Normal view MARC view ISBD view

Bayesian methods for hackers : probalistic programming and bayesian inference / Cameron Davidson-Pilon

By: Davidson-Pilon, C.
Material type: materialTypeLabelBookPublisher: New York: Addison Wesley, 2015Description: xvi, 226 p.: ill.; 23cm.ISBN: 9780133902839.Subject(s): Penetraton testing (computer security) -- Textbook | Soft computing | Bayesian statistical decision theory
Tags from this library: No tags from this library for this title. Log in to add tags.
    average rating: 0.0 (0 votes)
Item type Current location Home library Collection Call number Copy number Status Date due Barcode Item holds
GENERAL COLLECTION FOR LOAN GENERAL COLLECTION FOR LOAN MULTIMEDIA UNIVERSITY LIBRARY
General Stacks
MULTIMEDIA UNIVERSITY LIBRARY
General Stacks
Non-fiction QA76.9.A25 D38 2015 C.1 (Browse shelf) C.1 Available 119B00453
GENERAL COLLECTION FOR LOAN GENERAL COLLECTION FOR LOAN MULTIMEDIA UNIVERSITY LIBRARY
General Stacks
MULTIMEDIA UNIVERSITY LIBRARY
General Stacks
Non-fiction QA76.9.A25 D38 2015 C.2 (Browse shelf) C.2 Available 119B00432
GENERAL COLLECTION FOR LOAN GENERAL COLLECTION FOR LOAN MULTIMEDIA UNIVERSITY LIBRARY
General Stacks
MULTIMEDIA UNIVERSITY LIBRARY
General Stacks
Non-fiction QA76.9.A25 D38 2015 C.3 (Browse shelf) C.3 Available 119B00433
Total holds: 0
Browsing MULTIMEDIA UNIVERSITY LIBRARY Shelves , Shelving location: General Stacks Close shelf browser
QA76.8.O58 2010 Introduction to microcomputers and programming / QA76.87.S68 2016 Neural network programming with java QA76.9.A25 D38 2015 C.1 Bayesian methods for hackers QA76.9.A25 D38 2015 C.2 Bayesian methods for hackers QA76.9.A25 D38 2015 C.3 Bayesian methods for hackers QA76.9.A25K63 2007 C.1 Computer security and cryptography / QA76.9.A25K63 2007 C.2 Computer security and cryptography /

Includes index

There are no comments for this item.

Log in to your account to post a comment.

Mobile:
Email: info@mmu.ac.ke| |Website

Powered by CoreTEC.co.ke.