Flylib.com
Creating Games in C++: A Step-by-Step Guide
Creating Games in C++: A Step-by-Step Guide
ISBN: 0735714347
EAN: 2147483647
Year: N/A
Pages: 148
Authors:
David Conger
,
Ron Little
BUY ON AMAZON
Creating Games in C: A Step-by-Step Guide
Table of Contents
Copyright
Acknowledgments
Introduction
What s Different About This Book
What s in This Book?
System Requirements
Free Stuff on the CD
Who Am I?
Part 1: The Really Basic Stuff
Chapter 1. What it Takes to be a Game Programmer
Programming Skills
Computer Graphics Skills
Game Design Skills
Art Skills
Sound and Music Skills
Summary
Chapter 2. Writing C Programs
Introducing the Dev-C Compiler
Programming in C
Essential Math Operators
Loops
While Loops
Do-while loops
Windows Programming
Game Programming
Summary
Part 2: ObjectOriented Programming in Games
Chapter 3. Introducing Object-Oriented Programming
Software Objects
Classes
Logical Operators
The If-Else Statement
Namespaces and Scope Resolution
A Brief Word About Structures
Summary
Chapter 4. Introducing the LlamaWorks2D Game Engine
A Step-by-Step Overview
How Does Llamaworks2D Work?
A Stationary Ball
A Bouncing Ball
Getting Good Results
Summary
Chapter 5. Function and Operator Overloading
What Is Overloading?
Implementing a Vector Class with Overloading
Summary
Chapter 6. Inheritance: Getting a Lot for a Little
What Is Inheritance?
Deriving Classes
Protected Members
Overriding Base Class Functions
Customizing Your Game with Inheritance
Summary
Part 3: The Essentials of Game Development
Chapter 7. Program Structure
Program Structure
File Structure
A Game Called Ping
Summary
Chapter 8. Sound Effects and Music
Sound Effects and Music Are Emotion
Storing Sound Data
Sound Effects in LlamaWorks2D
Noise, Sweet Noise
Play That Funky Music, Geek Boy
Summary
Part 4: Graduating to Better C
Chapter 9. Floating-Point Math in C
Getting into the Guts of Floating-Point Numbers
Case Study: Floating-Point Numbers and Gamespaces
Summary
Chapter 10. Arrays
What Are Arrays?
Declaring and Using Arrays
Initializing Arrays
Problems with Array Boundaries
Summary
Chapter 11. Pointers
Why Are Pointers Important to Games?
Declaring and Using Pointers
Pointers and Dynamic Memory Allocation
Pointers and Inheritance
Arrays Are Pointers in Disguise
Summary
Chapter 12. File Input and Output
Games and File IO
Types of Files
Summary
Chapter 13. Moving into Real Game Development
Sprites that Come Alive
High-Speed Input
Summary
Part 5: The Big Payoff
Chapter 14. No Slime Allowed: Invasion of the Slugwroths
What It Takes to Make a Real Game
Essential Game Design
Designing Invasion of the Slugwroths
Summary
Chapter 15. Captain Chloride Gets Going
Introducing Captain Chloride
Pulling It Together In The Game Class
Summary
Chapter 16. The World of Captain Chloride
The New Captain Chloride
Levels in LlamaWorks2D
Summary
Chapter 17. Captain Chloride Encounters Solid Objects
Bumping into a Solid Door
Picking Up a Key
Making the Door Open and Close
Summary
Chapter 18. That s a Wrap
Time for Consolidation
Enter villains, Stage Left
Additions to the Game
Epilogue: Not the End
Glossary
Index
SYMBOL
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Creating Games in C++: A Step-by-Step Guide
ISBN: 0735714347
EAN: 2147483647
Year: N/A
Pages: 148
Authors:
David Conger
,
Ron Little
BUY ON AMAZON
MySQL Stored Procedure Programming
Using Non-SELECT SQL in Stored Programs
Handling SQL Errors: A Preview
Using PHP with the mysqli Extension
Tuning Stored Programs and Their SQL
Conclusion
Beginning Cryptography with Java
The JCA and the JCE
Certificate Revocation and Path Validation
Key and Certificate Management Using Keystores
Appendix B Algorithms Provided by the Bouncy Castle Provider
Appendix C Using the Bouncy Castle API for Elliptic Curve
Certified Ethical Hacker Exam Prep
Key Terms
The Attackers Process
Denial of Service
Physical Security
Appendix B. Preparing Your System for Knoppix-std
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 2. Set Up Bluetooth on Windows XP
Hack 22. Map Wi-Fi Networks with Kismet and GPSd
Hack 51. Track Wireless Users
Hack 80. Redirect Brought to you by Bonjour Ads
Section B.5. 802.11 Hardware Suppliers
Sap Bw: a Step By Step Guide for Bw 2.0
Creating an Authorization Object to Control User Access to the InfoCube Data
Part II. Advanced Topics
Transferring R/3 Global Settings
Loading Data from R/3 into BW
System Administration Assistant
Comparing, Designing, and Deploying VPNs
VPN Devices
Designing and Deploying L2TPv3-Based Layer 2 VPNs
Summary
Advantages and Disadvantages of IPsec Site-to-Site VPNs
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies