Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical aspects. Breaking the mold, Data Mining Tools for Malware Detection provides a step-by-step breakdown of how to develop...
Developed by Jean-Paul Benzérci more than 30 years ago, correspondence analysis as a framework for analyzing data quickly found widespread popularity in Europe. The topicality and importance of correspondence analysis continue, and with the tremendous computing power now available and new fields of application emerging, its...
Take a deep dive into the many uses of dynamic SQL in Microsoft SQL Server. This edition has been updated to use the newest features in SQL Server 2016 and SQL Server 2017 as well as incorporating the changing landscape of analytics and database administration. Code examples have been updated with new system objects and functions to...
Since the invention of the personal computer, software developers have used x86 assembly language
to create innovative solutions for a wide variety of algorithmic challenges. During the early days of the
PC era, it was common practice to code large portions of a program or complete applications using x86
assembly...
Gain practical skills in machine learning for finance, healthcare, and retail. This book uses a hands-on approach by providing case studies from each of these domains: you’ll see examples that demonstrate how to use machine learning as a tool for business enhancement. As a domain expert, you will not only discover how machine...
Utilize modern methods for digital image processing and take advantage of the many time-saving templates provided for all of the projects in this book.
Modern Algorithms for Image Processing approaches the topic of image processing through teaching by example. Throughout the book, you will create projects...
The human mind is evolutionarily designed to take shortcuts in order to survive. We jump to conclusions because our brains want to keep us safe. A majority of our biases work in our favor, such as when we feel a car speeding in our direction is dangerous and we instantly move, or when we...
Use Python's built-in features to create innovative graphics for data visualization and technical illustrations. This book goes beyond simple commands and libraries to explain how to not only display but also rotate, shade, and edit graphics for any purpose.
Starting with the essential Python functions to set up a...
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years,...
Examine the history of smart homes, how technology shapes our lives, and ways you can think about the home when developing new products. This book presents the opportunities in the homespace that will come from understanding the history and multiple players that have contributed to the development of the home in general. ...