Skip to Main Content
Amazon Hacks
book

Amazon Hacks

by Paul Bausch
August 2003
Intermediate to advanced content levelIntermediate to advanced
304 pages
7h 33m
English
O'Reilly Media, Inc.
Content preview from Amazon Hacks

What You Need

To use any of the Web Services hacks in this book, you’ll need a developer’s token. The token itself is just a random string of alphanumeric characters that is tied to your Amazon associates account. This token system allows Amazon to track who is using their API and to confirm that anyone using it has agreed to the terms of service. It also enables Amazon to contact developers who are violating the terms of service—whether knowingly or unwittingly. You’ll need an existing associates account Section 5.2 to get a token. At the Associates Central web site, you’ll find a link to the Web Services Program (http://amazon.com/webservices). From there, click on “Apply for developer’s token.” You’ll need to provide an email and password and agree to the terms of service. It’s a good idea to look over the terms carefully before you agree. Here are a few points from the terms to keep in mind while you’re developing applications:

  • Don’t query the API more than once per second.

  • Don’t substantially alter the data you receive from Amazon.

  • Include a link to Amazon somewhere on your site or in your application.

  • Update any information from Amazon at least once a day (once per hour for prices).

  • Point to Amazon for any sales.

Once you’ve agreed, you’ll be granted your token. Jot it down and keep it somewhere accessible.

If you’re going to customize the hacks or develop your own applications, you’ll want to download the Amazon.com Web Services software development kit. It provides sample applications ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

From ChatGPT to HackGPT: Meeting the Cybersecurity Threat of Generative AI

From ChatGPT to HackGPT: Meeting the Cybersecurity Threat of Generative AI

Karen Renaud, Merrill Warkentin, George Westerman
Incident Metrics in SRE

Incident Metrics in SRE

Stepan Davidovic

Publisher Resources

ISBN: 0596005423Supplemental ContentCatalog PageErrata