In today’s market, where rival web services compete for attention, a well-designed REST API is a must-have feature. This concise book presents a set of API design rules, drawn primarily from best practices that stick close to the Web’s REST architectural style. Along with rules for URI design and HTTP use, you’ll learn guidelines for media types and representational forms.
REST APIs are ubiquitous, but few of them follow a consistent design methodology. Using these simple rules, you will design web service APIs that adhere to recognized web standards. To assist you, author Mark Massé introduces the Web Resource Modeling Language (WRML), a conceptual framework he created for the design and implementation of REST APIs.
Learn design rules for addressing resources with URIs
Apply design principles to HTTP’s request methods and response status codes
Work with guidelines for conveying metadata through HTTP headers and media types
Understand why REST APIs should be designed and configured, not coded
Refactoring to Agility
Agile methodologies, such as XP, Scrum, Crystal, and Lean Software Development enable development organizations to deliver higher-quality software far more rapidly. However, for the "non-agile" development organization, transitioning to agility is an enormous leap, requiring radically new skills and presenting profound...
Asset Protection and Security Management Handbook Overall an excellent book, a lot of valuable information…I would give the book 9 out of a possible 10 stars … Well organized and well written, the ideas and concepts flow in a methodical and progressive manner. … for those who have an interest in the subject matter, the book is a pleasure to read. …Excellent and...
Systems Programmer's Guide to Z/OS System Logger
This Redbook provides system programmers with a solid understanding of the System Logger component and guidance about how it should be set up for optimum performance with each of the exploiters.
The z/OS System Logger is a function provided by the operating system to exploiters running on z/OS. The number of exploiters of...
Gray Hat Hacking, Second Edition Uncover, plug, and ethically disclose security flaws
Prevent catastrophic network attacks by exposing security flaws, fixing them, and ethically reporting them to the software author. Fully expanded to cover the hacker's latest devious methods, Gray Hat Hacking: The Ethical Hacker's Handbook, Second Edition lays out...
Stretching For Dummies
Stretching is a hot topic these days — just take a look when you attend any sporting event and you can see multitudes of athletes doing side bends or stretching out their calves or some other body part. Yes, stretching is good for your body, plus it helps prevent injuries and manage day-to-day stress!
But what is stretching?...