The Dark Side of Game Texturing
Author: David Franson
Charred ruins, bullet holes, rusted metalif you're a fan of 3D first-person-shooter games, then you're familiar with those amazing, ominous textures that draw you into your character's surroundings. Get ready to analyzeand re-createthe textures and graphics used in these games. All you need is a decent PC, Photoshop, and a digital camera. Once you learn how to create the textures within this book, you can create any texture for any game. Not a born artist? That's okay. You'll learn how to let Photoshop do most of the work. Begin with texturing basics, including pixel sizes, color modes, and alpha channels. Then jump right into hearty texture tutorials as you create everything from sci-fi backgrounds and molten lava to medieval castle walls and dragon skin. If you're ready to travel to the grim back alleys of your imagination, then you're ready for "The Dark Side of Game Texturing".
New interesting textbook: Économie Directoriale :les Applications, les Stratégies et la Tactique
Writing Secure Code
Author: Michael Howard
Keep black-hat hackers at bay with the tips and techniques in this entertaining, eye-opening book! Developers will learn how to padlock their applications throughout the entire development process-from designing secure applications to writing robust code that can withstand repeated attacks to testing applications for security flaws. Short, easily digested chapters reveal proven principles, strategies, and coding techniques. The authors-two battle-scarred veterans who have solved some of the industry's toughest security problems-provide sample code in several languages. This edition includes updated information about threat modeling, designing a security process, international issues, file-system issues, adding privacy to applications, and performing security code reviews. It also includes enhanced coverage of buffer overruns, Microsoft(r) .NET security, and Microsoft ActiveX(r) development, plus practical checklists for developers, testers, and program managers.
Table of Contents:
Introduction | ||
Pt. I | Contemporary Security | |
1 | The Need for Secure Systems | 3 |
2 | The Proactive Security Development Process | 23 |
3 | Security Principles to Live By | 51 |
4 | Threat Modeling | 69 |
Pt. II | Secure Coding Techniques | |
5 | Public Enemy #1: The Buffer Overrun | 127 |
6 | Determining Appropriate Access Control | 171 |
7 | Running with Least Privilege | 207 |
8 | Cryptographic Foibles | 259 |
9 | Protecting Secret Data | 299 |
10 | All Input Is Evil! | 341 |
11 | Canonical Representation Issues | 363 |
12 | Database Input Issues | 397 |
13 | Web-Specific Input Issues | 413 |
14 | Internationalization Issues | 439 |
Pt. III | Even More Secure Coding Techniques | |
15 | Socket Security | 455 |
16 | Securing RPC, ActiveX Controls, and DCOM | 477 |
17 | Protecting Against Denial of Service Attacks | 517 |
18 | Writing Secure .NET Code | 535 |
Pt. IV | Special Topics | |
19 | Security Testing | 567 |
20 | Performing a Security Code Review | 615 |
21 | Secure Software Installation | 627 |
22 | Building Privacy into Your Application | 641 |
23 | General Good Practices | 663 |
24 | Writing Security Documentation and Error Messages | 695 |
Pt. V | Appendixes | |
A | Dangerous APIs | 713 |
B | Ridiculous Excuses We've Heard | 723 |
C | A Designer's Security Checklist | 729 |
D | A Developer's Security Checklist | 731 |
E | A Tester's Security Checklist | 737 |
A Final Thought | 739 | |
Annotated Bibliography | 741 | |
Index | 747 |
No comments:
Post a Comment