Skip to:Content
|
Bottom
Cover image for Protecting games : a security handbook for game developers and publishers
Title:
Protecting games : a security handbook for game developers and publishers
Personal Author:
Publication Information:
Boston, MA : Course Technology, 2008
Physical Description:
xviii, 398 p. : ill. ; 24 cm.
ISBN:
9781584506706

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010205685 QA76.9.A25 D38 2008 Open Access Book Book
Searching...

On Order

Summary

Summary

Security measures are a critical piece of the game development process because they not only affect the player's ability to safely access and enjoy a game but a publisher's ability to profit from it. Protecting Games: A Security Handbook for Game Developers and Publishers provides IT and game security professionals with the solutions and tools they need to solve numerous game security problems, and an understanding of security principles that can be applied to game projects to prevent security issues. The book covers longstanding issues such as piracy and cheating and also new concerns like gambling, privacy, and protecting children. Security issues are addressed at the technical, business, operational, and design levels, with both technical and non-technical countermeasures and solutions discussed. And case studies are presented as realworld examples of the types of security concerns games and game developers face. You can easily jump to the key topics that are of interest to you, or work your way through the book. Protecting Games: A Security Handbook for Game Developers and Publishers makes understanding and resolving game security issues less intimidating, and provides practical security solutions that can be applied right away.


Table of Contents

Chapter 1 Introduction
Chapter 2 Trusting Clients
Chapter 3 Game Business Models and Security Implications
Chapter 4 Anti-Piracy & DRM
Chapter 5 Identity, Anonymity, and Game Commerce
Chapter 6 Cheating & Griefing Overview
Chapter 7 Game Implementation Security
Chapter 8 Game Security Incidents Chronology and Discussion
Chapter 9 Security Solutions
Chapter 10 Network Game Architectures
Chapter 11 Game Security Threats
Chapter 12 Summary & Conclusions
Go to:Top of Page