cta quote button

Best Slack Books to Read

Read More

How Much Does It Cost to Hire Web Developers in Ukraine?

Our pricing is completely transparent: you pay your engineers’ salaries and a flat monthly fee for our services. No hidden charges.

Read More

1. Designing Bots: Creating Conversational Experiences (2017)

From Facebook Messenger to Kik, and from Slack bots to Google Assistant, Amazon Alexa, and email bots, the new conversational apps are revolutionizing the way we interact with software. This practical guide shows you how to design and build great conversational experiences and delightful bots that help people be more productive, whether it’s for a new consumer service or an enterprise efficiency product.

Ideal for designers, product managers, and entrepreneurs, this book explores what works and what doesn’t in real-world bot examples, and provides practical design patterns for your bot-building toolbox. You’ll learn how to use an effective onboarding process, outline different flows, define a bot personality, and choose the right balance of rich control and text.

  • Explore different bot use-cases and design best practices
  • Understand bot anatomy—such as brand and personality, conversations, advanced UI controls—and their associated design patterns
  • Learn steps for building a Facebook Messenger consumer bot and a Slack business bot
  • Explore the lessons learned and shared experiences of designers and entrepreneurs who have built bots
  • Design and prototype your first bot, and experiment with user feedback

Author(s): Amir Shevat

2. Building Slack Bots (2016)

Key Features

  • This is the first developer’s guide to programming for Slack
  • It covers everything you need to create chat bots for Slack’s conversational UI
  • It’s full of realistic examples, usable code, and lucid explanations on everything you need to know

Book Description

Slack promises that its users will “be less busy.” Slack bots interact with users in Slack chatrooms, providing useful immediate information, and automating work. This book gives you everything you need to build powerful and useful Slack bots.

You’ll see how to hook into the Slack API to create software that can read and post to chatrooms, respond to commands and hints given in natural conversational language, and build fun and useful bots for your own place of work, both as a front end to your own service and to distribute and share as apps. You can even sell your bots and build a business as a Slack bot developer.

Throughout the book, you’ll build useful and fun example applications that you can modify for your own situations. These range from simple, fun applications to liven up discussions to useful, data-driven apps to help you make decisions quickly and manage work.

What you will learn

  • Receive and send messages sent in Slack
  • Respond to user commands
  • Process natural language
  • Perform useful tasks on commands such as fetching data from external sources
  • Use webhooks and slash commands
  • Create a Google Classroom and add customized information for each individual class

About the Author

Paul Asjes started programming on his TI-83 calculator in high school and has been hooked ever since.

Specializing in JavaScript, he is always interested in staying up to date with the latest developments in the field. Currently, he is building universal full-stack apps with technologies such as React, Webpack, and Node when he’s not spending far too much time on Slack.

Since his IRC days, he has been interested in chat bots and how they can be used. He has written several Slack bots to date, ranging from bots that facilitate playing games to bots that retrieve important business metrics.

Table of Contents

  1. Getting Started with Slack
  2. Your First Bot
  3. Adding Complexity
  4. Using Data
  5. Understanding and Responding to Natural Language
  6. Webhooks and Slash Commands
  7. Publishing Your App

Author(s): Paul Asjes

3. Programming the Microsoft Bot Framework: A Multiplatform Approach to Building Chatbots (Developer Reference) (2017)

This is the only comprehensive, authoritative guide to building Conversational User Interfaces (CUI, a.k.a. bots, chatbots, or chatterbots) with the Microsoft Bot Framework. Reflecting the next radical revolution in human-computer interaction, it will help you leverage advanced artificial intelligence (AI) and natural language processing to empower new and existing applications with stunningly intuitive conversational interfaces.

 

Long-time Microsoft MVP Joe Mayo begins with high-level explanations of what Microsoft Bot Framework is, what you can do with it, and why it matters so much. Next, he presents the foundational knowledge you need to start creating real bots and CUIs. Step by step, you'll learn how to build message dialogs, manage conversations, interact with framework APIs, and incorporate powerful natural language processing with Microsoft's advanced Language Understanding Intelligent Service (LUIS). Mayo also offers detailed guidance on deploying your customized bots to key platforms such as Slack, Skype, and Facebook Messenger.

