Bayesian Methods for Hackers