Verleger: Packt Publishing

4273
Wird geladen...
E-BOOK

Mind-Melding Unity and Blender for 3D Game Development. Unleash the power of Unity and Blender to create amazing games

Spencer Grey

Blender is an incredibly powerful, free computer graphics program that provides a world-class, open-source graphics toolset for creating amazing assets in 3D. With Mind-Melding Unity and Blender for 3D Game Development, you'll discover how adding Blender to Unity can help you unlock unlimited new possibilities and reduce your reliance on third parties for creating your game assets.This game development book will broaden your knowledge of Unity and help you to get to grips with Blender's core capabilities for enhancing your games. You'll become familiar with creating new assets and modifying existing assets in Blender as the book shows you how to use the Asset Store and Package Manager to download assets in Unity and then export them to Blender for modification. You'll also learn how to modify existing and create new sci-fi-themed assets for a minigame project. As you advance, the book will guide you through creating 3D model props, scenery, and characters and demonstrate UV mapping and texturing. Additionally, you'll get hands-on with rigging, animation, and C# scripting.By the end of this Unity book, you'll have developed a simple yet exciting mini game with audio and visual effects, and a GUI. More importantly, you'll be ready to apply everything you've learned to your Unity game projects.

4274
Wird geladen...
E-BOOK

Minimal APIs in ASP.NET 9. Design, implement, and optimize robust APIs in C# with .NET 9 - Second Edition

Nick Proud

Written by an esteemed technology leader, a .NET specialist, and Microsoft MVP for Developer Technologies, Minimal APIs in ASP.NET 9 provides you with specialized insights into the latest advancements in .NET technology, particularly minimal APIs.You’ll get your first minimal API set up and running, before exploring the anatomy of a typical minimal API project, seeing how the framework can be used to create various HTTP endpoints, route, and validate requests, as well as enhancing those requests with custom middleware. After covering the basics, you’ll move on to data mapping, managing important dependencies through dependency injection and integrating your minimal APIs with data sources such as Entity Framework, Dapper, and SQL databases for creating CRUD operations. The chapters also walk you through performance optimization, asynchronous programming, and caching, which’ll allow you to examine the more advanced aspects of minimal API development, with code examples reflecting real-world scenarios.By the end of this book, you’ll be armed with the necessary best practices and skills needed for deploying performant, elegant, and scalable minimal APIs in .NET.

4275
Wird geladen...
E-BOOK

Minimal CMake. Learn the best bits of CMake to create and share your own libraries and applications

Tom Hulton-Harrop

Minimal CMake guides you through creating a CMake project one step at a time. The book utilizes the author's unique expertise in game and engine development to craft compelling examples of how CMake can be used to build complex software. The chapters introduce concepts gradually, each one building on the last. Throughout the course of the book, you will progress from a simple console application all the way through to a full windowed app.The book will help you build a strong foundation in CMake that will translate to future projects. You'll learn how to integrate existing software libraries to enhance your app's functionality, how to build reusable libraries to share with others, and how to manage developing for multiple platforms simultaneously, including macOS, Windows, and Linux. You'll also find out how CMake facilitates testing and how to package your application ready for distribution.The book aims to not overwhelm you with everything there is to know about CMake. Instead, it focuses on the most relevant and important parts that will help you become productive quickly.By the end of this book, you will be a confident CMake user and will have gained the skills and experience to build and share your own libraries and applications.

4277
Wird geladen...
E-BOOK

MLOps with Red Hat OpenShift. A cloud-native approach to machine learning operations

Ross Brigoli, Faisal Masood

MLOps with OpenShift offers practical insights for implementing MLOps workflows on the dynamic OpenShift platform. As organizations worldwide seek to harness the power of machine learning operations, this book lays the foundation for your MLOps success. Starting with an exploration of key MLOps concepts, including data preparation, model training, and deployment, you’ll prepare to unleash OpenShift capabilities, kicking off with a primer on containers, pods, operators, and more.With the groundwork in place, you’ll be guided to MLOps workflows, uncovering the applications of popular machine learning frameworks for training and testing models on the platform.As you advance through the chapters, you’ll focus on the open-source data science and machine learning platform, Red Hat OpenShift Data Science, and its partner components, such as Pachyderm and Intel OpenVino, to understand their role in building and managing data pipelines, as well as deploying and monitoring machine learning models.Armed with this comprehensive knowledge, you’ll be able to implement MLOps workflows on the OpenShift platform proficiently.

4278
Wird geladen...
E-BOOK

Mobile App Reverse Engineering. Get started with discovering, analyzing, and exploring the internals of Android and iOS apps

Abhinav Mishra

Mobile App Reverse Engineering is a practical guide focused on helping cybersecurity professionals scale up their mobile security skills. With the IT world’s evolution in mobile operating systems, cybercriminals are increasingly focusing their efforts on mobile devices. This book enables you to keep up by discovering security issues through reverse engineering of mobile apps.This book starts with the basics of reverse engineering and teaches you how to set up an isolated virtual machine environment to perform reverse engineering. You’ll then learn about modern tools such as Ghidra and Radare2 to perform reverse engineering on mobile apps as well as understand how Android and iOS apps are developed. Next, you’ll explore different ways to reverse engineer some sample mobile apps developed for this book. As you advance, you’ll learn how reverse engineering can help in penetration testing of Android and iOS apps with the help of case studies. The concluding chapters will show you how to automate the process of reverse engineering and analyzing binaries to find low-hanging security issues.By the end of this reverse engineering book, you’ll have developed the skills you need to be able to reverse engineer Android and iOS apps and streamline the reverse engineering process with confidence.

4279
Wird geladen...
E-BOOK

Mobile Application Development: JavaScript Frameworks. Click here to enter text

Sani Yusuf, Tom Bray, Hazem Saleh, Ethan...

A great mobile app is rapidly becoming crucial for a huge range of businesses. With a great app, your customers or your readers don’t come to you – you go with them, just a few clicks and swipes away. This Learning Path shows you how to build awesome mobile apps with some of the best tools currently being used by some of the smartest developers in the industry. Taking you through JavaScript impressive development ecosystem – from jQuery Mobile to React, through to Ionic – we’ll show you how to put your skills into practice so you can build your next mobile apps with confidence and style. In this Learning Path, from jQuery to React, to Ionic, we’ll cover everything you need to start In the first module you’ll learn how to get stuck into Apache Cordova and find out how to use it as the key platform for developing your mobile app. It offers an efficient way to develop hybrid apps, which means you won’t have to connect to platform specific APIs or use their UI framework, and can instead harness your JavaScript web development skills. Make sure you have your HTML, CSS and jQuery skills at the ready.In Module 2 we’ll show you how to take advantage of React Native. It has a reputation for having a steep learning curve, but we’ll make it easy for you, making sure you make full use of your existing knowledge and getting you up and running with a sample application. You’ll also learn how to create components, how to create multiple screens, as well as using native UI components and accessing native APIs.In the third and final module you’ll get started with Ionic. With three practical projects you can build yourself, we’ve made sure that you’ll be learning by doing – which means you’ll not only develop new skills much more quickly, but you’ll have produced something tangible at the end of it!This Learning Path combines some of the best that Packt has to offer in one complete, curated package. It includes content from the following Packt products:?JavaScript Mobile Application Development by Hazem Saleh?Getting Started with React Native by Ethan Holmes and Tom Bray?Ionic Framework By Example by Sani Yusuf

4280
Wird geladen...
E-BOOK

Mobile Application Penetration Testing. Explore real-world threat scenarios, attacks on mobile applications, and ways to counter them

Vijay Kumar Velu

Mobile security has come a long way over the last few years. It has transitioned from should it be done? to it must be done!Alongside the growing number of devises and applications, there is also a growth in the volume of Personally identifiable information (PII), Financial Data, and much more. This data needs to be secured. This is why Pen-testing is so important to modern application developers. You need to know how to secure user data, and find vulnerabilities and loopholes in your application that might lead to security breaches.This book gives you the necessary skills to security test your mobile applications as a beginner, developer, or security practitioner. You'll start by discovering the internal components of an Android and an iOS application. Moving ahead, you'll understand the inter-process working of these applications. Then you'll set up a test environment for this application using various tools to identify the loopholes and vulnerabilities in the structure of the applications. Finally, after collecting all information about these security loop holes, we'll start securing our applications from these threats.