This book contains everything you need to make your application program support IPv6. IPv6 socket APIs (RFC2553) are fully described with real-world examples. It covers security, a great concern these days. To secure the Internet infrastructure, every developer has to take a security stance - to audit every line of code, to use proper API and write correct and secure code as much as possible. To achieve this goal, the examples presented in this book are implemented with a security stance. Also, the book leads you to write secure programs. For instance, the book recommends against the use of some of the IPv6 standard APIs - unfortunately, there are some IPv6 APIs that are inherently insecure, so the book tries to avoid (and discourage) the use of such APIs. Another key issue is portability. The examples in the book should be applicable to any of UNIX based operating systems, MacOS X, and Windows XP.
* Covers the new protocol just adopted by the Dept of Defense for future systems
* Deals with security concerns, including spam and email, by presenting the best programming standards
* Fully describes IPv6 socket APIs (RFC2553) using real-world examples
* Allows for portability to UNIX-based operating systems, MacOS X, and Windows XP
Application programmers who write network-oriented applications, such as web browsers, web servers, and email clients.
He has been contributing to IPv6 protocol design, implementation and deployment through activities at KAME project, where IPv6 stack is developed and maintained for 4.4BSD-variants.
"The author is an authority on the subject. The text is clear and to the point; it contains sufficient, complete examples, which can be downloaded from a Web site.
One particular aspect of this book makes it different from most others. It has 361 pages. The appendices start on page 81 and contain relevant, additional documentation for IPv6 network programming. The inclusion of four RFC (request for comments) documents is rather unexpected: most people would use http://www.rfc-editor.org, rather than a book, when they need to check details.
If you are responsible for networking code, and you need to migrate programs from IPv4 to IPv6, prepare such a migration, or start clean with IPv6, you will be able to pick up the essentials from this book without difficulty." - Computing Review 2005