Categories
Technical
-- Database/SQL
-- Multimedia
-- Internet/Networking
-- Operating System
-- Programming
-- Security/Hacking
-- Science/Engineering
-- Web/HTML/CSS/Ajax
-- Unix/Linux
-- Windows
-- Mac OS X
-- Office
-- Perl/PHP/Python
-- C/C++/C#
-- .NET
-- Java
-- Hardware
-- Game Development
-- Embedded Systems
-- Graphics and Design
-- Network Programming
Study
Novel
Nonfiction
Health
Tutorial
Entertainment
Business
Magazine
Arts & Design
Audiobooks & Video Training
Cultures & Languages
Family & Home
Law & Politics
Lyrics & Music
Software Related
eBook Torrents
Uncategorized
-- Database/SQL
-- Multimedia
-- Internet/Networking
-- Operating System
-- Programming
-- Security/Hacking
-- Science/Engineering
-- Web/HTML/CSS/Ajax
-- Unix/Linux
-- Windows
-- Mac OS X
-- Office
-- Perl/PHP/Python
-- C/C++/C#
-- .NET
-- Java
-- Hardware
-- Game Development
-- Embedded Systems
-- Graphics and Design
-- Network Programming
Study
Novel
Nonfiction
Health
Tutorial
Entertainment
Business
Magazine
Arts & Design
Audiobooks & Video Training
Cultures & Languages
Family & Home
Law & Politics
Lyrics & Music
Software Related
eBook Torrents
Uncategorized
Share With Friends
Archive by Date
2012-08-06
2012-08-05
2012-08-04
2012-08-03
2012-08-02
2012-08-01
2012-07-31
2012-07-30
2012-07-29
2012-07-28
2012-08-05
2012-08-04
2012-08-03
2012-08-02
2012-08-01
2012-07-31
2012-07-30
2012-07-29
2012-07-28
Search Tag
Angebots
v2012
Macarons
Waking
Exodus
Derrida
hack
Linguaphone
Chirurgie
Herman
Walton
Parisien
mesure
ndez
Wavelet
Pluralism
Rialto
Winding
WHIPLASH
Proze
happy
Closed
Imperatrice
Owner
Ausf
Stowe
Precambrian
Spot
la vie secrète des lettres de a à z
modeling
Saramago
Atemschaukel
Raid
pair
Juno
Mama
valve
Terrific
Hyde
ColdFusion
Clearing
Founders
Neurotropic
animation
Libertines
Folding
Reggie
update
PHYSICAL
Anisotropic
Newest
Security/Hacking Хакеры
Security/Hacking PDF Hacks: 100 Industrial-Strength Tips & Tools (Repost)
Security/Hacking International Relations and Security in the Digital Age: International Relations and Security in the Digital Age
Security/Hacking Information Security Cost Management
Security/Hacking Seven Deadliest Unified Communications Attacks (Repost)
Security/Hacking CompTIA Security Certification Study Guide, Third Edition
Security/Hacking New American Expat: Thriving and Surviving Overseas in the Post-9/11 World {Repost}
Security/Hacking Managing an Information Security and Privacy Awareness and Training Program
Security/Hacking Mechatronics for Safety, Security and Dependability in a New Era {Repost}
Security/Hacking How to Survive the End of the World as We Know It: Tactics, Techniques, and Technologies for Uncertain Times
Security/Hacking Spyware and Adware (Advances in Information Security)
Security/Hacking Network and System Security
Security/Hacking Amazon Hacks: 100 Industrial-Strength Tips & Tools (Repost)
Security/Hacking Introduction to Network Security (Repost)
Security/Hacking Security Study Guide {Repost}
Security/Hacking Aggressive Network Self Defense (2005) & Agile Web Development With Rails 1st Edition (2005) (Repost)
Security/Hacking The Hacker's Underground Handbook Learn What it Takes to Crack Even the Most Secure Systems
Security/Hacking Developer's Guide to Web Application Security By Michael Cross
Security/Hacking Hack Proofing ColdFusion By Steve Casco, Rob Rusher
Security/Hacking Wireshark & Ethereal Network Protocol Analyzer Toolkit (Repost)
Security/Hacking PDF Hacks: 100 Industrial-Strength Tips & Tools (Repost)
Security/Hacking International Relations and Security in the Digital Age: International Relations and Security in the Digital Age
Security/Hacking Information Security Cost Management
Security/Hacking Seven Deadliest Unified Communications Attacks (Repost)
Security/Hacking CompTIA Security Certification Study Guide, Third Edition
Security/Hacking New American Expat: Thriving and Surviving Overseas in the Post-9/11 World {Repost}
Security/Hacking Managing an Information Security and Privacy Awareness and Training Program
Security/Hacking Mechatronics for Safety, Security and Dependability in a New Era {Repost}
Security/Hacking How to Survive the End of the World as We Know It: Tactics, Techniques, and Technologies for Uncertain Times
Security/Hacking Spyware and Adware (Advances in Information Security)
Security/Hacking Network and System Security
Security/Hacking Amazon Hacks: 100 Industrial-Strength Tips & Tools (Repost)
Security/Hacking Introduction to Network Security (Repost)
Security/Hacking Security Study Guide {Repost}
Security/Hacking Aggressive Network Self Defense (2005) & Agile Web Development With Rails 1st Edition (2005) (Repost)
Security/Hacking The Hacker's Underground Handbook Learn What it Takes to Crack Even the Most Secure Systems
Security/Hacking Developer's Guide to Web Application Security By Michael Cross
Security/Hacking Hack Proofing ColdFusion By Steve Casco, Rob Rusher
Security/Hacking Wireshark & Ethereal Network Protocol Analyzer Toolkit (Repost)
Useful Links
Security/Hacking 网站设计的思考
Posted on 2010-04-28
|
很荣幸,能在这里和大家一起探讨关于网站设计的问题。目前,网络上有关网页制作的各种教程已经相当多,可以方便地学习到最新的技术和技巧。可是,有关网页的设计,比如设计灵感的实现,风格的确定,发展策略,技术的筛选等的文章却比较少,许多网友往往有好的材料,却苦恼没有好的具有表现力的设计。受到索易主持人的鼓励,阿捷整理了一些网页的设计心得,在这里和大家交流一下,也算抛砖引玉了,希望得到您的指正,如果您有好的建议和心得,也请发稿给我[email protected],在此先道一声谢谢!
网站设计,包含的内容非常多。大体分两个方面: 一方面是纯网站本身的设计比如文字排版,图片制作,平面设计,三维立体设计,静态无声图文,动态有声影像等; 另一方面是网站的延伸设计,包括网站的主题定位和浏览群的定位,智能交互,制作策划,形象包装,宣传营销等等。 这两方面相辅相成(感觉有点象写辨证论文:),加之网络技术的飞速发展,要提出一个绝对正确和权威的设计思路是不可能的,要想在一篇文章中概括出来也很难,所以阿捷根据建设一个网站的思路,将自己几年来网站设计制作的心得整理成一个系列“讲座”,告诉给大家(注意:我并不会非常具体地讲某一个技术或制作技巧,重点在于思路)希望能给您一些帮助。下面是大致的提纲: 1.定位你的网站主题和名称; 2.定位你的网站CI形象; 3.确定你的栏目和版块; 4.网站的整体风格创意设计 5.网站的层次结构和链接结构 6.首页的设计 7.版面布局的窍门 8.色彩的搭配 9.效果与速度 10.替浏览者考虑 11.细微之处见功力 12.建设完成度与推出时间 13.交互性与亲和度 14.考虑不同的浏览器和分辨率 15.字体的设置和表格的嵌套 16.新技术的运用取舍 17.设计好你的banner和位置 18.语句文字--融入感情 19.对网站设计初学者的建议
Rating:
2.5 out of 5 by Book123 |
Download Links | |
Server | Status |
---|---|
Direct Download Link 1 | Alive |
Direct Download Link 2 | Alive |
Download Link 1 | Alive |
Buy This Book at Best Price >> |
Like this article?! Give us +1: