Book picks similar to
System Modeling and Simulation: An Introduction by Frank L. Severance
mybooks
analysis
complex-science
computer-science
Getting Started in Hold 'em
Ed Miller - 2005
Sadly, most of these "professional" players will wind up broke. While many people play, few win consistently. In Getting Started in Hold 'em, noted poker authority Ed Miller guides you onto the winning path. As someone who made the leap from beginner to professional in less than a year and a half, Ed is uniquely qualified to show new players the quickest route to hold 'em success. This book presents the critical principles that expert players use: preflop hand valuation, domination, betting for value, protecting your hand, semi-bluffing, pot equity, pot odds, implied odds, free card plays, the importance of stack size, why chips change value in tournaments, and much more. Whether you want to play limit, no limit, or tournament hold 'em, this book provides you a solid foundation. It's perfect, not just for the would-be pro, but for anyone who wants a serious edge on the competition. Getting Started in Hold 'em teaches you more than just how to play; it teaches you to win.
The Elements of Data Analytic Style
Jeffrey Leek - 2015
This book is focused on the details of data analysis that sometimes fall through the cracks in traditional statistics classes and textbooks. It is based in part on the authors blog posts, lecture materials, and tutorials. The author is one of the co-developers of the Johns Hopkins Specialization in Data Science the largest data science program in the world that has enrolled more than 1.76 million people. The book is useful as a companion to introductory courses in data science or data analysis. It is also a useful reference tool for people tasked with reading and critiquing data analyses. It is based on the authors popular open-source guides available through his Github account (https://github.com/jtleek). The paper is also available through Leanpub (https://leanpub.com/datastyle), if the book is purchased on that platform you are entitled to lifetime free updates.
Wine Bar Theory
David Gilbertson - 2013
It's not about cutting corners, it's about wanting the very best and not settling for less. It's a theory that can pave your road to success.Author David Gilbertson built a failing company into a successful multi-billion dollar business without getting up at 4:00am or working until midnight. He knows how to work better, and get brilliant results. Now in just 28 simple rules, he spells out the secret of his success; everyday accessible strategies for creative professionals, managers, students, entrepreneurs, and anyone who wants to get ahead in life. As one rule follows another, he builds a compelling narrative on paving the way to success (and getting that all-important time to go to a wine bar with friends, or just time to think).Covering workplace issues and business strategy, Wine Bar Theory shows you things you can do more easily, and things you don't need to do at all. It's about being effective and not just busy. This affordable, pocket-sized book is a business book like no other. Its creative illustrations are by Bill Butcher, whose work is seen in the pages of The Wall Street Journal, Fortune and the Economist.
The Art of Deception: Controlling the Human Element of Security
Kevin D. Mitnick - 2001
Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a thief." Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent. Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented in an engaging and highly readable style reminiscent of a true-crime novel. And, perhaps most importantly, Mitnick offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security.
Predictive Analytics: The Power to Predict Who Will Click, Buy, Lie, or Die
Eric Siegel - 2013
Rather than a "how to" for hands-on techies, the book entices lay-readers and experts alike by covering new case studies and the latest state-of-the-art techniques.You have been predicted — by companies, governments, law enforcement, hospitals, and universities. Their computers say, "I knew you were going to do that!" These institutions are seizing upon the power to predict whether you're going to click, buy, lie, or die.Why? For good reason: predicting human behavior combats financial risk, fortifies healthcare, conquers spam, toughens crime fighting, and boosts sales.How? Prediction is powered by the world's most potent, booming unnatural resource: data. Accumulated in large part as the by-product of routine tasks, data is the unsalted, flavorless residue deposited en masse as organizations churn away. Surprise! This heap of refuse is a gold mine. Big data embodies an extraordinary wealth of experience from which to learn.Predictive analytics unleashes the power of data. With this technology, the computer literally learns from data how to predict the future behavior of individuals. Perfect prediction is not possible, but putting odds on the future — lifting a bit of the fog off our hazy view of tomorrow — means pay dirt.In this rich, entertaining primer, former Columbia University professor and Predictive Analytics World founder Eric Siegel reveals the power and perils of prediction: -What type of mortgage risk Chase Bank predicted before the recession. -Predicting which people will drop out of school, cancel a subscription, or get divorced before they are even aware of it themselves. -Why early retirement decreases life expectancy and vegetarians miss fewer flights. -Five reasons why organizations predict death, including one health insurance company. -How U.S. Bank, European wireless carrier Telenor, and Obama's 2012 campaign calculated the way to most strongly influence each individual. -How IBM's Watson computer used predictive modeling to answer questions and beat the human champs on TV's Jeopardy! -How companies ascertain untold, private truths — how Target figures out you're pregnant and Hewlett-Packard deduces you're about to quit your job. -How judges and parole boards rely on crime-predicting computers to decide who stays in prison and who goes free. -What's predicted by the BBC, Citibank, ConEd, Facebook, Ford, Google, IBM, the IRS, Match.com, MTV, Netflix, Pandora, PayPal, Pfizer, and Wikipedia. A truly omnipresent science, predictive analytics affects everyone, every day. Although largely unseen, it drives millions of decisions, determining whom to call, mail, investigate, incarcerate, set up on a date, or medicate.Predictive analytics transcends human perception. This book's final chapter answers the riddle: What often happens to you that cannot be witnessed, and that you can't even be sure has happened afterward — but that can be predicted in advance?Whether you are a consumer of it — or consumed by it — get a handle on the power of Predictive Analytics.
Object-Oriented Modeling and Design with UML
James Rumbaugh - 1990
Two of the leading authorities in the field, Mike Blaha, and Jim Rumbaugh, have thoroughly revised the book to provide a quintessential reference to UML 2.0 and its application for practical, usable state of the art Object-Oriented strategies in the design and implementation of complex object-oriented software systems.
சிவகாமியின் சபதம் [Sivagamiyin Sabadham] (Paranjothi's Journey & The Siege of Kanchi) Vol-1, 2
Kalki - 2012
The struggle for supremacy between the Chalukya Emperor, Pulikesi II, and the Pallava Emperor, Mahendra Varmar and at a later stage his son, Narasimha Varmar, forms the core of the novel. The story begins with Pulikesi’s unanticipated invasion of the Pallava Kingdom and the ruses Mahendra Varmar employs to safeguard his kingdom and the capital, Kanchi. Mahendra Varmar is handicapped by his ill equipped smaller army which is no match to the larger Chalukya army. Pulikesi’s invasion is not Mahendra Varmar’s sole cause for concern. The impractical yet ardent romance between his only son, Crown Prince Narasimha Varmar and the beautiful and talented danseuse, Sivakami, the daughter of the land’s foremost sculptor, Aayanar, and the fate of Mamallapuram which Mahendra Varmar is in the midst of converting in to a “dream world” filled with exquisite sculptures weigh heavily on him. The scheming Chalukya loyalist Naganandi Bikshu, the young and brave Pallava army commander Paranjyothi, the mysterious Vajrabahu, the passionate sculptor Aayanar and the Pallava spies Shatrugnan and Gundodharan aid in the story’s progression . This intense and unforgettable narrative by Kalki Krishnamurthy plays on the emotions of the readers and concludes with a least expected climax.
Think Like Zuck: The Five Business Secrets of Facebook's Improbably Brilliant CEO Mark Zuckerberg
Ekaterina Walter - 2012
Think Like Zuck answers the questions everyone is asking: What did Mark Zuckerberg do right?The book explores the critical elements that drive the success of Facebook and businesses like it, such as having passion to change the world, clear vision and higher purpose to execute, extraordinary team-building skills, and a flexible business strategy.
