Engagez émotionnellement les visiteurs de votre site Web en leur offrant une expérience positive grâce aux préceptes énoncés dans ce petit et brillant ouvrage écrit par le designer spécialiste en expérience utilisateur, Aarron Walter.
De la psychologie classique aux études de cas, des concepts poussés au bon sens le plus simple, Design émotionnel décrit des stratégies et des méthodes accessibles pour vous aider à donner une dimension humaine à vos designs.
Enrique Granados (1867-1916) is one of the most compelling figures of the late-Romantic period in music. During his return voyage to Spain after the premiere of his opera Goyescas in New York, a German submarine torpedoed the ship on which he and his wife were sailing and they perished in the waters of the English Channel. His death was mourned on both sides of the Atlantic as a stunning loss to the music world, for he had died at the pinnacle of his career and his late works held the promise of greater things to come. While Granados's tragic demise casts a pall over his life story, author Walter Clark reveals an artist of remarkable versatility and individuality and sheds new light on his enduring significance.
Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics-now the most sought after skill in the digital forensics and incident response fields. Beginning with introductory concepts and moving toward the advanced, The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory is based on a five day training course that the authors have presented to hundreds of students. It is the only book on the market that focuses exclusively on memory forensics and how to deploy such techniques properly. Discover memory forensics techniques: How volatile memory analysis improves digital investigations Proper investigative steps for detecting stealth malware and advanced threats How to use free, open source tools for conducting thorough memory forensics Ways to acquire memory from suspect systems in a forensically sound manner The next era of malware and security breaches are more sophisticated and targeted, and the volatile memory of a computer is often overlooked or destroyed as part of the incident response process. The Art of Memory Forensics explains the latest technological innovations in digital forensics to help bridge this gap. It covers the most popular and recently released versions of Windows, Linux, and Mac, including both the 32 and 64-bit editions.