Home | Amazing | Today | Tags | Publishers | Years | Search 
Visualize This: The FlowingData Guide to Design, Visualization, and Statistics
Visualize This: The FlowingData Guide to Design, Visualization, and Statistics

Think of all the popular data visualization works out there—the ones that you always hear in lectures or read about in blogs, and the ones that popped into your head as you were reading this sentence. What do they all have in common? They all tell an interesting story. Maybe the story was to convince you of something. Maybe it was to...

Think Stats
Think Stats

If you know how to program, you have the skills to turn data into knowledge using the tools of probability and statistics. This concise introduction shows you how to perform statistical analysis computationally, rather than mathematically, with programs written in Python.

You'll work with a case study throughout the...

Entity Framework 4 in Action
Entity Framework 4 in Action

Yatta, we did it! We wrote a book about Entity Framework! It’s not our first book, but it’s the first one written in English and distributed worldwide. It was a great challenge, but having the opportunity to spread the word about Entity Framework made it worth the effort. Entity Framework is a great tool that speeds up the...

Mastering IBM i: The Complete Resource for Today's IBM i System
Mastering IBM i: The Complete Resource for Today's IBM i System

The IBM i operating system running on IBM Power Systems is a platform in transition. Many think the system is obsolete, largely due to its infamous green screen. Nothing, though, could be further from the truth. When IBM embraced open-source software such as Linux, MySQL, and Zend PHP, the system cemented a formidable position in...

Ethics in Information Technology
Ethics in Information Technology

We are excited to publish the third edition of Ethics in Information Technology. This new edition builds on the success of the previous editions and meets the need for a resource that helps readers understand many of the legal, ethical, and societal issues associated with IT. We have responded to the feedback from our first and second...

Document Security: Protecting Physical and Electronic Content
Document Security: Protecting Physical and Electronic Content

Several electronic layers exist in most documents, a fact overlooked by many writers. Probing these sublayers often reveals information not intended for release by the author. Documents in electronic formats create a “palimpsest” that even semiskilled investigators can probe for sensitive data.

Palimpsest seems...

Successful Project Management (with Microsoft Project CD-ROM)
Successful Project Management (with Microsoft Project CD-ROM)

Project management is more than merely parceling out work assignments to individuals and hoping that they will somehow accomplish a desired result. In fact, projects that could have been successful often fail because of such take-itfor- granted approaches. Individuals need hard information and real skills to work successfully in a...

Logic Programming, Knowledge Representation, and Nonmonotonic Reasoning: Essays Dedicated to Michael Gelfond
Logic Programming, Knowledge Representation, and Nonmonotonic Reasoning: Essays Dedicated to Michael Gelfond

Michael Gelfond has been an extraordinary mentor, teacher, and colleague for many people in the knowledge representation and reasoning (KR&R), logic programming (LP), and answer set programming (ASP) communities.

Michael’s current and former students often like to tell stories about their experience with Michael as...

Architecture-Based Design of Multi-Agent Systems
Architecture-Based Design of Multi-Agent Systems

One of the most important things an architect can do is reflection. That is, examine systems, organizations, people and ask “What alternatives were considered and why was that particular decision made?” Thinking about the response gives an architect insight into the motivations and decision processes that others have used...

Electronic Value Exchange: Origins of the VISA Electronic Payment System (History of Computing)
Electronic Value Exchange: Origins of the VISA Electronic Payment System (History of Computing)

Most anywhere in the developed world, I can use a small rectangular piece of plastic, issued to me by a bank I have never visited, to obtain local currency or purchase goods and services directly from a merchant. The cashier and I may not even speak a common language, and the face of my card may look quite different from those carried...

Home Networking Do-It-Yourself For Dummies
Home Networking Do-It-Yourself For Dummies

Fifty years ago, most households had only one television and one telephone. As the price of these technological marvels dropped, families began purchasing additional televisions and telephones — and the home network was born!

Think about it: Your televisions are basically networked together on a cable network. Okay, not a...

Cryptography Engineering: Design Principles and Practical Applications
Cryptography Engineering: Design Principles and Practical Applications

The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts.

Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the...

Result Page: 144 143 142 141 140 139 138 137 136 135 134 133 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy