LEADER 02948nam 2200733Ia 450 001 9910957064303321 005 20251106120153.0 010 $a9781283735100 010 $a1283735105 010 $a9780123814654 010 $a0123814650 035 $a(CKB)2670000000172226 035 $a(EBL)892223 035 $a(OCoLC)784147337 035 $a(SSID)ssj0000662865 035 $a(PQKBManifestationID)11955799 035 $a(PQKBTitleCode)TC0000662865 035 $a(PQKBWorkID)10722615 035 $a(PQKB)10056514 035 $a(Au-PeEL)EBL892223 035 $a(CaPaEBR)ebr10547255 035 $a(CaONFJC)MIL404760 035 $a(CaSebORM)9780123814647 035 $a(MiAaPQ)EBC892223 035 $a(OCoLC)842844075 035 $a(OCoLC)ocn842844075 035 $a(OCoLC)ocn842844075 035 $a(EXLCZ)992670000000172226 100 $a20120305d2013 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aInformation visualization $eperception for design /$fColin Ware 205 $a3rd ed. 210 $aAmsterdam ;$aBoston $cElsevier/MK$dc2013 215 $a1 online resource (537 p.) 225 1 $aInteractive Technologies 300 $aDescription based upon print version of record. 311 08$a9780128128763 311 08$a0128128763 311 08$a9780123814647 311 08$a0123814642 320 $aIncludes bibliographical references and index. 327 $aFront Cover; Preface; About the Author; Appendix A: Changing Primaries; Appendix B: CIE Color Measurement System; Appendix C: The Perceptual Evaluation of Visualization Techniques and Systems; Appendix D: Guidelines; Bibliography; Index; A; C; D; E; F; G; H; I; J; K; L; M; N; O; P; Q; R; S; T; U; V; W; Y; Z 330 $aMost designers know that yellow text presented against a blue background reads clearly and easily, but how many can explain why, and what really are the best ways to help others and ourselves clearly see key patterns in a bunch of data? When we use software, access a website, or view business or scientific graphics, our understanding is greatly enhanced or impeded by the way the information is presented. This book explores the art and science of why we see objects the way we do. Based on the science of perception and vision, the author presents the key principles at work for a wide r 410 0$aInteractive Technologies 517 3 $aPerception for design 606 $aInformation visualization 606 $aVisual perception 606 $aVisualization 615 0$aInformation visualization. 615 0$aVisual perception. 615 0$aVisualization. 676 $a152.14 700 $aWare$b Colin$0792435 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910957064303321 996 $aInformation visualization$94081734 997 $aUNINA LEADER 03183nam 22006855 450 001 9910299248403321 005 20251113190119.0 010 $a3-319-22915-X 024 7 $a10.1007/978-3-319-22915-7 035 $a(CKB)3710000000467375 035 $a(SSID)ssj0001558353 035 $a(PQKBManifestationID)16183233 035 $a(PQKBTitleCode)TC0001558353 035 $a(PQKBWorkID)14819534 035 $a(PQKB)10271557 035 $a(DE-He213)978-3-319-22915-7 035 $a(MiAaPQ)EBC5578416 035 $a(PPN)188461884 035 $a(EXLCZ)993710000000467375 100 $a20150807d2015 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aSecurity in Computing and Communications $eThird International Symposium, SSCC 2015, Kochi, India, August 10-13, 2015. Proceedings /$fedited by Jemal H. Abawajy, Sougata Mukherjea, Sabu M. Thampi, Antonio Ruiz-Martínez 205 $a1st ed. 2015. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2015. 215 $a1 online resource (XXI, 548 p. 239 illus.) 225 1 $aCommunications in Computer and Information Science,$x1865-0937 ;$v536 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-319-22914-1 320 $aIncludes bibliographical references and index. 327 $aSecurity in cloud computing -- Authentication and access control Systems -- Cryptography and steganography -- System and network security -- Application security. 330 $aThis book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2015, held in Kochi, India, in August 2015. The 36 revised full papers presented together with 13 short papers were carefully reviewed and selected from 157 submissions. The papers are organized in topical sections on security in cloud computing; authentication and access control systems; cryptography and steganography; system and network security; application security. 410 0$aCommunications in Computer and Information Science,$x1865-0937 ;$v536 606 $aData protection 606 $aComputer networks 606 $aElectronic commerce 606 $aData and Information Security 606 $aComputer Communication Networks 606 $ae-Commerce and e-Business 615 0$aData protection. 615 0$aComputer networks. 615 0$aElectronic commerce. 615 14$aData and Information Security. 615 24$aComputer Communication Networks. 615 24$ae-Commerce and e-Business. 676 $a005.8 702 $aAbawajy$b Jemal H$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMukherjea$b Sougata$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aThampi$b Sabu M$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aRuiz-Martínez$b Antonio$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910299248403321 996 $aSecurity in Computing and Communications$92256445 997 $aUNINA