Make Your Own Pixel ArtHand anyone a pencil and paper and they can start drawing, but it's just as easy to draw digitally using a keyboard and mouse. With Make Your Own Pixel Art, pixel artist Jennifer Dawe and game designer Matthew Humphries walk you step-by-step through the available tools, pixel art techniques, the importance of shapes, colors, shading, and how to turn your art into animation. By the end of the book, you'll be creating art far beyond what's possible on paper!
Make Your Own Pixel Art will teach you how to: Create pixel art using the most popular art software and the common tools they provide; Draw with pixels, including coverage of sculpting, shading, texture, and color use; The basics of motion and how to animate your pixel art creations; Best practices for saving, sharing, sketching, and adding emotion to your art.
With a dash of creativity and the help of Make Your Own Pixel Art, your digital drawings can be brought to life, shared with the world, and form a basis for a career in ...
Pro .NET Framework with the Base Class LibraryLearn about the fundamentals and inner workings of the Common Type System (CTS) and the Virtual Execution System (VES) of the Common Language Runtime (CLR) and how they relate to the Base Class Library (BCL) from the perspective of the execution environment.
The author first gives an introduction to the .NET Framework and describes the architectural and engineering resources required when implementing the .NET Framework on any platform. Next, you will learn about the BCL and understand how to work with system structures including the fundamental built-in types system.array and system.string. You will then learn about the VES along with its methods and functionality. Further, you will go through the Common Intermediate Language (CIL), Assembly Manifest, and versioning. You will also learn how to design and implement libraries in detail by creating a .NET class library.
After reading this book, you will understand .NET Framework features, as well as details about the core function ...
Checking Out with the Payment Request APIQuickly create consistent checkouts for use within websites, using the power of the HTML5 Payment Request API. This project-oriented book simplifies the process of creating and manipulating checkouts with the Payment Request API in browsers for websites or online applications, using little more than a text editor or free software.
One of the key concerns of any e-commerce company is ensuring customers complete the checkout process successfully, and for them to return. Unfortunately, many checkouts still suffer from a high level of drop-out. The Payment Request API is an open standard being developed by browser vendors to simplify payments for users with a quick and seamless autofill process enabling a broader set of online payment providers to participate in the market. The API is designed to be easy to implement across all supported browsers, and work with any payment type or service provider.
Checking Out with the Payment Request API equips you with a tool set that you can use ...
The IoT Hacker's HandbookTake a practioner's approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture.
You'll review the architecture's central components, from hardware communication interfaces, such as UARTand SPI, to radio protocols, such as BLE or ZigBee. You'll also learn to assess a device physically by opening it, looking at the PCB, and identifying the chipsets and interfaces. You'll then use that information to gain entry to the device or to perform other actions, such as dumping encryption keys and firmware.
As the IoT rises to one of the most popular tech trends, manufactures need to take necessary steps to secure devices and protect them from attackers. The IoT Hacker's Handbook breaks down the Internet of Things, exploits it, and reveals how these devices can be built securely.
Perform a threat model of a real-world IoT device and locate all possible attacker entry points; Use reverse engineering of firmware binaries to identify securi ...
Becoming the HackerBecoming the Hacker will teach you how to approach web penetration testing with an attacker's mindset. While testing web applications for performance is common, the ever-changing threat landscape makes security testing much more difficult for the defender.
There are many web application tools that claim to provide a complete survey and defense against potential threats, but they must be analyzed in line with the security needs of each web application or service. We must understand how an attacker approaches a web application and the implications of breaching its defenses.
Through the first part of the book, Adrian Pruteanu walks you through commonly encountered vulnerabilities and how to take advantage of them to achieve your goal. The latter part of the book shifts gears and puts the newly learned techniques into practice, going over scenarios where the target may be a popular content management system or a containerized application and its network.
Becoming the Hacker is a c ...
The Successful Software ManagerThe Successful Software Manager is a comprehensive and practical guide to managing software developers, software customers, and the process of deciding what software needs to be built. It explains in detail how to develop a management mindset, lead a high-performing developer team, and meet all the expectations of a good manager.
The book will help you whether you've chosen to pursue a career in management or have been asked to "act up" as a manager. Whether you're a Development Manager, Product Manager, Team Leader, Solution Architect, or IT Director, this is your indispensable guide to all aspects of running your team and working within an organization and dealing with colleagues, customers, potential customers, and technologists, to ensure you build the product your organization needs.
This book is the must-have authoritative guide to managing projects, managing people, and preparing yourself to be an effective manager. The intuitive real-life examples will act as a desk compa ...
A Scrum BookGain insights and depth of rationale into Scrum from many highly respected world authorities, including one of its founders, who lead you through the deep foundations of Scrum's structure and practice. Enhance and customize your Scrum practice with ninety-four organizational building blocks, called patterns, that you can freely and flexibly choose from to fit your needs. Understand and appreciate the history of Scrum and the role it plays in solving common problems in product development.
Building a successful product usually involves teams of people, and many choose the Scrum approach to aid in creating products that deliver the highest possible value. Implementing Scrum gives teams a collection of powerful ideas they can assemble to fit their needs and meet their goals. The ninety-four patterns contained within are elaborated nuggets of insight into Scrum's building blocks, how they work, and how to use them. They offer novices a roadmap for starting from scratch, yet they help in ...
Developing Cognitive Bots Using the IBM Watson EngineCognitive Virtual Bots are taking the technology and user experience world by storm. This book provides clear guidance on how different cognitive platforms can be used to develop Cognitive Virtual Assistants that enable a conversation by using DialogFlow and advanced Natural Language Processing. You will start by understanding the technology landscape and various use cases that Cognitive Virtual Assistants can be used in. Early chapters will take you through the basics of Cognitive Virtual Assistants, before moving onto advanced concepts and hands on examples of using IBM Watson Assistant and its advanced configurations with Watson Discovery Services, Watson Knowledge Studio and Spellchecker Service.
You'll then examine integrations that enrich the Cognitive Virtual Assistant by providing data around weather, locations, stock markets. The book concludes by providing a glimpse of what to expect in the future for Cognitive Virtual Assistants.
Review the fundamentals of Cognitive Vi ...
macOS Catalina: The Missing ManualApple gives macOS new features and improvements right on your desktop and under the hood with Catalina - aka OS X 10.15. With this updated guide, you'll learn how to use your iPad as a second screen, work with iPad apps on your Mac, and use Screen Time on your Mac. This new edition of the #1 bestselling Mac book shows you how to use the revamped apps for Music, Podcasts, and TV.
Loaded with illustrations, step-by-step instructions, tips, and tricks, this book from David Pogue - Missing Manual series creator, New York Times columnist, and Emmy-winning tech correspondent for CNBC, CBS, and NPR - covers everything Catalina has to offer with lots of humor and technical insight. ...
The Software Architect ElevatorAs the digital economy changes the rules of the game for enterprises, the role of software and IT architects is also transforming. Rather than focus on technical decisions alone, architects and senior technologists need to combine organizational and technical knowledge to effect change in their company's structure and processes. To accomplish that, they need to connect the IT engine room to the penthouse, where the business strategy is defined.
In this guide, author Gregor Hohpe shares real-world advice and hard-learned lessons from actual IT transformations. His anecdotes help architects, senior developers, and other IT professionals prepare for a more complex but rewarding role in the enterprise.
This book is ideal for: Software architects and senior developers looking to shape the company's technology direction or assist in an organizational transformation; Enterprise architects and senior technologists searching for practical advice on how to navigate technical and organizati ...