 

Throughout, Mayo's practical examples combine code with clear explanations of when and why you would perform each task. From start to finish, Programming the Microsoft Bot Framework is relentlessly practical, helping you translate the advanced “magic” of intelligent bots into real solutions right now.

Author(s): Joe Mayo

4. Data Hiding Techniques in Windows OS: A Practical Approach to Investigation and Defense (2016)

  • “This unique book delves down into the capabilities of hiding and obscuring data object within the Windows Operating System. However, one of the most noticeable and credible features of this publication is, it takes the reader from the very basics and background of data hiding techniques, and run’s on the reading-road to arrive at some of the more complex methodologies employed for concealing data object from the human eye and/or the investigation. As a practitioner in the Digital Age, I can see this book siting on the shelves of Cyber Security Professionals, and those working in the world of Digital Forensics – it is a recommended read, and is in my opinion a very valuable asset to those who are interested in the landscape of unknown unknowns. This is a book which may well help to discover more about that which is not in immediate view of the onlooker, and open up the mind to expand its imagination beyond its accepted limitations of known knowns.” – John Walker, CSIRT/SOC/Cyber Threat Intelligence Specialist
  • Featured in Digital Forensics Magazine, February 2017

In the digital world, the need to protect online communications increase as the technology behind it evolves. There are many techniques currently available to encrypt and secure our communication channels. Data hiding techniques can take data confidentiality to a new level as we can hide our secret messages in ordinary, honest-looking data files.

Steganography is the science of hiding data. It has several categorizations, and each type has its own techniques in hiding. Steganography has played a vital role in secret communication during wars since the dawn of history. In recent days, few computer users successfully manage to exploit their Windows® machine to conceal their private data.

Businesses also have deep concerns about misusing data hiding techniques. Many employers are amazed at how easily their valuable information can get out of their company walls. In many legal cases a disgruntled employee would successfully steal company private data despite all security measures implemented using simple digital hiding techniques.

Human right activists who live in countries controlled by oppressive regimes need ways to smuggle their online communications without attracting surveillance monitoring systems, continuously scan in/out internet traffic for interesting keywords and other artifacts. The same applies to journalists and whistleblowers all over the world.

Computer forensic investigators, law enforcements officers, intelligence services and IT security professionals need a guide to tell them where criminals can conceal their data in Windows® OS & multimedia files and how they can discover concealed data quickly and retrieve it in a forensic way.

Data Hiding Techniques in Windows OS is a response to all these concerns. Data hiding topics are usually approached in most books using an academic method, with long math equations about how each hiding technique algorithm works behind the scene, and are usually targeted at people who work in the academic arenas. This book teaches professionals and end users alike how they can hide their data and discover the hidden ones using a variety of ways under the most commonly used operating system on earth, Windows®.

This is your hands-on guide to understand, detect and use today’s most popular techniques in hiding and exploring hidden data under Windows® machines, covering all Windows® versions from XP till Windows® 10. Starting with the Roman Emperor, Julius Caesar, and his simple cipher method to the surveillance programs deployed by NSA, to monitor communication and online traffic, this book will teach you everything you need to know to protect your digital data using steganographic & anonymity cryptographic techniques. Written in a simple style and requiring only basic knowledge of main Windows® functions, techniques are presented in a way to easily implement them directly on your computer.

  • A brief history of steganography since early inception to present day
  • Simple methods to hide your data without using any third party tools, and different ways to investigate and explore hidden data
  • Exploiting multimedia files to conceal data using text, image, video and audio steganography
  • Exploiting Windows® NTFS file system to hide your secret data
  • A wide array of encryption techniques to protect your confidential data and securing your online communications
  • Using cryptographic anonymity tools to conceal your identity online
  • Explaining how hidden data could be used to plant a malware and launch sophisticated attacks against computer systems
  • Methods to crack steganography and cryptography
  • A chapter dedicated to anti-forensic techniques, detailing how to conceal data when using a Windows® machine

Author(s): Nihad Ahmad Hassan, Rami Hijazi

5. PowerPoint 2007 Graphics & Animation Made Easy (Made Easy Series) (2008)

Get beyond the basics with PowerPoint 2007

Take your PowerPoint skills to the next level with help from this highly visual, easy-to-follow guide. PowerPoint 2007 Graphics & Animation Made Easy shows you how to enhance your presentations with everything from bullets and tables to dynamic slides that come to life on the screen. You'll learn to use the latest tools and techniques such as WordArt, SmartArt, charts, audio, and motion graphics. Discover how easy it is to build professional presentations with rich images, special effects, and high-impact animations that will capture your audience's attention every time you present.

