User interface (UI) design rules and guidelines, developed by early HCI gurus and recognized throughout the field, were based on cognitive psychology (study of mental processes such as problem solving, memory, and language), and early practitioners were well informed of its tenets.
Digital imaging techniques have been rapidly adopted within archaeology and cultural heritage practice for the accurate documentation of cultural artefacts.
You've found your Muse; now learn how to create with itCreative Web Design with Adobe Muse is a step-by-step guide to creating fully-featured websites using Adobe Muse.
Creative Direction in a Digital World provides designers the tools they need to craft compelling digital experiences across screens, devices and platforms.
Taking a cross-media approach to the ever-changing field of digital storytelling, this book offers an essential introduction to producing and editing interactive storytelling content, and to the platforms that host it.
Presents an Cyber-Assurance approach to the Internet of Things (IoT) This book discusses the cyber-assurance needs of the IoT environment, highlighting key information assurance (IA) IoT issues and identifying the associated security implications.
This book focuses on practical, standards-based approaches to planning, executing and managing projects in which libraries and other cultural institutions digitize material and make it available on the web (or make collections of born-digital material available).
- Für Admins: Backups, Multisite, Performance und Testsystem- Für Entwickler: Eigene Plug-ins und Themes programmieren- Für Nutzer: Erfolgreich bloggen, Suchmaschinenoptimierung und Code-SnippetsWordPress gilt als Star in der Bloggerszene, ist aber weit mehr als eine Blogging-Plattform.
An accessible illustrated introducton to the networks we use every day, from Facebook and Google to WiFi and the InternetWhat makes WiFi faster at home than at a coffee shop?
We live in a world where a tweet can be instantly retweeted and read by millions around the world in minutes, where a video forwarded to friends can destroy a political career in hours, and where an unknown man or woman can become an international celebrity overnight.
Moving to the Cloud provides an in-depth introduction to cloud computing models, cloud platforms, application development paradigms, concepts and technologies.
The book provides a comprehensive review of lifelong learning, information literacy and internships including assessment techniques for lifelong learning, teamwork and information literacy as defined by the ABET criteria.
An innovative and accessible guide to doing social research in the digital ageIn just the past several years, we have witnessed the birth and rapid spread of social media, mobile phones, and numerous other digital marvels.
The purpose of this book is to serve as a forum in which academics and researchers from all over the globe may come together to communicate, promote, and debate numerous new challenges and advancements in many fields related to engineering applications and the internet of things (IoT).
The aim of Sentiment Analysis is to define automatic tools able to extract subjective information from texts in natural language, such as opinions and sentiments, in order to create structured and actionable knowledge to be used by either a decision support system or a decision maker.
Trends and Issues in Instructional Design and Technology provides current and future IDT professionals with a clear picture of current and future developments in the field that are likely to impact their careers and the organizations they work for.
Digital Media, Projection Design, & Technology for Theatre, Second Edition comprehensively details the integration of digital media and projections in theatre and live performance, providing foundational skills, best practices, and real-world applications and considerations.
Cloud Computing: Theory and Practice, Second Edition, provides students and IT professionals with an in-depth analysis of the cloud from the ground up.
A straightforward overview with minimum technical descriptions of the underlying networking principles, standards, applications and uses of the Internet.
Discover the power of Rematch and its plugins by building a real-world application from scratchKey FeaturesGet to grips with the capabilities of Rematch quickly as you build applicationsLearn to use Rematch and its plugins to simplify everyday tasksTake total control of the application state and manage its scalability using RematchBook DescriptionRematch is Redux best practices without the boilerplate.
Difficult Heritage and Immersive Experiences examines the benefits involved in designing and employing immersive technologies to reconstruct difficult pasts at heritage sites around the world.
This book looks closely at the endings of narrative digital games, examining their ways of concluding the processes of both storytelling and play in order to gain insight into what endings are and how we identify them in different media.
A practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected worldKey FeaturesLearn best practices to secure your data from the device to the cloudUse systems security engineering and privacy-by-design principles to design a secure IoT ecosystemA practical guide that will help you design and implement cyber security strategies for your organizationBook DescriptionWith the advent of the Internet of Things (IoT), businesses have to defend against new types of threat.
Securing Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise network environments.
Academic Search Engines intends to run through the current panorama of the academic search engines through a quantitative approach that analyses the reliability and consistence of these services.
This easy-to-use guide covers the history, development, and current workings of cryptocurrencies and the underground economy, both in the United States and around the world.
Broadband-whether delivered via fiber, cable modem, mobile or fixed wireless, copper wire, or satellite-is increasingly the technology underlying telecommunications services such as voice, video, and data.
Wireless Sensor Networks and the Internet of Things: Future Directions and Applications explores a wide range of important and real-time issues and applications in this ever-advancing field.
Cybersecurity and Human Rights in the Age of Cyberveillance isa collection of articles by distinguished authors from the US and Europe and presents a contemporary perspectives on the limits online of human rights.