Browse Results

Showing 35,101 through 35,125 of 53,408 results

Professional NFC Application Development for Android

by Kerem Ok Busra Ozdenizci Vedat Coskun

A practical guide to developing and deploying Near Field Communication (NFC) applicationsThere has been little practical guidance available on NFC programming, until now. If you're a programmer or developer, get this unique and detailed book and start creating apps for this exciting technology. NFC enables contactless mobile communication between two NFC-compatible devices. It's what allows customers to pay for purchases by swiping their smartphones with Google Wallet, for example. This book shows you how to develop NFC applications for Android, for all NFC operating modes: reader/writer, peer-to-peer, and card emulation.The book starts with the basics of NFC technology, an overview of the Android OS, and what you need to know about the SDK tools. It then walks you through all aspects of NFC app development, including SE programming. You'll find all you need to create an app, including functioning, downloadable code and a companion website with additional content. Valuable case studies help you understand each operating mode in clear, practical detail.Shows programmers and developers how to develop Near Field Communication (NFC) applications for Android, including Secure Element (SE) programmingExpert authors are NFC researchers who have a deep knowledge of the subjectCovers app development in all NFC operating modes: reader/writer, peer-to-peer, and card emulationIncludes valuable case studies that showcase several system design and analysis methods, such as activity diagram, class diagram, UML, and othersProfessional NFC Application Development for Android offers the clear, concise advice you need to create great applications for this emerging and exciting technology.

Facets of Behaviormetrics: The 50th Anniversary of the Behaviormetric Society (Behaviormetrics: Quantitative Approaches to Human Behavior #4)

by Akinori Okada Kazuo Shigemasu Ryozo Yoshino Satoru Yokoyama

This edited book is the first one written in English that deals comprehensively with behavior metrics. The term “behaviormetrics” comprehends the research including all sorts of quantitative approaches to disclose human behavior. Researchers in behavior metrics have developed, extended, and improved methods such as multivariate statistical analysis, survey methods, cluster analysis, machine learning, multidimensional scaling, corresponding analysis or quantification theory, network analysis, clustering, factor analysis, test theory, and related factors. In the spirit of behavior metrics, researchers applied these methods to data obtained by surveys, experiments, or websites from a diverse range of fields. The purpose of this book is twofold. One is to represent studies that display how the basic elements of behavior metrics have developed into present-day behavior metrics. The other is to represent studies performed mainly by those who would like to pioneer new fields of behavior metrics and studies that display elements of future behavior metrics. These studies consist of various characteristics such as those dealing with theoretical or conceptual subjects, the algorithm, the model, the method, and the application to a wide variety of fields. This book helps readers to understand the present and future of behavior metrics.

Provable Security

by Tatsuaki Okamoto Yong Yu Man Ho Au Yannan Li

This book constitutes the refereed proceedings of the 11th International Conference on Provable Security, ProvSec 2017, held in Xi'an, China, in October 2017. The 24 full papers and 5 short papers presented were carefully reviewed and selected from 76 submissions. The papers are grouped in topical sections on secure cloud storage and computing; digital signature and authentication; authenticated encryption and key exchange; security models; lattice and post-quantum cryptography; public key encryption and signcryption; proxy re-encryption and functional encryption; protocols.

Sideways: The City Google Couldn't Buy

by Josh O'Kane

From the Globe and Mail tech reporter who revealed countless controversies while following the Sidewalk Labs fiasco in Toronto, an uncompromising investigation into the bigger story and what the Google sister company's failure there reveals about Big Tech, data privacy and the monetization of everything.When former New York deputy mayor Dan Doctoroff landed in Toronto, promising a revolution in better living through technology, the locals were starstruck. In 2017 a small parcel of land on the city's woefully underdeveloped lakeshore was available for development, and with Google co-founder Larry Page and his trusted chairman Eric Schmidt leaning into Sidewalk Labs' pitch for the long-forsaken property—with Doctoroff as the urban-planning company's CEO—Sidewalk's bid crushed the competition. But as soon as the bid was won, cracks appeared in the partnership between Doctoroff's team and Waterfront Toronto, the government-sponsored organization behind the contest. There were hundreds more acres of undeveloped former port lands nearby that kept creeping into conversation with Sidewalk, and more questions were emerging than answers about how much the public would actually benefit from the Alphabet-owned company's vision for the high-tech neighbourhood—and the data it could harvest from the people living there. Alarm bells began ringing in the city's corridors of power and activism. To Torontonians accustomed to big promises with little follow-through, the fiasco that unfolded seemed at first like just another city-building sideshow. But the pained battle to reel in the power of Sidewalk Labs became a crucible moment in the worldwide battle for privacy rights and against the extension of Big Tech&’s digital might into the physical world around us. With extensive contacts on all sides of the debacle, O'Kane tells a story of global consequence fought over a small, forgotten parcel of mud and pavement, taking readers from California to New York to Toronto to Berlin and back again. In the tradition of extraordinary boardroom dramas like Bad Blood and Super Pumped, Sideways vividly recreates the corporate drama and epic personalities in this David-and-Goliath battle that signalled to the world that all may not be lost in the effort to contain the rapidly growing power of Big Tech.

A Web-Based Introduction to Programming (Third Edition): Essential Algorithms, Syntax, and Control Structures Using PHP, HTML, and MySQL

by Mike O'Kane

A Web-Based Introduction to Programming is designed for use in introductory programming, programming logic and design, or Web programming courses, and for anyone seeking a painless way to learn the basics of programming by developing small Web applications. It keeps the focus on the need for beginning programmers to learn essential syntax and control structures with minimal complexity.

Purely Functional Data Structures

by Chris Okasaki

Most books on data structures assume an imperative language such as C or C++. However, data structures for these languages do not always translate well to functional languages such as Standard ML, Haskell, or Scheme. This book describes data structures from the point of view of functional languages, with examples, and presents design techniques that allow programmers to develop their own functional data structures. The author includes both classical data structures, such as red-black trees and binomial queues, and a host of new data structures developed exclusively for functional languages. All source code is given in Standard ML and Haskell, and most of the programs are easily adaptable to other functional languages. This handy reference for professional programmers working with functional languages can also be used as a tutorial or for self-study.

Network Automation Cookbook: Proven and actionable recipes to automate and manage network devices using Ansible

by Karim Okasha

Take your network automation skills to the next level with practical recipes on managing network devices from a variety of vendors like Cisco, Juniper, and Arista Key Features Use Ansible to automate network infrastructure with the help of step-by-step instructions Implement network automation best practices to save cost, avoid critical errors, and reduce downtime Deliver a robust automation framework by integrating Ansible with NAPALM, NetBox, and Batfish Book Description Network Automation Cookbook is designed to help system administrators, network engineers, and infrastructure automation engineers to centrally manage switches, routers, and other devices in their organization's network. This book will help you gain hands-on experience in automating enterprise networks and take you through core network automation techniques using the latest version of Ansible and Python. With the help of practical recipes, you'll learn how to build a network infrastructure that can be easily managed and updated as it scales through a large number of devices. You'll also cover topics related to security automation and get to grips with essential techniques to maintain network robustness. As you make progress, the book will show you how to automate networks on public cloud providers such as AWS, Google Cloud Platform, and Azure. Finally, you will get up and running with Ansible 2.9 and discover troubleshooting techniques and network automation best practices. By the end of this book, you'll be able to use Ansible to automate modern network devices and integrate third-party tools such as NAPALM, NetBox, and Batfish easily to build robust network automation solutions. What you will learn Understand the various components of Ansible Automate network resources in AWS, GCP, and Azure cloud solutions Use IaC concepts to design and build network solutions Automate network devices such as Cisco, Juniper, Arista, and F5 Use NetBox to build network inventory and integrate it with Ansible Validate networks using Ansible and Batfish Who this book is for This Ansible network automation book is for network and DevOps engineers interested in automating complex network tasks. Prior understanding of networking and basic Linux knowledge is required.

New Frontiers in Artificial Intelligence: JSAI-isAI 2020 Workshops, JURISIN, LENLS 2020 Workshops, Virtual Event, November 15–17, 2020, Revised Selected Papers (Lecture Notes in Computer Science #12758)

by Naoaki Okazaki Katsutoshi Yada Ken Satoh Koji Mineshima

This book constitutes extended, revised, and selected papers from the 12th International Symposium on Artificial Intelligence supported by the Japanese Society for Artificial Intelligence, JSAI-isAI 2020. Organized in the Tokyo Institute of Technology, it was held virtually due to COVID-19 pandemic. The 19 full papers were carefully selected from 50 submissions and present two workshops: Logic and Engineering of Natural Language Semantics (LENLS 2020) focus on the formal and theoretical aspects of natural language. It is an annual International Workshop recognized internationally in the formal syntax-semantics-pragmatics community. The 14th International Workshop on Juris-informatics (JURISIN 2020) details legal issues for the perspective of information science. This workshop covers a wide range of topics, including any theories and technologies which are not directly related with juris-informatics but have a potential to contribute to this domain.

Ethical Data and Information Management: Concepts, Tools and Methods

by Katherine O'Keefe Daragh O Brien

Information and how we manage, process and govern it is becoming increasingly important as organizations ride the wave of the big data revolution. Ethical Data and Information Management offers a practical guide for people in organizations who are tasked with implementing information management projects. It sets out, in a clear and structured way, the fundamentals of ethics, and provides practical and pragmatic methods for organizations to embed ethical principles and practices into their management and governance of information. Written by global experts in the field, Ethical Data and Information Management is an important book addressing a topic high on the information management agenda. Key coverage includes how to build ethical checks and balances into data governance decision making; using quality management methods to assess and evaluate the ethical nature of processing during design; change methods to communicate ethical values; how to avoid common problems that affect ethical action; and how to make the business case for ethical behaviours.

Data Ethics: Practical Strategies for Implementing Ethical Information Management and Governance

by Katherine O'Keefe Daragh O Brien

Data-gathering technology is more sophisticated than ever, as are the ethical standards for using this data. This second edition shows how to navigate this complex environment.Data Ethics provides a practical framework for the implementation of ethical principles into information management systems. It shows how to assess the types of ethical dilemmas organizations might face as they become more data-driven. This fully updated edition includes guidance on sustainability and environmental management and on how ethical frameworks can be standardized across cultures that have conflicting values. There is also discussion of data colonialism, the challenge of ethical trade-offs with ad-tech and analytics such as Covid-19 tracking systems and case studies on Smart Cities and Demings Principles.As the pace of developments in data-processing technology continues to increase, it is vital to capitalize on the opportunities this affords while ensuring that ethical standards and ideals are not compromised. Written by internationally regarded experts in the field, Data Ethics is the essential guide for students and practitioners to optimizing ethical data standards in organizations.

Managing Online Forums: Everything You Need to Know to Create and Run Successful Community Discussion Boards

by Patrick O'Keefe

Every day, millions of users log on to their favorite online forums and interact with others to get advice and discuss everything from the latest news and trends to their hobbies, professions, and whatever else strikes their fancy. Admin­istrators have to lead these communities, deal with difficult users, and choose moderators. Legal constraints, spammers, and technical issues can turn the excitement of running an online community into chaos. With the right guidance, however, running forums can be a pleasure. Patrick O’Keefe has spent years developing and managing online communities. Now, he shows readers how to make the right decisions about every aspect of their forums, including:• choosing a name and domain name• picking the right software• deciding on user options like avatars and private messaging• setting guidelines and dealing with violators• ensuring that posts stay on topic• settling online disputes among users• involving users and keeping the site interestingManaging Online Forums is the one book that shows site owners and administrators how to create a safe and entertaining community that users will return to again and again.

Cybersecurity in the COVID-19 Pandemic

by Kenneth Okereafor

As the 2020 global lockdown became a universal strategy to control the COVID-19 pandemic, social distancing triggered a massive reliance on online and cyberspace alternatives and switched the world to the digital economy. Despite their effectiveness for remote work and online interactions, cyberspace alternatives ignited several Cybersecurity challenges. Malicious hackers capitalized on global anxiety and launched cyberattacks against unsuspecting victims. Internet fraudsters exploited human and system vulnerabilities and impacted data integrity, privacy, and digital behaviour. Cybersecurity in the COVID-19 Pandemic demystifies Cybersecurity concepts using real-world cybercrime incidents from the pandemic to illustrate how threat actors perpetrated computer fraud against valuable information assets particularly healthcare, financial, commercial, travel, academic, and social networking data. The book simplifies the socio-technical aspects of Cybersecurity and draws valuable lessons from the impacts COVID-19 cyberattacks exerted on computer networks, online portals, and databases. The book also predicts the fusion of Cybersecurity into Artificial Intelligence and Big Data Analytics, the two emerging domains that will potentially dominate and redefine post-pandemic Cybersecurity research and innovations between 2021 and 2025. The book’s primary audience is individual and corporate cyberspace consumers across all professions intending to update their Cybersecurity knowledge for detecting, preventing, responding to, and recovering from computer crimes. Cybersecurity in the COVID-19 Pandemic is ideal for information officers, data managers, business and risk administrators, technology scholars, Cybersecurity experts and researchers, and information technology practitioners. Readers will draw lessons for protecting their digital assets from email phishing fraud, social engineering scams, malware campaigns, and website hijacks.

Microsoft Azure Security Technologies Certification and Beyond: Gain practical skills to secure your Azure environment and pass the AZ-500 exam

by David Okeyode

Learn how to implement multi-layered security controls to protect against rapidly evolving threats to Azure environmentsKey FeaturesDevelop practical skills to protect your organization from constantly evolving security threatsBecome well-versed with real-world Azure security strategies and AZ-500 exam objectivesEffectively manage security governance, policies, and operations in AzureBook DescriptionSecurity is a key part of any well-architected design. With the help of this book, you'll gain both the knowledge and the practical skills to significantly reduce the attack surface of your Azure workloads and protect your organization from constantly evolving threats to public cloud environments like Azure.This book is a comprehensive security guide for those looking to take the Azure Security Engineer certification exam as well as for those interested in securing their Azure infrastructure. Beyond preparing you for the Azure Security (AZ-500) exam, this book will guide you in securing your Azure environments and workloads using native Azure security capabilities.Complete with hands-on tutorials, projects, and self-assessment questions, this easy-to-follow guide builds a solid foundation of Azure security. You'll not only learn about security technologies in Azure but also be able to configure and manage them. Moreover, you'll develop a clear understanding of how to identify different attack vectors and mitigate risks.By the end of this book, you'll be well-versed with implementing multi-layered security to protect identities, networks, hosts, containers, databases, and storage in Azure.What you will learnManage users, groups, service principals, and roles effectively in Azure ADExplore Azure AD identity security and governance capabilitiesUnderstand how platform perimeter protection secures Azure workloadsImplement network security best practices for IaaS and PaaSDiscover various options to protect against DDoS attacksSecure hosts and containers against evolving security threatsConfigure platform governance with cloud-native toolsMonitor security operations with Azure Security Center and Azure SentinelWho this book is forIf you are a newly qualified or experienced security professional, cloud administrator, architect, or developer who wants to understand how to secure your Azure environment and workloads, this book is for you. The book is a handy resource for anyone preparing to take the Azure Security Engineer (AZ-500) certification exam. Foundational knowledge of the Azure cloud platform will be helpful but not necessary to understand the concepts covered in this book.

Penetration Testing Azure for Ethical Hackers: Develop practical skills to perform pentesting and risk assessment of Microsoft Azure environments

by David Okeyode Karl Fosaaen Charles Horton

Simulate real-world attacks using tactics, techniques, and procedures that adversaries use during cloud breachesKey FeaturesUnderstand the different Azure attack techniques and methodologies used by hackersFind out how you can ensure end-to-end cybersecurity in the Azure ecosystemDiscover various tools and techniques to perform successful penetration tests on your Azure infrastructureBook DescriptionSecurity professionals working with Azure will be able to put their knowledge to work with this practical guide to penetration testing. The book provides a hands-on approach to exploring Azure penetration testing methodologies that will help you get up and running in no time with the help of a variety of real-world examples, scripts, and ready-to-use source code. As you learn about the Microsoft Azure platform and understand how hackers can attack resources hosted in the Azure cloud, you'll find out how to protect your environment by identifying vulnerabilities, along with extending your pentesting tools and capabilities. This book starts by taking you through the prerequisites for pentesting Azure and shows you how to set up a pentesting lab. You'll then simulate attacks on Azure assets such as web applications and virtual machines from anonymous and authenticated perspectives. Finally, you'll learn about the opportunities for privilege escalation in Azure tenants and ways in which an attacker can create persistent access to an environment. By the end of this book, you'll be able to leverage your ethical hacking skills to identify and implement different tools and techniques to perform successful penetration tests on your own Azure infrastructure.What you will learnIdentify how administrators misconfigure Azure services, leaving them open to exploitationUnderstand how to detect cloud infrastructure, service, and application misconfigurationsExplore processes and techniques for exploiting common Azure security issuesUse on-premises networks to pivot and escalate access within AzureDiagnose gaps and weaknesses in Azure security implementationsUnderstand how attackers can escalate privileges in Azure ADWho this book is forThis book is for new and experienced infosec enthusiasts who want to learn how to simulate real-world Azure attacks using tactics, techniques, and procedures (TTPs) that adversaries use in cloud breaches. Any technology professional working with the Azure platform (including Azure administrators, developers, and DevOps engineers) interested in learning how attackers exploit vulnerabilities in Azure hosted infrastructure, applications, and services will find this book useful.

Linear Programming and Algorithms for Communication Networks: A Practical Guide to Network Design, Control, and Management

by Eiji Oki

Explaining how to apply to mathematical programming to network design and control, Linear Programming and Algorithms for Communication Networks: A Practical Guide to Network Design, Control, and Management fills the gap between mathematical programming theory and its implementation in communication networks. From the basics all the way through to m

Advanced Internet Protocols, Services, and Applications

by Eiji Oki Roberto Rojas-Cessa Mallikarjun Tatipamula Christian Vogt

Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions sent over the internet are carried using internet infrastructure- based on advanced internet protocols. Advanced internet protocols ensure that both public and private networks operate with maximum performance, security, and flexibility. This book is intended to provide a comprehensive technical overview and survey of advanced internet protocols, first providing a solid introduction and going on to discuss internetworking technologies, architectures and protocols. The book also shows application of the concepts in next generation networks and discusses protection and restoration, as well as various tunnelling protocols and applications. The book ends with a thorough discussion of emerging topics.

Learning C# Programming with Unity 3D

by Alex Okita

Designed to give you enough familiarity in a programming language to be immediately productive, Learning C# Programming with Unity 3D provides the basics of programming and brings you quickly up to speed. Organized into easy-to-follow lessons, the book covers how C# is used to make a game in Unity3D. After reading this book, you will be armed with

Learning C# Programming with Unity 3D, second edition

by Alex Okita

Learning C# Programming with Unity 3D, Second Edition is for the novice game programmer without any prior programming experience. Readers will learn how C# is used to make a game in Unity 3D. Many example projects provide working code to learn from and experiment with. As C# evolves, Unity 3D evolves along with it. Many new features and aspects of C# are included and explained. Common programming tasks are taught by way of making working game mechanics. The reader will understand how to read and apply C# in Unity 3D and apply that knowledge to other development environments that use C#. New to this edition: includes latest C# language features and useful tools included with the .NET library like LINQ, Local Functions Tuples, and more! Key Features Provides a starting point for the first-time programmer C# Code examples are simple short and clear Learn the very basics on up to interesting tricks which C# offers

Python Testing with pytest: Simple, Rapid, Effective, and Scalable

by Brian Okken

Do less work when testing your Python code, but be just as expressive, just as elegant, and just as readable. The pytest testing framework helps you write tests quickly and keep them readable and maintainable - with no boilerplate code. Using a robust yet simple fixture model, it's just as easy to write small tests with pytest as it is to scale up to complex functional testing for applications, packages, and libraries. This book shows you how. For Python-based projects, pytest is the undeniable choice to test your code if you're looking for a full-featured, API-independent, flexible, and extensible testing framework. With a full-bodied fixture model that is unmatched in any other tool, the pytest framework gives you powerful features such as assert rewriting and plug-in capability - with no boilerplate code. With simple step-by-step instructions and sample code, this book gets you up to speed quickly on this easy-to-learn and robust tool. Write short, maintainable tests that elegantly express what you're testing. Add powerful testing features and still speed up test times by distributing tests across multiple processors and running tests in parallel. Use the built-in assert statements to reduce false test failures by separating setup and test failures. Test error conditions and corner cases with expected exception testing, and use one test to run many test cases with parameterized testing. Extend pytest with plugins, connect it to continuous integration systems, and use it in tandem with tox, mock, coverage, unittest, and doctest. Write simple, maintainable tests that elegantly express what you're testing and why. What You Need: The examples in this book are written using Python 3.6 and pytest 3.0. However, pytest 3.0 supports Python 2.6, 2.7, and Python 3.3-3.6.

Python Testing with pytest

by Brian Okken

Test applications, packages, and libraries large and small with pytest, Python's most powerful testing framework. pytest helps you write tests quickly and keep them readable and maintainable. In this fully revised edition, explore pytest's superpowers - simple asserts, fixtures, parametrization, markers, and plugins - while creating simple tests and test suites against a small database application. Using a robust yet simple fixture model, it's just as easy to write small tests with pytest as it is to scale up to complex functional testing. This book shows you how. pytest is undeniably the best choice for testing Python projects. It's a full-featured, flexible, and extensible testing framework. pytest's fixture model allows you to share test data and setup procedures across multiple layers of tests. The pytest framework gives you powerful features such as assert rewriting, parametrization, markers, plugins, parallel test execution, and clear test failure reporting - with no boilerplate code. With simple step-by-step instructions and sample code, this book gets you up to speed quickly on this easy-to-learn yet powerful tool. Write short, maintainable tests that elegantly express what you're testing. Speed up test times by distributing tests across multiple processors and running tests in parallel. Use Python's builtin assert statements instead of awkward assert helper functions to make your tests more readable. Move setup code out of tests and into fixtures to separate setup failures from test failures. Test error conditions and corner cases with expected exception testing, and use one test to run many test cases with parameterized testing. Extend pytest with plugins, connect it to continuous integration systems, and use it in tandem with tox, mock, coverage, and even existing unittest tests. Write simple, maintainable tests quickly with pytest. What You Need: The examples in this book were written using Python 3.10 and pytest 7. pytest 7 supports Python 3.5 and above.

Digital Design and Fabrication (Computer Engineering Series)

by Vojin G. Oklobdzija

In response to tremendous growth and new technologies in the semiconductor industry, this volume is organized into five, information-rich sections. Digital Design and Fabrication surveys the latest advances in computer architecture and design as well as the technologies used to manufacture and test them. Featuring contributions from leading experts, the book also includes a new section on memory and storage in addition to a new chapter on nonvolatile memory technologies. Developing advanced concepts, this sharply focused book— Describes new technologies that have become driving factors for the electronic industry Includes new information on semiconductor memory circuits, whose development best illustrates the phenomenal progress encountered by the fabrication and technology sector Contains a section dedicated to issues related to system power consumption Describes reliability and testability of computer systems Pinpoints trends and state-of-the-art advances in fabrication and CMOS technologies Describes performance evaluation measures, which are the bottom line from the user’s point of view Discusses design techniques used to create modern computer systems, including high-speed computer arithmetic and high-frequency design, timing and clocking, and PLL and DLL design

