Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Clustering for Data Mining: A Data Recovery Approach (Chapman & Hall/CRC Computer Science & Data Analysis)
Clustering for Data Mining: A Data Recovery Approach (Chapman & Hall/CRC Computer Science & Data Analysis)
Often considered more as an art than a science, the field of clustering has been dominated by learning through examples and by techniques chosen almost through trial-and-error. Even the most popular clustering methods--K-Means for partitioning the data set and Ward's method for hierarchical clustering--have lacked the theoretical...
Routing TCP/IP, Volume II (CCIE Professional Development)
Routing TCP/IP, Volume II (CCIE Professional Development)

The complexities of exterior gateway protocols, including TCP connections, message states, path attributes, interior routing protocol interoperation, and setting up neighbor connections, require a comprehensive understanding of router operations in order to manage network growth. Routing TCP/IP, Volume II, provides you with the...

Success Metrics: A Multidimensional Framework for Measuring Organizational Success
Success Metrics: A Multidimensional Framework for Measuring Organizational Success
Learn how to measure success at the individual and organizational levels. By measuring success in multiple dimensions using multivariate methods you will be able to determine what works and what doesn’t. The key is to measure and promote progress in terms of organizational vision, mission, and overarching goals.

Business
...
Primate Neuroethology
Primate Neuroethology

Why do people find monkeys and apes so compelling to watch? One clear answer is that they seem so similar to us-a window into our own minds and how we have evolved over millennia. As Charles Darwin wrote in his Notebook M, "He who understands baboon would do more toward metaphysics than Locke." Darwin recognized that behavior and...

Protecting Networks with SATAN
Protecting Networks with SATAN

SATAN (Security Administrator's Tool for Analyzing Networks) is a powerful aid for system administrators. It performs "security audits," scanning host computers for security vulnerabilities caused by erroneous configurations or by known software errors in frequently used programs. SATAN is a particularly interesting piece of...

Linux Firewalls (3rd Edition)
Linux Firewalls (3rd Edition)
An Internet-connected Linux machine is in a high-risk situation. This book details security steps that a home or small-to-mid-size, non-enterprise business might take to protect itself from potential remote attackers. As with the first edition, this book will provide a description of the need for security measures and solutions built upon the most...
MCAD/MCSD Training Guide (70-310): Developing XML Web Services and Server Components with Visual Basic .NET and the .NET Framework
MCAD/MCSD Training Guide (70-310): Developing XML Web Services and Server Components with Visual Basic .NET and the .NET Framework

This certification exam measures your ability to develop and implement middle-tier components, server components, and XML Web services by using Visual Studio .NET and the Microsoft .NET Framework. This exam counts as a core credit toward the new MCAD (Microsoft Certified Application Developer) certification as well as a core credit toward the...

The Pesticide Detox: Towards a More Sustainable Agriculture
The Pesticide Detox: Towards a More Sustainable Agriculture
This book seeks to address some of these difficulties and set out some new solutions. Pests, diseases and weeds eat, infiltrate and smother crops and grab their nutrients. If farmers stood back and let nature take its course, there would be insufficient food. They must do something. Pesticides are easy to use, although often costly for farmers. In...
Magento 1.4 Development Cookbook
Magento 1.4 Development Cookbook

Magento is the fastest growing PHP-based eCommerce solution based on the Zend Framework. This robust CMS helps developers to enrich their store with more useful functionalities with custom modules. Developing a Magento store to get the desired look and feel is not as easy as you might believe, and may take hours due to the wealth of...

Guide to Tactical Perimeter Defense
Guide to Tactical Perimeter Defense

This course is the official courseware for the Security Certified Program SC0-451 certification exam. The Tactical Perimeter Defense course is designed to provide network administrators and certification candidates with hands-on tasks on the most fundamental perimeter security technologies. The network perimeter is often the first...

IBM Cognos 8 Business Intelligence: The Official Guide
IBM Cognos 8 Business Intelligence: The Official Guide

The Only Authorized Guide to IBM Cognos 8 Business Intelligence

Develop, deploy, and maintain a complete BI solution across your enterprise. IBM Cognos 8 Business Intelligence: The Official Guide shows you how to take full advantage of the robust service-oriented architecture and simplified role-based user...

Breed Predispositions to Disease in Dogs and Cats
Breed Predispositions to Disease in Dogs and Cats

It is well known that most breeds of dogs and cats have diseases and disorders to which they are particularly prone. Breed predispositions are often listed under specific disease conditions in the published literature and textbooks. However, it is hard to find a source of information that lists these conditions by breed.

This book...

unlimited object storage image
Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy