|
|
|
|
| | Statistical Methods, Second Edition
This broad text provides a complete overview of most standard statistical methods, including multiple regression, analysis of variance, experimental design, and sampling techniques. Assuming a background of only two years of high school algebra, this book teaches intelligent data analysis and covers the principles of good data collection. ... | | Revolutionary Women: A Book of Stencils
Both a radical feminist history and a street art resource, this handbook combines short biographies with striking and usable stencil images of 30 female activists, anarchists, feminists, freedom fighters, and visionaries. From Harriet Tubman, Emma Goldman, and Angela Davis to Vandana Shiva, Sylvia... |
|
| | | | Linux Cluster Architecture (Kaleidoscope)Cluster computers provide a low-cost alternative to multiprocessor systems for many applications. Building a cluster computer is within the reach of any computer user with solid C programming skills and a knowledge of operating systems, hardware, and networking. This book leads you through the design and assembly of such a system, and shows you how... |
|
Designing Security Architecture SolutionsThe first guide to tackle security architecture at the software engineering level Computer security has become a critical business concern, and, as such, the responsibility of all IT professionals. In this groundbreaking book, a security expert with AT&T Business's renowned Network Services organization explores system security... | | Race, Class, and the Death Penalty: Capital Punishment in American History
No scholarly effort is ever conducted without heavy indebtedness to others. This is particularly true of efforts that rest as heavily as this one does upon data collection efforts carried out by others. Our largest debt is, of course, to M. Watt Espy. Without his continuing effort, this study would have been impossible. We are profoundly... | | Pro Puppet
The lives of system administrators and operations staff often revolve around a series of repetitive tasks: configuring hosts, creating users, and managing applications, daemons, and services. Often these tasks are repeated many times in the life cycle of one host, from building to decommissioning, and as new configuration is added or... |
|
|
|
Result Page: 121 120 119 118 117 116 115 114 113 112 111 110 109 108 107 106 105 104 103 |