|
|
|
|
Principles of Data Mining (Undergraduate Topics in Computer Science)
Data Mining, the automatic extraction of implicit and potentially useful information from data, is increasingly used in commercial, scientific and other application areas.
Principles of Data Mining explains and explores the principal techniques of Data Mining: for classification, association rule mining and clustering. Each... | | Appcelerator Titanium: Up and Running
Build native apps for iOS, Android, and Blackberry from a single JavaScript codebase with Appcelerator Titanium. This guide gets you quickly up to speed on this amazing framework and shows you how to generate cross-platform apps with 100% native controls. You’ll also learn the advantages of using Titanium when you want to... | | Getting Started with Hazelcast
An easy-to-follow and hands-on introduction to the highly scalable data distribution system, Hazelcast, and its advanced features.
Overview
-
Understand how to revolutionize the way you share data across your application
-
A one-stop guide to this bleeding edge technology
-
Store...
|
|
Kali Linux Network Scanning Cookbook
Over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning
About This Book
-
Learn the fundamentals behind commonly used scanning techniques
-
Deploy powerful scanning tools that are integrated into the Kali...
| | MATLAB Differential and Integral Calculus
MATLAB is a high-level language and environment for numerical computation, visualization, and programming. Using MATLAB, you can analyze data, develop algorithms, and create models and applications. The language, tools, and built-in math functions enable you to explore multiple approaches and reach a solution faster than with spreadsheets or... | | Network Attacks and Exploitation: A Framework
Incorporate offense and defense for a more effective network security strategy
Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. Written by an expert in both government and corporate... |
|
|
|
|
Result Page: 333 332 331 330 329 328 327 326 325 324 323 322 321 320 319 318 317 316 315 |