Ramdan Hours:
Sun - Thu
9.30 AM - 2.30 PM
Iftar in --:--:--
🌙 Maghrib: --:--

Bayesian methods for hackers : (Record no. 11938)

MARC details
000 -LEADER
fixed length control field 01452cam a2200337 i 4500
001 - CONTROL NUMBER
control field 18616206
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220119094459.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 150513s2018 ii a 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2015017249
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9789353063641
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Transcribing agency DLC
Description conventions rda
Modifying agency DLC
-- EG-NcFUE
042 ## - AUTHENTICATION CODE
Authentication code pcc
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number D376 2016
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 006.3
Edition number 23
Item number D.C.B
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Davidson-Pilon, Cameron,
Relator term author.
245 10 - TITLE STATEMENT
Title Bayesian methods for hackers :
Remainder of title probabilistic programming and Bayesian inference /
Statement of responsibility, etc Cameron Davidson-Pilon.
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc New Delhi :
Name of publisher, distributor, etc Pearson India,
Date of publication, distribution, etc 2018.
300 ## - PHYSICAL DESCRIPTION
Extent xvi, 226 pages :
Other physical details illustrations ;
Dimensions 24 cm
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term unmediated
Media type code n
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term volume
Carrier type code nc
Source rdacarrier
500 ## - GENERAL NOTE
General note Includes index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 1: The Philosophy of Bayesian Inference Chapter 2: A Little More on PyMC Chapter 3: Opening the Black Box of MCMC Chapter 4: The Greatest Theorem Never Told Chapter 5: Would You Rather Lose an Arm or a Leg? Chapter 6: Getting Our Priorities Straight Chapter 7: Bayesian A/B Testing<br/>
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Penetration testing (Computer security)
General subdivision Mathematics.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Bayesian statistical decision theory.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Soft computing.
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c orignew
d 1
e ecip
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
Holdings
Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Acquisition method Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
  Dewey Decimal Classification     Computers & Information Technology ( Computer Science ) Main library Main library A2 16/02/2020 Baccah 319.00 Purchase 2020   006.3 D.C.B 00015170 19/02/2025 1 16/02/2020 Books