IPv6 network programming:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam
Elsevier/Digital Press
©2004
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Includes bibliographical references and index This book contains everything you need to make your application program support IPv6. IPv6 socket APIs (RFC2553) are fully described with real-world examples. It covers security, a great concern these days. To secure the Internet infrastructure, every developer has to take a security stance - to audit every line of code, to use proper API and write correct and secure code as much as possible. To achieve this goal, the examples presented in this book are implemented with a security stance. Also, the book leads you to write secure programs. For instance, the book recommends against the use of some of the IPv6 standard APIs - unfortunately, there are some IPv6 APIs that are inherently insecure, so the book tries to avoid (and discourage) the use of such APIs. Another key issue is portability. The examples in the book should be applicable to any of UNIX based operating systems, MacOS X, and Windows XP. * Covers the new protocol just adopted by the Dept of Defense for future systems * Deals with security concerns, including spam and email, by presenting the best programming standards * Fully describes IPv6 socket APIs (RFC2553) using real-world examples * Allows for portability to UNIX-based operating systems, MacOS X, and Windows XP. |
Beschreibung: | 1 Online-Ressource (1 volume) |
ISBN: | 0080478794 1281039497 1417552735 1555583180 1592782612 9780080478791 9781281039491 9781417552733 9781555583187 9781592782611 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043100108 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2004 |||| o||u| ||||||eng d | ||
020 | |a 0080478794 |c electronic bk. |9 0-08-047879-4 | ||
020 | |a 1281039497 |9 1-281-03949-7 | ||
020 | |a 1417552735 |9 1-4175-5273-5 | ||
020 | |a 1555583180 |9 1-55558-318-0 | ||
020 | |a 1592782612 |c electronic bk. : Adobe Reader |9 1-59278-261-2 | ||
020 | |a 9780080478791 |c electronic bk. |9 978-0-08-047879-1 | ||
020 | |a 9781281039491 |9 978-1-281-03949-1 | ||
020 | |a 9781417552733 |9 978-1-4175-5273-3 | ||
020 | |a 9781555583187 |9 978-1-55558-318-7 | ||
020 | |a 9781592782611 |c electronic bk. : Adobe Reader |9 978-1-59278-261-1 | ||
035 | |a (OCoLC)56938927 | ||
035 | |a (DE-599)BVBBV043100108 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 004.62 |2 22 | |
100 | 1 | |a Hagino, Jun-ichiro itojun |e Verfasser |4 aut | |
245 | 1 | 0 | |a IPv6 network programming |c Jun-ichiro itojun Hagino |
264 | 1 | |a Amsterdam |b Elsevier/Digital Press |c ©2004 | |
300 | |a 1 Online-Ressource (1 volume) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
500 | |a This book contains everything you need to make your application program support IPv6. IPv6 socket APIs (RFC2553) are fully described with real-world examples. It covers security, a great concern these days. To secure the Internet infrastructure, every developer has to take a security stance - to audit every line of code, to use proper API and write correct and secure code as much as possible. To achieve this goal, the examples presented in this book are implemented with a security stance. Also, the book leads you to write secure programs. For instance, the book recommends against the use of some of the IPv6 standard APIs - unfortunately, there are some IPv6 APIs that are inherently insecure, so the book tries to avoid (and discourage) the use of such APIs. Another key issue is portability. The examples in the book should be applicable to any of UNIX based operating systems, MacOS X, and Windows XP. * Covers the new protocol just adopted by the Dept of Defense for future systems * Deals with security concerns, including spam and email, by presenting the best programming standards * Fully describes IPv6 socket APIs (RFC2553) using real-world examples * Allows for portability to UNIX-based operating systems, MacOS X, and Windows XP. | ||
650 | 7 | |a COMPUTERS / Networking / Network Protocols |2 bisacsh | |
650 | 7 | |a TCP/IP (Computer network protocol) |2 fast | |
650 | 7 | |a TCP/IP (Computer network protocol) |2 cct | |
650 | 4 | |a TCP/IP (Computer network protocol) | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=117176 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028524299 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=117176 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=117176 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175509189296128 |
---|---|
any_adam_object | |
author | Hagino, Jun-ichiro itojun |
author_facet | Hagino, Jun-ichiro itojun |
author_role | aut |
author_sort | Hagino, Jun-ichiro itojun |
author_variant | j i i h jii jiih |
building | Verbundindex |
bvnumber | BV043100108 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)56938927 (DE-599)BVBBV043100108 |
dewey-full | 004.62 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.62 |
dewey-search | 004.62 |
dewey-sort | 14.62 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03317nmm a2200493zc 4500</leader><controlfield tag="001">BV043100108</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2004 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080478794</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-08-047879-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1281039497</subfield><subfield code="9">1-281-03949-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1417552735</subfield><subfield code="9">1-4175-5273-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1555583180</subfield><subfield code="9">1-55558-318-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1592782612</subfield><subfield code="c">electronic bk. : Adobe Reader</subfield><subfield code="9">1-59278-261-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080478791</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-08-047879-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781281039491</subfield><subfield code="9">978-1-281-03949-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781417552733</subfield><subfield