В этом разделе вы можете найти различные книги: художественную литературу и беллетристику на иностранных языках, пособия и методички, учебную и справочную литературу по изучающему языку. К вашему вниманию художественная литература на немецком и английском языке. Словари и энциклопедии. А понравившиеся издания вы можете заказать с доставкой.
This book offers an up-to-date coverage of the basic principles and tools of Bayesian inference in econometrics, with an emphasis on dynamic models. It shows how to treat Bayesian inference in non linear models, by integrating the useful developments of numerical integration techniques based on simulations , and the long available analytical results of Bayesian inference for linear regression models.
This volume contains a unique collection of mathematical essays which present a battery of techniques and approaches for the statistical analysis of heavy tailed distributions and processes. The articles cover a number of applications of heavy tailedmodeling, running the gamut from insurance and finance, to telecommunications and the World Wide Web, and classical signal/noise detection problems. Along with the specific applications are several articles covering such areas as time series analysis in the heavy tailed setting, regression, and the general structure of stable processes as viewed from a modeling standpoint. Considerable emphasis is placed on recent developments in handling the numerical problems associated with stable distributions, which have been, until recently, one of the main technical difficulties in working in the heavy tailed setting. The papers are intended to be accessible to the widest possible audience, with an emphasis on applicability rather than...
Iterative processes have gained widespread acceptance because they help software developers reduce risk and cost, manage change, improve productivity, and deliver more effective, timely solutions. But conventional project management techniques don’t work well in iterative projects, and newer iterative management techniques have been poorly documented. Managing Iterative Software Development Projects is the solution: a relentlessly practical guide to planning, organizing, estimating, staffing, and managing any iterative project, from start to finish. Leading iterative development experts Kurt Bittner and Ian Spence introduce a proven, scalable approach that improves both agility and control at the same time, satisfying the needs of developers, managers, and the business alike. Their techniques are easy to understand, and easy to use with any iterative methodology, from Rational Unified Process to Extreme Programming to the Microsoft Solutions Framework. ...
Do you trust your computer? You shouldn't. Personal computers are now part of the furniture in homes around the world. We use them for generating, storing and communicating documents and images; we talk to friends and family via email andsurf the Web without giving too much thought to the security of our personal information. Unfortunately hacking and computer security are issues which affect all computer users, not just big corporations. What is a desktop witness? Your computer stores a record of every document you create, every e-mail you write or receive, which sites you visit on the Internet, even attachments which you don't open. An unattended computer may reveal your secrets if you leave security vulnerabilities unattended to. It may 'let in' outsiders through your IR port. It 'whispers' behind your back when you are online. Detectable radiation gives away the contents of your screen. Eavesdroppers can hear conversations through your...
Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work. New methods of breaking into corporate networks are resulting in major losses. This book provides the latest information on how to guard against attacks and informs the IT manager of the products that can detect and prevent break-ins. Crucial concepts such as authentication and encryption are explained, enabling the reader to understand when and where these technologies will be useful. Due to the authors' experiences in helping corporations develop secure networks, they are able to include the newest methods for protecting corporate data. · Shield data from both the internal and external intruder · Discover products that can detect and prevent these break-ins · Protect against major losses with the latest incident handling procedures for detecting and...
In today’s competitive business environment, managers are required to have a strong understanding of Information Systems (IS). This book provides them with the concepts and tools needed to make effective managerial decisions about IS within a firm.In order to achieve this, author Paul Gray focuses on applications rather than technology or techniques.
* Указанная цена за книгу может отличаться от той, по которой продается она в онлайн-магазине Ozon.ru, партнером которого является Ranez.Ru. Администрация сайта Ranez.Ru ни коим образом не гарантирует ни цену, ни наличие этой книги на складе у продавца, равно как и возможность ее купить. На сайте Ranez.Ru представлена только информация о книге, оформление покупки, оплата и вопросы с доставкой решаются на сайте онлайн-магазина Ozon.ru.
Данный интернет-сайт носит исключительно информационный характер, и ни при каких условиях информационные материалы и цены, размещенные на сайте, не являются публичной офертой, определяемой положениями Статьи 437 ГК РФ.