Professional Web Apis with Php: Ebay, Google, Paypal, Amazon, Fedex Plus Web Feeds
- Offers hands-on tips and numerous code examples that show Web developers how to leverage content and feeds from today's top Web sites-including Google, eBay, PayPal, Amazon, Yahoo!, and FedEx
- Introduces APIs (Application Program Interfaces) in general and uses real-world examples that show how to produce and document them
- Explains how to use the popular scripting language PHP to create APIs that interact with unrelated applications over the Web
- Examples take readers through each stage of the API process, from basic test implementations to integration with existing sites
Chris Shiflett (NY, NY) is a frequent contributor to the PHP community and a leading security expert. He talks at conferences such as ApacheCon and the O'Reilly Open Source Convention, and publishes articles in PHP Magazine and php|architect. "Security Corner," his monthly column for php|architect, which is the industry's foremost PHP security column.
Table of Contents
Part One: Web Feeds.
Chapter 1: Introducing Web Services.
Chapter 2: Introducing Web Feeds.
Chapter 3: Consuming Web Feeds.
Chapter 4: Producing Web Feeds.
Part Two: APIs.
Chapter 5: Introduction to Web APIs.
Chapter 6: Interacting with the Google API.
Chapter 7: Interacting with the Amazon API.
Chapter 8: Interacting with the FedEx API.
Chapter 9: Interacting with the eBay API.
Chapter 10: Interacting with the PayPal API.
Chapter 11: Other Major APIs.
Chapter 12: Producing Web APIs.
Appendix A: Supporting Functions.
Appendix B: Complete Feed Specifications.
Appendix C: Development System.
Sign up now »
- FTJob Title: Mac Systems/ Enterprise Systems EngineerNZ
- FTFlash / ActionScript Developer - ContractNSW
- FTTechnical Business AnalystNSW
- FTR&D EngineerSA
- FTLead Software EngineerSA
- FT.NET - Sitecore Developer - Melbourne - PermNSW
- FTQuality ManagerSA
- FTSenior Python DeveloperNSW
- FTOS Web Applications DeveloperNSW
Today’s successful targeted attacks use a combination of social engineering, malware, and backdoor activities. This research paper will discuss how advanced detection techniques can be used to identify malware command-and ...
The nature of work has changed fundamentally and forever and it continues to evolve rapidly. Geographic distance and ...
"Suggesting that people's "purpose is to get information to flow through the ..."
Why change management doesn’t work
"Darn those pesky laws that get in the way of commercial exploitation ..."
Larry Page wants to see your medical records
"Instead of partitioning the device between corporate and personal data, another approach ..."
Dual-Persona Smartphones Not a BYOD Panacea
"Well that's a nice back-handed compliment isn't it? So now, finally, my ..."
After two-year hiatus, EFF accepts bitcoin donations again
"Actually, both Mobile App developers and CIOs should be blamed for it. ..."
CIOs struggle to deliver timely mobile business apps: survey
- Twitter's two-step authentication a good start, experts say
- U.S. urged to let companies 'hack-back' at IP cyber thieves
- AusCERT 2013: Introduction to Network Security Monitoring with Security Onion - AusCERT Presentation
- Auscert 2013: Perimeter protection has failed, encryption needs its day in the sun
- Researchers find more versions of digitally signed Mac OS X spyware
- CITRIX SYNERGY ’13: Partners and customers main focus in mobile strategy, says Willis
- CITRIX SYNERGY ’13: Mobile is key to a digital worklife, says CEO (+12 photos)
- ASI brings LapCabby to Australia
- Two in three Australian tweens are on a social network: McAfee
- Huawei Australia 2012 revenue up 61 per cent to $368m
- Lack of information, skills hinder finance-business partnering: Deloitte
- Rapid-growing mobile payments market is driving a financial fraud marketplace
- HP profit falls 32 per cent as PC and server sales decline
- Google launching new fund for later-stage tech investments
- Apple defends offshore decisions that result in low taxes