termasuk bibliografi dan indeks
Password sniffing, spoofing, buffer overflows, and denial of service: these are only a few of the attacks on today's computer systems and networks. At the root of this epidemic is poorly written, poorly tested, and insecure code that puts everyone at risk. Clearly, today's developers need help figuring out how to write code that attackers won't be able to exploit. But writing such code is surpr…
1. Drawing Statistical Conclusions. 2. Inference Using t-Distributions. 3. A Closer Look at Assumptions. 4. Alternatives to the t-Tools. 5. Comparisons among Several Samples. 6. Linear Combinations and Multiple Comparisons of Means. 7. Simple Linear Regression: A Model for the Mean. 8. A Closer Look at Assumptions for Simple Linear Regression. 9. Multiple Regression. 10. Inferential Tools for M…