  • Design unique layouts customized for your needs
  • Create memorable photo albums with captions, textures, and themes
  • Add and manipulate clip art
  • Display data in graphically rich tables and charts
  • Enhance text with fills, outlines, and artistic effects using WordArt
  • Highlight important points, people, and objects with shapes
  • Transform content into dynamic graphics using SmartArt
  • Add punch to your presentations with movies and sound
  • Create custom animations and impressive special effects
  • Import Excel content quickly and easily into PowerPoint slides

Author(s): Sally Slack, Michelle Zavala

6. Programming and Problem Solving with Java (1999)

This book lays the foundation of programming skills for the computer science major, with an early introduction (in Chapter 2) of the basic concepts of objects, classes, selection and iteration, and how graphics are handled in Java. The rest of the book builds on this core knowledge base. A major advantage of this book is that several key topics in the course – including graphical user interfaces (GUIs), graphics, applets, and exceptions – are presented in optional, stand-alone appendixes at the back of the text, making it easy for instructors to discuss them in class in the order that best serves their course objectives. Most of the text’s chapters end with an overview of important areas of professional work and research in the field of computer science, including discussions of graphics, artificial intelligence, and database systems.

Author(s): James M. Slack

7. Practical Bot Development: Designing and Building Bots with Node.js and Microsoft Bot Builder Framework (2018)

Explore the concept of bots and discover the motivation behind working with these new apps with messaging platforms. This book is an accessible resource teaching the basic concepts behind bot design and implementation. Each chapter builds on previous topics and, where appropriate, real working code is shown that implements the concepts. By just picking up a code editor, you can start creating smart, engaging, and useful bot experiences today.


Practical Bot Development will teach you how to create your own bots on platforms like Facebook Messenger and Slack, incorporate extension APIs, and apply AI and ML algorithms in the cloud. By the end of this book, you’ll be equipped with the information to reach thousands of new users with the bots you create!
The book is a great resource for those looking and harness the benefits of building their own bots and leveraging the platform feasibility of them.
What You’ll Learn
  • Understand the general architecture of a bot
  • Distinguish between a great bot experience versus a bad bot experience.
  • Explore the ideas behind natural language processing and apply them to bot development
  • Implement real Messenger, Slack, and custom channel bots using Node.js and the Microsoft Bot Builder framework
  • Deploy bots to Facebook Messenger and Slack 
Who This Book Is For

Engineers, hobbyists, and  the design oriented community looking looking for an introduction to the technologies and concepts involved in building bots. The experience level could be from beginner to expert, although some familiarity with Node.js and APIs will be assumed. 

Author(s): Szymon Rozga

8. Configuring User-Designer Relations: Interdisciplinary Perspectives (Computer Supported Cooperative Work) (2010)

‘User-designer relations’ concerns the sorts of working relationships that arise between developers and end users of IT products – the different ways designers of IT products seek to engage with users, and the ways users seek to influence product design. It is through the shifting patterns of these relations that IT products are realised. Although it has generally been accepted that achieving better user-designer relations will improve the quality of IT products, there has been little consensus on how this might be achieved.
This book aims to deepen our understanding of the relationships between users and designers both as they emerge in the wild and as a consequence of our attempts to intervene. Through a series of case studies the book juxtaposes in-depth explorations of different perspectives and approaches to thinking about – and doing – user-designer relations, considering important implications for design and computer science more generally.

Author(s): Alex Voss, Mark Hartswood

9. The Accountant And Auditor’s Guide to the Microsoft Office System (Vertiguide) (2005)

Provides information for accountants and auditors on using Microsoft Office.

