Home | Amazing | Today | Tags | Publishers | Years | Search 
Introduction to Data Mining Using SAS Enterprise Miner
Introduction to Data Mining Using SAS Enterprise Miner

If you have an abundance of data, but no idea what to do with it, this book was written for you! Packed with examples from an array of industries, Introduction to Data Mining Using SAS Enterprise Miner provides you with excellent starting points and practical guidelines to begin data mining today. Author Patricia Cerrito encourages you to...

The SIM Guide to Enterprise Architecture
The SIM Guide to Enterprise Architecture

It is amusing that the first part of this book to be read is the last part to be written. It provides, however, an opportunity to share with you a little about how writing and editing this book has changed my thinking not just about enterprise architecture (EA), or about the role of information technology (IT) and IT professionals in...

Entity Framework 4 in Action
Entity Framework 4 in Action

Yatta, we did it! We wrote a book about Entity Framework! It’s not our first book, but it’s the first one written in English and distributed worldwide. It was a great challenge, but having the opportunity to spread the word about Entity Framework made it worth the effort. Entity Framework is a great tool that speeds up the...

Sakai CLE Courseware Management: The Official Guide
Sakai CLE Courseware Management: The Official Guide

Open Source software efforts are organized in a variety of different ways. Some of them are driven primarily by a single commercial organization. Others, like Linux, are a result of a diverse contribution of many individuals and organizations and are often led by a "benevolent dictator". The Sakai community fits neither of these...

Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry
Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry

I am not an expert. I have never claimed to be an expert at anything (at least not seriously done so), least of all an expert in forensic analysis. I am not an expert in Windows Registry analysis. I am simply, by profession, a responder and analyst with some work and research experience in this area. I have also performed a number...

From Bash to Z Shell: Conquering the Command Line
From Bash to Z Shell: Conquering the Command Line

A shell is a sophisticated way to control your computer—Unix, Linux, Microsoft Windows, Mac OS X, and others. If you do more than the most basic operations, you can do many of them more powerfully and quickly with a shell and your keyboard than by using a mouse.

The history of shells goes back some 30 years. In the early...

Oracle9i Mobile
Oracle9i Mobile

The idea of writing this book came to us one afternoon when we were discussing building mobile applications. We marveled about the lack of reference materials and books that would go beyond WAP and single channel wireless publishing. Jeremy Judson of McGraw-Hill/ Osborne encouraged us to share what we know best: how to build mobile...

Designing for XOOPS: A Quickstart for Designers
Designing for XOOPS: A Quickstart for Designers

Before you dive into this book, I would like to first extend my warm welcome to you as you enter the world of XOOPS. XOOPS is an acronym of eXtensible Object Oriented Portal System. It is an open-source application platform and Content Management System (CMS) written in PHP. It is built for developing a variety of solutions...

GNSS Markets and Applications (GNSS Technology and Applications)
GNSS Markets and Applications (GNSS Technology and Applications)

After being shrouded in esoterica for a long time, Global Navigation Satellite Systems (GNSS) have become part of everyday life, especially the Global Positioning System (GPS). Having spent 40 years involved with the subject, it became clear to me that it would be useful to have a book about the business aspects of these systems. This...

Managing Web Usage in the Workplace: A Social, Ethical, and Legal Perspective
Managing Web Usage in the Workplace: A Social, Ethical, and Legal Perspective

The ubiquitous nature of the Internet is dramatically revolutionizing the manner in which organizations and individuals share information. Developed out of necessity during the cold war, the Internet was created as a means to help governmental institutions and collegiate institutions send documents and research materials electronically...

Advanced Design Approaches to Emerging Software Systems: Principles, Methodologies and Tools
Advanced Design Approaches to Emerging Software Systems: Principles, Methodologies and Tools

Recently, the rapid and fundamental advances in computing technologies have been driving the role and scope of software systems to a new level. A number of new types of software systems are emerging, among which service based systems, cloud computing, pervasive computing, and Internet of Things are eminent examples. For these systems,...

Information Modeling for Internet Applications
Information Modeling for Internet Applications

Different kinds of objects containing data are found on the Internet, including structured (e.g., relational) databases, collections of documents, and search engines. On the one hand, creating, storing, manipulating, and retrieving Internet documents can benefit from techniques known from the databases and data modeling...

Result Page: 113 112 111 110 109 108 107 106 105 104 103 102 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy