Flylib.com
Part II: User Experience Research Techniques
Previous page
Table of content
Next page
Chapter List
Chapter 5: The Research Plan
Chapter 6: Universal Tools: Recruiting and Interviewing
Chapter 7: User Profiles
Chapter 8: Contextual Inquiry, Task Analysis, Card Sorting
Chapter 9: Focus Groups
Chapter 10: Usability Tests
Chapter 11: Surveys
Chapter 12: Ongoing Relationships
Chapter 13: Log Files and Customer Support
Chapter 14: Competitive Research
Chapter 15: Others' Hard Work: Published Information and Consultants
Chapter 16: Emerging Techniques
Previous page
Table of content
Next page
Real-World .NET Applications
ISBN: 1558609237
EAN: 2147483647
Year: 2002
Pages: 144
Authors:
Budi Kurniawan
BUY ON AMAZON
Interprocess Communications in Linux: The Nooks and Crannies
Introduction
Introduction
exec s Minions
Key Terms and Concepts
C.2. RPC Definitions
Inside Network Security Assessment: Guarding Your IT Infrastructure
Risk-Assessment Terminology
Choosing the Best Risk-Assessment Approach
Tools Used for Assessments and Evaluations
Ranking Your Findings
Critical Systems and Information Forms
Certified Ethical Hacker Exam Prep
The Technical Foundations of Hacking
The Ethical Hackers Process
Denial of Service
Summary
Enumeration
Cisco IOS in a Nutshell (In a Nutshell (OReilly))
The Null Interface
Distance-Vector and Link-State Routing Protocols
A Simple BGP Configuration
Specialized Networking Topics
ping
MySQL Cookbook
Specifying Which Rows to Select
Finding Dates for Weekdays of Other Weeks
Controlling Case Sensitivity of String Sorts
Introduction
A LOAD DATA Diagnostic Utility
Special Edition Using FileMaker 8
Many-to-Many Relationships: Solving the Puzzle
Relationships Graphs and ERDs
Delivering Reports
Advanced Interface Techniques
Custom Web Publishing Versus XML Export
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies