Bayesian Methods for Hackers: Probabilistic Programming and Bayesian Inference (Addison-Wesley Data & Analytics Series)

Rating: 
Amazon Price: $17.27 (as of September 28, 2020 07:50 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Master Bayesian Inference through Practical Examples and Computation–Without Advanced Mathematical Analysis

Bayesian methods of inference are deeply natural and extremely powerful. However, most discussions of Bayesian inference rely on intensely complex mathematical analyses and artificial examples, making it inaccessible to anyone without a strong mathematical background. Now, though, Cameron Davidson-Pilon introduces Bayesian inference from a computational perspective, bridging theory to practice–freeing you to get results using computing power.
Continue reading “Bayesian Methods for Hackers: Probabilistic Programming and Bayesian Inference (Addison-Wesley Data & Analytics Series)”

Fuzzing: Brute Force Vulnerability Discovery

Rating: 
Amazon Price: $27.99 (as of September 27, 2020 13:35 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This is the eBook version of the printed book. If the print book includes a CD-ROM, this content is not included within the eBook version.

FUZZING
Continue reading “Fuzzing: Brute Force Vulnerability Discovery”

Bayesian Methods for Hackers: Probabilistic Programming and Bayesian Inference (Addison-Wesley Data & Analytics)

Rating: 
Amazon Price: $39.99 $35.99 You save: $4.00 (10%) (as of September 27, 2020 13:35 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Master Bayesian Inference through Practical Examples and Computation–Without Advanced Mathematical Analysis

Bayesian methods of inference are deeply natural and extremely powerful. However, most discussions of Bayesian inference rely on intensely complex mathematical analyses and artificial examples, making it inaccessible to anyone without a strong mathematical background. Now, though, Cameron Davidson-Pilon introduces Bayesian inference from a computational perspective, bridging theory to practice–freeing you to get results using computing power.
Continue reading “Bayesian Methods for Hackers: Probabilistic Programming and Bayesian Inference (Addison-Wesley Data & Analytics)”

Rootkits: Subverting the Windows Kernel: Subverting the Windows Kernel

Rating: 
Amazon Price: $64.99 $46.34 You save: $18.65 (29%) (as of September 28, 2020 07:50 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.
  • Manufacturer: Addison-Wesley Professional

Manufacturer Info

  • PartNumber: new-Feb172017-c0042294

Product Info

  • IsAdultProduct: no
  • ReleaseDate: 2005-08-01T00:00:01Z
  • NumberOfItems: 1

Computer Forensics: Incident Response Essentials

Rating: 
Amazon Price: $54.99 $49.49 You save: $5.50 (10%) (as of September 27, 2020 11:42 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Every computer crime leaves tracks—you just have to know where to find them. This book shows you how to collect and analyze the digital evidence left behind in a digital crime scene.

Computers have always been susceptible to unwanted intrusions, but as the sophistication of computer technology increases so does the need to anticipate, and safeguard against, a corresponding rise in computer-related criminal activity.
Continue reading “Computer Forensics: Incident Response Essentials”