It looks like you're offline.
Open Library logo
additional options menu

MARC Record from marc_nuls

Record ID marc_nuls/NULS_PHC_180925.mrc:256861446:3476
Source marc_nuls
Download Link /show-records/marc_nuls/NULS_PHC_180925.mrc:256861446:3476?format=raw

LEADER: 03476cam 2200421Ia 4500
001 9921154340001661
005 20150423133418.0
008 080720s2008 maua b 001 0 eng d
010 $a 2008932480
020 $a9781584506706
020 $a1584506709
029 1 $aCDX$b8552217
035 $a(CSdNU)u355579-01national_inst
035 $a(OCoLC)234444088
035 $a(OCoLC)234444088
035 $a(OCoLC)234444088
040 $aBTCTA$cBTCTA$dBAKER$dBWX$dOCLCQ$dCDX$dYDXCP$dOrLoB-B
049 $aCNUM
050 4 $aQA76.9.A25$bD39 2008
100 1 $aDavis, Steven B.
245 10 $aProtecting games :$ba security handbook for game developers and publishers /$cSteven B. Davis.
260 $aBoston :$bCharles River Media/Course Technology,$cc2008.
300 $axviii, 398 p. :$bill. ;$c24 cm.
504 $aIncludes bibliographical references and index.
505 0 $aPt. I. The Protection Game -- 1. Game Security Overview -- 2. Thinking Game Protection -- Pt. II. Piracy and Used Games -- 3. Overview of Piracy and Used Games -- 4. The State of Piracy and Anti-Piracy -- 5. Distribution Piracy -- 6. DRM, Licensing, Policies, and Region Coding -- 7. Console Piracy, Used Games, and Pricing -- 8. Server Piracy -- 9. Other Strategies, Tactics, and Thoughts -- 10. Anti-Piracy Bill of Rights -- 11. The Piracy Tipping Point -- Pt. III. Cheating -- 12. Overview of Cheating -- 13. Cheating 101 -- 14. App Attacks: State, Data, Asset, and Code Vulnerabilities and Countermeasures -- 15. Bots and Player Aids -- 16. Network Attacks: Timing Attacks, Standbying, Bridging, and Race Conditions -- 17. Game Design and Security -- 18. Case Study: High-Score Security -- Pt. IV. Social Subversion: From Griefing to Gold Farming and Beyond with Game Service Attacks -- 19. Overview of Social Subversion -- 20. Competition, Tournaments, and Ranking Systems (and Their Abuse) -- 21. Griefing and Spam -- 22. Game Commerce: Virtual Items, Real Money Transactions, Gold Farming, Escorting, and Power-Leveling -- 23. To Ban or Not To Ban? Punishing Wayward Players -- Pt. V. The Real World -- 24. Welcome to the Real World -- 25. Insider Issues: Code Theft, Data Disclosure, and Fraud -- 26. Partner Problems -- 27. Money: Real Transactions, Real Risks -- 28. More Money: Security, Technical, and Legal Issues -- 29. Identity, Anonymity, and Privacy -- 30. Protecting Kids from Pedophiles, Stalkers, Cyberbullies, and Marketeers -- 31. Dancing with Gambling: Skill Games, Contests, Promotions, and Gambling Again -- 32. Denial of Service, Disasters, Reliability, Availability, and Architecture -- 33. Scams and Law Enforcement -- 34. Operations, Incidents, and Incident Response -- 35. Terrorists -- 36. Practical Protection -- A. Selected Game Security Incidents -- B. Glossary.
650 0 $aComputer security$xComputer programs.
650 0 $aComputer games.
650 0 $aSoftware protection.
650 0 $aComputer networks$xSecurity measures.
938 $aBaker and Taylor$bBTCP$nBK0007871454
938 $aBaker & Taylor$bBKTY$c39.99$d29.99$i1584506709$n0007871454$sactive
938 $aBlackwell Book Service$bBBUS$nR7760186$c$39.99
938 $aCoutts Information Services$bCOUT$n8552217
938 $aYBP Library Services$bYANK$n3014975
947 $fGEN$hCIRCSTACKS$p$37.99$q1
949 $aQA 76.9.A25 D39 2008$i31786102374730
994 $a92$bCNU
999 $aQA 76.9 .A25 D39 2008$wLC$c1$i31786102374730$lCIRCSTACKS$mNULS$rY$sY $tBOOK$u6/24/2009