Nejnižší cena za posledních 45 dní: 1 396 Kč
Ceny a dostupnost se mohou měnit i několikrát za den. Zkontrolujte si aktuální údaje přímo v e-shopech. Všechny dostupné barvy a velikosti naleznete přímo v e-shopech.
This unique textbook provides an introduction to statistical inference with network data. The authors present a self-contained derivation and mathematical formulation of methods, review examples, and real-world applications, as well as provide data and code in the R environment that can be customised. Inferential network analysis transcends fields, and examples from across the social sciences are discussed (from management to electoral politics), which can be adapted and applied to a panorama of research. From scholars to undergraduates, spanning the social, mathematical, computational and physical sciences, readers will be introduced to inferential network models and their extensions. The exponential random graph model and latent space network model are paid particular attention and, fundamentally, the reader is given the tools to independently conduct their own
Produkt Inferential Network Analysis (Cranmer Skyler J.)(Paperback) má EAN kód 9781316610855.
Kategorie | Knihy |
EAN | 9781316610855 |
This unique textbook provides an introduction to statistical inference with network data. The authors present a self-contained derivation and mathematical formulation of methods, review examples, and real-world applications, as well as provide data and code in the R environment that can be
David Knoke and Song Yang′s Social Network Analysis, Third Edition provides a concise introduction to the concepts and tools of social network analysis. The authors convey key material while at the same time minimizing technical complexities. The examples are simple: sets of 5 or 6 entities such
Egocentric network analysis is used widely across the social sciences, especially in anthropology, political science, economics, and sociology, and is increasingly being employed in communications, informatics, and business and marketing studies. Egocentric network analysis requires a unique set of
The ego-net approach to social network analysis, which takes discrete individual actors and their contacts as its starting point, is one of the most widely used approaches in the field. This is the first textbook to take readers through each stage of ego-net research, from conception, through
Construct, analyze, and visualize networks with networkx, a Python language module. Network analysis is a powerful tool you can apply to a multitude of datasets and situations. Discover how to work with all kinds of networks, including social, product, temporal, spatial, and semantic networks
Fundamentals of Brain Network Analysis is a comprehensive and accessible introduction to methods for unraveling the extraordinary complexity of neuronal connectivity. From the perspective of graph theory and network science, this book introduces, motivates and explains techniques for modeling brain
Attacking Network Protocols is a deep dive into network protocol security from James Forshaw, one of the world's leading bug hunters. This comprehensive guide looks at networking from an attacker's perspective to help you discover, exploit, and ultimately protect vulnerabilities. You'll start
Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. Network security monitoring is based on the principle that
Thomas Cranmer, the architect of the Anglican Book of Common Prayer, was the archbishop of Canterbury who guided England through the early Reformation--and Henry VIII through the minefields of divorce. This is the first major biography of him for more than three decades, and the first for a century
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Network Security, Firewalls, and VPNs, Third Edition provides a unique, in-depth look at the major business challenges and threats that are introduced when an organization's network is connected to the public
Incorporating the most important and cutting-edge developments in the field, this bestselling text introduces newcomers to the key theories and techniques of social network analysis and guides more experienced analysts in their own research. New to This Edition: A chapter on data collection,
Driven by counter-terrorism efforts, marketing analysis and an explosion in online social networking in recent years, data mining has moved to the forefront of information science. This proposed Special Issue on Data Mining for Social Network Data will present a broad range of recent studies in
Big data, genomics, and quantitative approaches to network-based analysis are combining to advance the frontiers of medicine as never before. Network Medicine introduces this rapidly evolving field of medical research, which promises to revolutionize the diagnosis and treatment of human diseases
Narrative Sociology defines classics, identifies exemplars of narrative analysis, and delineates a field in the making. Table of Contents Part I: Varieties of Narrative - The Sociology of Storytelling Francesca Polletta, Pang Ching Bobby Chen, Beth Gharrity Gardner, and Alice Motes - The Value
Augmenting Network Analysis with Linked Data for Humanities Research.- A Memorial Design Pattern Catalogue for commemorative digital culture.- Annotation in Digital Humanities.- Establishment of a complex database for the study of cultural her-itage through the reading and analysis of the
Modernize and optimize network management with APIs and automation Legacy network management approaches don't scale adequately and can't be automated well. This guide will help meet tomorrow's challenges by adopting network programmability based on Application Programming Interfaces (APIs). Using
A classic book on the legacy of Rosa Luxemburg's work with essays of political analysis by leading scholars As an advocate of social democracy and individual responsibility, Rosa Luxemburg (1871-1919) remains the most eminent representative of the revolutionary socialist tradition. She was a
A legendary value investor on security analysis for a modern era This book outlines Whitman's approach to business and security analysis that departs from most conventional security analysts. This approach has more in common with corporate finance than it does with the conventional approach. The
Table of Contents1. IntroductionHow to use this bookInstalling iPython NotebookWhat is iPython notebook?What is Anaconda?Getting StartedGetting the datasets for the workbook's exercises2. Getting Data into and out of PythonLoading Data from CSV FilesSaving Data to CSVLoading Data from Excel
Originally a chapter in the Handbook of Political Science, this analysis develops the fundamental distinction between totalitarian and authoritarian systems. It emphasizes the personalistic, lawless, non-ideological type of authoritarian rule the author calls the 'sultanistic