![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer programming > General
Systems Programming: Designing and Developing Distributed Applications explains how the development of distributed applications depends on a foundational understanding of the relationship among operating systems, networking, distributed systems, and programming. Uniquely organized around four viewpoints (process, communication, resource, and architecture), the fundamental and essential characteristics of distributed systems are explored in ways which cut across the various traditional subject area boundaries. The structures, configurations and behaviours of distributed systems are all examined, allowing readers to explore concepts from different perspectives, and to understand systems in depth, both from the component level and holistically.
Expert advice from several industrial professionals who have worked for some of the world's biggest tech and interactive companies. Best practices that not only prepare writers on how to apply their craft to new fields, but also prepare them for the common ambiguity they will find in corporate and start-up environments. Breakdown of platforms that shows how tech capabilities can fulfill content expectations and how content can fulfill tech expectations. Basic storytelling mechanics customized to today's popular technologies and traditional gaming platforms.
- The first book dedicated to exploring key video games from the 1970s to present day. - Provides a highly accessible overview of the history of video games from PONG, Pac-Man and Tetris to Minecraft, Animal Crossing and Assassin's Creed. - The selection covers a range of historical periods and platforms, genres, commercial impact, artistic choices, contexts of play, typical and atypical representations, uses of games for specific purposes, uses of materials or techniques, specific subcultures, repurposing, transgressive aesthetics, interfaces, moral or ethical impacts, and more.
Welcome to the second volume of Game Audio Programming: Principles and Practices - the first series of its kind dedicated to the art of game audio programming! This volume features more than 20 chapters containing advanced techniques from some of the top game audio programmers and sound designers in the industry. This book continues the tradition of collecting more knowledge and wisdom about game audio programming than any other volume in history. Both audio programming beginners and seasoned veterans will find content in this book that is valuable, with topics ranging from extreme low-level mixing to high-level game integration. Each chapter contains techniques that were used in games that have shipped, and there is a plethora of code samples and diagrams. There are chapters on threading, DSP implementation, advanced middleware techniques in FMOD Studio and Audiokinetic Wwise, ambiences, mixing, music, and more. This book has something for everyone who is programming audio for a game: programmers new to the art of audio programming, experienced audio programmers, and those souls who just got assigned the audio code. This book is for you!
This book provides a systematic overview of watermarking and steganography methods for triangle meshes related to computer graphics and security. The significance of this research has been well recognized by the growing body of work on watermarking, steganography and steganalysis of 3D meshes. With the evolution of the CAD industry and real-world end-user applications such as virtual reality (VR) and 3D printing, 3D meshes have attracted world-wide attention. Besides, the flexible data structure of 3D geometry provides enough space to embed secret information, making it ideal for applications such as copyright protection and covert communication. Our goal of the book is to allow readers to systematically understand 3D mesh information hiding technology and its applications as a whole. The book outlines comprehensive techniques, including handcrafted and deep learning-based techniques, digital and physical techniques in the literature and provides standard evaluation metrics for triangle meshes. The up-to-date geometrical deep learning and 3D printing-related algorithms are also covered. Offering a rich blend of ideas and algorithms, the book is up-to-date and self-contained. It is an excellent reference resource for users who are seeking 3D mesh watermarking and steganography algorithms, as well as for graduate students and researchers wanting to grasp the frontiers of triangular mesh processing on data hiding.
There are several theories of programming. The first usable theory, often called "Hoare's Logic," is still probably the most widely known. In it, a specification is a pair of predicates: a precondition and postcondition (these and all technical terms will be defined in due course). Another popular and closely related theory by Dijkstra uses the weakest precondition predicate transformer, which is a function from programs and postconditions to preconditions. lones's Vienna Development Method has been used to advantage in some industries; in it, a specification is a pair of predicates (as in Hoare's Logic), but the second predicate is a relation. Temporal Logic is yet another formalism that introduces some special operators and quantifiers to describe some aspects of computation. The theory in this book is simpler than any of those just mentioned. In it, a specification is just a boolean expression. Refinement is just ordinary implication. This theory is also more general than those just mentioned, applying to both terminating and nonterminating computation, to both sequential and parallel computation, to both stand-alone and interactive computation. And it includes time bounds, both for algorithm classification and for tightly constrained real-time applications.
