Home | Amazing | Today | Tags | Publishers | Years | Search 
JSL Companion: Applications of the JMP Scripting Language, Second Edition
JSL Companion: Applications of the JMP Scripting Language, Second Edition

Confidently navigate your JMP® Scripting Language journey with this example-driven guide!

With more than 200 example scripts and applications, JSL Companion: Applications of the JMP® Scripting Language, Second Edition provides scripters with a resource that takes them beyond the basics of the JMP Scripting...

Profit From Your Forecasting Software: A Best Practice Guide for Sales Forecasters (Wiley and SAS Business Series)
Profit From Your Forecasting Software: A Best Practice Guide for Sales Forecasters (Wiley and SAS Business Series)

Go beyond technique to master the difficult judgement calls of forecasting

A variety of software can be used effectively to achieve accurate forecasting, but no software can replace the essential human component. You may be new to forecasting, or you may have mastered the statistical theory behind the software’s...

Implementing Models of Financial Derivatives, with CD-ROM: Object Oriented Applications with VBA
Implementing Models of Financial Derivatives, with CD-ROM: Object Oriented Applications with VBA

Implementing Models of Financial Derivatives is a comprehensivetreatment of advanced implementation techniques in VBA for modelsof financial derivatives. Aimed at readers who are already familiarwith the basics of VBA it emphasizes a fully object orientedapproach to valuation applications, chiefly in the context of MonteCarlo simulation but...

Packages and Abstraction
Packages and Abstraction
In thisunit,weconsider anumber of facilities of Java that are particularly useful for structuring larger systems.

Classesand class hierarchies are the fundamental structuring concepts for Java programs. In larger programs, consisting of many classes, we oftenneed ahigher level of structure also. The Java language provides the
...
Python Programming for Teens
Python Programming for Teens

If you want to learn how to program in Python, one of today's most popular computer programming languages, PYTHON PROGRAMMING FOR TEENS is the perfect first step. Written by teacher, author, and Python expert Kenneth Lambert, this book will help you build a solid understanding of programming and prepare you to make the jump to other...

Professional Python
Professional Python

Master the secret tools every Python programmer needs to know

Professional Python goes beyond the basics to teach beginner- and intermediate-level Python programmers the little-known tools and constructs that build concise, maintainable code. Design better architecture and write easy-to-understand code using highly...

Node.js in Action
Node.js in Action

Summary

Node.js in Action is an example-driven tutorial that starts at square one and guides you through all the features, techniques, and concepts you'll need to build production-quality Node applications. You'll start by learning how to set up your Node development environment, including loading...

Ethical Hacking and Penetration Testing Guide
Ethical Hacking and Penetration Testing Guide

Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking tools, which are required to complete a...

Functional Programming in R: Advanced Statistical Programming for Data Science, Analysis and Finance
Functional Programming in R: Advanced Statistical Programming for Data Science, Analysis and Finance
Master functions and discover how to write functional programs in R. In this concise book, you'll make your functions pure by avoiding side-effects; you’ll write functions that manipulate other functions, and you’ll construct complex functions using simpler functions as building blocks.

In Functional...
Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information
Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information

Use this book to learn how to conduct a timely and thorough Risk Analysis and Assessment documenting all risks to the confidentiality, integrity, and availability of electronic Protected Health Information (ePHI), which is a key component of the HIPAA Security Rule. The requirement is a focus area for the Department of Health and Human...

Processing for Android: Create Mobile, Sensor-Aware, and VR Applications Using Processing
Processing for Android: Create Mobile, Sensor-Aware, and VR Applications Using Processing
Learn how to use the Processing programming language and environment to create Android applications with ease. This book covers the basics of the Processing language, allowing users to effectively program interactive graphics in 2D and 3D. It  also details the application of these techniques to different types of Android devices...
Azure Automation Using the ARM Model: An In-Depth Guide to Automation with Azure Resource Manager
Azure Automation Using the ARM Model: An In-Depth Guide to Automation with Azure Resource Manager

Focus exclusively on the Azure Resource Manager (ARM) deployment model for Azure automation and gain in-depth knowledge of topics such as runbook authoring, different types of automation runbooks, and hybrid cloud automation. This book covers practical approaches to creating runbooks for multiple use cases, including operational tasks such as...

Result Page: 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy