Wydawca: Packt Publishing

Founded in 2004 in Birmingham, UK, Packt's mission is to help the world put software to work in new ways, through the delivery of effective learning and information services to IT professionals. Working towards that vision, we have published over 6,500 books and videos so far, providing IT professionals with the actionable knowledge they need to get the job done - whether that's specific learning on an emerging technology or optimizing key skills in more established tools. As part of our mission, we have also awarded over $1,000,000 through our Open Source Project Royalty scheme, helping numerous projects become household names along the way.
5489
Ładowanie...
EBOOK

Sculpting in ZBrush Made Simple. Explore powerful modeling and character creation techniques used for VFX, games, and 3D printing

Lukas Kutschera

Embark on a creative journey with ZBrush, the leading software for creating characters, creatures, and props in films, games, and 3D printing. This guide will take you through its powerful yet user-friendly workflows, allowing you to explore its dynamic organic sculpting, painting, and hard-surface modeling tools.The first part of this book is dedicated to helping you become familiar with ZBrush’s user interface and learning the very basics, from sculpting brushes and painting the model with Polypaint to setting up lights and rendering images. You’ll also create a demon bust with the help of ZBrush’s concept sculpting tool, DynaMesh. In the second part, you’ll get to grips with the creation of a humanoid character that is optimized for 3D printing. Focusing on anatomy, poly-modeling, and preparing the model for 3D printing, you’ll acquire the skills essential for sculptors. The final part delves into portrait sculpting, where you’ll learn everything from basic facial anatomy to hair creation with FiberMesh.By the end of this book, you'll have developed the expertise necessary to succeed in the ever-evolving world of 3D character modeling, complemented by portfolio and social media tips for showcasing your standout work.

5490
Ładowanie...
EBOOK

Sculpting the Blender Way. Explore Blender's 3D sculpting workflows and latest features, including Face Sets, Mesh Filters, and the Cloth brush

Xury Greer

Sculpting the Blender Way is a detailed step-by-step guide for creating digital art with the latest Blender 3D sculpting features. With over 400 reference images, 18 Sculpting in Action videos, and dozens of 3D sculpture example files, this book is an invaluable resource for traditional and digital sculptors looking to try their hand at sculpting in Blender.The first part of the book will teach you how to navigate Blender's user interface and familiarize yourself with the core workflows, as well as gain an understanding of how the sculpting features work, including basic sculpting, Dyntopo, the Voxel Remesher, QuadriFlow, and Multiresolution.You’ll also learn about a wide range of brushes and all of the latest additions to the sculpting feature set, such as Face Sets, Mesh Filters, and the Cloth brush. The next chapters will show you how to customize these brushes and features to create fantastic 3D sculptures that you can share with the ever-growing Blender community.By the end of this book, you'll have gained a complete understanding of the core sculpting workflows and be able to use Blender to bring your digital characters to life.

5491
Ładowanie...
EBOOK

SDL Game Development. If you're good with C++ and object oriented programming, this book utilizes your skills to create 2D games using the Simple DirectMedia Layer API. Practical tutorials include the development of two wickedly good games

Shaun Mitchell

SDL 2.0 is the latest release of the popular Simple DirectMedia Layer API, which is designed to make life easier for C++ developers, allowing you simple low-level access to various multiplatform audio, graphics, and input devices.SDL Game Development guides you through creating your first 2D game using SDL and C++. It takes a clear and practical approach to SDL game development, ensuring that the focus remains on creating awesome games.Starting with the installation and setup of SDL, you will quickly become familiar with useful SDL features, covering sprites, state management, and OOP, leading to a reusable framework that is extendable for your own games. SDL Game Development culminates in the development of two exciting action games that utilize the created framework along with tips to improve the framework.

5493
Ładowanie...
EBOOK

Secret Recipes of the Python Ninja. Over 70 recipes that uncover powerful programming tactics in Python

Cody Jackson, Steven F. Lott

This book covers the unexplored secrets of Python, delve into its depths, and uncover its mysteries.You’ll unearth secrets related to the implementation of the standard library, by looking at how modules actually work. You’ll understand the implementation of collections, decimals, and fraction modules. If you haven’t used decorators, coroutines, and generator functions much before, as you make your way through the recipes, you’ll learn what you’ve been missing out on. We’ll cover internal special methods in detail, so you understand what they are and how they can be used to improve the engineering decisions you make. Next, you’ll explore the CPython interpreter, which is a treasure trove of secret hacks that not many programmers are aware of. We’ll take you through the depths of the PyPy project, where you’ll come across several exciting ways that you can improve speed and concurrency. Finally, we’ll take time to explore the PEPs of the latest versions to discover some interesting hacks.

5494
Ładowanie...
EBOOK

Secure Continuous Delivery on Google Cloud. Implement an automated and secure software delivery pipeline on Google Cloud using native services

Giovanni Galloro, Nathaniel Avery, David Dorbin

Continuous delivery, a cornerstone of modern software engineering, facilitates quick and secure software delivery using a robust toolkit encompassing automated builds, testing, source code management, artifact storage, and deployment. Whether you integrate tools from different providers or use a set of managed services from a single cloud provider, the goal is to streamline setup, integration, and management. This book focuses on continuous delivery on the Google Cloud.Starting with an introduction to continuous delivery and secure software supply chain concepts, this book uses hands-on exercises to demonstrate how to continuously test your application with Skaffold and Cloud Code, leverage Duet AI-assisted code generation with Cloud Code and Cloud Workstations, and automate your continuous integration with Cloud Build. You'll see how to store and scan your software artifacts on Artifact Registry, orchestrate deployments with Cloud Deploy, and release your software on GKE and Cloud Run, configured to admit only trusted code. Using an example application, you'll implement tools for creating an end-to-end delivery pipeline on the Google Cloud Platform.By the end of this book, you'll be able to build a secure software delivery pipeline from development to production using the Google Cloud managed services and best practices.

5495
Ładowanie...
EBOOK

Securing Blockchain Networks like Ethereum and Hyperledger Fabric. Learn advanced security configurations and design principles to safeguard Blockchain networks

Alessandro Parisi

Blockchain adoption has extended from niche research to everyday usage. However, despite the blockchain revolution, one of the key challenges faced in blockchain development is maintaining security, and this book will demonstrate the techniques for doing this.You’ll start with blockchain basics and explore various blockchain attacks on user wallets, and denial of service and pool mining attacks. Next, you’ll learn cryptography concepts, consensus algorithms in blockchain security, and design principles while understanding and deploying security implementation guidelines. You’ll not only cover architectural considerations, but also work on system and network security and operational configurations for your Ethereum and Hyperledger Fabric network. You’ll later implement security at each level of blockchain app development, understanding how to secure various phases of a blockchain app using an example-based approach. You’ll gradually learn to securely implement and develop decentralized apps, and follow deployment best practices. Finally, you’ll explore the architectural components of Hyperledger Fabric, and how they can be configured to build secure private blockchain networks.By the end of this book, you’ll have learned blockchain security concepts and techniques that you can implement in real blockchain production environments.

5496
Ładowanie...
EBOOK

Securing Cloud PCs and Azure Virtual Desktop. Start implementing and optimizing security for Windows 365 and AVD infrastructure

Dominiek Verham, Johan Vanneuville, Christiaan Brinkhoff, Scott...

Do you want to effectively implement and maintain secure virtualized systems? This book will give you a comprehensive understanding of Microsoft virtual endpoints, from the fundamentals of Windows 365 and Azure Virtual Desktop to advanced security measures, enabling you to secure, manage, and optimize virtualized environments in line with contemporary cybersecurity challenges.You’ll start with an introduction to Microsoft technologies, gaining a foundational understanding of their capabilities. Next, you’ll delve into the importance of endpoint security, addressing the challenges faced by companies in safeguarding their digital perimeters. This book serves as a practical guide to securing virtual endpoints, covering topics such as network access, data leakage prevention, update management, threat detection, and access control configuration. As you progress, the book offers insights into the nuanced security measures required for Windows 365, Azure Virtual Desktop, and the broader Microsoft Azure infrastructure. The book concludes with real-world use cases, providing practical scenarios for deploying Windows 365 and Azure Virtual Desktop.By the end of this book, you’ll be equipped with practical skills for implementing and evaluating robust endpoint security strategies.