Profil
Mes achats
Découvrez plus de 300 000 ebooks aux formats pdf epub, audio en telechargement ou en lecture streaming. Nous vous avons sélectionné nos coups de cœur toutes categories confondues et mettons en avant l'actualité de la litterature française et internationale.
voir toutes les nouveautés
Nouveautés de la semaine
Recherche avancée
The Persona Lifecycle is a field guide exclusively focused on interaction design's most popular new technique.The Persona Lifecycle addresses the "how" of creating effective personas and using those personas to design products that people love. It doesn't just describe...
Building Intelligent Interactive Tutors discusses educational systems that assess a student's knowledge and are adaptive to a student's learning needs. The impact of computers has not been generally felt in education due to lack of hardware, teacher training, and...
In today's fast paced, infocentric environment, professionals increasingly rely on networked information technology to do business. Unfortunately, with the advent of such technology came new and complex problems that continue to threaten the availability, integrity, and...
Thoughts on Interaction Design explores the theory behind the field of Interaction Design in a new way. It aims to provide a better definition of Interaction Design that encompasses the intellectual facets of the field and the particular methods used by practitioners in...
User research is global – yet despite its pervasiveness, practitioners are not all well equipped to work globally. What may have worked in Nigeria may not be accepted in Russia, may be done differently in Brazil, may partly work in China, and may completely fail in...
User Experience Re-Mastered: Your Guide to Getting the Right Design provides an understanding of key design and development processes aimed at enhancing the user experience of websites and web applications. The book is organized into four parts. Part 1 deals with the...
Cryptology is the practice of hiding digital information by means of various obfuscatory and steganographic techniques. The application of said techniques facilitates message confidentiality and sender/receiver identity authentication, and helps to ensure the integrity...
Presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. Also imparts the skills and knowledge needed to identify and counter some...
Network Security: Know It All explains the basics, describes the protocols, and discusses advanced topics, by the best and brightest experts in the field of network security.Assembled from the works of leading researchers and practitioners, this best-of-the-best...
Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how...
Today many companies are employing a user-centered design (UCD) process, but for most companies, usability begins and ends with the usability test. Although usability testing is a critical part of an effective user-centered life cycle, it is only one component of the...
From the voice on the phone, to the voice on the computer, to the voice from the toaster, speech user interfaces are coming into the mainstream and are here to stay forever. Soundly anchored in HCI, cognitive psychology, linguistics, and social psychology, this...
Software for complex problem solving can dazzle people with advanced features and alluring visuals, but when actually put to use it often disappoints and even frustrates users. This software rarely follows the user's own work methods, nor does it give people the degree...
Since the beginning of the computer age, researchers from many disciplines have sought to facilitate people's use of computers and to provide ways for scientists to make sense of the immense quantities of data coming out of them. One gainful result of these efforts has...
Do you spend a lot of time during the design process wondering what users really need?Do you hate those endless meetings where you argue how the interface should work? Have you ever developed something that later had to be completely redesigned? Paper Prototyping can...
Can computers change what you think and do?Can they motivate you to stop smoking, persuade you to buy insurance, or convince you to join the Army? "Yes, they can," says Dr. B.J. Fogg, director of the Persuasive Technology Lab at Stanford University. Fogg has coined the...
Les livres numériques peuvent être téléchargés depuis l'ebookstore Numilog ou directement depuis une tablette ou smartphone.
PDF : format reprenant la maquette originale du livre ; lecture recommandée sur ordinateur et tablette EPUB : format de texte repositionnable ; lecture sur tous supports (ordinateur, tablette, smartphone, liseuse)
DRM Adobe LCP
LCP DRM Adobe
Restez informé(e) des événements et promotions ebook
Paiements sécurisés