Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Data Analysis Using SAS Enterprise Guide
Data Analysis Using SAS Enterprise Guide

The present book, Data Analysis Using SAS Enterprise Guide, provides readers with an overview of Enterprise Guide, the newest point-and-click interface from SAS. SAS Enterprise Guide is a graphical user (point-and-click) interface to the main SAS application, having relatively recently replaced the Analyst interface, which itself had replaced...

Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques

Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen...

IEEE Recommended Practice for the Design of Reliable Industrial and Commercial Power Systems
IEEE Recommended Practice for the Design of Reliable Industrial and Commercial Power Systems
The design of reliable industrial and commercial power systems is of considerable interest to many people. Prior to 1962, a qualitative viewpoint was taken when attempting to achieve this objective. The need for a quantitative approach was first recognized in the early 1960s when a small group of pioneers led by W. H. Dickinson...
Solid/Liquid Separation: Scale-up of Industrial Equipment
Solid/Liquid Separation: Scale-up of Industrial Equipment

This book identifies test procedures used within sectors of the solid/liquid separation equipment industry, providing practical explanations for test data and their uses when faced with a new application to assess. With a strong practical emphasis, this book is ideal for use as a reference text for engineers concerned with applications...

Mission Critical Windows 2000 Server Administration
Mission Critical Windows 2000 Server Administration
To put it in terms understandable to the many former English majors who now manage Windows networks: if Everyman were a system administrator, he'd run Windows 2000 Server. It supports pretty much any business requirement, yet it's user-friendly enough that anyone can learn to be an administrator with a bit of study. Mission Critical! Windows...
JUnit in Action
JUnit in Action
A guide to unit testing Java applications (including J2EE applications) using the JUnit framework and its extensions, this book provides techniques for solving real-world problems such as unit testing legacy applications, writing real tests for real objects, automating tests, testing in isolation, and unit testing J2EE and database...
Nonparametric Tests for Censored Data
Nonparametric Tests for Censored Data

This book concerns testing hypotheses in non-parametric models. Generalizations of many non-parametric tests to the case of censored and truncated data are considered. Most of the test results are proved and real applications are illustrated using examples. Theories and exercises are provided. The incorrect use of many tests applying most...

Management of Acute Coronary Syndromes (Contemporary Cardiology)
Management of Acute Coronary Syndromes (Contemporary Cardiology)

In this second edition of his highly acclaimed book, Christopher P. Cannon, MD, and a team of preeminent clinical investigators have thoroughly revised and expanded every chapter to reflect the recent explosion of clinical trials on the management of acute coronary syndromes (ACS). This includes: the newer tests, such as C reactive protein; a...

Hands-On Oracle Application Express Security: Building Secure Apex Applications
Hands-On Oracle Application Express Security: Building Secure Apex Applications
AT RECX we’ve been involved in the world of IT Security for more than a decade. We were involved in some of the fi rst penetration tests performed in the UK, where large organizations and government departments allowed ethical hackers into their networks to determine the risk they faced from what are now known as cyber attacks....
Schaum's Outline of Trigonometry, 4ed (Schaum's Outline Series)
Schaum's Outline of Trigonometry, 4ed (Schaum's Outline Series)
Get a firm grasp of trigonometry with this simple-to-use guide! It can help you pump up your problem-solving skills, ace your exams, and reduce the time you need to spend studying. Students love Schaum's Outlines! Each and every year, students purchase hundreds of thousands of the best study guides available anywhere. Students know that Schaum's...
5 Steps to a 5 AP Statistics, 2010-2011 Edition (5 Steps to a 5 on the Advanced Placement Examinations Series)
5 Steps to a 5 AP Statistics, 2010-2011 Edition (5 Steps to a 5 on the Advanced Placement Examinations Series)

A Perfect Plan for the Perfect Score

We want you to succeed on your AP* exam. That's why we've created this 5-step plan to help you study more effectively, use your preparation time wisely, and get your best score. This easy-to-follow guide offers you a complete review of your AP course, strategies to give you the edge on test...

Metasploit Penetration Testing Cookbook
Metasploit Penetration Testing Cookbook

Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes...

Result Page: 75 74 73 72 71 70 69 68 67 66 65 64 63 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy