eBooks-it.org Logo
eBooks-IT.org Inner Image

Morgan Kaufmann eBooks Page 22

Download free Morgan Kaufmann eBooks Page 22

Effective Prototyping with Excel

A practical handbook for developers and designers
Effective Prototyping with Excel Image
Although recognized as a key to the design process, prototyping often falls victim to budget cuts, deadlines, or lack of access to sophisticated tools. This can lead to sloppy and ineffective prototypes or the abandonment of them altogether. Rather than lose this important step, people are turning to Microsoft Excel to create effective, simple, and inexpensive prototypes. Conveniently, the software is available to nearly everyone, and most are proficient in its basic functionality. Effective Prototyping with Excel offers how-to guidance on how everyone can use basic Excel skills to create prototypes - ranging from narrative wire frames to hi-fidelity prototypes. A wide array of software design problems and business demands are solved via practical st...

Disappearing Cryptography

Information Hiding, Steganography & Watermarking
Disappearing Cryptography Image
3rd Edition
Cryptology is the practice of hiding digital information by means of various obfuscatory and steganographic techniques. The application of said techniques facilitates message confidentiality and sender/receiver identity authentication, and helps to ensure the integrity and security of computer passwords, ATM card information, digital signatures, DVD and HDDVD content, and electronic commerce. Cryptography is also central to digital rights management (DRM), a group of techniques for technologically controlling the use of copyrighted material that is being widely implemented and deployed at the behest of corporations that own and create revenue from the ...

Digital Watermarking and Steganography

Digital Watermarking and Steganography Image
2nd Edition
Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties to decipher the content that he has taken. The many techiniques of digital watermarking (embedding a code) and steganography (hiding information) continue to evolve as applications that necessitate them do the same. The authors of this second edition provide an update on the framework for applying these techn...

Designing with the Mind in Mind

Simple Guide to Understanding User Interface Design Rules
Designing with the Mind in Mind Image
Early user interface (UI) practitioners were trained in cognitive psychology, from which UI design rules were based. But as the field evolves, designers enter the field from many disciplines. Practitioners today have enough experience in UI design that they have been exposed to design rules, but it is essential that they understand the psychology behind the rules in order to effectively apply them. In Designing with the Mind in Mind, Jeff Johnson, author of the best selling GUI Bloopers, provides designers with just enough background in perceptual and cognitive psychology that UI design guidelines make intuitive sense rather than being just a list of rules to follow. * The first practical, all-in-one source for practitioners on user interface design ...

Database Modeling and Design

Logical Design
Database Modeling and Design Image
5th Edition
Database systems and database design technology have undergone significant evolution in recent years. The relational data model and relational database systems dominate business applications; in turn, they are extended by other technologies like data warehousing, OLAP, and data mining. How do you model and design your database application in consideration of new technology or new business needs? In the extensively revised fifth edition, you'll get clear explanations, lots of terrific examples and an illustrative case, and the really practical advice you have come to count on--with design rules that are applicable to any SQL-based system. But you'll als...



2007 - 2017 © eBooks-IT.org