Verleger: Packt Publishing

673
Wird geladen...
E-BOOK

Buildbox 2.x Game Development. Develop & Distribute video games with Buildbox, no coding necessary!

Ty Audronis

Buildbox is an “any skill level” development platform to develop video games with no coding experience. It also exports these games to be compiled for any platform (from Windows to Mac to iOS to Android and Blackberry) all using the same graphic user interface.Using an example as a tutorial, we will relate the driving principles and you’ll see how you can implement these principles to develop any games on the platform. We begin by setting expectations and providing a brief overview of the software. But it’s not long before you “dive in” to creating your first video game. You will actually have a playable level (“world”) by the end of the second chapter.Later on, you’ll learn everything from basic graphics creation to advanced world design while you refine your first game, called “Ramblin’ Rover.” All along the way, you will see how certain functions could be used in tandem to create other types of games; hoping to spark imagination. We will follow the principles and process of monetization through ads and in-game rewards.Lastly, we will go through the process of exporting, compiling, and preparing your storefront to sell the games you will eventually create.

674
Wird geladen...
E-BOOK

Building a 3D Game with LibGDX. Learn how to build an exciting 3D game with LibGDX from scratch

Sebastián Di Giuseppe, Andreas Krühlmann, Elmar van...

LibGDX is a hugely popular open source, cross-platform, Java-based game development framework built for the demands of cross-platform game development. This book will teach readers how the LibGDX framework uses its 3D rendering API with the OpenGL wrapper, in combination with Bullet Physics, 3D Particles, and Shaders to develop and deploy a game application to different platformsYou will start off with the basic Intellij environment, workflow and set up a LibGDX project with necessary APIs for 3D development. You will then go through LibGDX’s 3D rendering API main features and talk about the camera used for 3D. Our next step is to put everything together to build a basic 3D game with Shapes, including basic gameplay mechanics and basic UI. Next you will go through modeling, rigging, and animation in Blender. We will then talk about refining mechanics, new input implementations, implementing enemy 3D models, mechanics, and gameplay balancing. The later part of this title will help you to manage secondary resources like audio, music and add 3D particles in the game to make the game more realistic. You will finally test and deploy the app on a multitude of different platforms, ready to start developing your own titles how you want!

675
Wird geladen...
E-BOOK

Building a BeagleBone Black Super Cluster. Build and configure your own parallel computing Beowulf cluster using BeagleBone Black ARM systems

Andreas J Reichel

If you are a programmer, scientist, or someone interested in modern computer technology that goes beyond the typical PC, then this book will show you the outstanding possibilities of cluster computing with modern embedded systems based on ARM architecture. Whether you need a high-speed or low-cost scalable cluster for simulations or want to try something new, this book is the right guide for you.

676
Wird geladen...
E-BOOK

Building a Cyber Resilient Business. A cyber handbook for executives and boards

Dr. Magda Lilia Chelly , Shamane Tan,...

With cyberattacks on the rise, it has become essential for C-suite executives and board members to step up and collectively recognize cyber risk as a top priority business risk. However, non-cyber executives find it challenging to understand their role in increasing the business’s cyber resilience due to its complex nature and the lack of a clear return on investment.This book demystifies the perception that cybersecurity is a technical problem, drawing parallels between the key responsibilities of the C-suite roles to line up with the mission of the Chief Information Security Officer (CISO).The book equips you with all you need to know about cyber risks to run the business effectively. Each chapter provides a holistic overview of the dynamic priorities of the C-suite (from the CFO to the CIO, COO, CRO, and so on), and unpacks how cybersecurity must be embedded in every business function. The book also contains self-assessment questions, which are a helpful tool in evaluating any major cybersecurity initiatives and/or investment required.With this book, you’ll have a deeper appreciation of the various ways all executives can contribute to the organization’s cyber program, in close collaboration with the CISO and the security team, and achieve a cyber-resilient, profitable, and sustainable business.

677
Wird geladen...
HÖRBUCH

Building a Cyber Resilient Business Audiobook. A cyber handbook for executives and boards

Dr. Magda Lilia Chelly , Shamane Tan,...

With cyberattacks on the rise, it has become essential for C-suite executives and board members to step up and collectively recognize cyber risk as a top priority business risk. However, non-cyber executives find it challenging to understand their role in increasing the business’s cyber resilience due to its complex nature and the lack of a clear return on investment.This audiobook demystifies the perception that cybersecurity is a technical problem, drawing parallels between the key responsibilities of the C-suite roles to line up with the mission of the Chief Information Security Officer (CISO).The audiobook equips you with all you need to know about cyber risks to run the business effectively. Each chapter provides a holistic overview of the dynamic priorities of the C-suite (from the CFO to the CIO, COO, CRO, and so on), and unpacks how cybersecurity must be embedded in every business function. The audiobook also contains self-assessment questions, which are a helpful tool in evaluating any major cybersecurity initiatives and/or investment required.With this audiobook, you’ll have a deeper appreciation of the various ways all executives can contribute to the organization’s cyber program, in close collaboration with the CISO and the security team, and achieve a cyber-resilient, profitable, and sustainable business.

678
Wird geladen...
E-BOOK

Building a Game with Unity and Blender. Learn how to build a complete 3D game using the industry-leading Unity game development engine and Blender, the graphics software that gives life to your ideas

Lee Zhi Eng

In the wake of the indie game development scene, game development tools are no longer luxury items costing up to millions of dollars but are now affordable by smaller teams or even individual developers. Among these cutting-edge applications, Blender and Unity stand out from the crowd as a powerful combination that allows small-to-no budget indie developers or hobbyists alike to develop games that they have always dreamt of creating.Starting from the beginning, this book will cover designing the game concept, constructing the gameplay, creating the characters and environment, implementing game logic and basic artificial intelligence, and finally deploying the game for others to play. By sequentially working through the steps in each chapter, you will quickly master the skills required to develop your dream game from scratch.

679
Wird geladen...
E-BOOK

Building a Home Security System with BeagleBone. Save money and pursue your computing passion with this guide to building a sophisticated home security system using BeagleBone. From a basic alarm system to fingerprint scanners, all you need to turn your home into a fortress

William Pretty

One of the best kept secrets of the security industry is just how simple the monitoring hardware actually is - BeagleBone has all the computing power you need to build yourself an extremely sophisticated access control, alarm panel, and home automation and network intrusion-detection system. Security companies make a fortune each year by charging exorbitant fees to their customers. You will learn how easy it is to make an alarm system with Beaglebone.A company-maintained-and-monitored alarm system has its place - your dear old mum is probably not going to be creating her own system any time soon. But if you are reading this book, you are probably a builder or a hobbyist with all the skills required to do it yourself. With Building a Home Security System with BeagleBone, you will learn everything you need to know to develop your own state-of-the-art security system, all for less than a year's worth of monitoring charges from your local alarm company!You will start by building and testing your hardware and open source software on an experimenter's prototype board before progressing to more complex systems. You will then learn how to test your new creations in a modular fashion and begin to utilize BeagleBone. Once your system is built and tested, you will install some of the professional-grade sensors used in modern alarm systems and learn how to use them. You will also discover how to extend your alarm system in a variety of different ways. The only limit will be your imagination.

680
Wird geladen...
E-BOOK

Building a Home Security System with Raspberry Pi. Build your own sophisticated modular home security system using the popular Raspberry Pi board

Matthew Poole

The Raspberry Pi is a powerful low-cost credit-card-sized computer, which lends itself perfectly as the controller for a sophisticated home security system. Using the on-board interfaces available, the Raspberry Pi can be expanded to allow the connection of a virtually infinite number of security sensors and devices. The Raspberry Pi has the processing power and interfaces available to build a sophisticated home security system but at a fraction of the cost of commercially available systems.Building a Home Security System with Raspberry Pi starts off by showing you the Raspberry Pi and how to set up the Linux-based operating system. It then guides you through connecting switch sensors and LEDs to the native GPIO connector safely, and how to access them using simple Bash scripts. As you dive further in, you’ll learn how to build an input/output expansion board using the I2C interface and power supply, allowing the connection of the large number of sensors needed for a typical home security setup. In the later chapters of the book, we'll look at more sophisticated topics such as adding cameras, remotely accessing the system using your mobile phone, receiving intrusion alerts and images by e-mail, and more.By the end of the book, you will be well-versed with the use of Raspberry Pi to power a home-based security system that sends message alerts whenever it is triggered and will be able to build a truly sophisticated and modular home security system. You will also gain a good understanding of Raspberry Pi's ecosystem and be able to write the functions required for a security system.

