 |
|
 Visualize This: The FlowingData Guide to Design, Visualization, and Statistics
Think of all the popular data visualization works out there—the ones that you always hear in lectures or read about in blogs, and the ones that popped into your head as you were reading this sentence. What do they all have in common? They all tell an interesting story. Maybe the story was to convince you of something. Maybe it was to... |  |  Think Stats
If you know how to program, you have the skills to turn data into knowledge using the tools of probability and statistics. This concise introduction shows you how to perform statistical analysis computationally, rather than mathematically, with programs written in Python.
You'll work with a case study throughout the... |  |  Entity Framework 4 in Action
Yatta, we did it! We wrote a book about Entity Framework! It’s not our first book, but
it’s the first one written in English and distributed worldwide. It was a great challenge,
but having the opportunity to spread the word about Entity Framework made it worth
the effort. Entity Framework is a great tool that speeds up the... |
|
 Mastering IBM i: The Complete Resource for Today's IBM i System
The IBM i operating system running on IBM Power Systems is a platform in transition.
Many think the system is obsolete, largely due to its infamous green screen. Nothing,
though, could be further from the truth. When IBM embraced open-source software such
as Linux, MySQL, and Zend PHP, the system cemented a formidable position in... |  |  Ethics in Information Technology
We are excited to publish the third edition of Ethics in Information Technology. This new
edition builds on the success of the previous editions and meets the need for a resource that
helps readers understand many of the legal, ethical, and societal issues associated with IT.
We have responded to the feedback from our first and second... |  |  Document Security: Protecting Physical and Electronic Content
Several electronic layers exist in most documents, a fact overlooked
by many writers. Probing these sublayers often reveals information
not intended for release by the author. Documents in electronic formats
create a “palimpsest” that even semiskilled investigators can probe for
sensitive data.
Palimpsest seems... |
|
|
 |  |  Home Networking Do-It-Yourself For Dummies
Fifty years ago, most households had only one television and one telephone. As the price of these technological marvels dropped, families began purchasing additional televisions and telephones — and the home network was born!
Think about it: Your televisions are basically networked together on a cable network. Okay, not a... |  |  Cryptography Engineering: Design Principles and Practical Applications
The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts.
Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the... |
|
| Result Page: 144 143 142 141 140 139 138 137 136 135 134 133 |