-
Notifications
You must be signed in to change notification settings - Fork 1
/
Hacking APIs.json
1 lines (1 loc) · 37.9 KB
/
Hacking APIs.json
1
{'kind': 'books#volumes', 'totalItems': 205, 'items': [{'kind': 'books#volume', 'id': 'E3ZPEAAAQBAJ', 'etag': 'GUELdL5jK5Q', 'selfLink': 'https://www.googleapis.com/books/v1/volumes/E3ZPEAAAQBAJ', 'volumeInfo': {'title': 'Hacking APIs', 'subtitle': 'Breaking Web Application Programming Interfaces', 'authors': ['Corey J. Ball'], 'publisher': 'No Starch Press', 'publishedDate': '2022-07-05', 'description': 'Hacking APIs is a crash course in web API security testing that will prepare you to penetration-test APIs, reap high rewards on bug bounty programs, and make your own APIs more secure. Hacking APIs is a crash course on web API security testing that will prepare you to penetration-test APIs, reap high rewards on bug bounty programs, and make your own APIs more secure. You’ll learn how REST and GraphQL APIs work in the wild and set up a streamlined API testing lab with Burp Suite and Postman. Then you’ll master tools useful for reconnaissance, endpoint analysis, and fuzzing, such as Kiterunner and OWASP Amass. Next, you’ll learn to perform common attacks, like those targeting an API’s authentication mechanisms and the injection vulnerabilities commonly found in web applications. You’ll also learn techniques for bypassing protections against these attacks. In the book’s nine guided labs, which target intentionally vulnerable APIs, you’ll practice: • Enumerating APIs users and endpoints using fuzzing techniques • Using Postman to discover an excessive data exposure vulnerability • Performing a JSON Web Token attack against an API authentication process • Combining multiple API attack techniques to perform a NoSQL injection • Attacking a GraphQL API to uncover a broken object level authorization vulnerability By the end of the book, you’ll be prepared to uncover those high-payout API bugs other hackers aren’t finding and improve the security of applications on the web.', 'industryIdentifiers': [{'type': 'ISBN_13', 'identifier': '9781718502451'}, {'type': 'ISBN_10', 'identifier': '1718502451'}], 'readingModes': {'text': True, 'image': False}, 'pageCount': 362, 'printType': 'BOOK', 'categories': ['Computers'], 'maturityRating': 'NOT_MATURE', 'allowAnonLogging': True, 'contentVersion': '0.2.1.0.preview.2', 'panelizationSummary': {'containsEpubBubbles': False, 'containsImageBubbles': False}, 'imageLinks': {'smallThumbnail': 'http://books.google.com/books/content?id=E3ZPEAAAQBAJ&printsec=frontcover&img=1&zoom=5&edge=curl&source=gbs_api', 'thumbnail': 'http://books.google.com/books/content?id=E3ZPEAAAQBAJ&printsec=frontcover&img=1&zoom=1&edge=curl&source=gbs_api'}, 'language': 'en', 'previewLink': 'http://books.google.gr/books?id=E3ZPEAAAQBAJ&pg=PR4&dq=title:Hacking+APIs&hl=&cd=1&source=gbs_api', 'infoLink': 'https://play.google.com/store/books/details?id=E3ZPEAAAQBAJ&source=gbs_api', 'canonicalVolumeLink': 'https://play.google.com/store/books/details?id=E3ZPEAAAQBAJ'}, 'saleInfo': {'country': 'GR', 'saleability': 'FOR_SALE', 'isEbook': True, 'listPrice': {'amount': 46.43, 'currencyCode': 'EUR'}, 'retailPrice': {'amount': 46.43, 'currencyCode': 'EUR'}, 'buyLink': 'https://play.google.com/store/books/details?id=E3ZPEAAAQBAJ&rdid=book-E3ZPEAAAQBAJ&rdot=1&source=gbs_api', 'offers': [{'finskyOfferType': 1, 'listPrice': {'amountInMicros': 46430000, 'currencyCode': 'EUR'}, 'retailPrice': {'amountInMicros': 46430000, 'currencyCode': 'EUR'}}]}, 'accessInfo': {'country': 'GR', 'viewability': 'PARTIAL', 'embeddable': True, 'publicDomain': False, 'textToSpeechPermission': 'ALLOWED', 'epub': {'isAvailable': True}, 'pdf': {'isAvailable': False}, 'webReaderLink': 'http://play.google.com/books/reader?id=E3ZPEAAAQBAJ&hl=&source=gbs_api', 'accessViewStatus': 'SAMPLE', 'quoteSharingAllowed': False}, 'searchInfo': {'textSnippet': '<b>Title</b> : <b>Hacking APIS</b> : breaking web application programming interfaces / by Corey Ball . Description : San Francisco : No Starch Press , ( 2022 ) | Includes index . Identifiers : LCCN 2021061101 ( print ) | LCCN 2021061102 ( ebook ) ...'