`
siuying
  • 浏览: 88320 次
  • 性别: Icon_minigender_1
  • 来自: 香港
最近访客 更多访客>>
社区版块
存档分类
最新评论

Defensive Design for the Web

    博客分类:
  • Tech
阅读更多

Defensive Design for the Web
How to improve error messages, help, forms, and other crisis points (VOICES)
作者︰37signals, Matthew Linderman, Jason Fried

"任何可能失敗的事情都會失敗"

所有軟件都需要處理失敗的情況。本書集中討論網站在處理錯誤、輸入、搜尋等重要刻時要注意的地方。

有沒有試過在讀閱大型網站時連結到一些 (對於並通人來說) 意味不明的 Apache Server 404 訊息?有沒有試過在商業網站想找想購買的貨物卻返回了 2000 個結果?有時很奇怪大網站也會有可用性的問題,也許他們認為 usability 比起漂亮的畫面是不值一提?對商業網站來說,成功地處理錯誤等於解決了一個危機,反之則等於把原本想要消費的客戶趕走。

本書文字不多而且清楚,每一章還有多個正反的真實例子,易讀也易於執行。專業的網站設計者必讀。

  

分享到:
评论

相关推荐

    Defensive Security Handbook: Best Practices for Securing Infrastructure

    Defensive Security Handbook: Best Practices for Securing Infrastructure by Lee Brotherston English | 3 Apr. 2017 | ASIN: B06Y18XC5Y | 268 Pages | AZW3 | 3.88 MB Despite the increase of high-profile ...

    难得的经典——《Defensive Programming for RedHat Enterprise Linux》

    免责声明:此资源来源于网络,其著作权属于与本书相关的单位或个人。在此仅供学习和交流使用,请在下载后24小时内删除。如果因此而引起相关法律问题,本人概不负责,谢谢合作。

    Defensive.Security.Handbook.2017.4.pdf

    Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) ...

    Defensive Security Handbook(O'Reilly,2017) (三种格式pdf,azw3,epub)

    Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) ...

    Wireshark.for.Security.pdf

    Wireshark is combined with two popular platforms: Kali, the security-focused Linux distribution, and the Metasploit Framework, the open-source framework for security testing. Lab-based virtual ...

    Good.Habits.for.Great.Coding.1484234588.pdf

    Rather than teach basic programming, this book presumes that readers understand the fundamentals, and offers time-honed best practices for style, design, documenting, testing, refactoring, and more. ...

    The practice of defensive school psychology

    The practice of defensive school psychology THE PRACTICE OF DEFENSIVE SCHOOL PSYCHOLOGY DONALD A. LUPIANI Riverdale Country School Recent legal developments promise to bring school ...

    An analysis of the Slapper worm

    We’ve all learned the implications of security bugs and breaches the hard way, in a defensive and after-the-fact manner that prompts us to plug holes quickly and then wait for the next big one to ...

    Defensive Security Handbook(O'Reilly,2017)

    Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) ...

    Defensive_Database_Programming_with_SQL_Server

    Defensive_Database_Programming_with_SQL_Server

    Pro PHP Security(Pro)

    PHP is the world’s most popular open source web scripting language, installed on almost 17 million domains worldwide (www.php.net/usage.php). It is loved by beginners and embraced by advanced users. ...

    防御式编程 Defensive Programming.PPT完整版(精品课件)

    防御式编程 Defensive Programming.PPT完整版(精品课件) 大纲: 保护程序免遭非法输入数据的破坏 断言 错误处理技术 异常 隔离程序 辅助调试代码

    counter hack reloaded

    powerful tools in other categories, we can design and implement the most effective defenses. How This Book Differs In recent years, several books have been released covering the topic of attackers and...

    Military Avionics Systems

    Avionics is a word coined in the late 1930s to provide a generic name for the ... It is the military avionics of an aircraft that allow it to perform defensive, offensive and surveillance missions.

    The Hacker Playbook 3 Practical Guide To Penetration Testing

    Back for the third season, The Hacker Playbook 3 (THP3) takes your offensive game to the pro tier. With a combination of new strategies, attacks, exploits, tips and tricks, you will be able to put ...

    defensive database programming

    defensive database programming

    How to Cheat at Configuring Open Source Security Tools

    *Companion Web site contains dozens of working scripts and tools for readers *Follows Syngress' proven "How to Cheat" pedagogy providing readers with everything they need and nothing they don't About ...

    Security with Go

    Defensive topics include cryptography, forensics, packet capturing, and building secure web applications. Offensive topics include brute force, port scanning, packet injection, web scraping, social ...

    英文原版-Pro PHP Security 2nd Edition

    the impact of JavaScript, and the advantages of recent PHP hardening efforts.Pro PHP Security, Second Edition will serve as your complete guide for taking defensive and proactive security measures ...

Global site tag (gtag.js) - Google Analytics