|
|
|
|
Data Mining: A Knowledge Discovery Approach
“If you torture the data long enough, Nature will confess,” said 1991 Nobel-winning economist
Ronald Coase. The statement is still true. However, achieving this lofty goal is not easy. First,
“long enough” may, in practice, be “too long” in many applications and thus unacceptable. Second, ... | | Handbook of Research on Teaching Literacy Through the Communicative and Visual ArtsThe Handbook of Research on Teaching Literacy Through the Communicative and Visual Arts, a comprehensive overview of research on this topic, extends conceptualizations of literacy to include all of the communicative arts (reading, writing, speaking, listening, viewing) and the visual arts of drama, dance, film, art, video, and computer... | | Cryptography and Public Key Infrastructure on the InternetCryptography and Public Key Infrastructure on the Internet provides a thorough overview of the subject. It explains how susceptible networks are to hacking and how cryptography can help. This comprehensive and practical guide covers:
* Public Key Infrastructures (PKIs); important when using cryptography in a large organisation, ... |
|
|
Handbook of Logic in Computer Science 5"Oxford University Press publishes a wonderful series of books entitled Handbook of Logic in Computer Science. ... Volume 5: Logic and Algebraic Methods, has I think the best discussion of abstract data types that I have read."--he Bulletin of Mathematics Books Logic is now widely recognized as one of the foundational... | | | | PC Repair Bench BookYour one-stop guide to
- Understanding and repairing motherboards, processors, chipsets, BIOS, and system resources
- Updating and optimizing memory and aging systems
- Diagnosing common PC problems and performing routine maintenance
- Installing and configuring system upgrades
- Working
... |
|
|
|
Result Page: 66 65 64 63 62 61 60 59 58 57 56 |