}}, {'kind': 'books#volume', 'id': 'IVFSTGvNflsC', 'etag': 'aCBxTFtEF5o', 'selfLink': 'https://www.googleapis.com/books/v1/volumes/IVFSTGvNflsC', 'volumeInfo': {'title': 'Hacking Exposed Mobile', 'subtitle': 'Security Secrets & Solutions', 'authors': ['Neil Bergman', 'Mike Stanfield', 'Jason Rouse', 'Joel Scambray', 'Sarath Geethakumar', 'Swapnil Deshmukh', 'Scott Matsumoto', 'John Steven', 'Mike Price'], 'publisher': 'McGraw Hill Professional', 'publishedDate': '2013-08-05', 'description': 'Proven security tactics for today\'s mobile apps, devices, and networks "A great overview of the new threats created by mobile devices. ...The authors have heaps of experience in the topics and bring that to every chapter." -- Slashdot Hacking Exposed Mobile continues in the great tradition of the Hacking Exposed series, arming business leaders and technology practitioners with an in-depth understanding of the latest attacks and countermeasures--so they can leverage the power of mobile platforms while ensuring that security risks are contained." -- Jamil Farshchi, Senior Business Leader of Strategic Planning and Initiatives, VISA Identify and evade key threats across the expanding mobile risk landscape. Hacking Exposed Mobile: Security Secrets & Solutions covers the wide range of attacks to your mobile deployment alongside ready-to-use countermeasures. Find out how attackers compromise networks and devices, attack mobile services, and subvert mobile apps. Learn how to encrypt mobile data, fortify mobile platforms, and eradicate malware. This cutting-edge guide reveals secure mobile development guidelines, how to leverage mobile OS features and MDM to isolate apps and data, and the techniques the pros use to secure mobile payment systems. Tour the mobile risk ecosystem with expert guides to both attack and defense Learn how cellular network attacks compromise devices over-the-air See the latest Android and iOS attacks in action, and learn how to stop them Delve into mobile malware at the code level to understand how to write resilient apps Defend against server-side mobile attacks, including SQL and XML injection Discover mobile web attacks, including abuse of custom URI schemes and JavaScript bridges Develop stronger mobile authentication routines using OAuth and SAML Get comprehensive mobile app development security guidance covering everything from threat modeling to iOS- and Android-specific tips Get started quickly using our mobile pen testing and consumer security checklists', 'industryIdentifiers': [{'type': 'ISBN_13', 'identifier': '9780071817028'}, {'type': 'ISBN_10', 'identifier': '0071817026'}], 'readingModes': {'text': True, 'image': True}, 'pageCount': 320, 'printType': 'BOOK', 'categories': ['Computers'], 'maturityRating': 'NOT_MATURE', 'allowAnonLogging': True, 'contentVersion': '3.4.4.0.preview.3', 'panelizationSummary': {'containsEpubBubbles': False, 'containsImageBubbles': False}, 'imageLinks': {'smallThumbnail': 'http://books.google.com/books/content?id=IVFSTGvNflsC&printsec=frontcover&img=1&zoom=5&edge=curl&source=gbs_api', 'thumbnail': 'http://books.google.com/books/content?id=IVFSTGvNflsC&printsec=frontcover&img=1&zoom=1&edge=curl&source=gbs_api'}, 'language': 'en', 'previewLink': 'http://books.google.gr/books?id=IVFSTGvNflsC&printsec=frontcover&dq=title:Hacking+APIs&hl=&cd=2&source=gbs_api', 'infoLink': 'https://play.google.com/store/books/details?id=IVFSTGvNflsC&source=gbs_api', 'canonicalVolumeLink': 'https://play.google.com/store/books/details?id=IVFSTGvNflsC'}, 'saleInfo': {'country': 'GR', 'saleability': 'FOR_SALE', 'isEbook': True, 'listPrice': {'amount': 43.54, 'currencyCode': 'EUR'}, 'retailPrice': {'amount': 30.48, 'currencyCode': 'EUR'}, 'buyLink': 'https://play.google.com/store/books/details?id=IVFSTGvNflsC&rdid=book-IVFSTGvNflsC&rdot=1&source=gbs_api', 'offers': [{'finskyOfferType': 1, 'listPrice': {'amountInMicros': 43540000, 'currencyCode': 'EUR'}, 'retailPrice': {'amountInMicros': 30480000, 'currencyCode': 'EUR'}}]}, 'accessInfo': {'country': 'GR', 'viewability': 'PARTIAL', 'embeddable': True, 'publicDomain': False, 'textToSpeechPermission': 'ALLOWED_FOR_ACCESSIBILITY', 'epub': {'isAvailable': True, 'acsTokenLink': 'http://books.google.gr/books/download/Hacking_Exposed_Mobile-sample-epub.acsm?id=IVFSTGvNflsC&format=epub&output=acs4_fulfillment_token&dl_type=sample&source=gbs_api'}, 'pdf': {'isAvailable': True, 'acsTokenLink': 'http://books.google.gr/books/download/Hacking_Exposed_Mobile-sample-pdf.acsm?id=IVFSTGvNflsC&format=pdf&output=acs4_fulfillment_token&dl_type=sample&source=gbs_api'}, 'webReaderLink': 'http://play.google.com/books/reader?id=IVFSTGvNflsC&hl=&source=gbs_api', 'accessViewStatus': 'SAMPLE', 'quoteSharingAllowed': False}, 'searchInfo': {'textSnippet': 'This cutting-edge guide reveals secure mobile development guidelines, how to leverage mobile OS features and MDM to isolate apps and data, and the techniques the pros use to secure mobile payment systems.'}}, {'kind': 'books#volume', 'id': 'bvB1-MmhEjQC', 'etag': 'KdcB299QHg0', 'selfLink': 'https://www.googleapis.com/books/v1/volumes/bvB1-MmhEjQC', 'volumeInfo': {'title': 'Google Hacking for Penetration Testers', 'authors': ['Johnny Long', 'Bill Gardner', 'Justin Brown'], 'publisher': 'Elsevier', 'publishedDate': '2011-04-18', 'description': 'This book helps people find sensitive information on the Web. Google is one of the 5 most popular sites on the internet with more than 380 million unique users per month (Nielsen/NetRatings 8/05). But, Google’s search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web including: social security numbers, credit card numbers, trade secrets, and federally classified documents. Google Hacking for Penetration Testers Volume 2 shows the art of manipulating Google used by security professionals and system administrators to find this sensitive information and “self-police their own organizations. Readers will learn how Google Maps and Google Earth provide pinpoint military accuracy, see how bad guys can manipulate Google to create super worms, and see how they can "mash up" Google with MySpace, LinkedIn, and more for passive reconaissance. • Learn Google Searching Basics Explore Google’s Web-based Interface, build Google queries, and work with Google URLs. • Use Advanced Operators to Perform Advanced Queries Combine advanced operators and learn about colliding operators and bad search-fu. • Learn the Ways of the Google Hacker See how to use caches for anonymity and review directory listings and traversal techniques. • Review Document Grinding and Database Digging See the ways to use Google to locate documents and then search within the documents to locate information. • Understand Google’s Part in an Information Collection Framework Learn the principles of automating searches and the applications of data mining. • Locate Exploits and Finding Targets Locate exploit code and then vulnerable targets. • See Ten Simple Security Searches Learn a few searches that give good results just about every time and are good for a security assessment. • Track Down Web Servers Locate and profile web servers, login portals, network hardware and utilities. • See How Bad Guys Troll for Data Find ways to search for usernames, passwords, credit card numbers, social security numbers, and other juicy information. • Hack Google Services Learn more about the AJAX Search API, Calendar, Blogger, Blog Search, and more.', 'industryIdentifiers': [{'type': 'ISBN_10', 'identifier': '0080484263'}, {'type': 'ISBN_13', 'identifier': '9780080484266'}], 'readingModes': {'text': True, 'image': True}, 'pageCount': 560, 'printType': 'BOOK', 'categories': ['Computers'], 'averageRating': 3.5, 'ratingsCount': 10, 'maturityRating': 'NOT_MATURE', 'allowAnonLogging': True, 'contentVersion': '1.8.5.0.preview.3', 'panelizationSummary': {'containsEpubBubbles': False, 'containsImageBubbles': False}, 'imageLinks': {'smallThumbnail': 'http://books.google.com/books/content?id=bvB1-MmhEjQC&printsec=frontcover&img=1&zoom=5&edge=curl&source=gbs_api', 'thumbnail': 'http://books.google.com/books/content?id=bvB1-MmhEjQC&printsec=frontcover&img=1&zoom=1&edge=curl&source=gbs_api'}, 'language': 'en', 'previewLink': 'http://books.google.gr/books?id=bvB1-MmhEjQC&pg=PA409&dq=title:Hacking+APIs&hl=&cd=3&source=gbs_api', 'infoLink': 'https://play.google.com/store/books/details?id=bvB1-MmhEjQC&source=gbs_api', 'canonicalVolumeLink': 'https://play.google.com/store/books/details?id=bvB1-MmhEjQC'}, 'saleInfo': {'country': 'GR', 'saleability': 'FOR_SALE', 'isEbook': True, 'listPrice': {'amount': 38.95, 'currencyCode': 'EUR'}, 'retailPrice': {'amount': 27.26, 'currencyCode': 'EUR'}, 'buyLink': 'https://play.google.com/store/books/details?id=bvB1-MmhEjQC&rdid=book-bvB1-MmhEjQC&rdot=1&source=gbs_api', 'offers': [{'finskyOfferType': 1, 'listPrice': {'amountInMicros': 38950000, 'currencyCode': 'EUR'}, 'retailPrice': {'amountInMicros': 27260000, 'currencyCode': 'EUR'}}]}, 'accessInfo': {'country': 'GR', 'viewability': 'PARTIAL', 'embeddable': True, 'publicDomain': False, 'textToSpeechPermission': 'ALLOWED', 'epub': {'isAvailable': True, 'acsTokenLink': 'http://books.google.gr/books/download/Google_Hacking_for_Penetration_Testers-sample-epub.acsm?id=bvB1-MmhEjQC&format=epub&output=acs4_fulfillment_token&dl_type=sample&source=gbs_api'}, 'pdf': {'isAvailable': True, 'acsTokenLink': 'http://books.google.gr/books/download/Google_Hacking_for_Penetration_Testers-sample-pdf.acsm?id=bvB1-MmhEjQC&format=pdf&output=acs4_fulfillment_token&dl_type=sample&source=gbs_api'}, 'webReaderLink': 'http://play.google.com/books/reader?id=bvB1-MmhEjQC&hl=&source=gbs_api', 'accessViewStatus': 'SAMPLE', 'quoteSharingAllowed': False}, 'searchInfo': {'textSnippet': 'Google AJAX Search <b>API</b> Integration Earlier in this chapter we discussed how to use the AJAX <b>API</b> to embed search engine facilities in your own applications and even do automated queries. ... <html> <head> <<b>title</b>><b>Hacking</b> AJAX <b>API</b>.'}}, {'kind': 'books#volume', 'id': 'c_tSAAAAMAAJ', 'etag': 'r0mndlEq7cA', 'selfLink': 'https://www.googleapis.com/books/v1/volumes/c_tSAAAAMAAJ', 'volumeInfo': {'title': 'Hacking GMail', 'authors': ['Ben Hammersley'], 'publisher': 'John Wiley & Sons', 'publishedDate': '2006-01-04', 'description': 'No mere "how to use Gmail" book, this hacker\'s resource is the first volume to unlock the true power behind Gmail. Make no mistake, this is serious, down-and-dirty, under-the-hood, code-level hacking that will have you eliminating the default settings, customizing appearance, disabling advertising, and taking control of your Gmail accounts. The book begins with the basics, explaining Gmail\'s capabilities and hidden features before moving on to more advanced topics like deconstructing the boot sequence and using Greasemonkey to customize things to your liking. From there, the sky\'s the limit. You\'ll see how to access your Gmail without having to check in at the site, create custom Gmail skins with CSS, build your own tools with APIs, get your mail via RSS feeds, use Gmail storage like a spare hard drive, use it as a blogging tool, and more. Gmail is a hacker\'s dream. Offering more than two gigabytes of storage, an incredibly advanced JavaScript interface, and a series of user interface innovations, it\'s proving to be one of the flagship applications on the Web. With this book, you can take control of this flagship, trick it out, and use its capabilities in unconventional ways.', 'industryIdentifiers': [{'type': 'OTHER', 'identifier': 'UOM:39015063243185'}], 'readingModes': {'text': False, 'image': False}, 'pageCount': 316, 'printType': 'BOOK', 'categories': ['Computers'], 'averageRating': 4, 'ratingsCount': 1, 'maturityRating': 'NOT_MATURE', 'allowAnonLogging': False, 'contentVersion': '0.3.3.0.preview.0', 'panelizationSummary': {'containsEpubBubbles': False, 'containsImageBubbles': False}, 'imageLinks': {'smallThumbnail': 'http://books.google.com/books/content?id=c_tSAAAAMAAJ&printsec=frontcover&img=1&zoom=5&source=gbs_api', 'thumbnail': 'http://books.google.com/books/content?id=c_tSAAAAMAAJ&printsec=frontcover&img=1&zoom=1&source=gbs_api'}, 'language': 'en', 'previewLink': 'http://books.google.gr/books?id=c_tSAAAAMAAJ&q=title:Hacking+APIs&dq=title:Hacking+APIs&hl=&cd=4&source=gbs_api', 'infoLink': 'http://books.google.gr/books?id=c_tSAAAAMAAJ&dq=title:Hacking+APIs&hl=&source=gbs_api', 'canonicalVolumeLink': 'https://books.google.com/books/about/Hacking_GMail.html?hl=&id=c_tSAAAAMAAJ'}, 'saleInfo': {'country': 'GR', 'saleability': 'NOT_FOR_SALE', 'isEbook': False}, 'accessInfo': {'country': 'GR', 'viewability': 'NO_PAGES', 'embeddable': False, 'publicDomain': False, 'textToSpeechPermission': 'ALLOWED', 'epub': {'isAvailable': False}, 'pdf': {'isAvailable': False}, 'webReaderLink': 'http://play.google.com/books/reader?id=c_tSAAAAMAAJ&hl=&source=gbs_api', 'accessViewStatus': 'NONE', 'quoteSharingAllowed': False}, 'searchInfo': {'textSnippet': 'The first book to unlock the true power behind Gmail, Hacking Gmail will immediately appeal to Google and Gmail fans This is serious, down-and-dirty, under-the-hood, code-level hacking that will have readers eliminating the default settings ...'}}, {'kind': 'books#volume', 'id': 'bfEY5nnr-SgC', 'etag': '+eM7WwuKgy4', 'selfLink': 'https://www.googleapis.com/books/v1/volumes/bfEY5nnr-SgC', 'volumeInfo': {'title': 'Kinect Open Source Programming Secrets', 'subtitle': 'Hacking the Kinect with OpenNI, NITE, and Java', 'authors': ['Andrew Davison'], 'publisher': 'McGraw Hill Professional', 'publishedDate': '2012-05-22', 'description': 'Program Kinect to do awesome things using a unique selection of open source software! The Kinect motion-sensing device for the Xbox 360 and Windows became the world\'s fastest-selling consumer electronics device when it was released (8 million sold in its first 60 days) and won prestigious awards, such as "Gaming Gadget of the Year." Now Kinect Open Source Programming Secrets lets YOU harness the Kinect\'s powerful sensing capabilities for gaming, science, multimedia projects, and a mind-boggling array of other applications on platforms running Windows, Mac OS, and Linux. Dr. Andrew Davison, a user interface programming expert, delivers exclusive coverage of how to program the Kinect sensor with the Java wrappers for OpenNI and NITE, which are APIs created by PrimeSense, the primary developers of the Kinect\'s technology. Beginning with the basics--depth imaging, 3D point clouds, skeletal tracking, and hand gestures--the book examines many other topics, including Kinect gaming, FAAST-style gestures that aren\'t part of standard NITE, motion detection using OpenCV, how to create gesture-driven GUIs, accessing the Kinect\'s motor and accelerometer, and other tips and techniques. Inside: Free open source APIs to let you develop amazing Kinect hacks for commercial or private use Full coverage of depth detection, camera, and infrared imaging point clouds; Kinect gaming; 3D programming; gesture-based GUIs, and more Online access to detailed code examples on the author\'s web site, plus bonus chapters on speech recognition, beamforming, and other exotica', 'industryIdentifiers': [{'type': 'ISBN_13', 'identifier': '9780071783187'}, {'type': 'ISBN_10', 'identifier': '0071783180'}], 'readingModes': {'text': True, 'image': True}, 'pageCount': 336, 'printType': 'BOOK', 'categories': ['Computers'], 'maturityRating': 'NOT_MATURE', 'allowAnonLogging': True, 'contentVersion': '2.8.7.0.preview.3', 'panelizationSummary': {'containsEpubBubbles': False, 'containsImageBubbles': False}, 'imageLinks': {'smallThumbnail': 'http://books.google.com/books/content?id=bfEY5nnr-SgC&printsec=frontcover&img=1&zoom=5&edge=curl&source=gbs_api', 'thumbnail': 'http://books.google.com/books/content?id=bfEY5nnr-SgC&printsec=frontcover&img=1&zoom=1&edge=curl&source=gbs_api'}, 'language': 'en', 'previewLink': 'http://books.google.gr/books?id=bfEY5nnr-SgC&printsec=frontcover&dq=title:Hacking+APIs&hl=&cd=5&source=gbs_api', 'infoLink': 'https://play.google.com/store/books/details?id=bfEY5nnr-SgC&source=gbs_api', 'canonicalVolumeLink': 'https://play.google.com/store/books/details?id=bfEY5nnr-SgC'}, 'saleInfo': {'country': 'GR', 'saleability': 'FOR_SALE', 'isEbook': True, 'listPrice': {'amount': 27.87, 'currencyCode': 'EUR'}, 'retailPrice': {'amount': 19.51, 'currencyCode': 'EUR'}, 'buyLink': 'https://play.google.com/store/books/details?id=bfEY5nnr-SgC&rdid=book-bfEY5nnr-SgC&rdot=1&source=gbs_api', 'offers': [{'finskyOfferType': 1, 'listPrice': {'amountInMicros': 27870000, 'currencyCode': 'EUR'}, 'retailPrice': {'amountInMicros': 19510000, 'currencyCode': 'EUR'}}]}, 'accessInfo': {'country': 'GR', 'viewability': 'PARTIAL', 'embeddable': True, 'publicDomain': False, 'textToSpeechPermission': 'ALLOWED_FOR_ACCESSIBILITY', 'epub': {'isAvailable': True, 'acsTokenLink': 'http://books.google.gr/books/download/Kinect_Open_Source_Programming_Secrets-sample-epub.acsm?id=bfEY5nnr-SgC&format=epub&output=acs4_fulfillment_token&dl_type=sample&source=gbs_api'}, 'pdf': {'isAvailable': True, 'acsTokenLink': 'http://books.google.gr/books/download/Kinect_Open_Source_Programming_Secrets-sample-pdf.acsm?id=bfEY5nnr-SgC&format=pdf&output=acs4_fulfillment_token&dl_type=sample&source=gbs_api'}, 'webReaderLink': 'http://play.google.com/books/reader?id=bfEY5nnr-SgC&hl=&source=gbs_api', 'accessViewStatus': 'SAMPLE', 'quoteSharingAllowed': False}, 'searchInfo': {'textSnippet': 'It covers topics not found elsewhere. It provides depth, but with brevity. Unique Programming Tools This is the only book on programming the Kinect using the OpenNI library, NITE, and Java (as of April 2012, when this book went to press).'}}, {'kind': 'books#volume', 'id': 'xOAebVlk-x4C', 'etag': 'Ux97OWEmdd8', 'selfLink': 'https://www.googleapis.com/books/v1/volumes/xOAebVlk-x4C', 'volumeInfo': {'title': 'IRC Hacks', 'subtitle': '100 Industrial-Strength Tips & Tools', 'authors': ['Paul Mutton'], 'publisher': '"O\'Reilly Media, Inc."', 'publishedDate': '2004-07-24', 'description': 'IRC (Internet Relay Chat) may very well turn out to be the world\'s most successful hack. In 1988, Jarkko Oikarinen wrote the original IRC program at the University of Oulu, Finland. As he says in his foreword, "IRC started as one summer trainee\'s programming exercise. A hack grew into a software development project that hundreds of people participated in, and then became a worldwide environment where tens of thousands of people now spend time with each other. I have found many of my friends through IRC and learnt a significant part of my present software engineering knowledge while using and working with IRC. That would not have been possible without learning from code examples and hacks from others".IRC has continued to grow in popularity since its inception. Millions of people from all over the world now use IRC to chat with friends, discuss projects and collaborate on research. With a simple, clearly defined protocol, IRC has become one of the most accessible chat environments, with clients written for a multitude of operating systems. And IRC is more than just a simple chat system it is a network of intercommunicating servers, allowing thousands of clients to connect from anywhere in the world using the IRC protocol.While IRC is easy to get into and many people are happy to use it without being aware of what\'s happening under the hood, there are those who hunger for more knowledge, and this book is for them. IRC Hacks is a collection of tips and tools that cover just about everything needed to become a true IRC master, featuring contributions from some of the most renowned IRC hackers, many of whom collaborated on IRC, grouping together to form the channel #irchacks on the freenode IRC network (irc.freenode.net).Like all of our Hacks books, there are many different ways to use IRC Hacks. You can read the book from cover to cover, but you might be better served by picking an interesting item from the table of contents and just diving in.If you\'re relatively new to IRC, you should considering starting with a few hacks from each progressive chapter. Chapter 1 starts you off by showing you how to connect to IRC, while Chapter 2 acquaints you with the everyday concepts you\'ll need to use IRC effectively. Chapter 3 is all about users and channels, and introduces the first pieces of code. Chapter 4 shows you how to make useful enhancements to IRC clients.Chapter 5 is where you will learn the basics about creating IRC bots, with Chapters 6-12 introducing more complex bots that can be used for logging, servicing communities, searching, announcing, networking, managing channels or simply for having fun. Chapter 13 delves into the IRC protocol in more detail, and Chapter 14 demonstrates some interesting alternative methods for connecting to IRC. Finally, Chapter 15 will move you on to new pastures by showing you how to set up your own IRC server.This book presents an opportunity to learn how IRC works and how to make best use of some of the features that have made it the most successful, most scalable, and most mature chat system on this planet. IRC Hacks delves deep into the possibilities.', 'industryIdentifiers': [{'type': 'ISBN_13', 'identifier': '9781449339449'}, {'type': 'ISBN_10', 'identifier': '1449339441'}], 'readingModes': {'text': True, 'image': True}, 'pageCount': 436, 'printType': 'BOOK', 'categories': ['Computers'], 'maturityRating': 'NOT_MATURE', 'allowAnonLogging': True, 'contentVersion': '2.2.3.0.preview.3', 'panelizationSummary': {'containsEpubBubbles': False, 'containsImageBubbles': False}, 'imageLinks': {'smallThumbnail': 'http://books.google.com/books/content?id=xOAebVlk-x4C&printsec=frontcover&img=1&zoom=5&edge=curl&source=gbs_api', 'thumbnail': 'http://books.google.com/books/content?id=xOAebVlk-x4C&printsec=frontcover&img=1&zoom=1&edge=curl&source=gbs_api'}, 'language': 'en', 'previewLink': 'http://books.google.gr/books?id=xOAebVlk-x4C&pg=PA193&dq=title:Hacking+APIs&hl=&cd=6&source=gbs_api', 'infoLink': 'https://play.google.com/store/books/details?id=xOAebVlk-x4C&source=gbs_api', 'canonicalVolumeLink': 'https://play.google.com/store/books/details?id=xOAebVlk-x4C'}, 'saleInfo': {'country': 'GR', 'saleability': 'FOR_SALE', 'isEbook': True, 'listPrice': {'amount': 20.14, 'currencyCode': 'EUR'}, 'retailPrice': {'amount': 20.14, 'currencyCode': 'EUR'}, 'buyLink': 'https://play.google.com/store/books/details?id=xOAebVlk-x4C&rdid=book-xOAebVlk-x4C&rdot=1&source=gbs_api', 'offers': [{'finskyOfferType': 1, 'listPrice': {'amountInMicros': 20140000, 'currencyCode': 'EUR'}, 'retailPrice': {'amountInMicros': 20140000, 'currencyCode': 'EUR'}}]}, 'accessInfo': {'country': 'GR', 'viewability': 'PARTIAL', 'embeddable': True, 'publicDomain': False, 'textToSpeechPermission': 'ALLOWED', 'epub': {'isAvailable': True}, 'pdf': {'isAvailable': True}, 'webReaderLink': 'http://play.google.com/books/reader?id=xOAebVlk-x4C&hl=&source=gbs_api', 'accessViewStatus': 'SAMPLE', 'quoteSharingAllowed': False}, 'searchInfo': {'textSnippet': 'You'llfind oodlesof Google goodness and more Google Web <b>API hacking</b> in Google <b>Hacks</b> by Tara Calishain and Rael Dornfest (O'Reilly). ... It will respond by showing the <b>title</b> and URL of the first Google search result.'}}, {'kind': 'books#volume', 'id': 'ggsPgcWzL4IC', 'etag': 'Kz8lvVSCWKQ', 'selfLink': 'https://www.googleapis.com/books/v1/volumes/ggsPgcWzL4IC', 'volumeInfo': {'title': 'Mac OS X Panther Hacks', 'authors': ['Rael Dornfest', 'James Duncan Davidson'], 'publisher': '"O\'Reilly Media, Inc."', 'publishedDate': '2004', 'description': "Like the animal it's named for, Mac OS X Panther is beautiful, sleek, superbly efficient, dangerously alluring, and all muscle under the surface. Beneath its appealing interface, it's a hard-working machine. Those coming to Mac OS X from previous incarnations of the operating system recognize much of the friendly face of the Macintosh they're used to, but they're also plunged into a whole new world. Unix converts to Mac OS X find a familiar FreeBSD-like operating system at the core and many of the command-line applications that they're familiar with: it's like an open invitation to roll up their sleeves and hack.Mac OS X Panther Hacks brings together the perfect combination of tips, tricks, and tools to help serious Mac users--regardless of their background--get the most from their machines. This revised collection reflects the real-world know how of those well-steeped in Unix history and expertise, sharing their no-nonsense, sometimes quick-and-dirty solutions to administering and taking full advantage of everything a Unix desktop has to offer: Web, Mail, and FTP serving, security services, SSH, Perl and shell scripting, compiling, configuring, scheduling, networking, and hacking. Add to that the