25 Women to Read Before You Die
 
 

Special Offers see all

Enter to WIN a $100 Credit

Subscribe to PowellsBooks.news
for a chance to win.
Privacy Policy

Visit our stores


    Recently Viewed clear list


    Interviews | August 12, 2015

    Jill Owens: IMG Eli Gottlieb: The Powells.com Interview



    Eli GottliebEli Gottlieb has done something unusual — he's written two novels, 20 years apart, from opposing but connected perspectives. The Boy Who Went... Continue »
    1. $17.47 Sale Hardcover add to wish list

      Best Boy

      Eli Gottlieb 9781631490477

    spacer

Mathematics and Physics for Programmers (Charles River Media Game Development)

Mathematics and Physics for Programmers (Charles River Media Game Development) Cover

 

Synopses & Reviews

Publisher Comments:

Programmers coming from art, design, filmmaking, music, writing, education, or business fields frequently have little background in the mathematics and physics. Although today's software programs make it easier to become proficient at programming without having a solid foundation in these disciplines, sooner or later all programmers and developers will run into problems that they will need mathematics or physics to solve. This book provides a simple but thorough grounding in the mathematics and physics topics that programmers need to know to write programs, using a non-language specific approach. Each chapter includes exercise sets for additional practice of the techniques learned, or for use as a textbook. The companion CD-ROM provides demo examples of the mathematical and physical principles discussed in the book, with source code in several different languages (C++, Lingo, and Java).

Synopsis:

Many programmers frequently have limited backgrounds in the mathematics and physics needed for game development or other complex applications. Sooner or later, all programmers run into coding issues that will require an understanding of mathematics or physics concepts like collision detection, 3D vectors, transformations, game theory, or basic calculus. This book provides a simple but thorough grounding in the mathematics and physics topics that programmers need to write these algorithms and programs, using a non-language-specific approach. Applications and examples from game programming are included throughout, and exercise sets follow each chapter for additional practice of the techniques. The CD-ROM provides simulations of the mathematical and physical principles discussed in the book along with the source code.

Synopsis:

Presents commonly encountered maths and physics concepts such as collision detection, motion, game theory, AI, Bezier curves, etc.

About the Author

Danny Kodicek is a graduate of Cambridge University, now working as a freelance programmer and multimedia developer specializing in Web sites and games. He currently resides in the United Kingdom, where his previous clients include the BBC and the Royal Air Force. He is also a director of Wellspring Interactive Ltd, and co-creator of the award-winning, TimeHunt, Web site.

Table of Contents

Part I Introduction 1 A Call to Action Security as a Call to Action for Developers Why Care about Security Thinking Differently about Security Entering the Era of Software Security Why We Wrote This Book and Why You Should Read It How This Book Is Structured Who We Are 2 Security Background Hacker versus Cracker versus Attacker: The Language of Computer Security Legal and Ethical Issues Surrounding Computer Security Federal Laws Related to Illegal Computer Use Ethical Reporting of Security Vulnerabilities Networking Basics Networking References 3 Some Useful Tools Security Scanners Comprehensive Scanning Tools Nmap and Network Scanners Packet Sniffing and Spoofing Hacking and Cracking Tools Password Crackers Packet Generation and Replay Network Fuzzing Web Site Test Tools Reverse Engineering Tools Source and Binary Scanners Specialty Editors API and System Monitors Disassemblers Using Debuggers for Security Testing Commercial Tools Retina AppScan WebProxy Holodeck For More Information Part II System-Level Attacks 4 Problems with Permissions The Bell-Lapadua Model Finding Programs with the Supervisor Bit Set 64 Attacking Supervisor Mode Programs by Finding Side-Effect Functionality Attacking Supervisor Mode Programs by Exploiting a Buffer Overrun Windows: Not Immune From, but Less Prone to, Escalation of Privilege Fixing This Vulnerability The setuid() and seteuid() System Calls Summary Sheet--Running with Elevated Privilege 5 Permitting Default or Weak Passwords Finding Default and Weak Passwords Building a Password Cracker Using a Dictionary Helper Writing the Main Crack Routine Putting It Together Fixing This Vulnerability Summary Sheet--Permitting Default of Weak Passwords 6 Shells, Scripts, and Macros Embedded Script Languages and Command Interpreters Document Markup JavaScript Safe for Scripting ActiveX Controls Database Stored Procedures Macro Expansion in Logs and Messages Fixing This Problem 7 Dynamic Linking and Loading Finding This Vulnerability Fixing This Vulnerability Explicit Linking and Loading of a DLL Summary Sheet--Dynamic Linking and Loading Part III Data Parsing 8 Buffer Overflow Vulnerabilities Stack Overflows Exploiting Stack Overflows Heap Overflows Exploiting Buffer Overflows: Beyond the Stack Finding This Vulnerability 1 White-Box Testing Techniques and Tools Black-Box Testing Techniques and Tools Fixing This Vulnerability Summary Sheet--Buffer Overflows 9 Proprietary Formats and Protocols Same Data, Many Formats Using "Fuzzing" to Find Vulnerabilities in File Formats and Protocols Preventing Problems with Proprietary Formats and Protocols Summary Sheet--Proprietary Formats and Protocols 10 Format String Vulnerabilities The Format Family Exploiting Format String Vulnerabilities Finding This Vulnerability Fixing This Vulnerability Summary Sheet--Format String Vulnerabilities 11 Integer Overflow Vulnerabilities Exploiting Integer Overflow Vulnerabilities Finding This Vulnerability Fixing This Vulnerability Summary Sheet--Integer Overflows Part IV Information Disclosure 12 Storing Passwords in Plain Text Finding This Vulnerability Fixing This Vulnerability Using the Unix Password Hashing Functions Using CryptCreateHash and CryptHashData in Windows Summary Sheet--Storing Passwords in Plain Text 13 Creating Temporary Files Finding This Vulnerability Fixing This Vulnerability Summary Sheet--Creating Temporary Files 14 Leaving Things in Memory Description Finding Exposed Data in Memory Fixing This Problem Summary Sheet--Leaving Things in Memory 15 The Swap File and Incomplete Deletes Using a Disk Editor to Find Confidential Data Fragments Fixing This Problem Summary Sheet--The Swap File and Incomplete Deletes Part V On the Wire 16 Spoofing and Man-in-the-Middle Attacks Finding Spoofing and Man-in-the-Middle Attacks Connection Hijacking Name Server Cache Poisoning Spoofing at the Application Level Other Kinds of Man-in-the-Middle Attacks: DHCP and 802.11 Preventing Spoofing and Man-in-the-Middle Attacks Summary Sheet--Spoofing and Man-in-the-Middle Attacks 17 Volunteering Too Much Information Finding This Vulnerability Fixing This Vulnerability Summary Sheet--Revealing Too Much Information Part VI Web Sites 18 Cross-Site Scripting Finding Cross-Site Scripting Vulnerabilities Fixing This Vulnerability Preventing More Advanced Cross-Site Scripting Vulnerabilities HTML-Encoding Output Summary Sheet--Cross-Site Scripting 19 Forceful Browsing Finding Forceful Browsing Vulnerabilities Building a Forceful Browsing Test Tool Preventing Forceful Browsing Summary Sheet--Forceful Browsing 20 Parameter Tampering, Cookie Poisoning, and Hidden Field Manipulation Cookie Values Form Data Query Strings HTTP Header Tampering Finding This Vulnerability Fixing This Vulnerability Summary Sheet--Parameter Tampering, Cookie Poisoning, and Hidden Field Manipulation 21 SQL Injection Vulnerabilities Exploiting Sites Through SQL Injection Finding This Vulnerability Index.html Process.asp Fixing This Vulnerability Process.asp Summary Sheet--SQL Injection 22 Additional Browser Security Issues The Domain Security Model Unsafe ActiveX Controls Spoofing of URLs in the Browser MIME Type Spoofing Uncommon URL Schemes Browser Helper Objects Summary Sheet--Additional Browser Security Issues 23 Conclusion Learning from Vulnerabilities Where to Go Next References Appendix A: About the CD-ROM Appendix B: Open Source Software Licenses

Product Details

ISBN:
9781584503309
Publisher:
Cengage Learning
Subject:
General
Author:
Kodicek, Danny
Author:
Kodicek, Danny (Danny Kodicek)
Subject:
Physics
Subject:
Mathematics
Subject:
Programming - General
Subject:
Computer Graphics - Game Programming
Subject:
Electronics - General
Subject:
Engineering / Electrical
Subject:
Programming - Games
Subject:
Computer science -- Mathematics.
Subject:
Software Engineering - Programming and Languages
Copyright:
Edition Description:
Paperback
Series:
Charles River Media Game Development
Publication Date:
January 2005
Binding:
Paperback
Grade Level:
Professional and scholarly
Language:
English
Illustrations:
Y
Pages:
640
Dimensions:
9.20x7.40x1.33 in. 2.44 lbs.

Related Subjects

Computers and Internet » Software Engineering » Game Design
Computers and Internet » Software Engineering » Programming and Languages
Science and Mathematics » Mathematics » General

Mathematics and Physics for Programmers (Charles River Media Game Development)
0 stars - 0 reviews
$ In Stock
Product details 640 pages Charles River Media - English 9781584503309 Reviews:
"Synopsis" by , Many programmers frequently have limited backgrounds in the mathematics and physics needed for game development or other complex applications. Sooner or later, all programmers run into coding issues that will require an understanding of mathematics or physics concepts like collision detection, 3D vectors, transformations, game theory, or basic calculus. This book provides a simple but thorough grounding in the mathematics and physics topics that programmers need to write these algorithms and programs, using a non-language-specific approach. Applications and examples from game programming are included throughout, and exercise sets follow each chapter for additional practice of the techniques. The CD-ROM provides simulations of the mathematical and physical principles discussed in the book along with the source code.
"Synopsis" by , Presents commonly encountered maths and physics concepts such as collision detection, motion, game theory, AI, Bezier curves, etc.
spacer
spacer
  • back to top

FOLLOW US ON...

       
Powell's City of Books is an independent bookstore in Portland, Oregon, that fills a whole city block with more than a million new, used, and out of print books. Shop those shelves — plus literally millions more books, DVDs, and gifts — here at Powells.com.