Eye Tracking for User Experience Design explores the many applications of eye tracking to better understand how users view and interact with technology. Ten leading experts in eye tracking discuss how they have taken advantage of this new technology to understand, design, and evaluate user experience. Real-world stories are included from these experts who have used eye tracking during the design and development of products ranging from information websites to immersive games. They also explore recent advances in the technology which tracks how users interact with mobile devices, large-screen displays and video game consoles. Methods for combining eye tracking with other research techniques for a more holistic understanding of the user experience are discussed. This is an invaluable resource to those who want to learn how eye tracking can be used to better understand and design for their users. Includes highly relevant examples and information for those who perform user research and design interactive experiences Written by numerous experts in user experience and eye tracking. Highly relevant to anyone interested in eye tracking & UX design Features contemporary eye tracking research emphasizing the latest uses of eye tracking technology in the user experience industry.
This book focuses on video-based, corneal-reflection eye trackers - the most widely available and affordable type of system, and takes a look at a number of interesting and challenging applications in human factors, collaborative systems, virtual reality, marketing and advertising. The third edition has been extensively revised and extended, and includes new chapters on calibration accuracy, precision and correction; advanced eye movement analysis; binocular eye movement analysis; practical gaze analytics; design; GIS. Opening with useful background information, including an introduction to the human visual system and key issues in visual perception and eye movement, the author then surveys eye-tracking devices and provides a detailed introduction to the technical requirements necessary for installing a system and developing an application program.
Multidimensional data is data that exists and changes in more than one dimension, by time, or spatially, or both, sometimes dynamically. Think here of tracking hurricane data in order to project the storm´s path, for just one example. As spatial and other multidimensional data structures become increasingly important for the applications in game programming, data mining, bioinformatics, and many other areas--including astronomy, geographic information systems, physics, etc., the need for a comprehensive book on the subject is paramount. This book is truly a life´s work by the author who is clearly the best person for the job.
The DbContext API captures Entity Framework?s (EF) most commonly used features and tasks, simplifying development with EF. This concise book shows you how to use the API to perform set operations with the DbSet class, handle change tracking and resolve concurrency conflicts with the Change Tracker API, and validate changes to your data with the Validation API. With DbContext, you?ll be able to query and update data, whether you?re working with individual objects or graphs of objects and their related data. You?ll find numerous C# code samples to help you get started. All you need is experience with Visual Studio and database management basics. * Use EF?s query capabilities to retrieve data, and use LINQ to sort and filter data * Learn how to add new data, and change and delete existing data * Use the Change Tracker API to access information EF keeps about the state of entity instances * Control change tracking information of entities in disconnected scenarios, including NTier applications * Validate data changes before they?re sent to the database, and set up validation rules * Bypass EF?s query pipeline and interact directly with the database
Get up to speed on Git for tracking, branching, merging, and managing code revisions. Through a series of step-by-step tutorials, this practical guide takes you quickly from Git fundamentals to advanced techniques, and provides friendly yet rigorous advice for navigating the many functions of this open source version control system. This thoroughly revised edition also includes tips for manipulating trees, extended coverage of the reflog and stash, and a complete introduction to the GitHub repository. Git lets you manage code development in a virtually endless variety of ways, once you understand how to harness the system?s flexibility. This book shows you how. * Learn how to use Git for several real-world development scenarios * Gain insight into Git?s common-use cases, initial tasks, and basic functions * Use the system for both centralized and distributed version control * Learn how to manage merges, conflicts, patches, and diffs * Apply advanced techniques such as rebasing, hooks, and ways to handle submodules * Interact with Subversion (SVN) repositories?including SVN to Git conversions * Navigate, use, and contribute to open source projects though GitHub
Computer Software is an integral part of modern society. Companies rely on applications to manage client information, payment data, and inventory tracking. Consumers use software for a variety of different reasons as well--to manage their daily lives, to communicate with friends and family, and to browse resources made available on the internet, to name a few. With such a heavy reliance on software in our society, questions surrounding the security of the pieces of software performing these various tasks begin to arise. Is the software we are using really secure? How can we verify that it is? And what are the implications of a particular application being compromised? These are some of the questions that this book attempts to address. This book sheds light on the theory and practice of code auditing--how to rip apart an application and discover security vulnerabilities, whether they be simple or subtle, and how to assess the danger that each vulnerability represents. Product Description ´´There are a number of secure programming books on the market, but none that go as deep as this one. The depth and detail exceeds all books that I know about by an order of magnitude.´´ -Halvar Flake, CEO and head of research, SABRE Security GmbH The Definitive Insider´s Guide to Auditing Software Security This is one of the most detailed, sophisticated, and useful guides to software security auditing ever written. The authors are leading security consultants and researchers who have personally uncovered vulnerabilities in applications ranging from sendmail to Microsoft Exchange, Check Point VPN to Internet Explorer. Drawing on their extraordinary experience, they introduce a start-to-finish methodology for ´´ripping apart´´ applications to reveal even the most subtle and well-hidden security flaws. The Art of Software Security Assessment covers the full spectrum of software vulnerabilities in both UNIX/Linux and Windows environments. It demonstrates how to audit security in applications of all sizes and functions, including network and Web software. Moreover, it teaches using extensive examples of real code drawn from past flaws in many of the industry´s highest-profile applications . Coverage includes . Code auditing: theory, practice, proven methodologies, and secrets of the trade . Bridging the gap between secure software design and post-implementation review . Performing architectural assessment: design review, threat modeling, and operational review . Identifying vulnerabilities related to memory management, data types, and malformed data . UNIX/Linux assessment: privileges, files, and processes . Windows-specific issues, including objects and the filesystem . Auditing interprocess communication, synchronization, and state . Evaluating network software: IP stacks, firewalls, and common application protocols . Auditing Web applications and technologies This book is an unprecedented resource for everyone who must deliver secure software or assure the safety of existing software: consultants, security specialists, developers, QA staff, testers, and administrators alike. Contents ABOUT THE AUTHORS xv PREFACE xvii ACKNOWLEDGMENTS xxi I Introduction to Software Security Assessment 1 SOFTWARE VULNERABILITY FUNDAMENTALS 3 2 DESIGN REVIEW 25 3 OPERATIONAL REVIEW 67 4 APPLICATION REVIEW PROCESS 91 II Software Vulnerabilities 5 MEMORY CORRUPTION 167 6 C LANGUAGE ISSUES 203 7 PROGRAM BUILDING BLOCKS 297 8 STRINGS ANDMETACHARACTERS 387 9 UNIX I: PRIVILEGES AND FILES 459 10 UNIX II: PROCESSES 559 11 WINDOWS I: OBJECTS AND THE FILE SYSTEM 625 12 WINDOWS II: INTERPROCESS COMMUNICATION 685 13 SYNCHRONIZATION AND STATE 755 III Software Vulnerabilities in Practice 14 NETWORK PROTOCOLS 829 15 FIREWALLS 891 16 NETWORK APPLICATION PROTOCOLS 921 17 WEB APPLICATIONS 1007 18 WEB TECHNOLOGIES 1083 BIBLIOGRAPHY 1125 INDEX 1129 Backcover ´´There are a number of secure programming books on the market, but none that go as deep as this one. The depth and detail exceeds all books that I know about by an order of magnitude.´´ -Halvar Flake, CEO and head of research, SABRE Security GmbH The Definitive Insider´s Guide to Auditing Software Security This is one of the most detailed, sophisticated, and useful guides to software security auditing ever written. The authors are leading security consultants and researchers who have personally uncovered vulnerabilities in applications ranging from sendmail to Microsoft Exchange, Check Point VPN to Internet Explorer.
Testing at Google Scale Product Description 2012 Jolt Award finalist! Pioneering the Future of Software Test Do you need to get it right, too? Then, learn from Google . Legendary testing expert James Whittaker, until recently a Google testing leader, and two top Google experts reveal exactly how Google tests software, offering brand-new best practices you can use even if you?re not quite Google?s size? yet! Breakthrough Techniques You Can Actually Use Discover 100% practical, amazingly scalable techniques for analyzing risk and planning tests?thinking like real users?implementing exploratory, black box, white box, and acceptance testing?getting usable feedback?tracking issues?choosing and creating tools?testing ?Docs & Mocks,? interfaces, classes, modules, libraries, binaries, services, and infrastructure?reviewing code and refactoring?using test hooks, presubmit scripts, queues, continuous builds, and more. With these techniques, you can transform testing from a bottleneck into an accelerator ?and make your whole organization more productive! Features + Benefits Presents pioneering testing techniques that can help any company moving to the cloud Shows how to achieve web-level scale for integration and system testing Offers expert guidance on managing end-to-end testing, including superior automation strategies Foreword by Alberto Savoia xiii Foreword by Patrick Copeland xvii Preface xxiii Chapter 1: Introduction to Google Software Testing 1 Quality?Test 5 Roles 6 Organizational Structure 8 Crawl, Walk, Run 10 Types of Tests 12 Chapter 2: The Software Engineer in Test 15 The Life of an SET 17 Development and Test Workflow 17 Who Are These SETs Anyway? 22 The Early Phase of a Project 22 Team Structure 24 Design Docs 25 Interfaces and Protocols 27 Automation Planning 28 Testability 29 SET Workflow: An Example 32 Test Execution 40 Test Size Definitions 41 Use of Test Sizes in Shared Infrastructure 44 Benefits of Test Sizes 46 Test Runtime Requirements 48 Case 1: Change in Common Library 52 Test Certified 54 An Interview with the Founders of the Test Certified Program 57 Interviewing SETs 62 An Interview with Tool Developer Ted Mao 68 An Interview with Web Driver Creator Simon Stewart 70 Chapter 3: The Test Engineer 75 A User-Facing Test Role 75 The Life of a TE 76 Test Planning 79 Risk 97 Life of a Test Case 108 Life of a Bug 113 Recruiting TEs 127 Test Leadership at Google 134 Maintenance Mode Testing 137 Quality Bots Experiment 141 BITE Experiment 153 Google Test Analytics 163 Free Testing Workflow 169 External Vendors 173 An Interview with Google Docs TE Lindsay Webster 175 An Interview with YouTube TE Apple Chow 181 Chapter 4: The Test Engineering Manager 187 The Life of a TEM 187 Getting Projects and People 189 Impact 191 An Interview with Gmail TEM Ankit Mehta 193 An Interview with Android TEM Hung Dang 198 An Interview with Chrome TEM Joel Hynoski 202 The Test Engineering Director 206 An Interview with Search and Geo Test Director Shelton Mar 207 An Interview with Engineering Tools Director Ashish Kumar 211 An Interview with Google India Test Director Sujay Sahni 214 An Interview with Engineering Manager Brad Green 219 An Interview with James Whittaker 222 Chapter 5: Improving How Google Tests Software 229 Fatal Flaws in Google´s Process 229 The Future of the SET 231 The Future of the TE 233 The Future of the Test Director and Manager 234 The Future of Test Infrastructure 234 In Conclusion 235 Appendix A: Chrome OS Test Plan 237 Overview of Themes 237 Risk Analysis 238 Per-Build Baseline Testing 239 Per-LKG Day Testing 239 Per-Release Testing 239 Manual Versus Automation 240 Dev Versus Test Quality Focus 240 Release Channels 240 User Input 241 Test Case Repositories 241 Test Dashboarding 241 Virtualization 241 Performance 242 Stress, Long-Running, and Stability 242 Test Execution Framework (Autotest) 242 OEMs 242 Hardware Lab 242 E2E Farm Automation 243 Testing the Browser AppManager 243 Browser Testability 243 Hardware 244 Timeline 244 Primary Test Drivers 246 Relevant Documents 246 Appendix B: Test Tours for Chrome 247 The Shopping Tour 247 The Student Tour 248 Suggested Areas to Test 248 The International Calling Tour 249 Suggested Areas to Test 249 The Landmark Tour 249 Suggested Landmarks in Chrome 249 The All Nighter Tour 250 Suggested Areas to Test 250 The Artisan´s Tour 251 Tools in Chrome 251 The Bad Neighborhood Tour 251 Bad Neighborhoods in Chrome OS 251 The Personalization Tour 252 Ways to Customize
Das Webanalyse-Buch, das Sie zuerst lesen sollten! 30 Ansätze aus der Praxis: Grundprinzipien der Webanalyse Ziele definieren, Daten akquirieren und analysieren Reporting und Lösungen für bekannte Problemstellungen Kennen Sie das? Sie sitzen über einem Analyse-Bericht und starren auf die Auswertung, aber die Zusammenhänge wollen Ihnen nicht klar werden? Oder Sie rufen Ihr Webanalyse-System auf und fragen sich dann, womit und wie Sie eigentlich anfangen? Beginnen Sie am besten hier, mit diesem Buch! Der erfahrene Webanalyst Tom Alby erklärt Ihnen von Anfang bis Ende, wie eine professionelle Analyse abläuft - unabhängig davon, welches System Sie einsetzen und ob Sie Informatik studiert haben oder nicht. Anschaulich, gut verständlich und aufs Wesentliche konzentriert macht Sie dieses Buch mit den fundamentalen Denkansätzen und Herangehensweisen der Webanalyse vertraut. Mit diesen Grundlagen werden Sie in Zukunft alle Untiefen der Webanalyse sicher umschiffen; denn nur wer Segeln gelernt hat, kann jede Yacht über die Ozeane steuern. Aus dem Inhalt: Zieldefinition Wie funktioniert Tracking? Hits, Seitenaufrufe, Sitzungen Datenschutz (aktuell zur DSGVO) Statistik-Grundlagen Absprungrate und Akquise-Kanäle verstehen Kampagnenerfolge auswerten Testen und A/B-Tests Reporting: Berichte erstellen Dashboards Lösungen für typische Probleme