295fb3\"><h1 data-chaucer-element-id=\"3f9d7103-80a3-4d6c-921e-d782f0894368\" class=\"title\" id=\"P7001016513000000000000000000326\" data-uri=\"A01_STAL4039_08_LLV_FM.xhtml#P7001016513000000000000000000326\" epub:type=\"title\">Foundations of Modern Networking: SDN, NFV, QoE, IoT, and Cloud</h1></header>\n<p data-chaucer-element-id=\"6523d156-c055-4fac-bd7d-0a530e2f0bc2\" id=\"P7001016513000000000000000000327\" data-uri=\"A01_STAL4039_08_LLV_FM.xhtml#P7001016513000000000000000000327\">An in-depth up-to-date survey and tutorial on Software Defined Networking, Network Functions Virtualization, Quality of Experience, Internet of Things, and Cloud Computing and Networking. Examines standards, technologies, and deployment issues. Also treats security and career topics.</p>\n</section>\n<footer data-chaucer-element-id=\"8c84518d-ffeb-45c3-a493-c5ab13159185\"><aside data-chaucer-element-id=\"fb6b708b-8bf8-4d31-810e-2050ae722158\" id=\"P700101651300000000000000000032F\" class=\"footnote\" data-uri=\"A01_STAL4039_08_LLV_FM.xhtml#P700101651300000000000000000032F\" epub:type=\"footnote\" role=\"doc-footnote\"><p data-chaucer-element-id=\"2732d530-7d9a-4dd2-83e0-afea3732439b\">*These books are available at a discount at http://williamstallings.com/DiscountBookPurchase/</p></aside></footer></section>"
],
"_id": "6030420ae848d357a0f7a71d"
},
...
]