Our website is made possible by displaying online advertisements to our visitors.
Please consider supporting us by disabling your ad blocker.

Download links will be available after you disable the ad blocker and reload the page.
Showing: 1-10 results of 53348

A Turing Prize-winning computer scientist and statistician shows how understanding causality has revolutionized science and will revolutionize artificial intelligence "Correlation is not causation." This mantra, chanted by scientists for more than a century, has led to a virtual prohibition on causal talk. Today, that taboo is dead. The causal revolution, instigated by Judea Pearl and his colleagues, has cut through a century of... more...

Praise for the First Edition: "This outstanding book … gives the reader robust concepts and implementable knowledge of this environment. Graphical user interface (GUI)-based users and developers do not get short shrift, despite the command-line interface’s (CLI) full-power treatment. … Every programmer should read the introduction’s Unix/Linux philosophy section. … This authoritative and exceptionally well-constructed book... more...

An accessible and rigorous textbook for introducing undergraduates to computer science theory What Can Be Computed? is a uniquely accessible yet rigorous introduction to the most profound ideas at the heart of computer science. Crafted specifically for undergraduates who are studying the subject for the first time, and requiring minimal prerequisites, the book focuses on the essential fundamentals of computer science theory and... more...

  Written by some major contributors to the development of this class of graphical models, Chain Event Graphs introduces a viable and straightforward new tool for statistical inference, model selection and learning techniques. The book extends established technologies used in the study of discrete Bayesian Networks so that they apply in a much more general setting     As the first book on Chain Event Graphs, this... more...

Find out how to create visually stunning and feature-rich applications by empowering Python's built-in Tkinter GUI toolkit Key Features Explore Tkinter's powerful features to easily design and customize your GUI application Learn the basics of 2D and 3D animation in GUI applications. Learn to integrate stunning Data Visualizations using Tkinter Canvas and Matplotlib. Book Description Tkinter is a lightweight,... more...


Introduce your students to electric circuits with common design practices and simulations when you use Kang's ELECTRIC CIRCUITS. This engaging book presents the fundamental concepts of electric circuits alongside examples, exercises and problems. Fresh examples provide students with clear methods for understanding how electric circuits function. Each chapter includes several examples and problems related to circuit design with answers provided for the... more...

Zero to Maker is part memoir and part how-to guidebook for anyone who is having thoughts like these: I feel like all I can do is write emails. I wish I had more hands-on skills even though I don't know what I would build... I have this one idea I've always wanted to make, but I don't know how to build it... I keep hearing about the "maker movement" but I'm not sure what that means or how I can join... more...

NOTE - This is a stand-alone book. Intended primarily for undergraduate courses in business statistics, this text also provides practical content to current and aspiring industry professionals.   Reducing the emphasis on doing computations, this practical text thoroughly integrates Microsoft Excel as a tool for analysis and presents statistical concepts in the context of the functional areas of business.

Network Security and Cryptography introduces the basic concepts in computer networks and the latest trends and technologies in cryptography and network security. The book is a definitive guide to the principles and techniques of cryptography and network security, and introduces basic concepts in computer networks such as classical cipher schemes, public key cryptography, authentication schemes, pretty good privacy, and Internet security. It features... more...