Forecasting: Principles and Practice


Rob J. Hyndman - 2013
    Deciding whether to build another power generation plant in the next five years requires forecasts of future demand. Scheduling staff in a call centre next week requires forecasts of call volumes. Stocking an inventory requires forecasts of stock requirements. Telecommunication routing requires traffic forecasts a few minutes ahead. Whatever the circumstances or time horizons involved, forecasting is an important aid in effective and efficient planning. This textbook provides a comprehensive introduction to forecasting methods and presents enough information about each method for readers to use them sensibly. Examples use R with many data sets taken from the authors' own consulting experience.

Finding Amelia: The True Story of the Earhart Disappearance [With DVD]


Ric Gillespie - 2006
    Dozens of books have offered a variety of solutions to the puzzle, but they all draw on the same handful of documents and conflicting eyewitness accounts. Now, a wealth of new information uncovered by the International Group for Historic Aircraft Recovery (TIGHAR) allows this book to offer the first fully documented history of what happened. Scrupulously accurate and thrilling to read, it tells the story from the letters, logs, and telegrams that recorded events as they unfolded. Many long-accepted facts are revealed as myths. Author Ric Gillespie, TIGHAR's executive director, draws on the work of his organization's historians, archaeologists, and scientists, who compiled and analyzed more than five thousand documents relating to the Earhart case. Their research led to the hypothesis that Earhart and Noonan died as castaways on a remote Pacific atoll. But this book is not a polemic that argues for a particular theory. Rather, it presents all of the authenticated historical dots and leaves it to the reader to make the connections. In addition to details about the Earhart's career and final flight, the book examines her relationship with the U.S. government and the massive search undertaken by the U.S. Coast Guard and Navy. For serious students of Earhart's disappearance, an accompanying DVD reproduces the documents, reports, and technical studies cited in the text, allowing instant review and verification of the sources.

Mathematical Statistics and Data Analysis


John A. Rice - 1988
    The book's approach interweaves traditional topics with data analysis and reflects the use of the computer with close ties to the practice of statistics. The author stresses analysis of data, examines real problems with real data, and motivates the theory. The book's descriptive statistics, graphical displays, and realistic applications stand in strong contrast to traditional texts which are set in abstract settings.

Security Metrics: Replacing Fear, Uncertainty, and Doubt


Andrew Jaquith - 2007
    Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based on your organization's unique requirements. You'll discover how to quantify hard-to-measure security activities, compile and analyze all relevant data, identify strengths and weaknesses, set cost-effective priorities for improvement, and craft compelling messages for senior management. Security Metrics successfully bridges management's quantitative viewpoint with the nuts-and-bolts approach typically taken by security professionals. It brings together expert solutions drawn from Jaquith's extensive consulting work in the software, aerospace, and financial services industries, including new metrics presented nowhere else. You'll learn how to: - Replace nonstop crisis response with a systematic approach to security improvement - Understand the differences between "good" and "bad" metrics - Measure coverage and control, vulnerability management, password quality, patch latency, benchmark scoring, and business-adjusted risk - Quantify the effectiveness of security acquisition, implementation, and other program activities - Organize, aggregate, and analyze your data to bring out key insights - Use visualization to understand and communicate security issues more clearly - Capture valuable data from firewalls and antivirus logs, third-party auditor reports, and other resources - Implement balanced scorecards that present compact, holistic views of organizational security effectiveness Whether you're an engineer or consultant responsible for security and reporting to management-or an executive who needs better information for decision-making-Security Metrics is the resource you have been searching for. Andrew Jaquith, program manager for Yankee Group's Security Solutions and Services Decision Service, advises enterprise clients on prioritizing and managing security resources. He also helps security vendors develop product, service, and go-to-market strategies for reaching enterprise customers. He co-founded @stake, Inc., a security consulting pioneer acquired by Symantec Corporation in 2004. His application security and metrics research has been featured in CIO, CSO, InformationWeek, IEEE Security and Privacy, and The Economist. Foreword Preface Acknowledgments About the Author Chapter 1 Introduction: Escaping the Hamster Wheel of Pain Chapter 2 Defining Security Metrics Chapter 3 Diagnosing Problems and Measuring Technical Security Chapter 4 Measuring Program Effectiveness Chapter 5 Analysis Techniques Chapter 6 Visualization Chapter 7 Automating Metrics Calculations Chapter 8 Designing Security Scorecards Index

Python: Programming: Your Step By Step Guide To Easily Learn Python in 7 Days (Python for Beginners, Python Programming for Beginners, Learn Python, Python Language)


iCode Academy - 2017
    Are You Ready To Learn Python Easily? Learning Python Programming in 7 days is possible, although it might not look like it

Algorithm Design


Jon Kleinberg - 2005
    The book teaches a range of design and analysis techniques for problems that arise in computing applications. The text encourages an understanding of the algorithm design process and an appreciation of the role of algorithms in the broader field of computer science.

Getting Clojure


Russ Olsen - 2018
    The vision behind Clojure is of a radically simple language framework holding together a sophisticated collection of programming features. Learning Clojure involves much more than just learning the mechanics of the language. To really get Clojure you need to understand the ideas underlying this structure of framework and features. You need this book: an accessible introduction to Clojure that focuses on the ideas behind the language as well as the practical details of writing code.

Multivariable Calculus


James Stewart - 1991
    In the Fourth Edition CALCULUS, EARLY TRANSCENDENTALS these functions are introduced in the first chapter and their limits and derivatives are found in Chapters 2 and 3 at the same time as polynomials and other elementary functions. In this Fourth Edition, Stewart retains the focus on problem solving, the meticulous accuracy, the patient explanations, and the carefully graded problems that have made these texts word so well for a wide range of students. All new and unique features in CALCULUS, FOURTH EDITION have been incorporated into these revisions also.

The R Book


Michael J. Crawley - 2007
    The R language is recognised as one of the most powerful and flexible statistical software packages, and it enables the user to apply many statistical techniques that would be impossible without such software to help implement such large data sets.

Modern Database Management


Jeffrey A. Hoffer - 1994
    Intended for professional development programs in introductory database management.

Introductory Functional Analysis with Applications


Erwin Kreyszig - 1978
    With these new unabridged and inexpensive editions, Wiley hopes to extend the life of these important works by making them available to future generations of mathematicians and scientists.Currently available in the Series: Emil ArtinGeometnc Algebra R. W. CarterSimple Groups Of Lie Type Richard CourantDifferential and Integrai Calculus. Volume I Richard CourantDifferential and Integral Calculus. Volume II Richard Courant & D. HilbertMethods of Mathematical Physics, Volume I Richard Courant & D. HilbertMethods of Mathematical Physics. Volume II Harold M. S. CoxeterIntroduction to Modern Geometry. Second Edition Charles W. Curtis, Irving ReinerRepresentation Theory of Finite Groups and Associative Algebras Nelson Dunford, Jacob T. Schwartzunear Operators. Part One. General Theory Nelson Dunford. Jacob T. SchwartzLinear Operators, Part Two. Spectral Theory--Self Adjant Operators in Hilbert Space Nelson Dunford, Jacob T. SchwartzLinear Operators. Part Three. Spectral Operators Peter HenriciApplied and Computational Complex Analysis. Volume I--Power Senes-lntegrauon-Contormal Mapping-Locatvon of Zeros Peter Hilton, Yet-Chiang WuA Course in Modern Algebra Harry HochstadtIntegral Equations Erwin KreyszigIntroductory Functional Analysis with Applications P. M. PrenterSplines and Variational Methods C. L. SiegelTopics in Complex Function Theory. Volume I --Elliptic Functions and Uniformizatton Theory C. L. SiegelTopics in Complex Function Theory. Volume II --Automorphic and Abelian Integrals C. L. SiegelTopics In Complex Function Theory. Volume III --Abelian Functions & Modular Functions of Several Variables J. J. StokerDifferential Geometry

Quantum Mechanics


Claude Cohen-Tannoudji - 1977
    Nobel-Prize-winner Claude Cohen-Tannoudji and his colleagues have written this book to eliminate precisely these difficulties. Fourteen chapters provide a clarity of organization, careful attention to pedagogical details, and a wealth of topics and examples which make this work a textbook as well as a timeless reference, allowing to tailor courses to meet students' specific needs. Each chapter starts with a clear exposition of the problem which is then treated, and logically develops the physical and mathematical concept. These chapters emphasize the underlying principles of the material, undiluted by extensive references to applications and practical examples which are put into complementary sections. The book begins with a qualitative introduction to quantum mechanical ideas using simple optical analogies and continues with a systematic and thorough presentation of the mathematical tools and postulates of quantum mechanics as well as a discussion of their physical content. Applications follow, starting with the simplest ones like e.g. the harmonic oscillator, and becoming gradually more complicated (the hydrogen atom, approximation methods, etc.). The complementary sections each expand this basic knowledge, supplying a wide range of applications and related topics as well as detailed expositions of a large number of special problems and more advanced topics, integrated as an essential portion of the text.

Computer Vision: Algorithms and Applications


Richard Szeliski - 2010
    However, despite all of the recent advances in computer vision research, the dream of having a computer interpret an image at the same level as a two-year old remains elusive. Why is computer vision such a challenging problem and what is the current state of the art?Computer Vision: Algorithms and Applications explores the variety of techniques commonly used to analyze and interpret images. It also describes challenging real-world applications where vision is being successfully used, both for specialized applications such as medical imaging, and for fun, consumer-level tasks such as image editing and stitching, which students can apply to their own personal photos and videos.More than just a source of "recipes," this exceptionally authoritative and comprehensive textbook/reference also takes a scientific approach to basic vision problems, formulating physical models of the imaging process before inverting them to produce descriptions of a scene. These problems are also analyzed using statistical models and solved using rigorous engineering techniquesTopics and features: Structured to support active curricula and project-oriented courses, with tips in the Introduction for using the book in a variety of customized courses Presents exercises at the end of each chapter with a heavy emphasis on testing algorithms and containing numerous suggestions for small mid-term projects Provides additional material and more detailed mathematical topics in the Appendices, which cover linear algebra, numerical techniques, and Bayesian estimation theory Suggests additional reading at the end of each chapter, including the latest research in each sub-field, in addition to a full Bibliography at the end of the book Supplies supplementary course material for students at the associated website, http: //szeliski.org/Book/ Suitable for an upper-level undergraduate or graduate-level course in computer science or engineering, this textbook focuses on basic techniques that work under real-world conditions and encourages students to push their creative boundaries. Its design and exposition also make it eminently suitable as a unique reference to the fundamental techniques and current research literature in computer vision.

Data Structures and Algorithms Made Easy in Java: 700 Data Structure and Algorithmic Puzzles


Narasimha Karumanchi - 2011
    Success key books for: Programming puzzles for interviews Campus Preparation Degree/Masters Course Preparation Instructor's GATE Preparation Big job hunters: Microsoft, Google, Amazon, Yahoo, Flip Kart, Adobe, IBM Labs, Citrix, Mentor Graphics, NetApp, Oracle, Webaroo, De-Shaw, Success Factors, Face book, McAfee and many more Reference Manual for working people

Introduction to Modern Cryptography: Principles and Protocols


Jonathan Katz - 2007
    Introduction to Modern Cryptography provides a rigorous yet accessible treatment of modern cryptography, with a focus on formal definitions, precise assumptions, and rigorous proofs.The authors introduce the core principles of modern cryptography, including the modern, computational approach to security that overcomes the limitations of perfect secrecy. An extensive treatment of private-key encryption and message authentication follows. The authors also illustrate design principles for block ciphers, such as the Data Encryption Standard (DES) and the Advanced Encryption Standard (AES), and present provably secure constructions of block ciphers from lower-level primitives. The second half of the book focuses on public-key cryptography, beginning with a self-contained introduction to the number theory needed to understand the RSA, Diffie-Hellman, El Gamal, and other cryptosystems. After exploring public-key encryption and digital signatures, the book concludes with a discussion of the random oracle model and its applications.Serving as a textbook, a reference, or for self-study, Introduction to Modern Cryptography presents the necessary tools to fully understand this fascinating subject.