- Table View
- List View
ZBrush Professional Tips and Techniques
by Rick Baker Paul GabouryLearn to work effectively and creatively with all versions of ZBrush!ZBrush is used by top artists in Hollywood to model and sculpt characters in such films as Avatar, Iron Man, and Pirates of the Caribbean. In addition, this amazing technology is also used in jewelry design, forensic science, aerospace, video games, toy creation, and the medical field. Written by Pixologic's in-house ZBrush expert Paul Gaboury, this full-color, beautifully illustrated guide provides you with the ultimate tips and tricks to maximize your use of all versions of ZBrush. Reveals numerous little-known tips and tricks that exist within ZBrush, but often go unexploitedShares an abundance of helpful techniques and insights that the author has acquired from years of helping professional artists in various industriesOffers dozens of version-neutral solutions and shortcuts in areas such as sculpting, texturing, posing, rendering, and moreFeatures "Artist Spotlights" from several ZBrush experts, offering their how-to's for using the feature-rich software in today's studiosImprove your productivity and quality of work with this helpful, easy-to-understand resource.
Zed Attack Proxy Cookbook: Hacking tactics, techniques, and procedures for testing web applications and APIs
by Ryan Soper Nestor N Torres Ahmed AlmoailuDive into security testing and web app scanning with ZAP, a powerful OWASP security toolPurchase of the print or Kindle book includes a free PDF eBookKey FeaturesMaster ZAP to protect your systems from different cyber attacksLearn cybersecurity best practices using this step-by-step guide packed with practical examplesImplement advanced testing techniques, such as XXE attacks and Java deserialization, on web applicationsBook DescriptionMaintaining your cybersecurity posture in the ever-changing, fast-paced security landscape requires constant attention and advancements. This book will help you safeguard your organization using the free and open source OWASP Zed Attack Proxy (ZAP) tool, which allows you to test for vulnerabilities and exploits with the same functionality as a licensed tool. Zed Attack Proxy Cookbook contains a vast array of practical recipes to help you set up, configure, and use ZAP to protect your vital systems from various adversaries. If you're interested in cybersecurity or working as a cybersecurity professional, this book will help you master ZAP. You'll start with an overview of ZAP and understand how to set up a basic lab environment for hands-on activities over the course of the book. As you progress, you'll go through a myriad of step-by-step recipes detailing various types of exploits and vulnerabilities in web applications, along with advanced techniques such as Java deserialization. By the end of this ZAP book, you'll be able to install and deploy ZAP, conduct basic to advanced web application penetration attacks, use the tool for API testing, deploy an integrated BOAST server, and build ZAP into a continuous integration and continuous delivery (CI/CD) pipeline.What you will learnInstall ZAP on different operating systems or environmentsExplore how to crawl, passively scan, and actively scan web appsDiscover authentication and authorization exploitsConduct client-side testing by examining business logic flawsUse the BOAST server to conduct out-of-band attacksUnderstand the integration of ZAP into the final stages of a CI/CD pipelineWho this book is forThis book is for cybersecurity professionals, ethical hackers, application security engineers, DevSecOps engineers, students interested in web security, cybersecurity enthusiasts, and anyone from the open source cybersecurity community looking to gain expertise in ZAP. Familiarity with basic cybersecurity concepts will be helpful to get the most out of this book.
Zeitenwende: Wie die IT unsere Welt verändert
by Jürgen MüllerDie moderne Informationstechnologie durchdringt und verändert unsere Welt – weit mehr und intensiver, als die meisten von uns ahnen. Das Buch beschreibt ihre Entstehung, ihre Geschichte, ihre wesentlichen Treiber und welche herausragende Bedeutung die neue Weltmacht IT für unser soziales, wirtschaftliches und politisches Leben erlangt hat. Es bietet dem Leser auf interessante, allgemeinverständliche und ausgewogene Weise Orientierung zu einem komplexen Thema, das unsere Gegenwart und Zukunft wesentlich prägt. Es zeigt die großen Entwicklungslinien und erklärt dabei auch, was es etwa mit Künstlicher Intelligenz, Algorithmen oder Blockchains auf sich hat.
Zelda the Gamer Fairy (Rainbow Magic #80)
by Daisy MeadowsWhen jealous Jack Frost steals Zelda the Gamer Fairy's magical headset, controller and console, video games everywhere begin to glitch and gaming is ruined! With the help of Rachel, Kirsty, Gracie and Khadijah, Zelda must venture through the Land of Games and play to win back her enchanted objects so that gaming can be fun again.'These stories are magic; they turn children into readers!' ReadingZone.comIf you like Rainbow Magic, check out Daisy Meadows' other series: Pixie Magic, Unicorn Magic and Magic Animal Friends!
Zen Cart: E-commerce Application Development
by Suhreed SarkarThis is a highly practical book that can act as a reference material to which you will want to return again and again. The discussion in the book is right up-to-the point and it is filled with ample practical examples. This book is primarily for professional developers interested in building, enhancing, or extending Zen Cart sites for customers. It is also a useful reference for those who have got Zen Cart running on their own store, and want to improve it. It will also benefit those who want to migrate from osCommerce or other engines to Zen Cart.
Zen of Cloud: Learning Cloud Computing by Examples, Second Edition
by Haishi BaiThis book provides a comprehensive review of cloud philosophy, design principals, development trends as well as practical patterns to guide readers to understand, design and implement successful cloud-based solutions. This book provides both "hows" and "whys." It peers behind the buzz words such as machine learning, containers, and blockchains to help readers understand how to put those technologies into practical use. This unique book covers a broad spectrum of technologies of cloud computing.
Zen of Postproduction: Stress-Free Photography Workflow and Editing
by Mark FitzgeraldBreathe deep and relax - this book takes the stress out of photography post-production While capturing the perfect photograph is a welcome creative challenge for photographers, post-production can often be a headache. Downloading, sorting, tagging, editing, and distributing your digital images - especially the enormous quantities produced in today's image-happy world - can be overwhelming. Time to take a deep breath and sit down with a copy of this calming book. Digital worksflow teacher and author Mark Fitzgerald offers low-stress, post-production photography workflows and editing solutions that will make your life easier. Walking you through the latest photography software, especially Adobe Lightroom and Adobe Photoshop, Mark offers sensible advice and answers all your post-production questions, whether you're a professional photographer, serious amateur, or motivated novice. Takes the stress out of photography post-production by offering effective, timesaving, no-hassle solutions for overworked digital photographers Helps you streamline and simplify such post-production tasks as downloading, sorting, tagging, editing, and distributing digital images Explores the latest photography software, with special emphasis on Adobe Lightroom and Adobe Photoshop Offers straightforward advice for professional photographers and serious amateurs Includes practical, real-world examples, so you can immediately apply what you're learning Get into a better, more relaxing place with your photography post-production workflows and tasks with Zen of Post Production: Stress-Free Photography Workflow and Editing.
The Zen of Social Media Marketing
by Shama KabaniThe Ultimate Primer and How-To Guide for Social Media MarketingIn the two years since the first edition became a global bestseller, the world of social media has grown and changed enough to require an updated guide.Whether you use social media now or not, people are already talking about your company online. By becoming part of the conversation in a more meaningful way, you can start connecting directly to your customers and clients and finding new ones right away with ease and efficiency.Social media marketing isn't like traditional marketing--and treating it that way only leads to frustration and failure. In The Zen of Social Media Marketing, Shama Kabani, social media expert and president of The Marketing Zen Group (MarketingZen.com), teaches you the "Zen" of using social media tools to find your own marketing nirvana.With a foreword by New York Times bestselling author Chris Brogan and updated content on Google+, online advertising, SEO, and more, the newest edition of The Zen of Social Media Marketing gives you:* A comprehensive overview of why social media works and how to use it to drive traffic to your website and fan page* A proven process to attract followers and fans and convert them into customers and clients* The latest updates and step-by-step guidelines for Facebook, Twitter, LinkedIn, Google+, and group-buying sites such as Groupon and LivingSocial* Tips on why, when, and how to use online advertising* Essential advice on content marketing and targeted tactics to enhance your SEO* New information on why self-expression is the true driver of social media use and how to leverage it for your business* Insights from dozens of leading online marketers and entrepreneurs, with strategies for success
Zend Framework 1.8 Web Application Development
by Keith PopeThis book is an example-driven tutorial that takes you through the process of building Model-View-Controller-based web applications. You will create and develop a storefront application. It also covers common mistakes and best practices that will be helpful for developers. This book is for PHP web developers who want to get started with Zend Framework. If you are already using this framework, you will learn how to use it in the best way and produce better applications. Basic knowledge of Object Oriented design will be helpful.
Zend Framework 2.0 by Example: Beginner’s Guide
by Krishna Shasankar VZend Framework 2.0 by Example: Beginner's Guide is a step-by-step guide that aims to empower you to build web applications packed with some really exciting features using Zend Framework 2.0.If you are a PHP Developer who is new to Zend Framework, but you want to get hands-on with the product quickly, this book is for you. Basic knowledge of object oriented programming with PHP is expected.
Zend Framework 2 Application Development
by Christopher VallesThe book is really pragmatic, focusing on the key aspects you usually need to create an application. We skip the boring theory and jump straight to the action. Also, the examples don't try to be perfect, they just show the topic in question or the tool/components we are using. Here the focus is on the framework itself not on how to architect applications. The book will spend a lot of time reviewing the examples and each chapter is created around the example used to explain the topics so the example is first, then the explanation.This book is great for you if you are new to Zend Framework 2 and are looking to get a practical approach in how to use the framework. This book will be also really helpful if you are a Zend Framework 1 user but you want to adapt you knowledge to the new version of the framework. It's assumed that you will have good experience using PHP and specially with the Object Oriented programming paradigm.
Zend Framework 2 Cookbook
by Josephus CallaarsThis book is written in a practical, cookbook style with numerous examples and recipes. This style allows you to go both directly to your topic of interest or follow topics throughout a chapter to gain an in-depth knowledge of certain areas.'Zend Framework 2 Cookbook" is for PHP developers who are fairly advanced in programming in PHP. It will also be useful for developers who have a keen interest in expanding their knowledge outside the boundaries of simply scripting pages together. As unit testing and MVC will be discussed, it is beneficial for the reader to know what these technologies are, although experience with developing applications is not necessarily essential.
Zend Framework in Action
by Steven K. Brown Nick Lo Rob AllenFrom rather humble beginnings as the Personal Home Page scripting language, PHP has found its way into almost every server, corporation, and dev shop in the world. On an average day, somewhere between 500,000 and 2 million coders do something in PHP. Even when you use a well-understood language like PHP, building a modern web application requires tools that decrease development time and cost while improving code quality. Frameworks such as Ruby-on-Rails and Django have been getting a lot of attention as a result.For PHP coders, the Zend Framework offers that same promise without the need to move away from PHP. This powerful collection of components can be used in part or as a whole to speed up the development process. Zend Framework has the backing of Zend Technologies; the driving force behind the PHP programming language in which it is written. The first production release of the Zend Framework became available in July of 2007.Zend Framework in Action is a comprehensive tutorial that shows how to use the Zend Framework to create web-based applications and web services. This book takes you on an over-the-shoulder tour of the components of the Zend Framework as you build a high quality, real-world web application. This book is organized around the techniques you'll use every day as a web developer "data handling, forms, authentication, and so forth. As you follow the running example, you'll learn to build interactive Ajax-driven features into your application without sacrificing nuts-and-bolts considerations like security and performance.This book is aimed at the competent PHP developer who wants to master framework-driven web development. Zend Framework in Action goes beyond the docs but still provides quick access to the most common topics encountered in the development of web applications. Purchase of the print book comes with an offer of a free PDF, ePub, and Kindle eBook from Manning. Also available is all code from the book.
Zenobia July
by Lisa BunkerThe critically acclaimed author of Felix Yz crafts a bold, heartfelt story about a trans girl solving a cyber mystery and coming into her own. <P><P>Zenobia July is starting a new life. She used to live in Arizona with her father; now she's in Maine with her aunts. She used to spend most of her time behind a computer screen, improving her impressive coding and hacking skills; now she's coming out of her shell and discovering a community of friends at Monarch Middle School. People used to tell her she was a boy; now she's able to live openly as the girl she always knew she was. <P><P>When someone anonymously posts hateful memes on her school's website, Zenobia knows she's the one with the abilities to solve the mystery, all while wrestling with the challenges of a new school, a new family, and coming to grips with presenting her true gender for the first time. Timely and touching, Zenobia July is, at its heart, a story about finding home.
Zenoss Core 3.x Network and System Monitoring
by Michael BadgerThe book starts by covering installation and configuration, before moving on to administration and dashboard usage. It contains step-by-step instructions for setting up and using a working, capable Zenoss system. This book is written primarily for network and systems administrators who are monitoring their IT assets with Zenoss Core or who plan to monitor them. In reality, this book will benefit anyone, regardless of job title, who recognizes the importance of proactively monitoring the servers, routers, computers, websites, and devices that connect companies to customers.
Zenoss Core Network and System Monitoring
by Michael BadgerThe book starts by covering installation and configuration, before moving onto administration and dashboard usage.The book contains step-by-step instructions for setting up and using a working, capable Zenoss system. From small business to a large enterprise, this books helps organizations collect data, monitor, and report on their IT assets. Zenoss Core offers a feature-rich, accessible solution to organizations that lack the financial resources to purchase a proprietary monitoring solution or the technical resources. This book makes no distinction about your existing systems management knowledge or lack; thereof and assumes everyone is new to Zenoss Core. The emphasis is on configuring and administering a monitoring environment from the comforts of a graphical web interface.
The Zephyr Conspiracy (Level Up)
by Israel KeatsIn a virtual reality treasure hunt game, a gamer named Gadget is a steampunk pirate looking for her captain's lost treasure—a mysterious mechanical device. If she can find the scattered pieces that make up the device, she'll be released from the game. But the further she gets into it, the more Gadget worries she's in over her head. In a game where it's hard to know who's a real person and who's a non-player character, can Gadget trust anyone?
Zephyr RTOS Embedded C Programming: Using Embedded RTOS POSIX API
by Andrew EliaszThese days the term Real-Time Operating System (RTOS) is used when referring to an operating system designed for use in embedded microprocessors or controllers. The “Real Time” part refers to the ability to implement applications that can rapidly responding to external events in a deterministic and predictable manner. RTOS-based applications have to meet strict deadline constraints while meeting the requirements of the application. One way of ensuring that urgent operations are handled reliably is to set task priorities on each task and to assign higher priorities to those tasks that need to respond in a more timely manner.Another feature of real-time applications is the careful design and implementation of the communication and synchronization between the various tasks. The Zephyr RTOS was developed by Wind River Systems, and subsequently open sourced. Its design and implementation are oriented towards the development of time critical IoT (Internet of Things) and IIoT (Industrial Internet of Things) applications, and, consequently it has a rich feature set for building both wireless and wired networking applications. However, with a rich feature set comes a fairly steep learning curve.This book covers the foundations of programming embedded systems applications using Zephyr's Kernel services. After introducing the Zephyr architecture as well as the Zephyr build and configuration processes, the book will focus on multi-tasking and inter-process communication using the Zephyr Kernel Services API. By analogy with embedded Linux programming books, this book will be akin a Linux course that focuses on application development using the Posix API. In this case, however, it will be the Zephyr Kernel Services API that will be the API being used as well as the Posix API features supported by Zephyr.What You’ll learnAn Overview of the Cortex-M Architecture.Advanced data structures and algorithms programming (linked lists, circular buffers and lists).How to build Zephyr Applications, including setting up a Command Line Zephyr Development Environment on Linux.Task scheduling and pre-emption patterns used in Real Time Operating Systems.Scheduling, Interrupts and Synchronization, including threads, scheduling, and system threads.Overview of Symmetric Multiprocessing (SMP) and Zephyr support for SMP. Memory management, including memory heaps, memory slabs, and memory pools.Who This Book Is ForEmbedded Systems programmers, IoT and IIoT developers, researchers, BLE application developers (Industrial Control Systems, Smart Sensors, Medical Devices, Smart Watches, Manufacturing, Robotics). Also of use to undergraduate and masters in computer science and digital electronics courses.
Zero Comments: Blogging and Critical Internet Culture (Kultur- Und Medientheorie Ser.)
by Geert LovinkIn Zero Comments, internationally renowned media theorist and 'net critic' Geert Lovink revitalizes worn out concepts about the Internet and interrogates the latest hype surrounding blogs and social network sites. In this third volume of his studies into critical Internet culture, following the influential Dark Fiber and My First Recession, Lovink develops a 'general theory of blogging.' He unpacks the ways that blogs exhibit a 'nihilist impulse' to empty out established meaning structures. Blogs, Lovink argues, are bringing about the decay of traditional broadcast media, and they are driven by an in-crowd dynamic in which social ranking is a primary concern. The lowest rung of the new Internet hierarchy are those blogs and sites that receive no user feedback or 'zero comments'. Zero Comments also explores other important changes to Internet culture, as well, including the silent globalization of the Net in which the West is no longer the main influence behind new media culture, as countries like India, China and Brazil expand their influence and looks forward to speculate on the Net impact of organized networks, free cooperation and distributed aesthetics.
Zero Configuration Networking: The Definitive Guide
by Daniel H Steinberg Stuart CheshireIt used to be that two laptops, sitting side by side, couldn't communicate with each other; they may as well have been a thousand miles apart. But that was then, before the advent of Zero Configuration Networking technology. This amazing cross-platform open source technology automatically connects electronic devices on a network, allowing them to interoperate seamlessly-without any user configuration. So now you don't have to lift a finger! Needless to say, it has completely changed the way people connect to devices and programs for printing, file sharing, and other activities. Zero Configuration Networking: The Definitive Guide walks you through this groundbreaking network technology, with a complete description of the protocols and ways to implement network-aware applications and devices. Written by two Zero Configuration Networking experts, including one of Apple's own computer scientists, the book covers more than just file sharing and printing. Zero Configuration Networking also enables activities such as music and photo sharing and automatic buddy discovery on Instant Messaging applications. In fact, Zero Configuration Networking can be used for virtually any device that can be controlled by a computer. And this handy guide has the inside scoop on all of its capabilities-and how you can easily apply them in your own environment. For the technically advanced, Zero Configuration Networking: The Definitive Guide examines the three core technologies that make up Zero Configuration Networking: Link-Local Addressing, Multicast DNS, and DNS Service Discovery. It also reviews a series of APIs, including C-API, Java API, CFNetServices, and Cocoa's NSNetServices. Whether you want to understand how iTunes works, or you want to network a series of laptops and other devices at your office for maximum efficiency, you'll find all the answers in this authoritative guide.
Zero Days, Thousands of Nights: The Life and Times of Zero-Day Vulnerabilities and Their Exploits
by Andy Bogart Lillian AblonZero-day vulnerabilities—software vulnerabilities for which no patch or fix has been publicly released—and their exploits are useful in cyber operations, as well as in defensive and academic settings. This report provides findings from real-world zero-day vulnerability and exploit data that can inform ongoing policy debates regarding stockpiling (i.e., keeping zero-day vulnerabilities private) versus disclosing them to the public.
Zero to AI: A non-technical, hype-free guide to prospering in the AI era
by Gianluco Mauro Nicolo ValigiSummary How can artificial intelligence transform your business? In Zero to AI, you&’ll explore a variety of practical AI applications you can use to improve customer experiences, optimize marketing, help you cut costs, and more. In this engaging guide written for business leaders and technology pros alike, authors and AI experts Nicolò Valigi and Gianluca Mauro use fascinating projects, hands-on activities, and real-world explanations to make it clear how your business can benefit from AI. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications. About the technology There&’s no doubt that artificial intelligence has made some impressive headlines recently, from besting chess and Go grand masters to producing uncanny deep fakes that blur the lines of reality. But what can AI do for you? If you want to understand how AI will impact your business before you invest your time and money, this book is for you. About the book Zero to AI uses clear examples and jargon-free explanations to show the practical benefits of AI. Each chapter explores a real-world case study demonstrating how companies like Google and Netflix use AI to shape their industries. You begin at the beginning, with a primer on core AI concepts and realistic business outcomes. To help you prepare for the transition, the book breaks down a successful AI implementation, including advice on hiring the right team and making decisions about resources, risks, and costs. What's inside Identifying where AI can help your organization Designing an AI strategy Evaluating project scope and business impact Using AI to boost conversion rates, curate content, and analyze feedback Understanding how modern AI works and what it can/can&’t do About the reader For anyone who wants to gain an understanding of practical artificial intelligence and learn how to design and develop projects with high business impact. About the author Gianluca Mauro and Nicolò Valigi are the cofounders of AI Academy, a company specializing in AI trainings and consulting. Table of Contents: 1. An introduction to artificial intelligence PART 1 - UNDERSTANDING AI 2. Artificial intelligence for core business data 3. AI for sales and marketing 4. AI for media 5. AI for natural language 6. AI for content curation and community building PART 2 - BUILDING AI 7. Ready—finding AI opportunities 8. Set—preparing data, technology, and people 9. Go—AI implementation strategy 10. What lies ahead
Zero to Engineer: The Unconventional Blueprint to Securing a 6-Figure Tech Career
by Terry KimA straightforward, hands-on starter kit for your exciting new career in IT Zero to Engineer: The Unconventional Blueprint to Securing a 6-Figure IT Career is an intensely practical, no-nonsense guide to starting or rebooting your career in technology. Author and IT industry veteran Terry Kim gives you a first-person view of how to conquer the tech and cybersecurity realms, drawing on his own two decades' experience in the field. You'll learn how to get job-ready in less than four months, regardless of your educational background, and enjoy complimentary NGT Academy bonuses, including unlimited access to the CompTIA Network+ Certification Course, a free one-on-one career strategy session with trained IT career specialists, and membership in the Zero to Engineer Community Group. The book offers: Common and intuitive IT career pathways, showing you how to get from A-to-Z in the most direct way possible IT employment contract negotiation tips that make it easier to get your first six-figure job offer A comprehensive collection of worksheets you can use in your own journey from IT-beginner to subject-matter expert Perfect for anyone interested in starting a brand-new and exciting career in technology, Zero to Engineer is also a must-read for career changers and professionals interested in pivoting to a new job in tech. Whether or not you have a college degree, it's the insider's guide to IT and cybersecurity that you've been waiting for.
Zero to Hero: Your Guide to a Career in Cybersecurity
by Felix Kyei AsareZero to Hero: Your Guide to a Career in Cybersecurity is an essential roadmap for anyone aiming to penetrate the vibrant and ever-expanding domain of cybersecurity. In an era where digital threats loom larger and more complex than ever, this book stands as a beacon of clarity and practical wisdom. Tailored for novices and those with basic understanding, this resource empowers learners to solidify their cybersecurity foundation. It stands out with its laser focus on real-world applicability, ensuring readers grasp theoretical concepts and can implement them effectively.Key Features of This Guide: Actionable Learning: Dive into engaging exercises, compelling case studies, and practical scenarios that demystify complex cybersecurity concepts Career Development: Gain invaluable insights into crafting a standout resume, navigating job interviews with confidence, and learning strategies for a successful job hunt in the cybersecurity realm Cutting-Edge Knowledge: Stay ahead of the curve with detailed explorations of the latest cybersecurity trends, tools, and technologies that are shaping the future of digital security In-Depth Discussions: From ethical hacking to digital forensics, explore the breadth and depth of the cybersecurity field, ensuring a comprehensive understanding of various career paths Progressive Skill-Building: Embark on a structured learning journey, from foundational concepts to advanced techniques, tailored to foster a deep, actionable understanding of cybersecurity Zero to Hero: Your Guide to a Career in Cybersecurity is your launchpad into the heart of the industry. Perfect for students, career changers, and IT professionals, this book provides the essential knowledge and skills to secure a rewarding career in this critical field. Begin your journey from novice to expert in cybersecurity today!
Zero-trust – An Introduction (River Publishers Rapids Series in Digital Security and Forensics)
by Tom MadsenThe book provides you with information on how to implement and manage a zero-trust architecture across these different layers of an infrastructure. It is an introduction to the overall purpose of zero-trust and the benefits that zero-trust can bring to an infrastructure, across many different technologies: Cloud Networking Identity management Operational Technology (OT) 5G Zero-trust is not a product, but a way of thinking about design and architecture. Cisco and Microsoft are used as the technology vendors, but the steps and information are equally applicable to other technology vendors.