Basic Math for Game Development with Unity 3DUse Unity-based examples to understand fundamental mathematical concepts and see how they are applied when building modern video game functionality. You will gain the theoretical foundation you need, and you will know how to examine and modify an implementation.
This book covers points in a 3D Cartesian coordinate system, and then discusses vectors and the details of dot and cross products. Basic mathematical foundations are illustrated through Unity-based example implementations. Also provided are examples showing how the concepts are applied when implementing video game functionality, such as collision support, motion simulations, autonomous behaviors, shadow approximations, and reflection off arbitrary walls.
Throughout this book, you learn and examine the concepts and their applications in a game engine.
Understand the basic concepts of points and vectors and their applications in game development; Apply mathematical concepts to modern video game functionality, such as sph ...
Make Your Own PuzzleScript Games!PuzzleScript is a free, web-based tool you can use to create puzzle games. In a PuzzleScript game, you move objects around to solve problems and play through the levels.
In Make Your Own PuzzleScript Games! you'll learn how to use PuzzleScript to create interactive games - no programming experience necessary! Learn the basics like how to make objects, create rules, and add levels. You'll also learn how to edit, test, and share your games online.
Learn how to: Decorate your game with fun backgrounds; Write rules that define how objects interact; Add obstacles like laser guns and guards; Herd cats and even pull off a robot heist!
With colorful illustrations and plenty of examples for inspiration, Make Your Own PuzzleScript Games! will take you from puzzle solver to game designer in just a few clicks! ...
Foundations of Information SecurityA high-level survey of the information security field by best-selling author Jason Andress. The book covers the basics of a wide variety of topics, from authentication and authorization to maintaining confidentiality and performing penetration testing.
Using real-world security breaches as examples, Foundations of Information Security explores common applications of these concepts, such as operations security, network design, hardening and patching operating systems, securing mobile devices, as well as tools for assessing the security of hosts and applications.
You'll also learn the basics of topics like: Multifactor authentication and how biometrics and hardware tokens can be used to harden the authentication process; The principles behind modern cryptography, including symmetric and asymmetric algorithms, hashes, and certificates; The laws and regulations that protect systems and data; Anti-malware tools, firewalls, and intrusion detection systems; Vulnerabilities such as buffe ...
The Cult of Mac, 2nd EditionApple is a global luxury brand whose products range from mobile phones and tablets to streaming TVs and smart home speakers. Yet despite this dominance, a distinct subculture persists, which celebrates the ways in which Apple products seem to encourage self-expression, identity, and innovation.
The beautifully designed second edition of The Cult of Mac takes you inside today's Apple fandom to explore how devotions - new and old - keep the fire burning. Join journalists Leander Kahney and David Pierini as they explore how enthusiastic fans line up for the latest product releases, and how artists pay tribute to Steve Jobs' legacy in sculpture and opera. Learn why some photographers and filmmakers have eschewed traditional gear in favor of iPhone cameras. Discover a community of collectors around the world who spend tens of thousands of dollars to buy, restore, and enshrine Apple artifacts, like the Newton MessagePad and Apple II.
Whether you're an Apple fan or just a casual observe ...
Mining Social MediaDid fake Twitter accounts help sway a presidential election? What can Facebook and Reddit archives tell us about human behavior? In Mining Social Media, senior BuzzFeed reporter Lam Thuy Vo shows you how to use Python and key data analysis tools to find the stories buried in social media.
Whether you're a professional journalist, an academic researcher, or a citizen investigator, you'll learn how to use technical tools to collect and analyze data from social media sources to build compelling, data-driven stories.
Learn how to: Write Python scripts and use APIs to gather data from the social web; Download data archives and dig through them for insights; Inspect HTML downloaded from websites for useful content; Format, aggregate, sort, and filter your collected data using Google Sheets; Create data visualizations to illustrate your discoveries; Perform advanced data analysis using Python, Jupyter Notebooks, and the pandas library; Apply what you've learned to research topics on you ...
Autotools, 2nd EditionThe GNU Autotools make it easy for developers to create software that is portable across many Unix-like operating systems, and even Windows. Although the Autotools are used by thousands of open source software packages, they have a notoriously steep learning curve.
Autotools is the first book to offer programmers a tutorial-based guide to the GNU build system. Author John Calcote begins with an overview of high-level concepts and a hands-on tour of the philosophy and design of the Autotools. He then tackles more advanced details, like using the M4 macro processor with Autoconf, extending the framework provided by Automake, and building Java and C# sources. He concludes with solutions to frequent problems encountered by Autotools users.
This thoroughly revised second edition has been updated to cover the latest versions of the Autotools. It includes five new chapters on topics like pkg-config, unit and integration testing with Autotest, internationalizing with GNU tools, the porta ...
Advanced API Security, 2nd editionPrepare for the next wave of challenges in enterprise security. Learn to better protect, monitor, and manage your public and private APIs.
Enterprise APIs have become the common way of exposing business functions to the outside world. Exposing functionality is convenient, but of course comes with a risk of exploitation. This book teaches you about TLS Token Binding, User Managed Access (UMA) 2.0, Cross Origin Resource Sharing (CORS), Incremental Authorization, Proof Key for Code Exchange (PKCE), and Token Exchange. Benefit from lessons learned from analyzing multiple attacks that have taken place by exploiting security vulnerabilities in various OAuth 2.0 implementations. Explore root causes, and improve your security practices to mitigate against similar future exploits.
Security must be an integral part of any development project. This book shares best practices in designing APIs for rock-solid security. API security has evolved since the first edition of this book, and the gro ...
Prepare Your Data for TableauFocus on the most important and most often overlooked factor in a successful Tableau project - data. Without a reliable data source, you will not achieve the results you hope for in Tableau. This book does more than teach the mechanics of data preparation. It teaches you: how to look at data in a new way, to recognize the most common issues that hinder analytics, and how to mitigate those factors one by one.
Tableau can change the course of business, but the old adage of "garbage in, garbage out" is the hard truth that hides behind every Tableau sales pitch. That amazing sales demo does not work as well with bad data. The unfortunate reality is that almost all data starts out in a less-than-perfect state. Data prep is hard.
Traditionally, we were forced into the world of the database where complex ETL (Extract, Transform, Load) operations created by the data team did all the heavy lifting for us. Fortunately, we have moved past those days. With the introduction of the Tableau Dat ...
Salesforce Platform App Builder CertificationNew or intermediate developers will want to use this hands-on guide to prepare for the Salesforce Certified Platform App Builder credential, awarded for designing, building, and implementing applications using the declarative customization capabilities of the Salesforce Platform.
This is the first book available covering this content, and Salesforce training is very costly. This book is filled with real-world examples and hands-on exercises, enabling you to prepare for the certification exam in a short span of time. Multiple-choice study questions and exercises are included to help you apply what you learn in each chapter.
Author Rakesh Gupta explains Salesforce Platform fundamentals, including knowledge about the limitations of the declarative platform and when to use programmatic development versus the AppExchange. Data management and data analytics are covered. And you will learn how to set up organization-wide features that affect the look and feel of your application.
San ...
Deep Learning PipelineBuild your own pipeline based on modern TensorFlow approaches rather than outdated engineering concepts. This book shows you how to build a deep learning pipeline for real-life TensorFlow projects.
You'll learn what a pipeline is and how it works so you can build a full application easily and rapidly. Then troubleshoot and overcome basic Tensorflow obstacles to easily create functional apps and deploy well-trained models. Step-by-step and example-oriented instructions help you understand each step of the deep learning pipeline while you apply the most straightforward and effective tools to demonstrative problems and datasets.
You'll also develop a deep learning project by preparing data, choosing the model that fits that data, and debugging your model to get the best fit to data all using Tensorflow techniques. Enhance your skills by accessing some of the most powerful recent trends in data science. If you've ever considered building your own image or text-tagging solution or en ...