experience of die-hard Macintosh users, customizing and modifying their hardware and software to meet their needs. The end result is cool stuff no power user should be without.The hacks in the book range from the quick and easy to the more complex. Each can be read easily in a few minutes, saving countless hours of searching for the right answer. Mac OS X Panther Hacks provides direct, hands-on solutions in topics such as: User Interface Accessories (iPod, USB devices, mobile phones, PDAs, etc.) Wired and wireless networking (Ethernet, WiFi, Bluetooth, etc.) Email (servers and clients) Web (servers and clients) Messaging (iChat and associated apps) Printing and Faxing (sharing printers, fax server, etc.) Multimedia If you want more than your average Mac user--you want to explore and experiment, unearth shortcuts, create useful tools, and come up with fun things to try on your own--this book will set you on the right track. Written for users who need to go beyond what's covered in conventional manuals--Mac OS X Panther Hacks will bring your Mac to its full potential.", 'industryIdentifiers': [{'type': 'ISBN_10', 'identifier': '0596007183'}, {'type': 'ISBN_13', 'identifier': '9780596007188'}], 'readingModes': {'text': False, 'image': True}, 'pageCount': 596, 'printType': 'BOOK', 'categories': ['Electronic books'], 'maturityRating': 'NOT_MATURE', 'allowAnonLogging': False, 'contentVersion': '2.3.7.0.preview.1', 'panelizationSummary': {'containsEpubBubbles': False, 'containsImageBubbles': False}, 'imageLinks': {'smallThumbnail': 'http://books.google.com/books/content?id=ggsPgcWzL4IC&printsec=frontcover&img=1&zoom=5&edge=curl&source=gbs_api', 'thumbnail': 'http://books.google.com/books/content?id=ggsPgcWzL4IC&printsec=frontcover&img=1&zoom=1&edge=curl&source=gbs_api'}, 'language': 'en', 'previewLink': 'http://books.google.gr/books?id=ggsPgcWzL4IC&printsec=frontcover&dq=title:Hacking+APIs&hl=&cd=7&source=gbs_api', 'infoLink': 'http://books.google.gr/books?id=ggsPgcWzL4IC&dq=title:Hacking+APIs&hl=&source=gbs_api', 'canonicalVolumeLink': 'https://books.google.com/books/about/Mac_OS_X_Panther_Hacks.html?hl=&id=ggsPgcWzL4IC'}, 'saleInfo': {'country': 'GR', 'saleability': 'NOT_FOR_SALE', 'isEbook': False}, 'accessInfo': {'country': 'GR', 'viewability': 'PARTIAL', 'embeddable': True, 'publicDomain': False, 'textToSpeechPermission': 'ALLOWED', 'epub': {'isAvailable': False}, 'pdf': {'isAvailable': True}, 'webReaderLink': 'http://play.google.com/books/reader?id=ggsPgcWzL4IC&hl=&source=gbs_api', 'accessViewStatus': 'SAMPLE', 'quoteSharingAllowed': False}, 'searchInfo': {'textSnippet': 'Mac OS X Panther Hacks provides direct, hands-on solutions in topics such as: User Interface Accessories (iPod, USB devices, mobile phones, PDAs, etc.) Wired and wireless networking (Ethernet, WiFi, Bluetooth, etc.) Email (servers and ...'}}, {'kind': 'books#volume', 'id': '2tKx79ahktoC', 'etag': 's+2Qcc/YAlo', 'selfLink': 'https://www.googleapis.com/books/v1/volumes/2tKx79ahktoC', 'volumeInfo': {'title': 'Spidering Hacks', 'subtitle': '100 Industrial-Strength Tips & Tools', 'authors': ['Kevin Hemenway', 'Morbus Iff', 'Tara Calishain'], 'publisher': '"O\'Reilly Media, Inc."', 'publishedDate': '2004', 'description': 'Provides techniques on creating spiders and scrapers to retrieve information from Web sites and data sources.', 'industryIdentifiers': [{'type': 'ISBN_13', 'identifier': '9780596005771'}, {'type': 'ISBN_10', 'identifier': '0596005776'}], 'readingModes': {'text': False, 'image': True}, 'pageCount': 424, 'printType': 'BOOK', 'categories': ['Computers'], 'averageRating': 3.5, 'ratingsCount': 3, 'maturityRating': 'NOT_MATURE', 'allowAnonLogging': True, 'contentVersion': '0.4.0.0.preview.1', 'panelizationSummary': {'containsEpubBubbles': False, 'containsImageBubbles': False}, 'imageLinks': {'smallThumbnail': 'http://books.google.com/books/content?id=2tKx79ahktoC&printsec=frontcover&img=1&zoom=5&edge=curl&source=gbs_api', 'thumbnail': 'http://books.google.com/books/content?id=2tKx79ahktoC&printsec=frontcover&img=1&zoom=1&edge=curl&source=gbs_api'}, 'language': 'en', 'previewLink': 'http://books.google.gr/books?id=2tKx79ahktoC&pg=PA160&dq=title:Hacking+APIs&hl=&cd=8&source=gbs_api', 'infoLink': 'http://books.google.gr/books?id=2tKx79ahktoC&dq=title:Hacking+APIs&hl=&source=gbs_api', 'canonicalVolumeLink': 'https://books.google.com/books/about/Spidering_Hacks.html?hl=&id=2tKx79ahktoC'}, 'saleInfo': {'country': 'GR', 'saleability': 'NOT_FOR_SALE', 'isEbook': False}, 'accessInfo': {'country': 'GR', 'viewability': 'PARTIAL', 'embeddable': True, 'publicDomain': False, 'textToSpeechPermission': 'ALLOWED', 'epub': {'isAvailable': False}, 'pdf': {'isAvailable': True}, 'webReaderLink': 'http://play.google.com/books/reader?id=2tKx79ahktoC&hl=&source=gbs_api', 'accessViewStatus': 'SAMPLE', 'quoteSharingAllowed': False}, 'searchInfo': {'textSnippet': 'This <b>hack</b> scrapes those related terms and performs a Google search for the related terms in the <b>title</b>. ... Aside from showing how scraped and <b>API</b>- generated data can live together in harmony, this <b>hack</b> is good to use when you're ...'