Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Principles of Data Mining (Undergraduate Topics in Computer Science)
Principles of Data Mining (Undergraduate Topics in Computer Science)

Data Mining, the automatic extraction of implicit and potentially useful information from data, is increasingly used in commercial, scientific and other application areas.

Principles of Data Mining explains and explores the principal techniques of Data Mining: for classification, association rule mining and clustering. Each...

Statistics for Research (Wiley Series in Probability and Statistics)
Statistics for Research (Wiley Series in Probability and Statistics)
Praise for the Second Edition

"Statistics for Research has other fine qualities besides superior organization. The examples and the statistical methods are laid out with unusual clarity by the simple device of using special formats for each. The book was written with great care and is extremely user-friendly."—The...

The Edge of Infinity: Supermassive Black Holes in the Universe
The Edge of Infinity: Supermassive Black Holes in the Universe

This timely book is suitable for the general reader wishing to find answers to some of the intriguing questions now being asked about black holes. Although once recognized as the most destructive force in nature, following a cascade of astonishing discoveries, the opinion of supermassive black holes has undergone a dramatic shift. Astronomers...

Narrative Space and Time: Representing Impossible Topologies in Literature (Routledge Interdisciplinary Perspectives on Literature)
Narrative Space and Time: Representing Impossible Topologies in Literature (Routledge Interdisciplinary Perspectives on Literature)

Space is a central topic in cultural and narrative theory today, although in most cases theory assumes Newtonian absolute space. However, the idea of a universal homogeneous space is now obsolete. Black holes, multiple dimensions, quantum entanglement, and spatio-temporal distortions of relativity have passed into culture at large. This book...

Java 2 Core Language Little Black Book
Java 2 Core Language Little Black Book
The Java 2 Core Language Little Black Book is a compact, detailed reference for intermediate to experienced programmers and managers who are ready to learn how to build Java programs. The book features a logical, sequential approach with concise overviews and step-by-step, ready-to-use solutions created by a master Java programmer. This book is...
Lasers in the Preservation of Cultural Heritage: Principles and Applications (Optics and Optoelectronics)
Lasers in the Preservation of Cultural Heritage: Principles and Applications (Optics and Optoelectronics)
The book … describes how laser parameters associated with cleaning are chosen and the physics involved in various surface ablation processes. Key conservation practices are also addressed, such as removal of black encrustation from stone, varnish from paintings, and the laser cleaning of metals and paper. It details the use and benefit of...
International Assignments: An Integration of Strategy, Research, and Practice
International Assignments: An Integration of Strategy, Research, and Practice
Although the authors of this book and I approach the strategic challenges of globalization
from different perspectives, we've come to a similar conclusion: that the
"people" imperative is often overlooked when companies decide to enter new
countries or world regions. Stroh, Black, Mendenhall, and Gregersen base their...
Hack I.T.: Security Through Penetration Testing
Hack I.T.: Security Through Penetration Testing
Penetration testing--in which professional, "white hat" hackers attempt to break through an organization's security defenses--has become a key defense weapon in today's information systems security arsenal. Through penetration testing, I.T. and security professionals can take action to prevent true "black hat" hackers from...
Universe (Britannica Illustrated Science Library)
Universe (Britannica Illustrated Science Library)

There was a time when people believed that the stars were bonfires lit by other tribes in the sky, that the universe was a flat plate resting on the shell of a giant turtle, and that the Earth, according to the Greek astronomer Ptolemy, was at the center of the universe. From the most remote of times, people have been curious...

Fundamentals of Digital Imaging in Medicine
Fundamentals of Digital Imaging in Medicine
There was a time not so long ago, well within the memory of many of us, when medical imaging was an analog process in which X-rays, or reflected ultrasound signals, exiting from a patient were intercepted by a detector, and their intensity depicted as bright spots on a fluorescent screen or dark areas in a photographic film. The...
Black Hat Physical Device Security: Exploiting Hardware and Software
Black Hat Physical Device Security: Exploiting Hardware and Software
Attacking & Defending Physical Devices for Software and Hardware EngineersThe security devices of today are much more complex than those long ago. While some still are just electronic transistors, diodes, capacitors and resistors, many now have software and communication-based features. Easy-to-use and easy-to-deploy,...
Design for Trustworthy Software: Tools, Techniques, and Methodology of Developing Robust Software
Design for Trustworthy Software: Tools, Techniques, and Methodology of Developing Robust Software

An Integrated Technology for Delivering Better Software—Cheaper and Faster!

 

This book presents an integrated technology, Design for Trustworthy Software (DFTS), to address software quality issues upstream such that the goal of software...

unlimited object storage image
Result Page: 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy