IT eBooks
Download, Read, Use
Microsoft Excel Inside Out
Microsoft Excel Inside Out

Dive Into Microsoft Excel for Office 2021 and Microsoft 365 and really put your spreadsheet expertise to work. This supremely well-organized reference packs hundreds of timesaving solutions, tips, and workaroundsall you need to make the most of Excels most powerful tools for analyzing data and making better decisions. Renowned Excel expert Bill Jelen offers a complete tour of Excel and its latest innovations, from advanced analysis and visualizations to dashboards. Discover how experts tackle todays key tasksand challenge yourself to new levels of mastery. Save time with galleries, keyboard accelerators, and other shortcuts; Enter formulas more efficiently, and fully control operators and dates; Use new data types to return photos, arrays, or weather history and even create your own; Master Excels most widely-used functions; Integrate external data from the web and other sources; Use the new XLOOKUP function to retrieve data more efficiently, with fewer errors; Store powerful specia ...
Intermediate Statistics with R
Intermediate Statistics with R

Introductory statistics courses prepare students to think statistically but cover relatively few statistical methods. Building on the basic statistical thinking emphasized in an introductory course, a second course in statistics at the undergraduate level can explore a large number of statistical methods. This text covers more advanced graphical summaries, One-Way ANOVA with pair-wise comparisons, Two-Way ANOVA, Chi-square testing, and simple and multiple linear regression models. Models with interactions are discussed in the Two-Way ANOVA and multiple linear regression setting with categorical explanatory variables. Randomization-based inferences are used to introduce new parametric distributions and to enhance understanding of what evidence against the null hypothesis "looks like". Throughout, the use of the statistical software R via Rstudio is emphasized with all useful code and data sets provided within the text. ...
SQL Server Source Control Basics
SQL Server Source Control Basics

Few software developers would build an application without using source control, but its adoption for databases has been slower. Yet without source control to maintain the scripts necessary to create our database objects, load lookup data, and take other actions, we cannot guarantee a reliable and repeatable database deployment process, let alone coordinate database upgrades with changes to the application. We also run the risk that our "ad hoc" database patching will cause inconsistencies and data loss. Source control can and should play a key role in the database development and deployment process, and this book will show you exactly how to get started. It provides 'just enough' detail about the core components of a source control system and how to incorporate that system into the database development and deployment processes, covering: Database Source Control architecture - what to include, how to structure the components Collaborative editing - teamwork on a database project, while ...
Principles of Superconducting Quantum Computers
Principles of Superconducting Quantum Computers

In Principles of Superconducting Quantum Computers, a pair of distinguished researchers delivers a comprehensive and insightful discussion of the building of quantum computing hardware and systems. Bridging the gaps between computer science, physics, and electrical and computer engineering, the book focuses on the engineering topics of devices, circuits, control, and error correction. Using data from actual quantum computers, the authors illustrate critical concepts from quantum computing. Questions and problems at the end of each chapter assist students with learning and retention, while the text offers descriptions of fundamentals concepts ranging from the physics of gates to quantum error correction techniques. The authors provide efficient implementations of classical computations, and the book comes complete with a solutions manual and demonstrations of many of the concepts discussed within. It also includes: A thorough introduction to qubits, gates, and circuits, including ...
User Tested
User Tested

With so many digital experiences touching our lives - and businesses - it's understandable to feel like you're drowning in data. There's a dashboard or chart for just about everything, but data alone can't help you understand and empathize with your customers. No amount of it will take you inside their heads, help you see the world through their eyes, or let you experience what it's really like to be your customer. Only human insight from real people can do that. User Tested gives both individual contributors and executives an approachable, pragmatic playbook for stepping beyond standard business metrics and infusing real human insight into every business decision, design, and experience. In this book, you'll: Learn how businesses became obsessed with data - but disconnected from their customers - and why that's not sustainable; Get the basics about how to capture human insight through user testing, including how to find the right people, ask the right questions, and make sense o ...
Practical Go
Practical Go

Google announced the Go programming language to the public in 2009, with the version 1.0 release announced in 2012. Since its announcement to the community, and the compatibility promise of the 1.0 release, the Go language has been used to write scalable and high-impact software programs ranging from command-line applications and critical infrastructure tools to large-scale distributed systems. It's speed, simplicity, and reliability make it a perfect choice for developers working in various domains. In Practical Go - Building Scalable Network + Non-Network Applications, you will learn to use the Go programming language to build robust, production-ready software applications. You will learn just enough to building command line tools and applications communicating over HTTP and gRPC. This practical guide will cover: Writing command line applications; Writing a HTTP services and clients; Writing RPC services and clients using gRPC; Writing middleware for network clients and servers ...
Wireless Security Architecture
Wireless Security Architecture

Wireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise offers readers an essential guide to planning, designing, and preserving secure wireless infrastructures. It is a blueprint to a resilient and compliant architecture that responds to regulatory requirements, reduces organizational risk, and conforms to industry best practices. This book emphasizes WiFi security, as well as guidance on private cellular and Internet of Things security. Readers will discover how to move beyond isolated technical certifications and vendor training and put together a coherent network that responds to contemporary security risks. It offers up-to-date coverage - including data published for the first time - of new WPA3 security, Wi-Fi 6E, zero-trust frameworks, and other emerging trends. It also includes: Concrete strategies suitable for organizations of all sizes, from large government agencies to small public and private companies; Effective technical resources and r ...
Trustworthy AI
Trustworthy AI

In Trustworthy AI, award-winning executive Beena Ammanath offers a practical approach for enterprise leaders to manage business risk in a world where AI is everywhere by understanding the qualities of trustworthy AI and the essential considerations for its ethical use within the organization and in the marketplace. The author draws from her extensive experience across different industries and sectors in data, analytics and AI, the latest research and case studies, and the pressing questions and concerns business leaders have about the ethics of AI. Filled with deep insights and actionable steps for enabling trust across the entire AI lifecycle, the book presents: In-depth investigations of the key characteristics of trustworthy AI, including transparency, fairness, reliability, privacy, safety, robustness, and more; A close look at the potential pitfalls, challenges, and stakeholder concerns that impact trust in AI application; Best practices, mechanisms, and governance considerati ...
Foundations of Machine Learning, 2nd Edition
Foundations of Machine Learning, 2nd Edition

A new edition of a graduate-level machine learning textbook that focuses on the analysis and theory of algorithms. This book is a general introduction to machine learning that can serve as a textbook for graduate students and a reference for researchers. It covers fundamental modern topics in machine learning while providing the theoretical basis and conceptual tools needed for the discussion and justification of algorithms. It also describes several key aspects of the application of these algorithms. The authors aim to present novel theoretical tools and concepts while giving concise proofs even for relatively advanced topics. Foundations of Machine Learning is unique in its focus on the analysis and theory of algorithms. The first four chapters lay the theoretical foundation for what follows; subsequent chapters are mostly self-contained. Topics covered include the Probably Approximately Correct (PAC) learning framework; generalization bounds based on Rademacher complexity and ...
Modern Computer Architecture and Organization, 2nd Edition
Modern Computer Architecture and Organization, 2nd Edition

Are you a software developer, systems designer, or computer architecture student looking for a methodical introduction to digital device architectures, but are overwhelmed by the complexity of modern systems? This step-by-step guide will teach you how modern computer systems work with the help of practical examples and exercises. You'll gain insights into the internal behavior of processors down to the circuit level and will understand how the hardware executes code developed in high-level languages. This book will teach you the fundamentals of computer systems including transistors, logic gates, sequential logic, and instruction pipelines. You will learn details of modern processor architectures and instruction sets including x86, x64, ARM, and RISC-V. You will see how to implement a RISC-V processor in a low-cost FPGA board and write a quantum computing program and run it on an actual quantum computer. This edition has been updated to cover the architecture and design principle ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2026