"Pro J2ME Polish: Open Source Wireless Java Tools Suite" is written for wireless and other mobile Java programmers who want to "polish" their efficiency and acquire in-depth knowledge about programming real-world J2ME applications. It also uncovers all common device limitations and quirks, and explains how these can be circumvented. The book describes the open-source tools collection J2ME Polish, and shows how the tools can be used for creating professional J2ME applications. Building multiple devices and multiple locales is easy after studying this book. Author -->Robert Virkus--> offers tips about the more hidden features of J2ME Polish, like the logging framework, the preprocessor, and the game-engine. You will learn to polish up your applications with the powerful GUI that enables you to design standard J2ME applications with simple CSS text files. You'll also learn to write portable, fast applications while using all available features on your target devices simultaneously.
a balanced blend of theoretical and practical information that enables readers to develop 3D worlds quickly and efficiently.
Expert advice from several industrial professionals who have worked for some of the world's biggest tech and interactive companies. Best practices that not only prepare writers on how to apply their craft to new fields, but also prepare them for the common ambiguity they will find in corporate and start-up environments. Breakdown of platforms that shows how tech capabilities can fulfill content expectations and how content can fulfill tech expectations. Basic storytelling mechanics customized to today's popular technologies and traditional gaming platforms.
Doing data science is difficult. Projects are typically very dynamic with requirements that change as data understanding grows. The data itself arrives piecemeal, is added to, replaced, contains undiscovered flaws and comes from a variety of sources. Teams also have mixed skill sets and tooling is often limited. Despite these disruptions, a data science team must get off the ground fast and begin demonstrating value with traceable, tested work products. This is when you need Guerrilla Analytics. In this book, you will learn about: The Guerrilla Analytics Principles: simple rules of thumb for maintaining data provenance across the entire analytics life cycle from data extraction, through analysis to reporting. Reproducible, traceable analytics: how to design and implement work products that are reproducible, testable and stand up to external scrutiny. Practice tips and war stories: 90 practice tips and 16 war stories based on real-world project challenges encountered in consulting, pre-sales and research. Preparing for battle: how to set up your team's analytics environment in terms of tooling, skill sets, workflows and conventions. Data gymnastics: over a dozen analytics patterns that your team will encounter again and again in projects
This comprehensive reference uses a formal and standard evaluation technique to show the strengths and weakness of more than 60 software development methodologies such as agile, DevOps, RUP, Waterfall, TSP, XP and many more. Each methodology is applied to an application of 1000 function points using the Java language. Each methodology produces a characteristic set of results for development schedules, productivity, costs, and quality. The intent of the book is to show readers the optimum kinds of methodologies for the projects they are concerned with and to warn them about counter indications and possible harm from unsuitable methodologies.
"Python Forensics" provides many never-before-published proven forensic modules, libraries, and solutions that can be used right out of the box. In addition, detailed instruction and documentation provided with the code samples will allow even novice Python programmers to add their own unique twists or use the models presented to build new solutions. Rapid development of new cybercrime investigation tools is an essential ingredient in virtually every case and environment. Whether you are performing post-mortem investigation, executing live triage, extracting evidence from mobile devices or cloud services, or you are collecting and processing evidence from a network, Python forensic implementations can fill in the gaps. Drawing upon years of practical experience and using numerous
examples and illustrative code samples, author Chet Hosmer
discusses how to: Develop new forensic solutions independent of
large vendor software release schedules Participate in an
open-source workbench that facilitates direct involvement in the
design and implementation of new methods that augment or replace
existing tools Advance your career by creating new solutions along
with the construction of cutting-edge automation solutions to solve
old problems
This book looks closely at the endings of narrative digital games, examining their ways of concluding the processes of both storytelling and play in order to gain insight into what endings are and how we identify them in different media. While narrative digital games share many representational strategies for signalling their upcoming end with more traditional narrative media - such as novels or movies - they also show many forms of endings that often radically differ from our conventional understanding of conclusion and closure. From vast game worlds that remain open for play after a story's finale, to multiple endings that are often hailed as a means for players to create their own stories, to the potentially tragic endings of failure and "game over", digital games question the traditional singularity and finality of endings. Using a broad range of examples, this book delves deeply into these and other forms and their functions, both to reveal the closural specificities of the ludonarrative hybrid that digital games are, as well as to find the core elements that characterise endings in any medium. It examines how endings make themselves known to players and raises the question of how well-established closural conventions blend with play and a player's effort to achieve a goal. As an interdisciplinary study that draws on game studies as much as on transmedial narratology, Forms and Functions of Endings in Narrative Digital Games is suited for scholars and students of digital games as well as for narratologists yet to become familiar with this medium.
The classic guide to cryptography and network security - now fully updated! "Alice and Bob are back!" Widely regarded as the most comprehensive yet comprehensible guide to network security and cryptography, the previous editions of Network Security received critical acclaim for lucid and witty explanations of the inner workings of cryptography and network security protocols. In this edition, the authors have significantly updated and revised the previous content, and added new topics that have become important. This book explains sophisticated concepts in a friendly and intuitive manner. For protocol standards, it explains the various constraints and committee decisions that led to the current designs. For cryptographic algorithms, it explains the intuition behind the designs, as well as the types of attacks the algorithms are designed to avoid. It explains implementation techniques that can cause vulnerabilities even if the cryptography itself is sound. Homework problems deepen your understanding of concepts and technologies, and an updated glossary demystifies the field's jargon. Network Security, Third Edition will appeal to a wide range of professionals, from those who design and evaluate security systems to system administrators and programmers who want a better understanding of this important field. It can also be used as a textbook at the graduate or advanced undergraduate level. Coverage includes Network security protocol and cryptography basics Design considerations and techniques for secret key and hash algorithms (AES, DES, SHA-1, SHA-2, SHA-3) First-generation public key algorithms (RSA, Diffie-Hellman, ECC) How quantum computers work, and why they threaten the first-generation public key algorithms Quantum-safe public key algorithms: how they are constructed, and optimizations to make them practical Multi-factor authentication of people Real-time communication (SSL/TLS, SSH, IPsec) New applications (electronic money, blockchains) New cryptographic techniques (homomorphic encryption, secure multiparty computation)
"Process Modeling Style"focuses on other aspects of process
modeling beyond notation that are very important to practitioners.
Many people who model processes focus on the specific notation used
to create their drawings. While that is important, there are many
other aspects to modeling, such as naming, creating identifiers,
descriptions, interfaces, patterns, and creating useful process
documentation.Experience author John Longfocuses on those
non-notational aspects of modeling, which practitioners will find
invaluable.
Knowing the industry-standard animation and interactivity tool Adobe Animate CC (previously known as "Flash Professional") can help you get a foothold in the exciting web design and mobile app-development world. Learn Animate CC by building cool creative projects that will teach you how to: Design and animate vector artwork Compose an animated greeting card using HTML5 Build a promotional video with text and images animated in 3D Construct a working digital clock using ActionScript Design and code an interactive quiz for mobile devices This study guide uses more than 6 hours of video integrated with text to help you gain real-world skills that will get you started in your career designing and building interactive media using Adobe Animate CC. It lays the foundation for taking the Adobe Certified Associate (ACA) exam in Interactive Media Using Adobe Flash Professional CC (name correct at press time) and helps prepare you for an entry-level position in a competitive job market. Purchasing this book gives you access to valuable online extras. Follow the instructions in the book's "Getting Started" section to unlock access to: The Web Edition containing instructional video embedded in the complete text of the book with interactive review questions along with product updates Downloadable lesson file you need to work through the projects When creating the Adobe Certified Associate examination, Adobe conducted research to identify the foundational skills students need to effectively communicate using digital media tools. Based on feedback from educators, design professionals, businesses, and educational institutions around the world, the objectives cover entry-level skill expectations for each topic. The ACA exams have proved to be highly successful around the world. To create this new product, Peachpit and Adobe Press have joined forces with team of outstanding instructors who have a great track record getting students certified: Rob Schwartz and his colleagues at BrainBuffet.com Joseph Labrecque is a senior interactive software engineer at the University of Denver where he also teaches classes on Adobe Animate CC (formerly Flash Professional), web animation, graphics production, and mobile application design. Joseph is an Adobe Education Leader (AEL) and an Adobe Community Professional. He received the Adobe Education Impact Award in 2010 and currently serves on the AEL Advisory Board. Joseph produces written and video content for Adobe Press, Peachpit, O'Reilly, Lynda.com, and BrainBuffet.com. What you need to use this book: Adobe Animate CC (2015 release) software, for either Windows or Mac OS. (Software not included.)
A uniquely cross-disciplinary and cross-experience book written as an accessible guide for people new to storytelling in games, new to games as a practice, and those eager to develop their existing practices & knowledge around storytelling in games. Offers careful, clear, and practical advice for understanding creative writing, in the context of games, and in discovering and developing your own games writing practice. Focuses on writing, not narrative design, as an area underdeveloped in the context of games storytelling.
Explores the basics of indie game marketing Helps the reader with how to communicate to talk to investors, pbulishers, and major platforms Illustrates different negotiation tactics
Python Packages introduces Python packaging at an introductory and practical level that's suitable for those with no previous packaging experience. Despite this, the text builds up to advanced topics such as automated testing, creating documentation, versioning and updating a package, and implementing continuous integration and deployment. Covering the entire Python packaging life cycle, this essential guide takes readers from package creation all the way to effective maintenance and updating. Python Packages focuses on the use of current and best-practice packaging tools and services like poetry, cookiecutter, pytest, sphinx, GitHub, and GitHub Actions. Features: The book's source code is available online as a GitHub repository where it is collaborated on, automatically tested, and built in real time as changes are made; demonstrating the use of good reproducible and clear project workflows. Covers not just the process of creating a package, but also how to document it, test it, publish it to the Python Package Index (PyPI), and how to properly version and update it. All concepts in the book are demonstrated using examples. Readers can follow along, creating their own Python packages using the reproducible code provided in the text. Focuses on a modern approach to Python packaging with emphasis on automating and streamlining the packaging process using new and emerging tools such as poetry and GitHub Actions.
Python Packages introduces Python packaging at an introductory and practical level that's suitable for those with no previous packaging experience. Despite this, the text builds up to advanced topics such as automated testing, creating documentation, versioning and updating a package, and implementing continuous integration and deployment. Covering the entire Python packaging life cycle, this essential guide takes readers from package creation all the way to effective maintenance and updating. Python Packages focuses on the use of current and best-practice packaging tools and services like poetry, cookiecutter, pytest, sphinx, GitHub, and GitHub Actions. Features: The book's source code is available online as a GitHub repository where it is collaborated on, automatically tested, and built in real time as changes are made; demonstrating the use of good reproducible and clear project workflows. Covers not just the process of creating a package, but also how to document it, test it, publish it to the Python Package Index (PyPI), and how to properly version and update it. All concepts in the book are demonstrated using examples. Readers can follow along, creating their own Python packages using the reproducible code provided in the text. Focuses on a modern approach to Python packaging with emphasis on automating and streamlining the packaging process using new and emerging tools such as poetry and GitHub Actions.
a balanced blend of theoretical and practical information that enables readers to develop 3D worlds quickly and efficiently.
Uses a modular structure, oriented to solve several small-sized cybersecurity problems, each workable in about two weeks with a hands-on approach Evolves from the experience of educating students for more than ten years, following the same principle Includes tutorial work that guides students through a development model aiming to stimulate specific education for non-functional requirements implementation Integrates well-known multimedia resources aiming to explain background concepts and to familiarize students with technological tools. Provides many examples generated from actual occurrences, including those generated by European and NATO experiences
As the trend toward the increased miniaturization of devices continues, solder interconnects are becoming the limiting factor in the reliability of electronic packages. With the critical nature of these small electrical-mechanical interconnections, the question arises: Just how reliable are the solder joints in a modern electronic package? The authors will answer this question by addressing the materials and mechanics issues associated with solder joints in this state-of-the-art assessment. The reader will learn the basic metallurgy of solder alloys, the constitutive models available for modeling solder interconnects, computational simulations to predict solder joint geometry, and the application of mechanics models to through-hole and surface mount technologies. The Mechanics of Solder Alloy Interconnects is a resource to be used in developing a solder joint reliability assessment. Each chapter is written to be used as a "stand-alone" resource for a particular aspect of materials and modeling issues. With this gained understanding, the reader in search of a solution to a solder joint reliability problem knows where in the materials and modeling communities to go for the appropriate answer.
Fully detailed game projects from scratch. Beginners can do the steps and create games right away. No coding experience is necessary. Numerous examples take a raw beginner towards professional coding proficiency in C# and Unity. Includes a thorough introduction to Unity 2020 All required software is professional quality and completely free to use for any purpose including commercial applications and games. |
You may like...
Practical Guide to Usability Testing
Joseph S. Dumas, Janice C. Redish
Paperback
R984
Discovery Miles 9 840
Research Anthology on Agile Software…
Information R Management Association
Hardcover
R14,523
Discovery Miles 145 230
Design and Optimization of Sensors and…
Vinod Kumar Singh, Ratnesh Tiwari, …
Hardcover
R5,892
Discovery Miles 58 920
Research Anthology on Agile Software…
Information R Management Association
Hardcover
R14,547
Discovery Miles 145 470
News Search, Blogs and Feeds - A Toolkit
Lars Vage, Lars Iselid
Paperback
R1,332
Discovery Miles 13 320
|