 |
|
 Performing Data Analysis Using IBM SPSS
Features easy-to-follow insight and clear guidelines to perform data analysis using IBM SPSS®
Performing Data Analysis Using IBM SPSS® uniquely addresses the presented statistical procedures with an example problem, detailed analysis, and the related data sets. Data entry procedures, variable naming,... |  |  Kali Linux: Assuring Security By Penetration Testing
Master the art of penetration testing with Kali Linux
Overview
-
Learn penetration testing techniques with an in-depth coverage of Kali Linux distribution
-
Explore the insights and importance of testing your corporate network systems before the hackers strike
-
Understand the...
|  |  |
|
|
 Global Energy Policy and Security (Lecture Notes in Energy)
Despite efforts to increase renewables, the global energy mix is still likely to be dominated by fossil-fuels in the foreseeable future, particularly gas for electricity and oil for land, air and sea transport. The reliance on depleting conventional oil and natural gas resources and the geographic distribution of these reserves can have... |  |  Ubuntu Linux Toolbox: 1000+ Commands for Ubuntu and Debian Power Users
This updated bestseller from Linux guru Chris Negus is packed with an array of new and revised material
As a longstanding bestseller, Ubuntu Linux Toolbox has taught you how to get the most out Ubuntu, the world's most popular Linux distribution. With this anticipated new edition, Christopher Negus returns with a... |  |  Imbalanced Learning: Foundations, Algorithms, and Applications
The first book of its kind to review the current status and future direction of the exciting new branch of machine learning/data mining called imbalanced learning
Imbalanced learning focuses on how an intelligent system can learn when it is provided with imbalanced data. Solving imbalanced learning problems is critical in... |
|
|
| Result Page: 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 |