Skip to Main Content
Amazon Hacks
book

Amazon Hacks

by Paul Bausch
August 2003
Intermediate to advanced content levelIntermediate to advanced
304 pages
7h 33m
English
O'Reilly Media, Inc.
Content preview from Amazon Hacks

How This Book Is Organized

To become an Amazon power user, you’ll have to learn about all the core features and how they relate to one another. The hacks are loosely organized by topic within each chapter, and the book itself is divided into several chapters by core feature:

Chapter 1

The ability to find a product among the millions available is a fundamental feature of Amazon. The search box on Amazon’s home page is only one way to navigate the catalog. This chapter starts simple, by showing you how to find any product’s Amazon Standard Item Number (ASIN); moves on to ways of fine-tuning search results and browsing categories; and ends with integrating Amazon searches into your web browser.

Chapter 2

From the moment you sign into your Amazon account to the moment you close your browser window, Amazon is collecting information to personalize your experience with the site. This chapter’s hacks show ways to access, control, and fine-tune that information.

Chapter 3

By allowing customers to communicate directly with each other, Amazon has become one of the largest community sites on the Web. This chapter describes ways to participate in the Amazon community, shows how you can integrate Amazon community features into your own web site, and demonstrates some ways to work with those features programmatically.

Chapter 4

Amazon has opened its billing, inventory, and marketing infrastructure to anyone who wants to sell through their site. They’ve gone from a single-vendor commerce site to ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

From ChatGPT to HackGPT: Meeting the Cybersecurity Threat of Generative AI

From ChatGPT to HackGPT: Meeting the Cybersecurity Threat of Generative AI

Karen Renaud, Merrill Warkentin, George Westerman
Incident Metrics in SRE

Incident Metrics in SRE

Stepan Davidovic

Publisher Resources

ISBN: 0596005423Supplemental ContentCatalog PageErrata