Home | Amazing | Today | Tags | Publishers | Years | Search 
Decision Trees for Business Intelligence and Data Mining: Using SAS Enterprise Miner
Decision Trees for Business Intelligence and Data Mining: Using SAS Enterprise Miner
Using SAS Enterprise Miner, Barry de Ville's Decision Trees for Business Intelligence and Data Mining illustrates the application and operation of decision trees in business intelligence, data mining, business analytics, prediction, and knowledge discovery. It explains in detail the use of decision trees as a data mining technique and...
Applied Engineering Failure Analysis: Theory and Practice
Applied Engineering Failure Analysis: Theory and Practice

Applied Engineering Failure Analysis: Theory and Practice provides a point of reference for engineering failure analysis (EFA) cases, presenting a compilation of case studies covering a 35-year period, from the 1970s to 2012. This period spans the era from the time when slide rules were used routinely for...

Penetration Testing Basics: A Quick-Start Guide to Breaking into Systems
Penetration Testing Basics: A Quick-Start Guide to Breaking into Systems
Learn how to break systems, networks, and software in order to determine where the bad guys might get in. Once the holes have been determined, this short book discusses how they can be fixed. Until they have been located, they are exposures to your organization. By reading Penetration Testing Basics, you'll...
Wicked Cool Shell Scripts, 2nd Edition: 101 Scripts for Linux, OS X, and UNIX Systems
Wicked Cool Shell Scripts, 2nd Edition: 101 Scripts for Linux, OS X, and UNIX Systems
Shell scripts are an efficient way to interact with your machine and manage your files and system operations. With just a few lines of code, your computer will do exactly what you want it to do. But you can also use shell scripts for many other essential (and not-so-essential) tasks.

This second edition of Wicked Cool
...
A Fast Track to Structured Finance Modeling, Monitoring, and Valuation: Jump Start VBA
A Fast Track to Structured Finance Modeling, Monitoring, and Valuation: Jump Start VBA

This book is designed to start with simple examples that progressively develop the reader's confidence to take on more complex tasks. There is very little theoretical discussion about computer science, operations research algorithms, mathematics, or finance. The thrust of the book is to teach the reader to break complex tasks down into...

Access 2013 For Dummies
Access 2013 For Dummies

The easy guide to Microsoft Access returns with updates on the latest version!

Microsoft Access allows you to store, organize, view, analyze, and share data; the new Access 2013 release enables you to build even more powerful, custom database solutions that integrate with the web and enterprise data sources. Access 2013...

JSL Companion: Applications of the JMP Scripting Language, Second Edition
JSL Companion: Applications of the JMP Scripting Language, Second Edition

Confidently navigate your JMP® Scripting Language journey with this example-driven guide!

With more than 200 example scripts and applications, JSL Companion: Applications of the JMP® Scripting Language, Second Edition provides scripters with a resource that takes them beyond the basics of the JMP Scripting...

Learn Adobe Illustrator CC for Graphic Design and Illustration: Adobe Certified Associate Exam Preparation (Adobe Certified Associate (ACA))
Learn Adobe Illustrator CC for Graphic Design and Illustration: Adobe Certified Associate Exam Preparation (Adobe Certified Associate (ACA))

This study guide uses text integrated with video to help you gain real-world skills that will get you started in your career in graphics, design, or illustration, and lays the foundation for taking the Illustrator ACA exam. A mix of project-based lessons, practical videos, and regular assessments throughout prepares you...

Tor And The Dark Net: Learn To Avoid NSA Spying And Become Anonymous Online (Dark Net, Tor, Dark Web, Tor Books) (Volume 1)
Tor And The Dark Net: Learn To Avoid NSA Spying And Become Anonymous Online (Dark Net, Tor, Dark Web, Tor Books) (Volume 1)

Use This Information To Avoid Being Spied By The Government Today!

If you’ve ever heard outrageous stories about online illegal drug stores, hit men for hire, celebrities busted for child porn, mad scientific experiments, and Illuminati rituals, you’ve probably heard of the “dark web”, alternatively called...

Python Web Penetration Testing Cookbook
Python Web Penetration Testing Cookbook

Over 60 indispensable Python recipes to ensure you always have the right code on hand for web application testing

About This Book

  • Get useful guidance on writing Python scripts and using libraries to put websites and web apps through their paces
  • Find the script you need to deal with any...
Metasploit Penetration Testing Cookbook - Third Edition: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework
Metasploit Penetration Testing Cookbook - Third Edition: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework

Over 100 recipes for penetration testing using Metasploit and virtual machines

Key Features

  • Special focus on the latest operating systems, exploits, and penetration testing techniques
  • Learn new anti-virus evasion techniques and use Metasploit to evade countermeasures
  • ...
Excel 2016 VBA and Macros (includes Content Update Program) (MrExcel Library)
Excel 2016 VBA and Macros (includes Content Update Program) (MrExcel Library)

MASTER CORE EXCEL 2016 TOOLS FOR BUILDING POWERFUL, RELIABLE SPREADSHEETS!

 

Use this guide to automate virtually any routine task: save yourself hours, days, maybe even weeks! Make Excel do things you thought were impossible, discover macro...

Result Page: 65 64 63 62 61 60 59 58 57 56 55 54 53 52 51 50 49 48 47 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy