Eye Tracking in User Experience Design [Elektronisk resurs]
Material type: TextPublication details: Morgan Kaufmann Publishers 2014Subject(s): Genre/Form: Additional physical formats: Print: Eye Tracking in User Experience DesignOnline resources:- Online access for BTH Safari Technical Books
- Tillg�nglig f�r anv�ndare inom Stockholms universitet Elsevier ScienceDirect Books Complete:Full Text
- Tillg�nglig f�r anv�ndare inom H�gskolan i Bor�s Safari Technical Books (Current File)
- Online access for HV Ebrary Academic Ebooks
- Tillg�nglig f�r anv�ndare inom H�gskolan i J�nk�ping / Restricted access Safari Books Online:Full Text
- Online access for HKR Safari Technical Books (Current File)
- Online access for HKR Ebook Central
- Extern tillg�ng endast anst�llda och studenter vid LiU Books 24x7 IT Pro Collection
- Endast tillg�nglig f�r anv�ndare i NU-sjukv�rden EBL
- Online access for Chalmers ScienceDirect
- Online access for Chalmers Books24x7
Item type | Current library | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|
Books | Kwara State University Library | QA76.9.B47 2014 (Browse shelf(Opens below)) | Available | 016036-01 | ||
Books | Kwara State University Library | QA76.9.B47 2014 (Browse shelf(Opens below)) | Available | 016036-02 | ||
Books | Kwara State University Library | QA76.9.B47 2014 (Browse shelf(Opens below)) | Available | 016036-03 |
Browsing Kwara State University Library shelves Close shelf browser (Hides shelf browser)
QA76.9.A94 .W37 2015 Augmented reality law, privacy, and ethics : law, society, and emerging ar technologies / | QA76.9.B47 2014 Eye Tracking in User Experience Design | QA76.9.B47 2014 Eye Tracking in User Experience Design | QA76.9.B47 2014 Eye Tracking in User Experience Design | QA76.9 .B73 2015 Interaction flow modeling language : model-driven UI engineering of web and mobile apps with IFML | QA76.9.B76 2013 Risk management framework : a lab-based approach to securing information systems / | QA76.9.B76 2013 Risk management framework : a lab-based approach to securing information systems / |
Book
There are no comments on this title.
Log in to your account to post a comment.