IPv6 Network ProgrammingBy
- Jun-ichiro Hagino, Jun-ichiro itojun Hagino is a Senior Researcher at IIJ research laboratory,a Core Researcher at KAME project and an IETF Internet Architecture Board member.
This book contains everything you need to make your application program support IPv6. IPv6 socket APIs (RFC2553) are fully described with real-world examples. It covers security, a great concern these days. To secure the Internet infrastructure, every developer has to take a security stance - to audit every line of code, to use proper API and write correct and secure code as much as possible. To achieve this goal, the examples presented in this book are implemented with a security stance. Also, the book leads you to write secure programs. For instance, the book recommends against the use of some of the IPv6 standard APIs - unfortunately, there are some IPv6 APIs that are inherently insecure, so the book tries to avoid (and discourage) the use of such APIs. Another key issue is portability. The examples in the book should be applicable to any of UNIX based operating systems, MacOS X, and Windows XP.
Application programmers who write network-oriented applications, such as web browsers, web servers, and email clients.
Paperback, 376 Pages
Published: November 2004
Imprint: Digital Press
"The author is an authority on the subject. The text is clear and to the point; it contains sufficient, complete examples, which can be downloaded from a Web site. One particular aspect of this book makes it different from most others. It has 361 pages. The appendices start on page 81 and contain relevant, additional documentation for IPv6 network programming. The inclusion of four RFC (request for comments) documents is rather unexpected: most people would use http://www.rfc-editor.org, rather than a book, when they need to check details. If you are responsible for networking code, and you need to migrate programs from IPv4 to IPv6, prepare such a migration, or start clean with IPv6, you will be able to pick up the essentials from this book without difficulty." - Computing Review 2005