IPv6 network programming /

Saved in:
Bibliographic Details
Author / Creator:Hagino, Jun-ichiro itojun.
Imprint:Amsterdam ; Boston : Elsevier/Digital Press, ©2004.
Description:1 online resource (1 volume)
Language:English
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/11131032
Hidden Bibliographic Details
ISBN:1417552735
9781417552733
1281039497
9781281039491
9781555583187
1555583180
1592782612
9781592782611
9780080478791
0080478794
Notes:Includes bibliographical references and index.
Print version record.
Summary:This book contains everything you need to make your application program support IPv6. IPv6 socket APIs (RFC2553) are fully described with real-world examples. It covers security, a great concern these days. To secure the Internet infrastructure, every developer has to take a security stance - to audit every line of code, to use proper API and write correct and secure code as much as possible. To achieve this goal, the examples presented in this book are implemented with a security stance. Also, the book leads you to write secure programs. For instance, the book recommends against the use of some of the IPv6 standard APIs - unfortunately, there are some IPv6 APIs that are inherently insecure, so the book tries to avoid (and discourage) the use of such APIs. Another key issue is portability. The examples in the book should be applicable to any of UNIX based operating systems, MacOS X, and Windows XP. * Covers the new protocol just adopted by the Dept of Defense for future systems * Deals with security concerns, including spam and email, by presenting the best programming standards * Fully describes IPv6 socket APIs (RFC2553) using real-world examples * Allows for portability to UNIX-based operating systems, MacOS X, and Windows XP.
Other form:Print version: Hagino, Jun-ichiro itojun. IPv6 network programming. Amsterdam ; Boston : Elsevier/Digital Press, ©2004 1555583180

MARC

LEADER 00000cam a2200000Ia 4500
001 11131032
005 20210426223408.2
006 m o d
007 cr cnu|||unuuu
008 041109s2004 ne fob 001 0 eng d
019 |a 123125474  |a 149296453  |a 162595222  |a 648325077  |a 823829152  |a 823898862  |a 824090147  |a 824137284  |a 856949674  |a 880334380 
020 |a 1417552735  |q (electronic bk.) 
020 |a 9781417552733  |q (electronic bk.) 
020 |a 1281039497 
020 |a 9781281039491 
020 |a 9781555583187 
020 |a 1555583180 
020 |a 1592782612  |q (electronic bk. ;  |q Adobe Reader) 
020 |a 9781592782611  |q (electronic bk. ;  |q Adobe Reader) 
020 |a 9780080478791  |q (electronic bk.) 
020 |a 0080478794  |q (electronic bk.) 
035 |a (OCoLC)56938927  |z (OCoLC)123125474  |z (OCoLC)149296453  |z (OCoLC)162595222  |z (OCoLC)648325077  |z (OCoLC)823829152  |z (OCoLC)823898862  |z (OCoLC)824090147  |z (OCoLC)824137284  |z (OCoLC)856949674  |z (OCoLC)880334380 
035 9 |a (OCLCCM-CC)56938927 
037 |a 104829:104855  |b Elsevier Science & Technology  |n http://www.sciencedirect.com 
040 |a N$T  |b eng  |e pn  |c N$T  |d OCLCQ  |d YDXCP  |d OCLCQ  |d OCLCO  |d OCLCQ  |d IDEBK  |d OCLCF  |d OCLCQ  |d OPELS  |d E7B  |d EBLCP  |d SLY  |d OCLCQ  |d AGLDB  |d IQW  |d PIFBR  |d OCLCQ  |d WY@  |d LUE  |d D6H  |d VTS  |d TOF  |d STF  |d G3B  |d K6U  |d LUN  |d OCLCQ 
049 |a MAIN 
050 4 |a TK5105.585  |b .H34 2004eb 
072 7 |a COM  |x 043040  |2 bisacsh 
072 7 |a UT  |2 bicssc 
084 |a TN915. 04  |2 clc 
100 1 |a Hagino, Jun-ichiro itojun.  |0 http://id.loc.gov/authorities/names/n2004012956 
245 1 0 |a IPv6 network programming /  |c Jun-ichiro itojun Hagino. 
260 |a Amsterdam ;  |a Boston :  |b Elsevier/Digital Press,  |c ©2004. 
300 |a 1 online resource (1 volume) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
588 0 |a Print version record. 
520 |a This book contains everything you need to make your application program support IPv6. IPv6 socket APIs (RFC2553) are fully described with real-world examples. It covers security, a great concern these days. To secure the Internet infrastructure, every developer has to take a security stance - to audit every line of code, to use proper API and write correct and secure code as much as possible. To achieve this goal, the examples presented in this book are implemented with a security stance. Also, the book leads you to write secure programs. For instance, the book recommends against the use of some of the IPv6 standard APIs - unfortunately, there are some IPv6 APIs that are inherently insecure, so the book tries to avoid (and discourage) the use of such APIs. Another key issue is portability. The examples in the book should be applicable to any of UNIX based operating systems, MacOS X, and Windows XP. * Covers the new protocol just adopted by the Dept of Defense for future systems * Deals with security concerns, including spam and email, by presenting the best programming standards * Fully describes IPv6 socket APIs (RFC2553) using real-world examples * Allows for portability to UNIX-based operating systems, MacOS X, and Windows XP. 
650 0 |a TCP/IP (Computer network protocol)  |0 http://id.loc.gov/authorities/subjects/sh91005299 
650 7 |a COMPUTERS  |x Networking  |x Network Protocols.  |2 bisacsh 
650 0 7 |a TCP/IP (Computer network protocol)  |2 cct 
650 7 |a TCP/IP (Computer network protocol)  |2 fast  |0 (OCoLC)fst01141584 
655 0 |a Electronic books. 
655 4 |a Electronic books. 
776 0 8 |i Print version:  |a Hagino, Jun-ichiro itojun.  |t IPv6 network programming.  |d Amsterdam ; Boston : Elsevier/Digital Press, ©2004  |z 1555583180  |w (OCoLC)56645105 
903 |a HeVa 
929 |a oclccm 
999 f f |i 0d140680-3f18-5aa7-acff-16f22db09bb2  |s 3a331ee5-ef2d-58b5-bba9-b1aa36c48527 
928 |t Library of Congress classification  |a TK5105.585 .H34 2004eb  |l Online  |c UC-FullText  |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=e000xna&AN=117176  |z eBooks on EBSCOhost  |g ebooks  |i 12225637