681
Wird geladen...
E-BOOK

Building a Next-Gen SOC with IBM QRadar. Accelerate your security operations and detect cyber threats effectively

Ashish Kothekar

This comprehensive guide to QRadar will help you build an efficient security operations center (SOC) for threat hunting and need-to-know software updates, as well as understand compliance and reporting and how IBM QRadar stores network data in real time.The book begins with a quick introduction to QRadar components and architecture, teaching you the different ways of deploying QRadar. You’ll grasp the importance of being aware of the major and minor upgrades in software and learn how to scale, upgrade, and maintain QRadar. Once you gain a detailed understanding of QRadar and how its environment is built, the chapters will take you through the features and how they can be tailored to meet specifi c business requirements. You’ll also explore events, flows, and searches with the help of examples. As you advance, you’ll familiarize yourself with predefined QRadar applications and extensions that successfully mine data and find out how to integrate AI in threat management with confidence. Toward the end of this book, you’ll create different types of apps in QRadar, troubleshoot and maintain them, and recognize the current security challenges and address them through QRadar XDR.By the end of this book, you’ll be able to apply IBM QRadar SOC’s prescriptive practices and leverage its capabilities to build a very efficient SOC in your enterprise.

682
Wird geladen...
E-BOOK

Building a Pentesting Lab for Wireless Networks. Build your own secure enterprise or home penetration testing lab to dig into the various hacking techniques

Andrey Popov, Vyacheslav Fadyushin, Aaron Woody

Starting with the basics of wireless networking and its associated risks, we will guide you through the stages of creating a penetration testing lab with wireless access and preparing your wireless penetration testing machine.This book will guide you through configuring hardware and virtual network devices, filling the lab network with applications and security solutions, and making it look and work like a real enterprise network. The resulting lab protected with WPA-Enterprise will let you practice most of the attack techniques used in penetration testing projects. Along with a review of penetration testing frameworks, this book is also a detailed manual on preparing a platform for wireless penetration testing. By the end of this book, you will be at the point when you can practice, and research without worrying about your lab environment for every task.

683
Wird geladen...
E-BOOK

Building a Recommendation System with R. Learn the art of building robust and powerful recommendation engines using R

Michele Usuelli

A recommendation system performs extensive data analysis in order to generate suggestions to its users about what might interest them. R has recently become one of the most popular programming languages for the data analysis. Its structure allows you to interactively explore the data and its modules contain the most cutting-edge techniques thanks to its wide international community. This distinctive feature of the R language makes it a preferred choice for developers who are looking to build recommendation systems.The book will help you understand how to build recommender systems using R. It starts off by explaining the basics of data mining and machine learning. Next, you will be familiarized with how to build and optimize recommender models using R. Following that, you will be given an overview of the most popular recommendation techniques. Finally, you will learn to implement all the concepts you have learned throughout the book to build a recommender system.

684
Wird geladen...
E-BOOK

Building a RESTful Web Service with Spring. A hands-on guide to building an enterprise-grade, scalable RESTful web service using the Spring Framework

Ludovic Dewailly

REST is an architectural style that tackles the challenges of building scalable web services. In today’s connected world, APIs have taken a central role on the web. APIs provide the fabric through which systems interact, and REST has become synonymous with APIs.The depth, breadth, and ease of use of Spring makes it one of the most attractive frameworks in the Java ecosystem. Marrying the two technologies is therefore a very natural choice.This book takes you through the design of RESTful web services and leverages the Spring Framework to implement these services. Starting from the basics of the philosophy behind REST, you’ll go through the steps of designing and implementing an enterprise-grade RESTful web service. Taking a practical approach, each chapter provides code samples that you can apply to your own circumstances.This book goes beyond the use of Spring and explores approaches to tackle resilience, security, and scalability concerns. You’ll learn techniques to deal with security in Spring and discover how to implement unit and integration test strategies.Finally, the book ends by walking you through building a Java client for your RESTful web service, along with some scaling techniques for it.

685
Wird geladen...
E-BOOK

Building a Web Application with PHP and MariaDB: A Reference Guide. Build fast, secure, and interactive web applications using this comprehensive guide

Sai S Sriparasa

This is a step-by-step, tutorial guide designed to help readers transition from beginners to more experienced developers using clear explanations. The variety of examples will help readers build, secure, and host real-time web applications. If you are a developer who wants to use PHP and MariaDB to build web applications, this book is ideal for you. Beginners can use this book to start with the basics and learn how to build and host web applications. Seasoned PHP Developers can use this book to get familiar with the new features of PHP 5.4 and 5.5, unit testing, caching, security, and performance optimization.

686
Wird geladen...
E-BOOK

Building Agentic AI Systems. Create intelligent, autonomous AI agents that can reason, plan, and adapt

Anjanava Biswas, Wrick Talukdar, Matthew R. Scott,...

Gain unparalleled insights into the future of AI autonomy with this comprehensive guide to designing and deploying autonomous AI agents that leverage generative AI (GenAI) to plan, reason, and act. Written by industry-leading AI architects and recognized experts shaping global AI standards and building real-world enterprise AI solutions, it explores the fundamentals of agentic systems, detailing how AI agents operate independently, make decisions, and leverage tools to accomplish complex tasks.Starting with the foundations of GenAI and agentic architectures, you’ll explore decision-making frameworks, self-improvement mechanisms, and adaptability. The book covers advanced design techniques, such as multi-step planning, tool integration, and the coordinator, worker, and delegator approach for scalable AI agents.Beyond design, it addresses critical aspects of trust, safety, and ethics, ensuring AI systems align with human values and operate transparently. Real-world applications illustrate how agentic AI transforms industries such as automation, finance, and healthcare. With deep insights into AI frameworks, prompt engineering, and multi-agent collaboration, this book equips you to build next-generation adaptive, scalable AI agents that go beyond simple task execution and act with minimal human intervention.

687
Wird geladen...
E-BOOK

Building Agents with OpenAI Agents SDK. Create practical AI agents and agentic systems through hands-on projects

Henry Habib

Everyone’s talking about AI agents, but how do you build one that works in the real world? Not a toy demo, but an agent that solves real problems, saves time, and integrates into workflows. With vague frameworks, fragmented tooling, and endless hype, most developers are left without a clear path. The hardest part isn’t technical; it is knowing where to start.This book gives you that starting point. It’s a complete guide to building intelligent AI agents and agentic systems using the official OpenAI Agents SDK. It begins by grounding you in the core concepts, design principles, and architecture of AI agents, how they differ from other traditional systems, their advantages, and why that matters.Through practical step-by-step projects, you’ll master every feature of the SDK—tools, memory, RAG, multi-agent orchestration, tracing, handoffs, and more—while contributing to an end-to-end agent system that grows in complexity. Projects include a custom support agent, invoice and inventory assistant, health advisor, sales trainer, and data analyst, giving you production-ready skills.By the end, you’ll know how to design, build, and deploy agentic systems that interact with APIs, query databases, hand off to external systems, and drive meaningful outcomes. You won’t just understand AI agents; you’ll be ready to ship them.

688
Wird geladen...
E-BOOK

Building AI Agents with LLMs, RAG, and Knowledge Graphs. A practical guide to autonomous and modern AI agents

Salvatore Raieli, Gabriele Iuculano

This book addresses the challenge of building AI that not only generates text but also grounds its responses in real data and takes action. Authored by AI specialists with expertise in drug discovery and systems optimization, this guide empowers you to leverage retrieval-augmented generation (RAG), knowledge graphs, and agent-based architectures to engineer truly intelligent behavior. By combining large language models (LLMs) with up-to-date information retrieval and structured knowledge, you'll create AI agents capable of deeper reasoning and more reliable problem-solving.Inside, you'll find a practical roadmap from concept to implementation. You’ll discover how to connect language models with external data via RAG pipelines for increasing factual accuracy and incorporate knowledge graphs for context-rich reasoning. The chapters will help you build and orchestrate autonomous agents that combine planning, tool use, and knowledge retrieval to achieve complex goals. Concrete Python examples and real-world case studies reinforce each concept and show how the techniques fit together.By the end of this book, you’ll be able to build intelligent AI agents that reason, retrieve, and interact dynamically, empowering you to deploy powerful AI solutions across industries.*Email sign-up and proof of purchase required