Publisher: K-i-s-publishing
Brandon Milonovich
Scratch 2.0 is an easy to use programming language that allows you to animate stories and create interactive games. Scratch also gives you the capability of using programming to calculate complicated calculations for you.Scratch Cookbook will lead you through easy-to-follow recipes that give you everything you need to become a more advanced programmer.Scratch Cookbook will take you through the essential features of Scratch. You'll then work through simple recipes to gain an understanding of the more advanced features of Scratch.You will learn how to create animations using Scratch. Sensory board integration (getting input from the outside environment) will also be covered, along with using Scratch to solve complicated and tedious calculations for you. You'll also learn how to work through the exciting process of project remixing where you build on the work of others.Scratch Cookbook will give you everything you need to get started with building your own programs in Scratch that involve sounds, animations, and user interaction.
Cedric Gemy, Christoph Schafer
Scribus is an Open Source program that brings award-winning and inexpensive professional page layout to desktop computers with a combination of press-ready output and new approaches to page layout. Creating professional-looking documents using Scribus is not a cakewalk, especially with so many features at your disposal, it’s hard to know where to get started! Scribus Beginners guide walks users step by step through common projects, such as creating a brochure,newsletter, business cards and so on. It also includes guidelines on starting a web newsletter and online PDF (Adobe Acrobat format) newsletter along with basic scripting to extend Scribus as per your requirements. This book begins with the simplest tasks and brings you progressively to adapt your workflow to the most efficient tools. It commences with the description of the graphic tool chain and an overall chapter on how to draw a simple and attractive business card. You'll then see how to manage the pages of your document and organized their structure thanks to guides. Then being invited to fill them with text, you'll be able to import, set text style as well as use replacement and hyphenation tool. Pictures or vector drawing will be added to the documents too. You'll be taught to choose the best format at the best time, modify or distort the shapes to get very custom documents. You will also learn how Scribus handles advanced color features such as transparencies, overprinting, spot colors precisely and be sure they are set well for a print result without bad surprise. At the end, you'll know to produce a perfect PDF file, be it for print jobs or web with effects, buttons and javascript interactivity, extend the document capacities as well as Scribus tools with simple programming especially with the python language.
Scripting. Automation with Bash, PowerShell, and Python
Rheinwerk Publishing, Inc, Michael Kofler
This comprehensive scripting guide empowers system administrators, developers, and power users to automate repetitive IT tasks across platforms using three major scripting languages: Bash, PowerShell, and Python. The book opens with foundational scripting concepts and showcases what you can accomplish with just ten lines of code. It continues with in-depth chapters on each language, emphasizing syntax, control structures, error handling, and modularity.Readers will explore practical techniques for managing files, parsing text, utilizing regular expressions, and working with JSON, XML, and INI formats. The book dives into job automation with cron and Task Scheduler, secure communication via SSH, and scripting in professional environments with tools like Visual Studio Code and Git.The final section applies scripting to real-world cases, including system backups, image processing, web scraping, API consumption, database interactions, cloud integration, and virtual machine automation. With this book, readers build a strong scripting toolkit to efficiently manage modern IT workflows.
Lukas Kutschera
Embark on a creative journey with ZBrush, the leading software for creating characters, creatures, and props in films, games, and 3D printing. This guide will take you through its powerful yet user-friendly workflows, allowing you to explore its dynamic organic sculpting, painting, and hard-surface modeling tools.The first part of this book is dedicated to helping you become familiar with ZBrush’s user interface and learning the very basics, from sculpting brushes and painting the model with Polypaint to setting up lights and rendering images. You’ll also create a demon bust with the help of ZBrush’s concept sculpting tool, DynaMesh. In the second part, you’ll get to grips with the creation of a humanoid character that is optimized for 3D printing. Focusing on anatomy, poly-modeling, and preparing the model for 3D printing, you’ll acquire the skills essential for sculptors. The final part delves into portrait sculpting, where you’ll learn everything from basic facial anatomy to hair creation with FiberMesh.By the end of this book, you'll have developed the expertise necessary to succeed in the ever-evolving world of 3D character modeling, complemented by portfolio and social media tips for showcasing your standout work.
Xury Greer
Sculpting the Blender Way is a detailed step-by-step guide for creating digital art with the latest Blender 3D sculpting features. With over 400 reference images, 18 Sculpting in Action videos, and dozens of 3D sculpture example files, this book is an invaluable resource for traditional and digital sculptors looking to try their hand at sculpting in Blender.The first part of the book will teach you how to navigate Blender's user interface and familiarize yourself with the core workflows, as well as gain an understanding of how the sculpting features work, including basic sculpting, Dyntopo, the Voxel Remesher, QuadriFlow, and Multiresolution.You’ll also learn about a wide range of brushes and all of the latest additions to the sculpting feature set, such as Face Sets, Mesh Filters, and the Cloth brush. The next chapters will show you how to customize these brushes and features to create fantastic 3D sculptures that you can share with the ever-growing Blender community.By the end of this book, you'll have gained a complete understanding of the core sculpting workflows and be able to use Blender to bring your digital characters to life.
Shaun Mitchell
SDL 2.0 is the latest release of the popular Simple DirectMedia Layer API, which is designed to make life easier for C++ developers, allowing you simple low-level access to various multiplatform audio, graphics, and input devices.SDL Game Development guides you through creating your first 2D game using SDL and C++. It takes a clear and practical approach to SDL game development, ensuring that the focus remains on creating awesome games.Starting with the installation and setup of SDL, you will quickly become familiar with useful SDL features, covering sprites, state management, and OOP, leading to a reusable framework that is extendable for your own games. SDL Game Development culminates in the development of two exciting action games that utilize the created framework along with tips to improve the framework.
Cody Jackson, Steven F. Lott
This book covers the unexplored secrets of Python, delve into its depths, and uncover its mysteries.You’ll unearth secrets related to the implementation of the standard library, by looking at how modules actually work. You’ll understand the implementation of collections, decimals, and fraction modules. If you haven’t used decorators, coroutines, and generator functions much before, as you make your way through the recipes, you’ll learn what you’ve been missing out on. We’ll cover internal special methods in detail, so you understand what they are and how they can be used to improve the engineering decisions you make. Next, you’ll explore the CPython interpreter, which is a treasure trove of secret hacks that not many programmers are aware of. We’ll take you through the depths of the PyPy project, where you’ll come across several exciting ways that you can improve speed and concurrency. Finally, we’ll take time to explore the PEPs of the latest versions to discover some interesting hacks.
Giovanni Galloro, Nathaniel Avery, David Dorbin
Continuous delivery, a cornerstone of modern software engineering, facilitates quick and secure software delivery using a robust toolkit encompassing automated builds, testing, source code management, artifact storage, and deployment. Whether you integrate tools from different providers or use a set of managed services from a single cloud provider, the goal is to streamline setup, integration, and management. This book focuses on continuous delivery on the Google Cloud.Starting with an introduction to continuous delivery and secure software supply chain concepts, this book uses hands-on exercises to demonstrate how to continuously test your application with Skaffold and Cloud Code, leverage Duet AI-assisted code generation with Cloud Code and Cloud Workstations, and automate your continuous integration with Cloud Build. You'll see how to store and scan your software artifacts on Artifact Registry, orchestrate deployments with Cloud Deploy, and release your software on GKE and Cloud Run, configured to admit only trusted code. Using an example application, you'll implement tools for creating an end-to-end delivery pipeline on the Google Cloud Platform.By the end of this book, you'll be able to build a secure software delivery pipeline from development to production using the Google Cloud managed services and best practices.
Alessandro Parisi
Blockchain adoption has extended from niche research to everyday usage. However, despite the blockchain revolution, one of the key challenges faced in blockchain development is maintaining security, and this book will demonstrate the techniques for doing this.You’ll start with blockchain basics and explore various blockchain attacks on user wallets, and denial of service and pool mining attacks. Next, you’ll learn cryptography concepts, consensus algorithms in blockchain security, and design principles while understanding and deploying security implementation guidelines. You’ll not only cover architectural considerations, but also work on system and network security and operational configurations for your Ethereum and Hyperledger Fabric network. You’ll later implement security at each level of blockchain app development, understanding how to secure various phases of a blockchain app using an example-based approach. You’ll gradually learn to securely implement and develop decentralized apps, and follow deployment best practices. Finally, you’ll explore the architectural components of Hyperledger Fabric, and how they can be configured to build secure private blockchain networks.By the end of this book, you’ll have learned blockchain security concepts and techniques that you can implement in real blockchain production environments.
Dominiek Verham, Johan Vanneuville, Christiaan Brinkhoff, Scott...
Do you want to effectively implement and maintain secure virtualized systems? This book will give you a comprehensive understanding of Microsoft virtual endpoints, from the fundamentals of Windows 365 and Azure Virtual Desktop to advanced security measures, enabling you to secure, manage, and optimize virtualized environments in line with contemporary cybersecurity challenges.You’ll start with an introduction to Microsoft technologies, gaining a foundational understanding of their capabilities. Next, you’ll delve into the importance of endpoint security, addressing the challenges faced by companies in safeguarding their digital perimeters. This book serves as a practical guide to securing virtual endpoints, covering topics such as network access, data leakage prevention, update management, threat detection, and access control configuration. As you progress, the book offers insights into the nuanced security measures required for Windows 365, Azure Virtual Desktop, and the broader Microsoft Azure infrastructure. The book concludes with real-world use cases, providing practical scenarios for deploying Windows 365 and Azure Virtual Desktop.By the end of this book, you’ll be equipped with practical skills for implementing and evaluating robust endpoint security strategies.
IT Governance Publishing, Lee Newcombe
Cloud computing plays a critical role in modern business, but with it comes a host of security challenges. This book explores the intricacies of securing cloud services, starting with foundational concepts of cloud computing and moving into specific service and deployment models. It provides insights into balancing security benefits with potential risks such as availability issues, shadow IT, and information leakage. The book goes on to focus on security threats, from hackers and insiders to government entities, while offering strategies to mitigate these risks. The practical approach continues with a deep dive into security architecture, providing a structured model to secure cloud environments across IaaS, PaaS, SaaS, and more. Further, it examines the regulatory landscape, including compliance requirements, privacy concerns, and data protection laws that impact cloud service security. Finally, the book concludes with projections about the future of cloud security and emerging challenges. Readers will gain not only the theoretical foundations but also real-world insights that they can apply to strengthen their cloud service security.
Securing Hadoop. Implement robust end-to-end security for your Hadoop ecosystem
Sudheesh Narayan
Security of Big Data is one of the biggest concerns for enterprises today. How do we protect the sensitive information in a Hadoop ecosystem? How can we integrate Hadoop security with existing enterprise security systems? What are the challenges in securing Hadoop and its ecosystem? These are the questions which need to be answered in order to ensure effective management of Big Data. Hadoop, along with Kerberos, provides security features which enable Big Data management and which keep data secure.This book is a practitioner's guide for securing a Hadoop-based Big Data platform. This book provides you with a step-by-step approach to implementing end-to-end security along with a solid foundation of knowledge of the Hadoop and Kerberos security models.This practical, hands-on guide looks at the security challenges involved in securing sensitive data in a Hadoop-based Big Data platform and also covers the Security Reference Architecture for securing Big Data. It will take you through the internals of the Hadoop and Kerberos security models and will provide detailed implementation steps for securing Hadoop. You will also learn how the internals of the Hadoop security model are implemented, how to integrate Enterprise Security Systems with Hadoop security, and how you can manage and control user access to a Hadoop ecosystem seamlessly. You will also get acquainted with implementing audit logging and security incident monitoring within a Big Data platform.
Jalal Bouhdada, Marco Ayala
As modern process facilities become increasingly sophisticated and vulnerable to cyber threats, securing critical infrastructure is more crucial than ever. This book offers an indispensable guide to industrial cybersecurity and Safety Instrumented Systems (SIS), vital for maintaining the safety and reliability of critical systems and protecting your operations, personnel, and assets.Starting with SIS design principles, the book delves into the architecture and protocols of safety networks. It provides hands-on experience identifying vulnerabilities and potential attack vectors, exploring how attackers might target SIS components. You’ll thoroughly analyze Key SIS technologies, threat modeling, and attack techniques targeting SIS controllers and engineer workstations. The book shows you how to secure Instrument Asset Management Systems (IAMS), implement physical security measures, and apply integrated risk management methodologies. It also covers compliance with emerging cybersecurity regulations and industry standards worldwide.By the end of the book, you’ll have gained practical insights into various risk assessment methodologies and a comprehensive understanding of how to effectively protect critical infrastructure.