Exploiting Online Games: Cheating Massively Distributed Systems 1st Edition

3.8 out of 5 stars 24 ratings
ISBN-13: 978-0132271912
ISBN-10: 0132271915
Why is ISBN important?
ISBN
This bar-code number lets you verify that you're getting exactly the right version or edition of a book. The 13-digit and 10-digit formats both work.
Scan an ISBN with your phone
Use the Amazon App to scan ISBNs and compare prices.
Loading your book clubs
There was a problem loading your book clubs. Please try again.
Not in a club? Learn more
Amazon book clubs early access

Join or create book clubs

Choose books together

Track your books
Bring your club to Amazon Book Clubs, start a new book club and invite your friends to join, or find a club that’s right for you for free.
Used: Good | Details
Sold by Simon Sellz
Condition: Used: Good
Comment: Used - Good: All pages and cover are intact (including the dust cover, if applicable). Spine may show signs of wear. Pages may include limited notes and highlighting. May include "From the library of" labels. Shrink wrap, dust covers, or boxed set case may be missing. Item may be missing bundled media.
Access codes and supplements are not guaranteed with used items.
Get Fast, Free Shipping with Amazon Prime
FREE delivery Friday, October 29 if you spend $25 on items shipped by Amazon
In Stock.
Ships from and sold by Amazon.com.
Available at a lower price from other sellers that may not offer free Prime shipping.
FREE delivery Wednesday, October 27. Order within 5 hrs 57 mins
Exploiting Online Games: ... has been added to your Cart
1-Click ordering is not available for this item.
Available at a lower price from other sellers that may not offer free Prime shipping.

Celebrate Halloween with these spooky picks

Frequently bought together

  • Exploiting Online Games: Cheating Massively Distributed Systems
  • +
  • Game Hacking: Developing Autonomous Bots for Online Games
Total price:
To see our price, add these items to your cart.
One of these items ships sooner than the other.
Choose items to buy together.

Editorial Reviews

From the Back Cover

"Imagine trying to play defense in football without ever studying offense. You would not know when a run was coming, how to defend pass patterns, nor when to blitz. In computer systems, as in football, a defender must be able to think like an attacker. I say it in my class every semester, you don't want to be the last person to attack your own system--you should be the first.

"The world is quickly going online. While I caution against online voting, it is clear that online gaming is taking the Internet by storm. In our new age where virtual items carry real dollar value, and fortunes are won and lost over items that do not really exist, the new threats to the intrepid gamer are all too real. To protect against these hazards, you must understand them, and this groundbreaking book is the only comprehensive source of information on how to exploit computer games. Every White Hat should read it. It's their only hope of staying only one step behind the bad guys."

--Aviel D. Rubin, Ph.D.
Professor, Computer Science
Technical Director, Information Security Institute
Johns Hopkins University

"Everyone's talking about virtual worlds. But no one's talking about virtual-world security. Greg Hoglund and Gary McGraw are the perfect pair to show just how vulnerable these online games can be."

--Cade Metz
Senior Editor

PC Magazine

"If we're going to improve our security practices, frank discussions like the ones in this book are the only way forward. Or as the authors of this book might say, when you're facing off against Heinous Demons of Insecurity, you need experienced companions, not to mention a Vorpal Sword of Security Knowledge."

--Edward W. Felten, Ph.D.
Professor of Computer Science and Public Affairs
Director, Center for Information Technology Policy
Princeton University

"Historically, games have been used by warfighters to develop new capabilities and to hone existing skills--especially in the Air Force. The authors turn this simple concept on itself, making games themselves the subject and target of the 'hacking game,' and along the way creating a masterly publication that is as meaningful to the gamer as it is to the serious security system professional.

"Massively distributed systems will define the software field of play for at least the next quarter century. Understanding how they work is important, but understanding how they can be manipulated is essential for the security professional. This book provides the cornerstone for that knowledge."

--Daniel McGarvey
Chief, Information Protection Directorate
United States Air Force

"Like a lot of kids, Gary and I came to computing (and later to computer security) through games. At first, we were fascinated with playing games on our Apple ][s, but then became bored with the few games we could afford. We tried copying each other's games, but ran up against copy-protection schemes. So we set out to understand those schemes and how they could be defeated. Pretty quickly, we realized that it was a lot more fun to disassemble and work around the protections in a game than it was to play it.

"With the thriving economies of today's online games, people not only have the classic hacker's motivation to understand and bypass the security of games, but also the criminal motivation of cold, hard cash. That's a combination that's hard to stop. The first step, taken by this book, is revealing the techniques that are being used today."

--Greg Morrisett, Ph.D.
Allen B. Cutting Professor of Computer Science
School of Engineering and Applied Sciences
Harvard University

"If you're playing online games today and you don't understand security, you're at a real disadvantage. If you're designing the massive distributed systems of tomorrow and you don't learn from games, you're just plain sunk."

--Brian Chess, Ph.D.
Founder/Chief Scientist, For

About the Author

Greg Hoglund has been involved with software security for many years, specializing in Windows rootkits and vulnerability exploitation. He founded the websitewww.rootkit.com, and has coauthored several books on software security (Exploiting Software: How to Break Code andRootkits: Subverting the Windows Kernel, both from Addison-Wesley). Greg is a long-time game hacker and spends much of his free time reverse engineering and tooling exploits for new games. Professionally, Greg offers in-depth training on rootkit development and software exploits. He is currently CEO of HBGary, Inc. (www.hbgary.com), building a world-class product for software reverse engineering and digital forensics.

Gary McGraw is the CTO of Cigital, Inc., a software security and quality consulting firm with headquarters in the Washington, D.C., area. He is a globally recognized authority on software security and the author of six best-selling books on this topic. The latest, Software Security: Building Security In, was released in 2006. His other titles includeJava Security (Wiley), Building Secure Software (Addison-Wesley), andExploiting Software (Addison-Wesley). He is the editor of the Addison-Wesley Software Security Series. Dr. McGraw has also written more than 90 peer-reviewed scientific publications, writes a monthly security column fordarkreading.com, and is frequently quoted in the press. Besides serving as a strategic counselor for top business and IT executives, Gary is on the advisory boards of Fortify Software and Raven White. His dual Ph.D. is in cognitive science and computer science from Indiana University where he serves on the Dean's Advisory Council for the School of Informatics. Gary is an IEEE Computer Society Board of Governors member and produces the monthly Silver Bullet Security Podcast for IEEE Security & Privacy magazine.



Go ahead, give a gift card

Product details

  • Publisher ‏ : ‎ Addison-Wesley Professional; 1st edition (July 9, 2007)
  • Language ‏ : ‎ English
  • Paperback ‏ : ‎ 380 pages
  • ISBN-10 ‏ : ‎ 0132271915
  • ISBN-13 ‏ : ‎ 978-0132271912
  • Item Weight ‏ : ‎ 1.63 pounds
  • Dimensions ‏ : ‎ 7 x 0.86 x 9.1 inches
  • Customer Reviews:
    3.8 out of 5 stars 24 ratings

About the authors

Follow authors to get new release updates, plus improved recommendations.

Customer reviews

3.8 out of 5 stars
3.8 out of 5
24 global ratings
How are ratings calculated?

Top reviews from the United States

Reviewed in the United States on August 11, 2007
Verified Purchase
10 people found this helpful
Report abuse
Reviewed in the United States on May 13, 2009
Verified Purchase
5 people found this helpful
Report abuse
Reviewed in the United States on September 10, 2007
Verified Purchase
8 people found this helpful
Report abuse
Reviewed in the United States on April 23, 2013
Verified Purchase
3 people found this helpful
Report abuse
Reviewed in the United States on May 18, 2010
Verified Purchase
19 people found this helpful
Report abuse
Reviewed in the United States on August 21, 2007
6 people found this helpful
Report abuse

Top reviews from other countries

Alan Lenton
2.0 out of 5 stars Excellent cure for insomnia
Reviewed in the United Kingdom on October 21, 2007
Verified Purchase
5 people found this helpful
Report abuse