}}, {'kind': 'books#volume', 'id': 'yqPizaawSzYC', 'etag': 'o2MEgru5+Io', 'selfLink': 'https://www.googleapis.com/books/v1/volumes/yqPizaawSzYC', 'volumeInfo': {'title': 'Google Apps Hacks', 'authors': ['Philipp Lenssen'], 'publisher': '"O\'Reilly Media, Inc."', 'publishedDate': '2008', 'description': 'Google is challenging the venerable Microsoft Office suite with its own Web-based office applications. This book offers scores of clever hacks and workarounds that enable power users to get more out of various applications.', 'industryIdentifiers': [{'type': 'ISBN_13', 'identifier': '9780596515881'}, {'type': 'ISBN_10', 'identifier': '059651588X'}], 'readingModes': {'text': False, 'image': True}, 'pageCount': 379, 'printType': 'BOOK', 'categories': ['Application software'], 'averageRating': 4, 'ratingsCount': 15, 'maturityRating': 'NOT_MATURE', 'allowAnonLogging': True, 'contentVersion': '3.2.0.0.preview.1', 'panelizationSummary': {'containsEpubBubbles': False, 'containsImageBubbles': False}, 'imageLinks': {'smallThumbnail': 'http://books.google.com/books/content?id=yqPizaawSzYC&printsec=frontcover&img=1&zoom=5&edge=curl&source=gbs_api', 'thumbnail': 'http://books.google.com/books/content?id=yqPizaawSzYC&printsec=frontcover&img=1&zoom=1&edge=curl&source=gbs_api'}, 'language': 'en', 'previewLink': 'http://books.google.gr/books?id=yqPizaawSzYC&pg=PA284&dq=title:Hacking+APIs&hl=&cd=9&source=gbs_api', 'infoLink': 'http://books.google.gr/books?id=yqPizaawSzYC&dq=title:Hacking+APIs&hl=&source=gbs_api', 'canonicalVolumeLink': 'https://books.google.com/books/about/Google_Apps_Hacks.html?hl=&id=yqPizaawSzYC'}, 'saleInfo': {'country': 'GR', 'saleability': 'NOT_FOR_SALE', 'isEbook': False}, 'accessInfo': {'country': 'GR', 'viewability': 'PARTIAL', 'embeddable': True, 'publicDomain': False, 'textToSpeechPermission': 'ALLOWED', 'epub': {'isAvailable': False}, 'pdf': {'isAvailable': True}, 'webReaderLink': 'http://play.google.com/books/reader?id=yqPizaawSzYC&hl=&source=gbs_api', 'accessViewStatus': 'SAMPLE', 'quoteSharingAllowed': False}, 'searchInfo': {'textSnippet': 'The HTML and Cascading Stylesheet files behind the sample home page <b>Hacking</b> the <b>Hack</b> For more control over what your map does and how it appears, you can use the Google Maps <b>API</b> (Application Programming Interface).'}}, {'kind': 'books#volume', 'id': 'yzqbAgAAQBAJ', 'etag': 'YkN5zXSUcGo', 'selfLink': 'https://www.googleapis.com/books/v1/volumes/yzqbAgAAQBAJ', 'volumeInfo': {'title': 'EBay Hacks', 'subtitle': 'Tips & Tools for Bidding, Buying, and Selling', 'authors': ['David A. Karp'], 'publisher': '"O\'Reilly Media, Inc."', 'publishedDate': '2005-06-02', 'description': 'Presents a collection of tips and techniques for getting the most out of eBay.', 'industryIdentifiers': [{'type': 'ISBN_13', 'identifier': '9780596100681'}, {'type': 'ISBN_10', 'identifier': '059610068X'}], 'readingModes': {'text': False, 'image': True}, 'pageCount': 463, 'printType': 'BOOK', 'categories': ['Computers'], 'averageRating': 5, 'ratingsCount': 1, 'maturityRating': 'NOT_MATURE', 'allowAnonLogging': False, 'contentVersion': '1.1.1.0.preview.1', 'panelizationSummary': {'containsEpubBubbles': False, 'containsImageBubbles': False}, 'imageLinks': {'smallThumbnail': 'http://books.google.com/books/content?id=yzqbAgAAQBAJ&printsec=frontcover&img=1&zoom=5&edge=curl&source=gbs_api', 'thumbnail': 'http://books.google.com/books/content?id=yzqbAgAAQBAJ&printsec=frontcover&img=1&zoom=1&edge=curl&source=gbs_api'}, 'language': 'en', 'previewLink': 'http://books.google.gr/books?id=yzqbAgAAQBAJ&pg=PA406&dq=title:Hacking+APIs&hl=&cd=10&source=gbs_api', 'infoLink': 'http://books.google.gr/books?id=yzqbAgAAQBAJ&dq=title:Hacking+APIs&hl=&source=gbs_api', 'canonicalVolumeLink': 'https://books.google.com/books/about/EBay_Hacks.html?hl=&id=yzqbAgAAQBAJ'}, 'saleInfo': {'country': 'GR', 'saleability': 'NOT_FOR_SALE', 'isEbook': False}, 'accessInfo': {'country': 'GR', 'viewability': 'PARTIAL', 'embeddable': True, 'publicDomain': False, 'textToSpeechPermission': 'ALLOWED', 'epub': {'isAvailable': False}, 'pdf': {'isAvailable': True}, 'webReaderLink': 'http://play.google.com/books/reader?id=yzqbAgAAQBAJ&hl=&source=gbs_api', 'accessViewStatus': 'SAMPLE', 'quoteSharingAllowed': False}, 'searchInfo': {'textSnippet': 'Change this to 1 (the default) for a Chinese auction, 2 for a Dutch auction [<b>Hack</b> #44], or 7 for an eBay Store listing [<b>Hack</b> #91]. Refer to the <b>API</b> documentation for the requirements for other listing formats.'}}]}