code="9">978-1-4175-5273-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781555583187</subfield><subfield code="9">978-1-55558-318-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781592782611</subfield><subfield code="c">electronic bk. : Adobe Reader</subfield><subfield code="9">978-1-59278-261-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)56938927</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043100108</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.62</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Hagino, Jun-ichiro itojun</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">IPv6 network programming</subfield><subfield code="c">Jun-ichiro itojun Hagino</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam</subfield><subfield code="b">Elsevier/Digital Press</subfield><subfield code="c">©2004</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 volume)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">This book contains everything you need to make your application program support IPv6. IPv6 socket APIs (RFC2553) are fully described with real-world examples. It covers security, a great concern these days. To secure the Internet infrastructure, every developer has to take a security stance - to audit every line of code, to use proper API and write correct and secure code as much as possible. To achieve this goal, the examples presented in this book are implemented with a security stance. Also, the book leads you to write secure programs. For instance, the book recommends against the use of some of the IPv6 standard APIs - unfortunately, there are some IPv6 APIs that are inherently insecure, so the book tries to avoid (and discourage) the use of such APIs. Another key issue is portability. The examples in the book should be applicable to any of UNIX based operating systems, MacOS X, and Windows XP. * Covers the new protocol just adopted by the Dept of Defense for future systems * Deals with security concerns, including spam and email, by presenting the best programming standards * Fully describes IPv6 socket APIs (RFC2553) using real-world examples * Allows for portability to UNIX-based operating systems, MacOS X, and Windows XP.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Network Protocols</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TCP/IP (Computer network protocol)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TCP/IP (Computer network protocol)</subfield><subfield code="2">cct</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">TCP/IP (Computer network protocol)</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=117176</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028524299</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=117176</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=117176</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043100108 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:17:25Z |
institution | BVB |
isbn | 0080478794 1281039497 1417552735 1555583180 1592782612 9780080478791 9781281039491 9781417552733 9781555583187 9781592782611 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028524299 |
oclc_num | 56938927 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (1 volume) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2004 |
publishDateSearch | 2004 |
publishDateSort | 2004 |
publisher | Elsevier/Digital Press |
record_format | marc |
spelling | Hagino, Jun-ichiro itojun Verfasser aut IPv6 network programming Jun-ichiro itojun Hagino Amsterdam Elsevier/Digital Press ©2004 1 Online-Ressource (1 volume) txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index This book contains everything you need to make your application program support IPv6. IPv6 socket APIs (RFC2553) are fully described with real-world examples. It covers security, a great concern these days. To secure the Internet infrastructure, every developer has to take a security stance - to audit every line of code, to use proper API and write correct and secure code as much as possible. To achieve this goal, the examples presented in this book are implemented with a security stance. Also, the book leads you to write secure programs. For instance, the book recommends against the use of some of the IPv6 standard APIs - unfortunately, there are some IPv6 APIs that are inherently insecure, so the book tries to avoid (and discourage) the use of such APIs. Another key issue is portability. The examples in the book should be applicable to any of UNIX based operating systems, MacOS X, and Windows XP. * Covers the new protocol just adopted by the Dept of Defense for future systems * Deals with security concerns, including spam and email, by presenting the best programming standards * Fully describes IPv6 socket APIs (RFC2553) using real-world examples * Allows for portability to UNIX-based operating systems, MacOS X, and Windows XP. COMPUTERS / Networking / Network Protocols bisacsh TCP/IP (Computer network protocol) fast TCP/IP (Computer network protocol) cct TCP/IP (Computer network protocol) http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=117176 Aggregator Volltext |
spellingShingle | Hagino, Jun-ichiro itojun IPv6 network programming COMPUTERS / Networking / Network Protocols bisacsh TCP/IP (Computer network protocol) fast TCP/IP (Computer network protocol) cct TCP/IP (Computer network protocol) |
title | IPv6 network programming |
title_auth | IPv6 network programming |
title_exact_search | IPv6 network programming |
title_full | IPv6 network programming Jun-ichiro itojun Hagino |
title_fullStr | IPv6 network programming Jun-ichiro itojun Hagino |
title_full_unstemmed | IPv6 network programming Jun-ichiro itojun Hagino |
title_short | IPv6 network programming |
title_sort | ipv6 network programming |
topic | COMPUTERS / Networking / Network Protocols bisacsh TCP/IP (Computer network protocol) fast TCP/IP (Computer network protocol) cct TCP/IP (Computer network protocol) |
topic_facet | COMPUTERS / Networking / Network Protocols TCP/IP (Computer network protocol) |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=117176 |
work_keys_str_mv | AT haginojunichiroitojun ipv6networkprogramming |