Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required. Learn more
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
Protecting Games: A Security Handbook for Game Developers and Publishers 1st Edition
- ISBN-101584506709
- ISBN-13978-1584506706
- Edition1st
- PublisherCengage Learning
- Publication dateJanuary 8, 2009
- LanguageEnglish
- Dimensions7.25 x 1 x 9.25 inches
- Print length416 pages
Editorial Reviews
About the Author
Product details
- Publisher : Cengage Learning; 1st edition (January 8, 2009)
- Language : English
- Paperback : 416 pages
- ISBN-10 : 1584506709
- ISBN-13 : 978-1584506706
- Item Weight : 1.85 pounds
- Dimensions : 7.25 x 1 x 9.25 inches
- Best Sellers Rank: #2,273,885 in Books (See Top 100 in Books)
- #229 in CompTIA Certification Guides
- #626 in Computer Graphics
- #1,606 in Game Programming
- Customer Reviews:
About the author

Steven Davis has over 20 years of IT and IT security expertise and has focused on the security issues of the gaming industry for more than a decade. He advises game companies, governments, and regulators around the world. Mr. Davis has written numerous papers and speaks at conferences on all aspects of game security. He is the author of the book "Protecting Games" and the game security and industry blog, PlayNoEvil (http://www.playnoevil.com/). Mr. Davis has international patents on game security and IT security techniques, most notably the anti-cheating protocols that underlie the SecurePlay (http://www.secureplay.com) anti-cheating library. He has designed several games including DiceHoldem (http://www.diceholdem.com) and acts as a design consultant. He is currently the CEO of IT GlobalSecure (http://www.itglobalsecure.com) which develops game security products and provides game security, IT security, and game design and evaluation services. Mr. Davis' expertise includes security leadership positions at the US National Security Agency (NSA), CSC, Bell Atlantic (now Verizon), and SAIC. He has extensive cryptographic and key management design experience including work on Nuclear Command and Control systems, the Electronic Key Management System, and numerous other commercial and government projects. Mr. Davis has a BA in Mathematics from UC Berkeley and a Masters Degree in Security Policy Studies from George Washington University.
Customer reviews
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on Amazon-
Top reviews
Top reviews from the United States
There was a problem filtering reviews right now. Please try again later.
The book also deals with some eye-opening facts, such as how terrorists are using game communication tools to avoid the NSA, and how to deal with that problem.
Overall the only issue I found with this book is that it's from 2009, and the gaming landscape has changed a lot since then, with mobiles and free-to-play now becoming more prevalent than the traditional formats like MMORPG and match-based multiplayer. I'm not going to withhold a star from it due to this, because it's no-one's fault: the book was extremely comprehensive for its time and the advice it does contain is as relevant as ever (that is, the only fault is that it omits some new issues, but everything it has is still spot-on).
I'm eagerly awaiting a second edition!
The book is broken into four primary sections with piracy and cheating having the most obvious relevance. The latter two sections address social attacks from griefing to gold farming and finally a "Real World" section that seems to act as a catch-all covering relationships with third parties, real money transactions and even a brief chapter on terrorism.
The sections on piracy and cheating seem to make up the core of the book and carry with it interesting tips, anecdotes and in some cases psuedo-code that help illustrate a solution to the problem at hand. I actually walked away from these chapters feeling a bit depressed in regard to how monumental these security challenges are. It's not that you're left empty handed or unwarned. It's just that you start to feel like you're being attacked from all sides and quite frankly, you probably are. By this point in the book you're ready for a change of pace and chapter 18 (which concludes the section on cheating) comes at the perfect time. Ironically for me, I was hoping for something different than the high score cheat case study which plagues many online Flash games and are of special interest to me. It's only after devouring the chapter on network attacks that made me want to see more in that category.
What was most surprising was how game design can adversely affect security. By tweaking design documents early in the process there are some issues that can simply be mitigated instead of turning into real dollar problems that affect the integrity of the game and potentially turn away paying customers. Perhaps the author would consider changing the subtitle to "A Security Handbook for Game Developers, Designers and Publishers". That being said, I should also mention that although the book is targeted toward those in the industry there's incredibly useful information in this book for gamers and parents as well.
Protecting Games is an excellent security handbook albeit a slightly overwhelming one that deserves a place on the bookshelf of anyone involved in the process of creating games. It arms us with the knowledge we need to make the right choices while navigating through the process of not only an building an entertaining game but a secure one as well.