Author(s): S. E. Slack

10. Windows Vista: Home Entertainment with Windows Media Center and Xbox 360 (Media Center & Xbox 360) (2007)

Connect! Create! Play! And discover digital home entertainment made easy with Windows Vista, Windows Media Center, and Xbox 360. This book is full of activities that help you create a vivid entertainment experience in every room of your home. It’s loaded with easy how-to’s, helpful hints, and troubleshooting tips to help you focus on the fun. Let your imagination run wild and take a front row seat as you enjoy eye-popping graphics, 3D gaming on the big screen, and stunning cinematic experiences—all with one remote!

Discover how to:

  • Transform one PC into a hub for entertainment throughout your entire home
  • Bring home the concert hall and movie theater with dazzling sound and hi-def, big-screen picture
  • Create digital slide shows, home movies, photo albums, and music libraries to share throughout the home
  • Rent and download movies, record your favorite shows, watch them on your time
  • Game on! Download the hottest games or your retro favorites, and match wits online
  • Customize your system and set parental controls to meet the needs of the whole family

Author(s): S.E. Slack, Greg Slack

11. Advances in Self Organising Maps (2001)

This is the third Workshop on Self-Organising Maps (WSOM) and its related techniques. The previous two were held in Helsinki (1997 and 1999) and confIrmed the vitality of the SOM as one of the most popular and powerful concepts for unsupervised pattern recognition and data visualisation. These meetings not only acted as a showcase for the latest advances in SOM theory and for illustrating its vast range of applicability, but also as venues where much informal and fruitful interaction could take place. It is interesting to observe the development of the original SOM, and this remarkable progress confrrms the originality and insight of Teuvo Kohonen’s pioneering work. With the range and quality of the papers in this volume, the stage is set for another very successful meeting. This volume is a permanent record of all the contributions presented during WSOM’OI held at the University of Lincolnshire and Humberside, 13 – 15 June, 2001. The University is the newest of England’s universities but it is situated in the heart of one of our oldest cities – founded by the Romans and overlooked by the towering mass of its medieval cathedral. Primarily Lincoln has always been a centre for the rich agricultural heartland of England; however, it was the birthplace, 186 years ago, of George Boole. So WSOM’OI is continuing Lincoln’s long and honourable tradition of advancing scientific understanding.

Author(s): Nigel Allinson, Hujun Yin

12. The World Market for Paraffin Wax, Microcrystalline Petroleum Wax, Slack Wax, Ozokerite, Lignite Wax, Peat Wax, and Similar Waxes: A 2007 Global Trade Perspective (2006)

On the demand side, exporters and strategic planners approaching the world market face a number of questions. Which countries are supplying paraffin wax, microcrystalline petroleum wax, slack wax, ozokerite, lignite wax, peat wax, and similar waxes? What is the dollar value of these imports? How much do the imports of paraffin wax, microcrystalline petroleum wax, slack wax, ozokerite, lignite wax, peat wax, and similar waxes vary from one country to another? Do exporters serving the world market have similar market shares across the importing countries? Which countries supply the most exports of paraffin wax, microcrystalline petroleum wax, slack wax, ozokerite, lignite wax, peat wax, and similar waxes? Which countries are buying their exports? What is the value of these exports and which countries are the largest buyers? In what follows, Chapter 2 begins by summarizing the regional markets for imported and exported paraffin wax, microcrystalline petroleum wax, slack wax, ozokerite, lignite wax, peat wax, and similar waxes. The total level of imports and exports on a worldwide basis, and those for each region, is based on a model which aggregates across over 150 key country markets and projects these to the current year. From there, each country represents a percent of the world market. This market is served from a number of competitive countries of origin. Based on both demand- and supply-side dynamics, market shares by country of origin are then calculated across each country market destination. These shares lead to a volume of import and export values for each country and are aggregated to regional and world totals. In doing so, we are able to obtain maximum likelihood estimates of both the value of each market and the shares that countries are likely to receive this year. From these figures, rankings are calculated to allow managers to prioritize markets. In this way, all the figures provided in this report are forecasts that can be combined with internal information for strategic planning purposes.

Author(s): Philip M. Parker