 |
|
 Time Series Data Analysis Using EViews (Statistics in Practice)
Do you want to recognize the most suitable models for analysis of statistical data sets?
This book provides a hands-on practical guide to using the most suitable models for analysis of statistical data sets using EViews - an interactive Windows-based computer software program for sophisticated data analysis, regression, and... |  |  Childhood Cancer: A Parent's Guide to Solid Tumor Cancers, 2nd Edition
This second edition of the most complete parent guide available, features detailed and precise medical information about solid tumor childhood cancers, including neuroblastoma, Wilms tumor, liver tumors, soft tissue sarcomas, and bone sarcomas. In addition, it offers day-to-day practical advice on how to cope with procedures,... |  |  |
|
 |  |  Collaborate or Perish!: Reaching Across Boundaries in a Networked World
In Collaborate or Perish! former Los Angeles police chief and New York police commissioner William Bratton and Harvard Kennedy School’s Zachary Tumin lay out a field-tested playbook for collaborating across the boundaries of our networked world. Today, when everyone is connected, collaboration is the game changer. Agencies and... |  |  Healthcare Hazard Control and Safety Management, Second Edition
Surpassing the standard set by the first edition, Healthcare Hazard Control and Safety Management, Second Edition presents expansive coverage for healthcare professionals serving in safety, occupational health, hazard materials management, quality improvement, and risk management positions. Comprehensive in scope, the book covers all major... |
|
 The Epidemiology of Schizophrenia
The aim of this book is to weave together the diverse threads of epidemiological
research in schizophrenia into a single volume that captures the new and exciting
themes that have been emerging over recent years. Diverse topics are juxtaposed to
expose synergy and to reveal new avenues of work, while the power of the epidemiological... |  |  Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions
The intersection of politics, law, privacy, and security in the context of computer technology is both sensitive and complex. Computer viruses, worms, Trojan horses, spy-ware, computer exploits, poorly designed software, inadequate technology laws, politics and terrorism all of these have a profound effect on our daily computing operations... |  |  Handbook of Graphs and Networks
Complex interacting networks are observed in systems from such diverse areas as physics, biology, economics, ecology, and computer science. For example, economic or social interactions often organize themselves in complex network structures. Similar phenomena are observed in traffic flow and in communication networks as the internet. In... |
|
|
Result Page: 196 195 194 193 192 191 190 189 188 187 186 185 184 183 182 181 180 179 178 |