|
|
|
|
Inventors at Work: The Minds and Motivation Behind Modern Inventions
Inventors at Work: The Minds and Motivation Behind Modern Inventions is a collection of interviews with inventors of famous products, innovations, and technologies that have made life easier or even changed the way we live. All of these scientists, engineers, wild-eyed geniuses, and amateur technologists have dedicated their... | | Writing Security Tools and ExploitsExploits. In most information technology circles these days, the term exploits has become synonymous with vulnerabilities or in some cases, buffer overflows. It is not only a scary word that can keep you up at night wondering if you purchased the best firewalls, configured your new host-based intrusion prevention system correctly,... | | Special Edition Using FileMaker 8If you're looking for the inside scoop on the latest version of FileMaker, you've come to the right place. Authors Scott Love and Steve Lane are FileMaker experts who were involved in the development of FileMaker 8, and they bring that knowledge to you in ... |
|
|
Epidemiology and Biostatistics Secrets: with STUDENT CONSULT Access
The Secrets Series® is breaking new ground again. A two-color page layout, a portable size, and a list of the "Top 100 Secrets" in biostatistics and epidemiology help readers to better meet the challenges they face today. And, at no extra charge, purchasers also receive online access to the complete contents of the text via... | | Heroes: David Bowie and Berlin (Reverb)
In 1976, David Bowie left Los Angeles and the success of his celebrated albums Diamond Dogs and Young Americans for Europe. The rocker settled in Berlin, where he would make his “Berlin Trilogy”âthe albums Low, Heroes, and Lodger, which are now considered some of the most critically ... | | |
|
Gaussian Harmonic Analysis (Springer Monographs in Mathematics)
Authored by a ranking authority in Gaussian harmonic analysis, this book embodies a state-of-the-art entrée at the intersection of two important fields of research: harmonic analysis and probability. The book is intended for a very diverse audience, from graduate students all the way to researchers working in a... | | Malicious Cryptography: Exposing CryptovirologyHackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first... | | Learning RStudio for R Statistical Computing
If you need to create and manage complex statistical analysis projects, this book could be a catalyst for great things. In clear, practical chapters it teaches you how to employ Rstudio's powerful features to perform R statistical computing.
Overview
-
A complete practical tutorial for RStudio, designed...
|
|
|
Result Page: 88 87 86 85 84 83 82 81 80 79 78 77 76 75 74 73 72 71 70 |