`
siuying
  • 浏览: 91622 次
  • 性别: Icon_minigender_1
  • 来自: 香港
最近访客 更多访客>>
社区版块
存档分类
最新评论

Defensive Design for the Web

    博客分类:
  • Tech
阅读更多

Defensive Design for the Web
How to improve error messages, help, forms, and other crisis points (VOICES)
作者︰37signals, Matthew Linderman, Jason Fried

"任何可能失敗的事情都會失敗"

所有軟件都需要處理失敗的情況。本書集中討論網站在處理錯誤、輸入、搜尋等重要刻時要注意的地方。

有沒有試過在讀閱大型網站時連結到一些 (對於並通人來說) 意味不明的 Apache Server 404 訊息?有沒有試過在商業網站想找想購買的貨物卻返回了 2000 個結果?有時很奇怪大網站也會有可用性的問題,也許他們認為 usability 比起漂亮的畫面是不值一提?對商業網站來說,成功地處理錯誤等於解決了一個危機,反之則等於把原本想要消費的客戶趕走。

本書文字不多而且清楚,每一章還有多個正反的真實例子,易讀也易於執行。專業的網站設計者必讀。

  

分享到:
评论

相关推荐

    难得的经典——《Defensive Programming for RedHat Enterprise Linux》

    ### 难得的经典——《Defensive Programming for Red Hat Enterprise Linux》 #### 摘要与背景 在软件开发领域,安全性和稳定性是至关重要的。随着互联网的发展,网络安全威胁日益严重,对软件的安全性提出了更高...

    Defensive Security Handbook: Best Practices for Securing Infrastructure

    Defensive Security Handbook: Best Practices for Securing Infrastructure by Lee Brotherston English | 3 Apr. 2017 | ASIN: B06Y18XC5Y | 268 Pages | AZW3 | 3.88 MB Despite the increase of high-profile ...

    Defensive Security Handbook(O'Reilly,2017) (三种格式pdf,azw3,epub)

    Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) ...

    防御性驾驶指南Guide_For_Defensive_Drivind.pdf

    防御性驾驶指南Guide_For_Defensive_Drivind

    The practice of defensive school psychology

    The practice of defensive school psychology THE PRACTICE OF DEFENSIVE SCHOOL PSYCHOLOGY DONALD A. LUPIANI Riverdale Country School Recent legal developments promise to bring school ...

    Defensive Security Handbook(O'Reilly,2017)

    Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) ...

    防御式编程 Defensive Programming.PPT完整版(精品课件)

    防御式编程 Defensive Programming.PPT完整版(精品课件) 大纲: 保护程序免遭非法输入数据的破坏 断言 错误处理技术 异常 隔离程序 辅助调试代码

    Pro PHP Security(Pro)

    The book aims to provide both defensive and proactive security strategies, making it an essential resource for developers looking to protect their applications from potential attacks. #### ...

    counter hack reloaded

    powerful tools in other categories, we can design and implement the most effective defenses. How This Book Differs In recent years, several books have been released covering the topic of attackers and...

    Military Avionics Systems

    Avionics is a word coined in the late 1930s to provide a generic name for the ... It is the military avionics of an aircraft that allow it to perform defensive, offensive and surveillance missions.

    Defensive_Database_Programming_with_SQL_Server

    ### 防御性数据库编程与SQL Server #### 引言 《防御性数据库编程与SQL Server》一书由Alex Kuznetsov撰写,并由Hugo Kornelis进行了技术审稿,首次由Simple Talk Publishing出版于2010年。本书主要探讨了在SQL ...

    Security with Go

    Defensive topics include cryptography, forensics, packet capturing, and building secure web applications. Offensive topics include brute force, port scanning, packet injection, web scraping, social ...

    英文原版-Pro PHP Security 2nd Edition

    the impact of JavaScript, and the advantages of recent PHP hardening efforts.Pro PHP Security, Second Edition will serve as your complete guide for taking defensive and proactive security measures ...

    Cyber Operations(Apress,2015)

    You'll learn how to configure your network from the ground up, starting by setting up your virtual test environment with basics like DNS and active directory, through common network services, and ...

Global site tag (gtag.js) - Google Analytics