|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
SCIDIR_ocm56938927 |
003 |
OCoLC |
005 |
20231117015023.0 |
006 |
m o d |
007 |
cr cnu|||unuuu |
008 |
041109s2004 ne fob 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e pn
|c N$T
|d OCLCQ
|d YDXCP
|d OCLCQ
|d OCLCO
|d OCLCQ
|d IDEBK
|d OCLCF
|d OCLCQ
|d OPELS
|d E7B
|d EBLCP
|d SLY
|d OCLCQ
|d AGLDB
|d IQW
|d PIFBR
|d OCLCQ
|d WY@
|d LUE
|d D6H
|d VTS
|d TOF
|d STF
|d G3B
|d K6U
|d LUN
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 123125474
|a 149296453
|a 162595222
|a 648325077
|a 823829152
|a 823898862
|a 824090147
|a 824137284
|a 856949674
|a 880334380
|
020 |
|
|
|a 1417552735
|q (electronic bk.)
|
020 |
|
|
|a 9781417552733
|q (electronic bk.)
|
020 |
|
|
|a 1281039497
|
020 |
|
|
|a 9781281039491
|
020 |
|
|
|a 9781555583187
|
020 |
|
|
|a 1555583180
|
020 |
|
|
|a 1592782612
|q (electronic bk. ;
|q Adobe Reader)
|
020 |
|
|
|a 9781592782611
|q (electronic bk. ;
|q Adobe Reader)
|
020 |
|
|
|a 9780080478791
|q (electronic bk.)
|
020 |
|
|
|a 0080478794
|q (electronic bk.)
|
035 |
|
|
|a (OCoLC)56938927
|z (OCoLC)123125474
|z (OCoLC)149296453
|z (OCoLC)162595222
|z (OCoLC)648325077
|z (OCoLC)823829152
|z (OCoLC)823898862
|z (OCoLC)824090147
|z (OCoLC)824137284
|z (OCoLC)856949674
|z (OCoLC)880334380
|
050 |
|
4 |
|a TK5105.585
|b .H34 2004eb
|
072 |
|
7 |
|a COM
|x 043040
|2 bisacsh
|
072 |
|
7 |
|a UT
|2 bicssc
|
082 |
0 |
4 |
|a 004.62
|2 22
|
084 |
|
|
|a TN915. 04
|2 clc
|
100 |
1 |
|
|a Hagino, Jun-ichiro itojun.
|
245 |
1 |
0 |
|a IPv6 network programming /
|c Jun-ichiro itojun Hagino.
|
260 |
|
|
|a Amsterdam ;
|a Boston :
|b Elsevier/Digital Press,
|c �2004.
|
300 |
|
|
|a 1 online resource (1 volume)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
0 |
|
|a Print version record.
|
520 |
|
|
|a This book contains everything you need to make your application program support IPv6. IPv6 socket APIs (RFC2553) are fully described with real-world examples. It covers security, a great concern these days. To secure the Internet infrastructure, every developer has to take a security stance - to audit every line of code, to use proper API and write correct and secure code as much as possible. To achieve this goal, the examples presented in this book are implemented with a security stance. Also, the book leads you to write secure programs. For instance, the book recommends against the use of some of the IPv6 standard APIs - unfortunately, there are some IPv6 APIs that are inherently insecure, so the book tries to avoid (and discourage) the use of such APIs. Another key issue is portability. The examples in the book should be applicable to any of UNIX based operating systems, MacOS X, and Windows XP. * Covers the new protocol just adopted by the Dept of Defense for future systems * Deals with security concerns, including spam and email, by presenting the best programming standards * Fully describes IPv6 socket APIs (RFC2553) using real-world examples * Allows for portability to UNIX-based operating systems, MacOS X, and Windows XP.
|
650 |
|
0 |
|a TCP/IP (Computer network protocol)
|
650 |
|
6 |
|a TCP/IP (Protocole de r�eseaux d'ordinateurs)
|0 (CaQQLa)201-0243407
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Network Protocols.
|2 bisacsh
|
650 |
0 |
7 |
|a TCP/IP (Computer network protocol)
|2 cct
|
650 |
|
7 |
|a TCP/IP (Computer network protocol)
|2 fast
|0 (OCoLC)fst01141584
|
776 |
0 |
8 |
|i Print version:
|a Hagino, Jun-ichiro itojun.
|t IPv6 network programming.
|d Amsterdam ; Boston : Elsevier/Digital Press, �2004
|z 1555583180
|w (OCoLC)56645105
|
856 |
4 |
0 |
|u https://sciencedirect.uam.elogim.com/science/book/9781555583187
|z Texto completo
|