Bayesian methods for hackers : probalistic programming and bayesian inference / Cameron Davidson-Pilon
By: Davidson-Pilon, C.
Material type: BookPublisher: New York: Addison Wesley, 2015Description: xvi, 226 p.: ill.; 23cm.ISBN: 9780133902839.Subject(s): Penetraton testing (computer security) -- Textbook | Soft computing | Bayesian statistical decision theoryItem type | Current location | Home library | Collection | Call number | Copy number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|---|---|---|
GENERAL COLLECTION FOR LOAN | MULTIMEDIA UNIVERSITY LIBRARY General Stacks | MULTIMEDIA UNIVERSITY LIBRARY General Stacks | Non-fiction | QA76.9.A25 D38 2015 C.1 (Browse shelf) | C.1 | Available | 119B00453 | ||
GENERAL COLLECTION FOR LOAN | MULTIMEDIA UNIVERSITY LIBRARY General Stacks | MULTIMEDIA UNIVERSITY LIBRARY General Stacks | Non-fiction | QA76.9.A25 D38 2015 C.2 (Browse shelf) | C.2 | Available | 119B00432 | ||
GENERAL COLLECTION FOR LOAN | MULTIMEDIA UNIVERSITY LIBRARY General Stacks | MULTIMEDIA UNIVERSITY LIBRARY General Stacks | Non-fiction | QA76.9.A25 D38 2015 C.3 (Browse shelf) | C.3 | Available | 119B00433 |
Total holds: 0
Browsing MULTIMEDIA UNIVERSITY LIBRARY Shelves , Shelving location: General Stacks Close shelf browser
QA76.8.O58 2010 Introduction to microcomputers and programming / | QA76.87.S68 2016 Neural network programming with java | QA76.9.A25 D38 2015 C.1 Bayesian methods for hackers | QA76.9.A25 D38 2015 C.2 Bayesian methods for hackers | QA76.9.A25 D38 2015 C.3 Bayesian methods for hackers | QA76.9.A25K63 2007 C.1 Computer security and cryptography / | QA76.9.A25K63 2007 C.2 Computer security and cryptography / |
Includes index
There are no comments for this item.