Mostrando 21 - 27 Resultados de 27 Para Buscar '"Design Matters"', tiempo de consulta: 0.09s Limitar resultados
  1. 21
    Publicado 2009
    Tabla de Contenidos: “…CONCLUSIONReferences; SECTION 2: Designing Mobile Technologies; Chapter 6: Mobile Interaction Design Matters; Developing worlds; Understanding small lives; Activities and interaction technologies; DESIGNING FOR MOBILES AND SMALL LIVES; GROWING UP; References; Chapter 7: A Child's Mobile Digital Library: Collaboration, Community, and Change; Stories, mobility, and children; Designing with children: cooperative inquiry; Lessons learned; Acknowledgments; References; Chapter 8: Adding Space and Senses to Mobile World Exploration; Learning through georeferenced and mobile sensory experiences…”
    Libro electrónico
  2. 22
    por Harrington, Jan L.
    Publicado 2009
    Tabla de Contenidos: “…Legacy DatabasesFor Further Reading; Chapter 2 Systems Analysis and Database Requirements; Dealing with Resistance to Change; The Structured Design Life Cycle; Conducting the Needs Assessment; Assessing Feasibility; Generating Alternatives; Evaluating and Choosing an Alternative; Creating Design Requirements; Alternative Analysis Methods; Prototyping; Spiral Methodology; Object-Oriented Analysis; For Further Reading; Part II Database Design Theory; Database Design Theory; Chapter 3 Why Good Design Matters; Effects of Poor Database Design; Unnecessary Duplicated Data and Data Consistency…”
    Libro electrónico
  3. 23
    por Kadavy, David
    Publicado 2011
    Tabla de Contenidos: “…Design for Hackers: Reverse-Engineering Beauty; About the Author; Credits; Acknowledgments; Contents; Introduction; Design as Literacy; The Hacker Attitude; The Gap in Design Knowledge; Part I: Understanding Design; Chapter 1: Why Design Matters; What Design Really Is; What Design Is Not; The Layers of Design; Conclusion; Chapter 2: The Purpose of Design; Visual Design and Its Relation to User Experience Design; Sometimes a Visual Design Is Just Good Enough; Sometimes Visual Design Is Your Advantage; Reverse-Engineering the Twitter User Experience; Knowledge Applied; Part II: Medium and Form…”
    Libro electrónico
  4. 24
    Publicado 2016
    Tabla de Contenidos: “…SecurityGovernment Regulations and Privacy; Legacy Databases; Open Source Relational DBMSs; For Further Reading; Chapter 2 - Systems Analysis and Database Requirements; Dealing with Resistance to Change; The Structured Design Life Cycle; Conducting the Needs Assessment; Assessing Feasibility; Generating Alternatives; Evaluating and Choosing an Alternative; Creating Design Requirements; Alternative Analysis Methods; Prototyping; Spiral Methodology; Object-Oriented Analysis; For Further Reading; Part II - Relational Database Design Theory; Chapter 3 - Why Good Design Matters…”
    Libro electrónico
  5. 25
    por Culbertson, Melissa
    Publicado 2013
    Tabla de Contenidos: “…Contents at a Glance; Table of Contents; Introduction; About This Book; Foolish Assumptions; Conventions Used in This Book; Icons Used in This Book; Beyond the Book; Where to Go from Here; Part I: Getting Started with Blog Design; Chapter 1: Recognizing Components of a Well-Designed Blog; Knowing Why Blog Design Matters; Discovering How Readers Visually Travel Your Blog; Using Design Elements That Complement Your Message; Creating a Great-Looking Blog (When You Aren't a Designer); Looking at Available Tools; Chapter 2: Applying Core Design Principles; Providing Structure with Proximity…”
    Libro electrónico
  6. 26
    Publicado 2018
    Tabla de Contenidos: “…Intro -- Secure by Design -- brief contents -- contents -- front matter -- foreword -- preface -- acknowledgments -- about this book -- Who should read this book -- How this book is organized: A roadmap -- About the code -- liveBook discussion forum -- about the authors -- about the cover illustration -- Part 1 Introduction -- 1 Why design matters for security -- 1.1 Security is a concern, not a feature -- 1.1.1 The robbery of Öst-Götha Bank, 1854 -- 1.1.2 Security features and concerns -- 1.1.3 Categorizing security concerns: CIA-T -- 1.2 Defining design -- 1.3 The traditional approach to software security and its shortcomings -- 1.3.1 Explicitly thinking about security -- 1.3.2 Everyone is a security expert -- 1.3.3 Knowing all and the unknowable -- 1.4 Driving security through design -- 1.4.1 Making the user secure by design -- 1.4.2 The advantages of the design approach -- 1.4.3 Staying eclectic -- 1.5 Dealing with strings, XML, and a billion laughs -- 1.5.1 Extensible Markup Language (XML) -- 1.5.2 Internal XML entities in a nutshell -- 1.5.3 The Billion Laughs attack -- 1.5.4 Configuring the XML parser -- 1.5.5 Applying a design mindset -- 1.5.6 Applying operational constraints -- 1.5.7 Achieving security in depth -- Summary -- 2 Intermission: The anti-Hamlet -- 2.1 An online bookstore with business integrity issues -- 2.1.1 The inner workings of the accounts receivable ledger -- 2.1.2 How the inventory system tracks books in the store -- 2.1.3 Shipping anti-books -- 2.1.4 Systems living the same lie -- 2.1.5 A do-it-yourself discount voucher -- 2.2 Shallow modeling -- 2.2.1 How shallow models emerge -- 2.2.2 The dangers of implicit concepts -- 2.3 Deep modeling -- 2.3.1 How deep models emerge -- 2.3.2 Make the implicit explicit -- Summary -- Part 2 Fundamentals -- 3 Core concepts of Domain-Driven Design…”
    Libro electrónico
  7. 27
    Publicado 2021
    “…Taken together, these images and texts offer the most comprehensive overview of Dieter Rams' work to date and will serve as both a reference and an inspiration for anyone interested in how and why good design matters -- Editor…”
    Capítulo