Author: Andy Field
Publisher: SAGE
ISBN: 152644030X
Category : Social Science
Languages : en
Pages : 2026
Book Description
With an exciting new look, math diagnostic tool, and a research roadmap to navigate projects, this new edition of Andy Field’s award-winning text offers a unique combination of humor and step-by-step instruction to make learning statistics compelling and accessible to even the most anxious of students. The Fifth Edition takes students from initial theory to regression, factor analysis, and multilevel modeling, fully incorporating IBM SPSS Statistics© version 25 and fascinating examples throughout. SAGE edge offers a robust online environment featuring an impressive array of free tools and resources for review, study, and further exploration, keeping both instructors and students on the cutting edge of teaching and learning. Course cartridges available for Blackboard, Canvas, and Moodle. Andy Field is the award winning author of An Adventure in Statistics: The Reality Enigma and is the recipient of the UK National Teaching Fellowship (2010), British Psychological Society book award (2006), and has been recognized with local and national teaching awards (University of Sussex, 2015, 2016).
Discovering Statistics Using IBM SPSS Statistics
Computers at Risk
Author: National Research Council
Publisher: National Academies Press
ISBN: 0309043883
Category : Computers
Languages : en
Pages : 320
Book Description
Computers at Risk presents a comprehensive agenda for developing nationwide policies and practices for computer security. Specific recommendations are provided for industry and for government agencies engaged in computer security activities. The volume also outlines problems and opportunities in computer security research, recommends ways to improve the research infrastructure, and suggests topics for investigators. The book explores the diversity of the field, the need to engineer countermeasures based on speculation of what experts think computer attackers may do next, why the technology community has failed to respond to the need for enhanced security systems, how innovators could be encouraged to bring more options to the marketplace, and balancing the importance of security against the right of privacy.
Publisher: National Academies Press
ISBN: 0309043883
Category : Computers
Languages : en
Pages : 320
Book Description
Computers at Risk presents a comprehensive agenda for developing nationwide policies and practices for computer security. Specific recommendations are provided for industry and for government agencies engaged in computer security activities. The volume also outlines problems and opportunities in computer security research, recommends ways to improve the research infrastructure, and suggests topics for investigators. The book explores the diversity of the field, the need to engineer countermeasures based on speculation of what experts think computer attackers may do next, why the technology community has failed to respond to the need for enhanced security systems, how innovators could be encouraged to bring more options to the marketplace, and balancing the importance of security against the right of privacy.
The Fourth Paradigm
Author: Anthony J. G. Hey
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 292
Book Description
Foreword. A transformed scientific method. Earth and environment. Health and wellbeing. Scientific infrastructure. Scholarly communication.
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 292
Book Description
Foreword. A transformed scientific method. Earth and environment. Health and wellbeing. Scientific infrastructure. Scholarly communication.
PC Magazine
Author:
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 1266
Book Description
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 1266
Book Description
Code
Author: Charles Petzold
Publisher: Microsoft Press
ISBN: 0137909292
Category : Computers
Languages : en
Pages : 563
Book Description
The classic guide to how computers work, updated with new chapters and interactive graphics "For me, Code was a revelation. It was the first book about programming that spoke to me. It started with a story, and it built up, layer by layer, analogy by analogy, until I understood not just the Code, but the System. Code is a book that is as much about Systems Thinking and abstractions as it is about code and programming. Code teaches us how many unseen layers there are between the computer systems that we as users look at every day and the magical silicon rocks that we infused with lightning and taught to think." - Scott Hanselman, Partner Program Director, Microsoft, and host of Hanselminutes Computers are everywhere, most obviously in our laptops and smartphones, but also our cars, televisions, microwave ovens, alarm clocks, robot vacuum cleaners, and other smart appliances. Have you ever wondered what goes on inside these devices to make our lives easier but occasionally more infuriating? For more than 20 years, readers have delighted in Charles Petzold's illuminating story of the secret inner life of computers, and now he has revised it for this new age of computing. Cleverly illustrated and easy to understand, this is the book that cracks the mystery. You'll discover what flashlights, black cats, seesaws, and the ride of Paul Revere can teach you about computing, and how human ingenuity and our compulsion to communicate have shaped every electronic device we use. This new expanded edition explores more deeply the bit-by-bit and gate-by-gate construction of the heart of every smart device, the central processing unit that combines the simplest of basic operations to perform the most complex of feats. Petzold's companion website, CodeHiddenLanguage.com, uses animated graphics of key circuits in the book to make computers even easier to comprehend. In addition to substantially revised and updated content, new chapters include: Chapter 18: Let's Build a Clock! Chapter 21: The Arithmetic Logic Unit Chapter 22: Registers and Busses Chapter 23: CPU Control Signals Chapter 24: Jumps, Loops, and Calls Chapter 28: The World Brain From the simple ticking of clocks to the worldwide hum of the internet, Code reveals the essence of the digital revolution.
Publisher: Microsoft Press
ISBN: 0137909292
Category : Computers
Languages : en
Pages : 563
Book Description
The classic guide to how computers work, updated with new chapters and interactive graphics "For me, Code was a revelation. It was the first book about programming that spoke to me. It started with a story, and it built up, layer by layer, analogy by analogy, until I understood not just the Code, but the System. Code is a book that is as much about Systems Thinking and abstractions as it is about code and programming. Code teaches us how many unseen layers there are between the computer systems that we as users look at every day and the magical silicon rocks that we infused with lightning and taught to think." - Scott Hanselman, Partner Program Director, Microsoft, and host of Hanselminutes Computers are everywhere, most obviously in our laptops and smartphones, but also our cars, televisions, microwave ovens, alarm clocks, robot vacuum cleaners, and other smart appliances. Have you ever wondered what goes on inside these devices to make our lives easier but occasionally more infuriating? For more than 20 years, readers have delighted in Charles Petzold's illuminating story of the secret inner life of computers, and now he has revised it for this new age of computing. Cleverly illustrated and easy to understand, this is the book that cracks the mystery. You'll discover what flashlights, black cats, seesaws, and the ride of Paul Revere can teach you about computing, and how human ingenuity and our compulsion to communicate have shaped every electronic device we use. This new expanded edition explores more deeply the bit-by-bit and gate-by-gate construction of the heart of every smart device, the central processing unit that combines the simplest of basic operations to perform the most complex of feats. Petzold's companion website, CodeHiddenLanguage.com, uses animated graphics of key circuits in the book to make computers even easier to comprehend. In addition to substantially revised and updated content, new chapters include: Chapter 18: Let's Build a Clock! Chapter 21: The Arithmetic Logic Unit Chapter 22: Registers and Busses Chapter 23: CPU Control Signals Chapter 24: Jumps, Loops, and Calls Chapter 28: The World Brain From the simple ticking of clocks to the worldwide hum of the internet, Code reveals the essence of the digital revolution.
Microsoft Azure Essentials Azure Machine Learning
Author: Jeff Barnes
Publisher: Microsoft Press
ISBN: 073569818X
Category : Computers
Languages : en
Pages : 393
Book Description
Microsoft Azure Essentials from Microsoft Press is a series of free ebooks designed to help you advance your technical skills with Microsoft Azure. This third ebook in the series introduces Microsoft Azure Machine Learning, a service that a developer can use to build predictive analytics models (using training datasets from a variety of data sources) and then easily deploy those models for consumption as cloud web services. The ebook presents an overview of modern data science theory and principles, the associated workflow, and then covers some of the more common machine learning algorithms in use today. It builds a variety of predictive analytics models using real world data, evaluates several different machine learning algorithms and modeling strategies, and then deploys the finished models as machine learning web services on Azure within a matter of minutes. The ebook also expands on a working Azure Machine Learning predictive model example to explore the types of client and server applications you can create to consume Azure Machine Learning web services. Watch Microsoft Press’s blog and Twitter (@MicrosoftPress) to learn about other free ebooks in the Microsoft Azure Essentials series.
Publisher: Microsoft Press
ISBN: 073569818X
Category : Computers
Languages : en
Pages : 393
Book Description
Microsoft Azure Essentials from Microsoft Press is a series of free ebooks designed to help you advance your technical skills with Microsoft Azure. This third ebook in the series introduces Microsoft Azure Machine Learning, a service that a developer can use to build predictive analytics models (using training datasets from a variety of data sources) and then easily deploy those models for consumption as cloud web services. The ebook presents an overview of modern data science theory and principles, the associated workflow, and then covers some of the more common machine learning algorithms in use today. It builds a variety of predictive analytics models using real world data, evaluates several different machine learning algorithms and modeling strategies, and then deploys the finished models as machine learning web services on Azure within a matter of minutes. The ebook also expands on a working Azure Machine Learning predictive model example to explore the types of client and server applications you can create to consume Azure Machine Learning web services. Watch Microsoft Press’s blog and Twitter (@MicrosoftPress) to learn about other free ebooks in the Microsoft Azure Essentials series.
Inside the IBM PC
Author: Peter Norton
Publisher: Brady Publishing
ISBN:
Category : Computers
Languages : en
Pages : 298
Book Description
Publisher: Brady Publishing
ISBN:
Category : Computers
Languages : en
Pages : 298
Book Description
Developing Applications with IBM FileNet P8 APIs
Author: Wei-Dong Zhu
Publisher: IBM Redbooks
ISBN: 0738433721
Category : Computers
Languages : en
Pages : 352
Book Description
This IBM® Redbooks® publication can help you develop content and process management applications with IBM FileNet® APIs. The IBM FileNet P8 suite of products contains a set of robust APIs that range from core platform APIs to supporting application APIs. This book focuses specifically on Content Engine and Process Engine APIs. Content Engine API topics that we discuss include creating, retrieving, updating, and deleting objects; querying and viewing documents; and batching and batch execution. We also explore more complex topics, including permissions and authorization, versioning, relationships, annotations, workflow subscriptions and event actions, metadata discovery, and dynamic security inheritance. Process Engine API topics that we discuss include launching a workflow, searching for and processing work items, and working with process status. The more complex topics we cover include, Component Integrator application space, role, workbasket, resource navigation in Process Engine REST API, ECM Widgets, and building a custom Get Next In-basket widget. To help you better understand programming with IBM FileNet APIs, we provide a sample application implemented for a fictional company. We include the data model, security model, workflows, and various applications developed for the sample. You can download them for your reference. This book is intended for IBM FileNet P8 application developers. We recommend using this book in conjunction with the online ECM help.
Publisher: IBM Redbooks
ISBN: 0738433721
Category : Computers
Languages : en
Pages : 352
Book Description
This IBM® Redbooks® publication can help you develop content and process management applications with IBM FileNet® APIs. The IBM FileNet P8 suite of products contains a set of robust APIs that range from core platform APIs to supporting application APIs. This book focuses specifically on Content Engine and Process Engine APIs. Content Engine API topics that we discuss include creating, retrieving, updating, and deleting objects; querying and viewing documents; and batching and batch execution. We also explore more complex topics, including permissions and authorization, versioning, relationships, annotations, workflow subscriptions and event actions, metadata discovery, and dynamic security inheritance. Process Engine API topics that we discuss include launching a workflow, searching for and processing work items, and working with process status. The more complex topics we cover include, Component Integrator application space, role, workbasket, resource navigation in Process Engine REST API, ECM Widgets, and building a custom Get Next In-basket widget. To help you better understand programming with IBM FileNet APIs, we provide a sample application implemented for a fictional company. We include the data model, security model, workflows, and various applications developed for the sample. You can download them for your reference. This book is intended for IBM FileNet P8 application developers. We recommend using this book in conjunction with the online ECM help.
The Security Development Lifecycle
Author: Michael Howard
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 364
Book Description
Your customers demand and deserve better security and privacy in their software. This book is the first to detail a rigorous, proven methodology that measurably minimizes security bugs--the Security Development Lifecycle (SDL). In this long-awaited book, security experts Michael Howard and Steve Lipner from the Microsoft Security Engineering Team guide you through each stage of the SDL--from education and design to testing and post-release. You get their first-hand insights, best practices, a practical history of the SDL, and lessons to help you implement the SDL in any development organization. Discover how to: Use a streamlined risk-analysis process to find security design issues before code is committed Apply secure-coding best practices and a proven testing process Conduct a final security review before a product ships Arm customers with prescriptive guidance to configure and deploy your product more securely Establish a plan to respond to new security vulnerabilities Integrate security discipline into agile methods and processes, such as Extreme Programming and Scrum Includes a CD featuring: A six-part security class video conducted by the authors and other Microsoft security experts Sample SDL documents and fuzz testing tool PLUS--Get book updates on the Web. For customers who purchase an ebook version of this title, instructions for downloading the CD files can be found in the ebook.
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 364
Book Description
Your customers demand and deserve better security and privacy in their software. This book is the first to detail a rigorous, proven methodology that measurably minimizes security bugs--the Security Development Lifecycle (SDL). In this long-awaited book, security experts Michael Howard and Steve Lipner from the Microsoft Security Engineering Team guide you through each stage of the SDL--from education and design to testing and post-release. You get their first-hand insights, best practices, a practical history of the SDL, and lessons to help you implement the SDL in any development organization. Discover how to: Use a streamlined risk-analysis process to find security design issues before code is committed Apply secure-coding best practices and a proven testing process Conduct a final security review before a product ships Arm customers with prescriptive guidance to configure and deploy your product more securely Establish a plan to respond to new security vulnerabilities Integrate security discipline into agile methods and processes, such as Extreme Programming and Scrum Includes a CD featuring: A six-part security class video conducted by the authors and other Microsoft security experts Sample SDL documents and fuzz testing tool PLUS--Get book updates on the Web. For customers who purchase an ebook version of this title, instructions for downloading the CD files can be found in the ebook.
IBM Tivoli Application Dependency Discovery Manager
Author: Bart Jacob
Publisher:
ISBN:
Category : Application software
Languages : en
Pages : 0
Book Description
In this IBM® Redbooks® publication, we describe the capabilities and ways to use the IBM Tivoli® Application Dependency Discovery Manager (TADDM). It is becoming critical for enterprises to track the IT resources in their environment and, more importantly, the dependencies of their business applications on various components. TADDM provides rich capabilities that discover the components of a complex infrastructure and their interdependencies. In this book, we provide insight into the TADDM capabilities and architecture. We include recommended procedures for installing and configuring TADDM, tips and techniques for populating the TADDM database and customizing its use, performance considerations, and information about how TADDM integrates with operational management programs.
Publisher:
ISBN:
Category : Application software
Languages : en
Pages : 0
Book Description
In this IBM® Redbooks® publication, we describe the capabilities and ways to use the IBM Tivoli® Application Dependency Discovery Manager (TADDM). It is becoming critical for enterprises to track the IT resources in their environment and, more importantly, the dependencies of their business applications on various components. TADDM provides rich capabilities that discover the components of a complex infrastructure and their interdependencies. In this book, we provide insight into the TADDM capabilities and architecture. We include recommended procedures for installing and configuring TADDM, tips and techniques for populating the TADDM database and customizing its use, performance considerations, and information about how TADDM integrates with operational management programs.