Microinteractions


Book Description

It’s the little things that turn a good digital product into a great one. With this practical book, you’ll learn how to design effective microinteractions: the small details that exist inside and around features. How can users change a setting? How do they turn on mute, or know they have a new email message? Through vivid, real-world examples from today’s devices and applications, author Dan Saffer walks you through a microinteraction’s essential parts, then shows you how to use them in a mobile app, a web widget, and an appliance. You’ll quickly discover how microinteractions can change a product from one that’s tolerated into one that’s treasured. Explore a microinteraction’s structure: triggers, rules, feedback, modes, and loops Learn the types of triggers that initiate a microinteraction Create simple rules that define how your microinteraction can be used Help users understand the rules with feedback, using graphics, sounds, and vibrations Use modes to let users set preferences or modify a microinteraction Extend a microinteraction’s life with loops, such as “Get data every 30 seconds”







The Minds Behind PlayStation Games


Book Description

Featuring interviews with the creators of 43 popular video games--including Spyro the Dragon, Syphon Filter, NFL GameDay 98 and Final Fantasy VII--this book gives a behind-the-scenes look at some of the most influential (and sometimes forgotten) titles of the original PlayStation era. Interviewees recall the painstaking development, challenges of working with mega publishers and uncertainties of public reception, and discuss the creative processes that produced some of gaming's all-time classics.




The Essential Guide to Game Audio


Book Description

The Essential Guide to Game Audio: The Theory and Practice of Sound for Games is a first of its kind textbook and must-have reference guide for everything you ever wanted to know about sound for games. This book provides a basic overview of game audio, how it has developed over time, and how you can make a career in this industry. Each chapter gives you the background and context you will need to understand the unique workflow associated with interactive media. The practical, easy to understand interactive examples provide hands-on experience applying the concepts in real world situations.




Time and Space in Video Games


Book Description

Video games are temporal artifacts: They change with time as players interact with them in accordance with rules. In this study, Federico Alvarez Igarzábal investigates the formal aspects of video games that determine how these changes are produced and sequenced. Theories of time perception drawn from the cognitive sciences lay the groundwork for an in-depth analysis of these features, making for a comprehensive account of time in this novel medium. This book-length study dedicated to time perception and video games is an indispensable resource for game scholars and game developers alike. Its reader-friendly style makes it readily accessible to the interested layperson.




The Awakened Family


Book Description

"New from the New York Times bestselling author of The Conscious Parent comes a radically transformative plan that shows parents how to raise children to be their best, truest selves, "--Amazon.com.




The Awakened Family


Book Description

FINALIST FOR THE BOOKS FOR A BETTER LIFE AWARD • NEW YORK TIMES BESTSELLER "Parents . . . you will be wowed and awed by [Dr. Shefali]." —Oprah Winfrey As seen on Oprah’s SuperSoul Sunday, a radically transformative plan that shows parents how to raise children to be their best, truest selves, from the New York Times bestselling author of The Conscious Parent. What if...? What if I told you that you can put an end to all of your parenting struggles? That you can learn to parent without fear or anxiety? That you can end conflict with your children? That you can create close and connected relationships within your family? …Would you accept this invitation to a revolution in parenting? We all have the capacity to raise children who are highly resilient and emotionally connected. However, many of us are unable to because we are blinded by modern misconceptions of parenting and our own inner limitations. In The Awakened Family, I show you how you can cultivate a relationship with your children so they can thrive; moreover, you can be transformed to a state of greater calm, compassion and wisdom as well. This book will take you on a journey to transcending your fears and illusions around parenting and help you become the parent you always wanted to be: fully present and conscious. It will arm you with practical, hands-on strategies and real-life examples from my experience as a parent and clinical psychologist that show the extraordinary power of being a conscious parent. Everyone in your family is ready to be awakened. Will you take this journey with me? —Shefali




Restorative Yoga for Ethnic and Race-Based Stress and Trauma


Book Description

Presenting ways in which Restorative Yoga can contribute to healing emotional wounds, this book invites yoga teachers, therapists and practitioners to consider the psychological impact of ethnic and race-based stress and trauma. It aids in the process of uncovering, examining, and healing one's own emotional wounds and offers insight into avoiding wounding or re-wounding others. The book describes how race-based traumatic stress differs from PTSD and why a more targeted approach to treatment is necessary, as well as what can trigger it. It also considers the implications of an increasingly racially and ethnically diverse and global yoga community, as well as the importance of creating conscious yoga communities of support and connection, where issues of race and ethnicity are discussed openly, non-defensively and constructively. By providing a therapeutic structure that assists those directly and indirectly impacted by ethnic and race-based stress and trauma, Restorative Yoga for Ethnic and Race-Based Stress and Trauma provides valuable tools for aiding in the processing of stressful experiences and in trauma recovery.




Information Systems Security


Book Description

This book constitutes the refereed proceedings of the18th International Conference on Information Systems Security, ICISS 2022, held in Tirupati, India, during December 16–20, 2022 The 8 full papers and 5 short papers included in this book were carefully reviewed and selected from 55 submissions. They were organized in topical sections as follows: ​ostinato: cross-host attack correlation through attack activity similaritydetection; DKS-PKI: a distributed key server architecture for public keyinfrastructure;generating-set evaluation of bloom filter hardening techniques in privaterecord linkage; etc




Adversarial AI Attacks, Mitigations, and Defense Strategies


Book Description

Understand how adversarial attacks work against predictive and generative AI, and learn how to safeguard AI and LLM projects with practical examples leveraging OWASP, MITRE, and NIST Key Features Understand the connection between AI and security by learning about adversarial AI attacks Discover the latest security challenges in adversarial AI by examining GenAI, deepfakes, and LLMs Implement secure-by-design methods and threat modeling, using standards and MLSecOps to safeguard AI systems Purchase of the print or Kindle book includes a free PDF eBook Book DescriptionAdversarial attacks trick AI systems with malicious data, creating new security risks by exploiting how AI learns. This challenges cybersecurity as it forces us to defend against a whole new kind of threat. This book demystifies adversarial attacks and equips cybersecurity professionals with the skills to secure AI technologies, moving beyond research hype or business-as-usual strategies. The strategy-based book is a comprehensive guide to AI security, presenting a structured approach with practical examples to identify and counter adversarial attacks. This book goes beyond a random selection of threats and consolidates recent research and industry standards, incorporating taxonomies from MITRE, NIST, and OWASP. Next, a dedicated section introduces a secure-by-design AI strategy with threat modeling to demonstrate risk-based defenses and strategies, focusing on integrating MLSecOps and LLMOps into security systems. To gain deeper insights, you’ll cover examples of incorporating CI, MLOps, and security controls, including open-access LLMs and ML SBOMs. Based on the classic NIST pillars, the book provides a blueprint for maturing enterprise AI security, discussing the role of AI security in safety and ethics as part of Trustworthy AI. By the end of this book, you’ll be able to develop, deploy, and secure AI systems effectively.What you will learn Understand poisoning, evasion, and privacy attacks and how to mitigate them Discover how GANs can be used for attacks and deepfakes Explore how LLMs change security, prompt injections, and data exposure Master techniques to poison LLMs with RAG, embeddings, and fine-tuning Explore supply-chain threats and the challenges of open-access LLMs Implement MLSecOps with CIs, MLOps, and SBOMs Who this book is for This book tackles AI security from both angles - offense and defense. AI builders (developers and engineers) will learn how to create secure systems, while cybersecurity professionals, such as security architects, analysts, engineers, ethical hackers, penetration testers, and incident responders will discover methods to combat threats and mitigate risks posed by attackers. The book also provides a secure-by-design approach for leaders to build AI with security in mind. To get the most out of this book, you’ll need a basic understanding of security, ML concepts, and Python.