Digital Systems and Applications (Computer Engineering Series)

by Vojin G. Oklobdzija

New design architectures in computer systems have surpassed industry expectations. Limits, which were once thought of as fundamental, have now been broken. Digital Systems and Applications details these innovations in systems design as well as cutting-edge applications that are emerging to take advantage of the fields increasingly sophisticated capabilities. This book features new chapters on parallelizing iterative heuristics, stream and wireless processors, and lightweight embedded systems. This fundamental text— Provides a clear focus on computer systems, architecture, and applications Takes a top-level view of system organization before moving on to architectural and organizational concepts such as superscalar and vector processor, VLIW architecture, as well as new trends in multithreading and multiprocessing. includes an entire section dedicated to embedded systems and their applications Discusses topics such as digital signal processing applications, circuit implementation aspects, parallel I/O algorithms, and operating systems Concludes with a look at new and future directions in computing Features articles that describe diverse aspects of computer usage and potentials for use Details implementation and performance-enhancing techniques such as branch prediction, register renaming, and virtual memory Includes a section on new directions in computing and their penetration into many new fields and aspects of our daily lives

Cuckoo Malware Analysis

by Digit Oktavianto Iqbal Muhardianto

This book is a step-by-step, practical tutorial for analyzing and detecting malware and performing digital investigations. This book features clear and concise guidance in an easily accessible format.Cuckoo Malware Analysis is great for anyone who wants to analyze malware through programming, networking, disassembling, forensics, and virtualization. Whether you are new to malware analysis or have some experience, this book will help you get started with Cuckoo Sandbox so you can start analysing malware effectively and efficiently.

The VES Handbook of Visual Effects: Industry Standard VFX Practices and Procedures

by Jeffrey A. Okun Susan Zwerman

Wisdom from the best and the brightest in the industry, this visual effects bible belongs on the shelf of anyone working in or aspiring to work in VFX. The book covers techniques and solutions all VFX artists/producers/supervisors need to know, from breaking down a script and initial bidding, to digital character creation and compositing of both live-action and CG elements. In-depth lessons on stereoscopic moviemaking, color management and digital intermediates are included, as well as chapters on interactive games and full animation authored by artists from EA and Dreamworks respectively. From predproduction to acquisition to postproduction, every aspect of the VFX production workflow is given prominent coverage. VFX legends such as John Knoll, Mike Fink, and John Erland provide you with invaluable insight and lessons from the set, equipping you with everything you need to know about the entire visual effects workflow. Simply a must-have book for anyone working in or wanting to work in the VFX industry.

The VES Handbook of Visual Effects: Industry Standard VFX Practices and Procedures

by Jeffrey A. Okun Susan Zwerman Christopher McKittrick Lisa Sepp-Wilson

The award-winning VES Handbook of Visual Effects remains the most complete guide to visual effects techniques and best practices available today. This new edition has been updated to include the latest, industry-standard techniques, technologies, and workflows for the ever-evolving fast paced world of visual effects. The Visual Effects Society (VES) tasked the original authors to update their areas of expertise, such as AR/VR Moviemaking, Color Management, Cameras, VFX Editorial, Stereoscopic and the Digital Intermediate, as well as provide detailed chapters on interactive games and full animation. Additionally, 56 contributors share their best methods, tips, tricks, and shortcuts developed through decades of trial and error and real-world, hands-on experience.This third edition has been expanded to feature lessons on 2.5D/3D Compositing; 3D Scanning; Digital Cinematography; Editorial Workflow in Animated and Visual Effects Features; Gaming updates; General Geometry Instancing; Lens Mapping for VFX; Native Stereo; Real-Time VFX and Camera Tracking; Shot/Element Pulls and Delivery to VFX; Techvis; VFX Elements and Stereo; Virtual Production; and VR/AR (Virtual Reality / Augmented Reality).A must-have for anyone working in or aspiring to work in visual effects, The VES Handbook of Visual Effects, Third Edition covers essential techniques and solutions for all VFX artists, producers, and supervisors, from pre-production to digital character creation, compositing of both live-action and CG elements, photorealistic techniques, and much more. With subjects and techniques clearly and definitively presented in beautiful four-color, this handbook is a vital resource for any serious VFX artist.

Refine Search

Showing 35,101 through 35,125 of 53,408 results