Temporal data mining deals with the harvesting of useful information from temporal data. New initiatives in health care and business organizations have increased the importance of temporal information in data today.
From basic data mining concepts to state-of-the-art advances, Temporal Data Mining covers...
" . . . an excellent addition to an upper-level undergraduate course on environmental statistics, and . . . a 'must-have' desk reference for environmental practitioners dealing with censored datasets."
—Vadose Zone Journal
Statistical genetics has become a core course in many graduate programs in public health and medicine. This book presents fundamental concepts and principles in this emerging field at a level that is accessible to students and researchers with a first course in biostatistics. Extensive examples are provided using publicly available data and...
Work is one of the most universal features of human life; virtually everybody spends some part of their life at work. It is often associated with tedium and boredom; in conflict with the things we would otherwise love to do. Thinking of work primarily as a burden - an activity we would rather be without - is a thought that was shared by the...
Expanding on the author’s experience as a cybersecurity lawyer and law professor, Cybersecurity Law is the definitive guide to cybersecurity law, with an in-depth analysis of U.S. and international laws that apply to data security, data breaches, sensitive information...
Green products have been around since the 1970s, but it's only in recent years that they've become ubiquitous. That's because savvy green marketers are no longer targeting "deep green" consumers with a "save the planet" pitch. Instead, they're promoting the added value their products provide: better health,...
Hailed as a superfood and loved for its cool, tangy taste, yogurt's popularity continues to grow. Yogurt Every Day feeds this frenzy for yogurt, serving up 75 delicious recipes for breakfast, lunch, dinner, snacks and dessert, including how to make your own yogurt at home.
Build a better defense against motivated, organized, professional attacks
Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not taught in any certification prep or covered by...
This book presents state-of-the-art technical contributions based around one of the most successful evolutionary optimization algorithms published to date: Harmony Search. Contributions span from novel technical derivations of this algorithm to applications in the broad fields of civil engineering, energy, transportation &...
This research monograph provides the means to learn the theory and practice of graph and network analysis using the Python programming language. The social network analysis techniques, included, will help readers to efficiently analyze social data from Twitter, Facebook, LiveJournal, GitHub and many others at three levels of depth: ego,...
An accessible, compelling introduction to today’s major policy issues from the New York Times columnist, best-selling author, and Nobel prize–winning economist Paul Krugman.
There is no better guide than Paul Krugman to basic economics, the ideas that animate much of our public...