Programming Linux Games

Author: Loki Software,John Hall,Loki Software Inc,John R. Hall
ISBN: 1886411492/9781886411494
Pages: 415

Programming Linux Games discusses important multimedia toolkits (including a very thorough discussion of the Simple DirectMedia Layer) and teaches the basics of Linux game programming. Readers learn about the state of the Linux gaming world, and how to write and distribute Linux games to the Linux gaming community.
Download

Posted in Label: | 0 komentar

Creating Games in C++: A Step-by-Step Guide

Author: David Conger,Ron Little
ISBN: 0735714347/9780735714342
Pages: 464
Publication Date: 2007-02-01

Do you love video games? Ever wondered if you could create one of your own, with all the bells and whistles? It’s not as complicated as you’d think, and you don’t need to be a math whiz or a programming genius to do it. In fact, everything you need to create your first game, “Invasion of the Slugwroths,” is included in this book and CD-ROM.

Author David Conger starts at square one, introducing the tools of the trade and all the basic concepts for getting started programming with C++, the language that powers most current commercial games. Plus, he’s put a wealth of top-notch (and free) tools on the CD-ROM, including the Dev-C++ compiler, linker, and debugger--and his own LlamaWorks2D game engine. Step-by-step instructions and ample illustrations take you through game program structure, integrating sound and music into games, floating-point math, C++ arrays, and much more. Using the sample programs and the source code to run them, you can follow along as you learn.

Bio: David Conger has been programming professionally for over 23 years. Along with countless custom business applications, he has written several PC and online games. Conger also worked on graphics firmware for military aircraft, and taught computer science at the university level for four years. Conger has written numerous books on C, C++, and other computer-related topics. He lives in western Washington State and has also published a collection of Indian folk tales.
Download

Posted in Label: | 0 komentar

Beginning C# Game Programming (Game Development)

Author: Ron Penton
ISBN: 1592005179/9781592005178
Pages: 344
Publication Date: 2004-10-22

Are you ready to try your hand at programming games using C#? "Beginning C# Game Programming" is your ideal introductory guide - designed to jumpstart your experience with C# and DirectX 9. It includes the fundamental topics you'll need to know and covers additional topics that you'll find helpful along the way. Begin with a comprehensive look at programming with C# - from the basics of classes to advanced topics such as polymorphism and abstraction. Then it's on to DirectX 9 as you learn how to create a basic framework and a Direct3D device. You'll also cover DirectSound and DirectInput. Put your newfound knowledge to the test as you program a complete game!
Download

Posted in Label: | 1 komentar

.NET Game Programming with DirectX 9.0

Author: Alexandre Santos Lobao,Ellen Hatton
ISBN: 1590590511/9781590590515
Pages: 696
Publication Date: 2003-03-27

Written in easy-to-understand language, this book is a must-read if you'd like to create out-of-the-ordinary, yet simple games. Authors Lobao and Hatton demonstrate the ease of producing multimedia games with Managed DirectX 9.0 and programming the games with Visual Basic .NET on Everett, the latest version of Microsoft's Visual Studio.

The authors emphasize simplicity, but still explore important concepts of Managed DirectX 9.0, such as Direct3D, DirectSound, DirectMusic (using the COM interface), DirectInput (including force-feedback joysticks), DirectShow, and DirectPlay. Additional chapters discuss game programming technologies: Speech API for generating character voices, GDI+ for simple games, and multithreading. A bonus chapter even shows you how to port a simple game to a Pocket PC.

The book includes two chapters' worth of sample games. The first presents a game with simple features; the second extends that game and presents additional concepts. A library of game programming helper classes is also created, step by step, in both chapters.

Download

Posted in Label: | 0 komentar

Programming Video Games for the Evil Genius

Author: Ian Cinnamon
ISBN: 0071497528/9780071497527
Pages: 316
Publication Date: 2008-02-29

IF EVIL'S YOUR NAME, THEN THESE ARE YOUR GAMES!

Always wanted to be a genius game creator? This Evil Genius guide goes far beyond a typical programming class or text to reveal insider tips for breaking the rules and constructing wickedly fun games that you can tweak and customize to suit your needs!

In Programming Video Games for the Evil Genius, programming wunderkind Ian Cinnamon gives you everything you need to create and control 57 gaming projects. You'll find easy-to-follow plans featuring Java, the most universal programming language, that run on any PC, Mac, or Linux computer.

  • Illustrated instructions and plans for an awesome mix of racing, board, shoot 'em up, strategy, retro, and puzzle games
  • Gaming projects that vary in difficulty-starting with simple programs and progressing to sophisticated projects for programmers with advanced skills
  • An interactive companion website featuring a free Java compiler, where you can share your projects with Evil Geniuses around the globe
  • Removes the frustration-factor-all the parts you need are listed, along with sources

Regardless of your skill level, Programming Video Games for the Evil Genius provides you with all the strategies, code, and insider programming advice you need to build and test your games with ease, such as:

  • Radical Racing
  • Screen Skier
  • Whack an Evil Genius
  • Tic-Tac-Toe Boxing
  • Snake Pit
  • Space Destroyers
  • Bomb Diffuser
  • Trapper
  • Oiram
  • Java Man
  • Memory
  • Ian Says
Download

Posted in Label: | 0 komentar

Beginning Game Art in 3ds Max 8

Author: Les Pardew,Dan Whittington
ISBN: 1592009085/9781592009084
Pages: 368
Publication Date: 2005-12-08

Are you an artist ready to try your hand at 3ds Max 8? Beginning Game Art in 3ds Max 8 gives you the skills you need to hit the ground running, covering the basics of this amazing program. It is filled with step-by-step instructions and sample projects from actual games. Fine-tune your new skills as you learn to build objects, environments, and characters. You will also learn the basics of rigging and animating your game characters. Using this book's hands-on approach, you'll jump right in and begin creating your own art using the amazing features of 3ds Max 8.
Download

Posted in Label: | 0 komentar

Macromedia Flash MX Fast & Easy Web Development

Author: Mike Puleio
ISBN: 1931841594/9781931841597
Pages: 320
Publication Date: 2002-09-11

Don't spend your time wading through manuals to learn Macromedia Dreamweaver MX. Spend it doing what you do best-creating Web pages! Design, develop, and deliver Web pages like a pro. Integrate graphics, animations, or documents into your Web pages with ease. Combining easy-to-understand instructions with visual examples, Macromedia Dreamweaver MX Fast & Easy Web Development offers a unique, hands-on approach that you won't find anywhere else. Less time, less effort, more results!
Download

Posted in Label: | 0 komentar

The Book of PF: A No-Nonsense Guide to the OpenBSD Firewall

Author: Peter Hansteen
ISBN: 1593271654/9781593271657
Pages: 184
Publication Date: 2008-01-11

OpenBSD's stateful packet filter, PF, offers an amazing feature set and support across the major BSD platforms. Like most firewall software though, unlocking PF's full potential takes a good teacher. Peter N.M. Hansteen's PF website and conference tutorials have helped thousands of users build the networks they need using PF. The Book of PF is the product of Hansteen's knowledge and experience, teaching good practices as well as bare facts and software options. Throughout the book, Hansteen emphasizes the importance of staying in control by having a written network specification, using macros to make rule sets more readable, and performing rigid testing when loading in new rules.

Today's system administrators face increasing challenges in the quest for network quality, and The Book of PF can help by demystifying the tools of modern *BSD network defense. But, perhaps more importantly, because we know you like to tinker, The Book of PF tackles a broad range of topics that will stimulate your mind and pad your resume, including how to:

  • Create rule sets for all kinds of network traffic, whether it is crossing a simple home LAN, hiding behind NAT, traversing DMZs, or spanning bridges
  • Use PF to create a wireless access point, and lock it down tight with authpf and special access restrictions
  • Maximize availability by using redirection rules for load balancing and CARP for failover
  • Use tables for proactive defense against would-be attackers and spammers
  • Set up queues and traffic shaping with ALTQ, so your network stays responsive
  • Master your logs with monitoring and visualization, because you can never be too paranoid

The Book of PF is written for BSD enthusiasts and network admins at any level of expertise. With more and more services placing high demands on bandwidth and increasing hostility coming from the Internet at-large, you can never be too skilled with PF.

Download

Posted in Label: | 0 komentar

Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort

Author: Michael Rash
ISBN: 1593271417/9781593271411
Pages: 336
Publication Date: 2007-09-15

System administrators need to stay ahead of new security vulnerabilities that leave their networks exposed every day. A firewall and an intrusion detection systems (IDS) are two important weapons in that fight, enabling you to proactively deny access and monitor network traffic for signs of an attack.

Linux Firewalls discusses the technical details of the iptables firewall and the Netfilter framework that are built into the Linux kernel, and it explains how they provide strong filtering, Network Address Translation (NAT), state tracking, and application layer inspection capabilities that rival many commercial tools. You'll learn how to deploy iptables as an IDS with psad and fwsnort and how to build a strong, passive authentication layer around iptables with fwknop.

Concrete examples illustrate concepts such as firewall log analysis and policies, passive network authentication and authorization, exploit packet traces, Snort ruleset emulation, and more with coverage of these topics:

  • Passive network authentication and OS fingerprinting
  • iptables log analysis and policies
  • Application layer attack detection with the iptables string match extension
  • Building an iptables ruleset that emulates a Snort ruleset
  • Port knocking vs. Single Packet Authorization (SPA)
  • Tools for visualizing iptables logs

    Perl and C code snippets offer practical examples that will help you to maximize your deployment of Linux firewalls. If you're responsible for keeping a network secure, you'll find Linux Firewalls invaluable in your attempt to understand attacks and use iptables-along with psad and fwsnort-to detect and even prevent compromises.

  • Download

    Posted in Label: | 0 komentar

    Cisco ASA, PIX, and FWSM Firewall Handbook (2nd Edition) (Networking Technology: Security)

    Author: David Hucaby
    ISBN: 1587054574/9781587054570
    Pages: 912
    Publication Date: 2007-08-09

    Cisco ASA, PIX, and FWSM Firewall Handbook, Second Edition, is a guide for the most commonly implemented features of the popular Cisco® firewall security solutions. Fully updated to cover the latest firewall releases, this book helps you to quickly and easily configure, integrate, and manage the entire suite of Cisco firewall products, including ASA, PIX®, and the Catalyst® Firewall Services Module (FWSM).

    Organized by families of features, this book helps you get up to speed quickly and efficiently on topics such as file management, building connectivity, controlling access, firewall management, increasing availability with failover, load balancing, logging, and verifying operation.

    Sections are marked by shaded tabs for quick reference, and information on each feature is presented in a concise format, with background, configuration, and example components.

    Whether you are looking for an introduction to the latest ASA, PIX, and FWSM devices or a complete reference for making the most out of your Cisco firewall deployments, Cisco ASA, PIX, and FWSM Firewall Handbook, Second Edition, helps you achieve maximum protection of your network resources.

    “Many books on network security and firewalls settle for a discussion focused primarily on concepts and theory. This book, however, goes well beyond these topics. It covers in tremendous detail the information every network and security administrator needs to know when configuring and managing market-leading firewall products from Cisco.”

    –Jason Nolet, Vice President of Engineering, Security Technology Group, Cisco

    David Hucaby, CCIE® No. 4594, is a lead network engineer for the University of Kentucky, where he works with health-care networks based on the Cisco Catalyst, ASA, FWSM, and VPN product lines. He was one of the beta reviewers of the ASA 8.0 operating system software.

    • Learn about the various firewall models, user interfaces, feature sets, and configuration methods
    • Understand how a Cisco firewall inspects traffic
    • Configure firewall interfaces, routing, IP addressing services, and IP multicast support
    • Maintain security contexts and flash and configuration files, manage users, and monitor firewalls with SNMP
    • Authenticate, authorize, and maintain accounting records for firewall users
    • Control access through the firewall by implementing transparent and routed firewall modes, address translation, and traffic shunning
    • Define security policies that identify and act on various types of traffic with the Modular Policy Framework
    • Increase firewall availability with firewall failover operation
    • Understand how firewall load balancing works
    • Generate firewall activity logs and learn how to analyze the contents of the log
    • Verify firewall operation and connectivity and observe data passing through a firewall
    • Configure Security Services Modules, such as the Content Security Control (CSC) module and the Advanced Inspection Processor (AIP) module

    This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.

    Category: Networking: Security

    Covers: Cisco ASA 8.0, PIX 6.3, and FWSM 3.2 version firewalls

    $60.00 USA / $69.00 CAN

    Download

    Posted in Label: | 0 komentar