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System
Bill Blunden - 2009
Adopting an approach that favors full disclosure, The Rootkit Arsenal presents the most accessible, timely, and complete coverage of rootkit technology. This book covers more topics, in greater depth, than any other currently available. In doing so the author forges through the murky back alleys of the Internet, shedding light on material that has traditionally been poorly documented, partially documented, or intentionally undocumented.The spectrum of topics covered includes how to:* Hook kernel structures on multi-processor systems* Use a kernel debugger to reverse system internals* Inject call gates to create a back door into Ring-0* Use detour patches to sidestep group policy* Modify privilege levels on Vista by altering kernel objects* Utilize bootkit technology* Defeat live incident response and post-mortem forensics* Implement code armoring to protect your deliverables* Establish covert channels using the WSK and NDIS 6.0
ಅನ್ವೇಷಣ [Anveshana]
S.L. Bhyrappa - 1976
He does not directly appear in the novel, but is seen through the experience of other characters. This technique is successful in bringing out the complexity of the central character
Data Smart: Using Data Science to Transform Information into Insight
John W. Foreman - 2013
Major retailers are predicting everything from when their customers are pregnant to when they want a new pair of Chuck Taylors. It's a brave new world where seemingly meaningless data can be transformed into valuable insight to drive smart business decisions.But how does one exactly do data science? Do you have to hire one of these priests of the dark arts, the "data scientist," to extract this gold from your data? Nope.Data science is little more than using straight-forward steps to process raw data into actionable insight. And in Data Smart, author and data scientist John Foreman will show you how that's done within the familiar environment of a spreadsheet. Why a spreadsheet? It's comfortable! You get to look at the data every step of the way, building confidence as you learn the tricks of the trade. Plus, spreadsheets are a vendor-neutral place to learn data science without the hype. But don't let the Excel sheets fool you. This is a book for those serious about learning the analytic techniques, the math and the magic, behind big data.Each chapter will cover a different technique in a spreadsheet so you can follow along: - Mathematical optimization, including non-linear programming and genetic algorithms- Clustering via k-means, spherical k-means, and graph modularity- Data mining in graphs, such as outlier detection- Supervised AI through logistic regression, ensemble models, and bag-of-words models- Forecasting, seasonal adjustments, and prediction intervals through monte carlo simulation- Moving from spreadsheets into the R programming languageYou get your hands dirty as you work alongside John through each technique. But never fear, the topics are readily applicable and the author laces humor throughout. You'll even learn what a dead squirrel has to do with optimization modeling, which you no doubt are dying to know.
Student Solutions Manual, Vol. 1 for Swokowski's Calculus: The Classic Edition
Earl W. Swokowski - 1991
Prepare for exams and succeed in your mathematics course with this comprehensive solutions manual! Featuring worked out-solutions to the problems in CALCULUS: THE CLASSIC EDITION, 5th Edition, this manual shows you how to approach and solve problems using the same step-by-step explanations found in your textbook examples.
Data Structures Using C++
D.S. Malik - 2003
D.S. Malik is ideal for a one-semester course focused on data structures. Clearly written with the student in mind, this text focuses on Data Structures and includes advanced topics in C++ such as Linked Lists and the Standard Template Library (STL). This student-friendly text features abundant Programming Examples and extensive use of visual diagrams to reinforce difficult topics. Students will find Dr. Malik's use of complete programming code and clear display of syntax, explanation, and example easy to read and conducive to learning.
Hiding from the Internet: Eliminating Personal Online Information
Michael Bazzell - 2012
Author Michael Bazzell has been well known in government circles for his ability to locate personal information about anyone through the internet. In Hiding from the Internet: Eliminating Personal Online Information, he exposes the resources that broadcast your personal details to public view. He has researched each source and identified the best method to have your private details removed from the databases that store profiles on all of us. This book will serve as a reference guide for anyone that values privacy. Each technique is explained in simple steps. It is written in a hands-on style that encourages the reader to execute the tutorials as they go. The author provides personal experiences from his journey to disappear from public view. Much of the content of this book has never been discussed in any publication. Always thinking like a hacker, the author has identified new ways to force companies to remove you from their data collection systems. This book exposes loopholes that create unique opportunities for privacy seekers. Among other techniques, you will learn to: Remove your personal information from public databases and people search sites Create free anonymous mail addresses, email addresses, and telephone numbers Control your privacy settings on social networks and remove sensitive data Provide disinformation to conceal true private details Force data brokers to stop sharing your information with both private and public organizations Prevent marketing companies from monitoring your browsing, searching, and shopping habits Remove your landline and cellular telephone numbers from online websites Use a credit freeze to eliminate the worry of financial identity theft and fraud Change your future habits to promote complete privacy and anonymity Conduct a complete background check to verify proper information removalConfigure a home firewall with VPN Kill-SwitchPurchase a completely invisible home or vehicle