Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Interpreting and Visualizing Regression Models Using Stata
Interpreting and Visualizing Regression Models Using Stata

Interpreting and Visualizing Regression Models Using Stata, Second Edition provides clear and simple examples illustrating how to interpret and visualize a wide variety of regression models. Including over 200 figures, the book illustrates linear models with continuous predictors (modeled linearly, using polynomials,...

Pattern Calculus: Computing with Functions and Structures
Pattern Calculus: Computing with Functions and Structures

The pattern calculus is a new foundation for computation, in which the expressive power of functions and of data structures are combined within pattern-matching functions. The best existing foundations focus on either functions, as in the lambda-calculus, or on data structures, as in Turing machines, or on compromises involving both, as in...

Parallel Programming with Intel Parallel Studio XE (Wrox Programmer to Programmer)
Parallel Programming with Intel Parallel Studio XE (Wrox Programmer to Programmer)

Nearly all the computers sold today have a multi-core processor, but only a small number of applications are written to take advantage of the extra cores. Most programmers are playing catch-up. A recent consultation with a group of senior programming engineers revealed the top three hurdles in adopting parallelism: the challenges of porting...

Dynamic and Mobile GIS: Investigating Changes in Space and Time (Innovations in Gis)
Dynamic and Mobile GIS: Investigating Changes in Space and Time (Innovations in Gis)
Like Stan Openshaw (1998) in the foreword to the ‘Innovations in GIS 5’, I have never been asked to write a foreword before, and also like him I am concerned that after you read this one (and who reads forewords anyway?) I may never be invited again. But, as readers of this foreword will be probably be sparse and perhaps limited to the...
Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network
Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network

This book looks at network security in a new and refreshing way. It guides readers step-by-step through the "stack" -- the seven layers of a network. Each chapter focuses on one layer of the stack along with the attacks, vulnerabilities, and exploits that can be found at that layer. The book even includes a chapter on the mythical...

Professional Web APIs with PHP: eBay, Google, Paypal, Amazon, FedEx plus Web Feeds
Professional Web APIs with PHP: eBay, Google, Paypal, Amazon, FedEx plus Web Feeds
As the only book that details how to integrate different APIs and web feeds in PHP so websites can leverage content from eBay, Google, PayPal, Amazon, and FedEx, this hands-on guide takes you step by step through each stage of the API process. Experienced PHP programmer Paul Michael Reinheimer walks you through the production and consumption angles...
Behavioral Biometrics: A Remote Access Approach
Behavioral Biometrics: A Remote Access Approach

With the advent of the internet as a medium for performing business transactions, the need for a secure communication channel has never been more paramount. The study of behavioral biometrics - the verification and/or identification of individuals based on the way they provide information to an authentication system - originated from the need...

Get Good with Money: Ten Simple Steps to Becoming Financially Whole
Get Good with Money: Ten Simple Steps to Becoming Financially Whole
NEW YORK TIMES, WALL STREET JOURNAL, AND USA TODAY BESTSELLER • A ten-step plan for finding peace, safety, and harmony with your money—no matter how big or small your goals and no matter how rocky the market might be—by the inspiring and savvy “Budgetnista.”

...
IP Network Design Guide
IP Network Design Guide

This redbook identifies some of the basic design aspects of IP networks and explains how to deal with them when implementing new IP networks or redesigning existing IP networks. This project focuses on internetwork and transport layer issues such as address and name management, routing, network management, security, load...

Secure Programming with Static Analysis (Addison-Wesley Software Security Series)
Secure Programming with Static Analysis (Addison-Wesley Software Security Series)
The First Expert Guide to Static Analysis for Software Security!

 

Creating secure code requires more than just good intentions. Programmers need to know that their code will be safe in an almost infinite number of scenarios and configurations. Static source code analysis...

Algorithms Sequential & Parallel: A Unified Approach (Electrical and Computer Engineering Series)
Algorithms Sequential & Parallel: A Unified Approach (Electrical and Computer Engineering Series)
A major thrust of computer science is the design, analysis, implementation, and scientific evaluation of algorithms to solve critical problems. In addition, new challenges are being offered to computer scientists in the field of computational science and engineering, which includes challenging problems in computational biology, computational fluid...
Using SQLite
Using SQLite

Application developers, take note: databases aren't just for the IS group any more. You can build database-backed applications for the desktop, Web, embedded systems, or operating systems without linking to heavy-duty client-server databases such as Oracle and MySQL. This book shows you how to use SQLite, a small and lightweight...

unlimited object storage image
Result Page: 203 202 201 200 199 198 197 196 195 194 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy