Unreal for Mobile and Standalone VRApply the techniques needed to build VR applications for mobile and standalone head-mounted displays (HMDs) using the Unreal Engine. This book covers the entire VR ecosystem including production tools, Unreal engine, workflows, performance and optimization, and presents two fully-developed projects to reinforce what you've learned. Media designers, CG artists and other creatives will be able to take advantage of real-time engine techniques and easy-to-learn visual scripting logic to turn their creations into immersive and interactive VR worlds.
Gear VR, the Oculus Go and other Android based VR HMDs are becoming exciting new platforms for immersive business presentations, entertainment and educational solutions. The Unreal engine, one of the world's most powerful and popular game engines, is now free to use and has become increasingly popular for real-time visualizations and enterprise solutions in recent years.
With Unreal's powerful blueprint visual scripting system, non-coders ...
Microsoft Excel 2019 Data Analysis and Business Modeling, 6th EditionMaster business modeling and analysis techniques with Microsoft Excel 2019 and Office 365 and transform data into bottom-line results. Written by award-winning educator Wayne Winston, this hands-on, scenario-focused guide helps you use Excel to ask the right questions and get accurate, actionable answers. New coverage ranges from Power Query/Get & Transform to Office 365 Geography and Stock data types. Practice with more than 800 problems, many based on actual challenges faced by working analysts.
Solve real business problems with Excel - and build your competitive advantage: Quickly transition from Excel basics to sophisticated analytics; Use PowerQuery or Get & Transform to connect, combine, and refine data sources; Leverage Office 365's new Geography and Stock data types and six new functions; Illuminate insights from geographic and temporal data with 3D Maps; Summarize data with pivot tables, descriptive statistics, histograms, and Pareto charts; Use Excel trend curves, multipl ...
Exam Ref MS-101 Microsoft 365 Mobility and SecurityPrepare for Microsoft Exam MS-101 - and help demonstrate your real-world mastery of skills and knowledge needed to manage Microsoft 365 mobility, security, and related administration tasks. Designed for experienced IT professionals, Exam Ref focuses on the critical thinking and decision-making acumen needed for success at the Microsoft Certified Expert level.
Focus on the expertise measured by these objectives: Implement modern device services; Implement Microsoft 365 security and threat management; Manage Microsoft 365 governance and compliance.
Exam MS-101 focuses on knowledge needed to implement Mobile Device Management (MDM); manage device compliance; plan for devices and apps; plan Windows 10 deployment; implement Cloud App Security (CAS), threat management, and Windows Defender Advanced Threat Protection (ATP); manage security reports and alerts; configure Data Loss Prevention (DLP); implement Azure Information Protection (AIP); and manage data governance, auditing, and eD ...
Rethinking Productivity in Software EngineeringGet the most out of this foundational reference and improve the productivity of your software teams. This open access book collects the wisdom of the 2017 "Dagstuhl" seminar on productivity in software engineering, a meeting of community leaders, who came together with the goal of rethinking traditional definitions and measures of productivity.
The results of their work, Rethinking Productivity in Software Engineering, includes chapters covering definitions and core concepts related to productivity, guidelines for measuring productivity in specific contexts, best practices and pitfalls, and theories and open questions on productivity. You'll benefit from the many short chapters, each offering a focused discussion on one aspect of productivity in software engineering.
Readers in many fields and industries will benefit from their collected work. Developers wanting to improve their personal productivity, will learn effective strategies for overcoming common issues that interfere wit ...
Rootkits and BootkitsRootkits and Bootkits will teach you how to understand and counter sophisticated, advanced threats buried deep in a machine's boot process or UEFI firmware.
With the aid of numerous case studies and professional research from three of the world's leading security experts, you'll trace malware development over time from rootkits like TDL3 to present-day UEFI implants and examine how they infect a system, persist through reboot, and evade security software.
As you inspect and dissect real malware, you'll learn: How Windows boots - including 32-bit, 64-bit, and UEFI mode - and where to find vulnerabilities; The details of boot process security mechanisms like Secure Boot, including an overview of Virtual Secure Mode (VSM) and Device Guard; Reverse engineering and forensic techniques for analyzing real malware, including bootkits like Rovnix/Carberp, Gapz, TDL4, and the infamous rootkits TDL3 and Festi; How to perform static and dynamic analysis using emulation and tools like Bochs ...
C++ Crash CourseC++ is one of the most widely used languages for real-world software. In the hands of a knowledgeable programmer, C++ can produce small, efficient, and readable code that any programmer would be proud of.
Designed for intermediate to advanced programmers, C++ Crash Course cuts through the weeds to get you straight to the core of C++17, the most modern revision of the ISO standard. Part 1 covers the core of the C++ language, where you'll learn about everything from types and functions, to the object life cycle and expressions. Part 2 introduces you to the C++ Standard Library and Boost Libraries, where you'll learn about all of the high-quality, fully-featured facilities available to you. You'll cover special utility classes, data structures, and algorithms, and learn how to manipulate file systems and build high-performance programs that communicate over networks.
You'll learn all the major features of modern C++, including: Fundamental types, reference types, and user-defined ty ...
Becoming the HackerBecoming the Hacker will teach you how to approach web penetration testing with an attacker's mindset. While testing web applications for performance is common, the ever-changing threat landscape makes security testing much more difficult for the defender.
There are many web application tools that claim to provide a complete survey and defense against potential threats, but they must be analyzed in line with the security needs of each web application or service. We must understand how an attacker approaches a web application and the implications of breaching its defenses.
Through the first part of the book, Adrian Pruteanu walks you through commonly encountered vulnerabilities and how to take advantage of them to achieve your goal. The latter part of the book shifts gears and puts the newly learned techniques into practice, going over scenarios where the target may be a popular content management system or a containerized application and its network.
Becoming the Hacker is a c ...
PowerShell and Python TogetherBring together the Python programming language and Microsoft's PowerShell to address digital investigations and create state-of-the-art solutions for administrators, IT personnel, cyber response teams, and forensic investigators.
You will learn how to join PowerShell's robust set of commands and access to the internals of both the MS Windows desktop and enterprise devices and Python's rich scripting environment allowing for the rapid development of new tools for investigation, automation, and deep analysis.
PowerShell and Python Together takes a practical approach that provides an entry point and level playing field for a wide range of individuals, small companies, researchers, academics, students, and hobbyists to participate.
Leverage the internals of PowerShell for: digital investigation, incident response, and forensics; Leverage Python to exploit already existing PowerShell CmdLets and aliases to build new automation and analysis capabilities; Create combined PowerShell a ...
Python, PyGame, and Raspberry Pi Game DevelopmentExpand your basic knowledge of Python and use PyGame to create fast-paced video games with great graphics and sounds. This second edition shows how you can integrate electronic components with your games using the build-in general purpose input/output (GPIO) pins and some Python code to create two new games.
You'll learn about object-oriented programming (OOP) as well as design patterns, such as model-view-controller (MVC) and finite-state machines (FSMs). Whether using Windows, macOS, Linux, or a Raspberry Pi, you can unleash the power of Python and PyGame to create great looking games.
The book also includes complete code listings and explanations for Bricks, Snake, and Invaders - three fully working games. These allow you to get started in making your own great games and then modify them or build your own exciting titles. The concepts are further explained using games such as Copycat, where the player must concentrate and repeat the sequence of lights and sounds, and Couch Q ...
The Cult of Mac, 2nd EditionApple is a global luxury brand whose products range from mobile phones and tablets to streaming TVs and smart home speakers. Yet despite this dominance, a distinct subculture persists, which celebrates the ways in which Apple products seem to encourage self-expression, identity, and innovation.
The beautifully designed second edition of The Cult of Mac takes you inside today's Apple fandom to explore how devotions - new and old - keep the fire burning. Join journalists Leander Kahney and David Pierini as they explore how enthusiastic fans line up for the latest product releases, and how artists pay tribute to Steve Jobs' legacy in sculpture and opera. Learn why some photographers and filmmakers have eschewed traditional gear in favor of iPhone cameras. Discover a community of collectors around the world who spend tens of thousands of dollars to buy, restore, and enshrine Apple artifacts, like the Newton MessagePad and Apple II.
Whether you're an Apple fan or just a casual observe ...