This book attempts to bridge the gap ... Furthermore, without a strong mathematical background, the analysis required by the first path cannot even take place. Bayesian Methods for Hackers is designed ...