|
|
|
|
|
| | Cryptographic Security Architecture: Design and VerificationThis book describes various aspects of cryptographic security architecture design, with a particular emphasis on the use of rigorous security models and practices in the design. The first portion of the book presents the overall architectural basis for the design, providing a general overview of features such as the object model and... | | Enabling eBusiness - Integrating Technologies Architectures & ApplicationsThis book describes the technical architecture and components that can be integrated in order to provide a comprehensive and robust infrastructure on which to build successful e-Business. It is essential reading for technical and functional team leaders and strategists, who analyse the options, limitations and possibilities for new technology and... |
|
|
| | XAML Developer Reference
XAML is ubiquitous today. Whether with Silverlight, WPF, WF, various XPS formats, or XML-based formats, XAML is being used in a whole lot of Microsoft platform- based technologies. Though based on XML, XAML is unlike most other markup languages, because it is strongly linked to CLR assemblies through its objects.
... | | Principles of Data Mining (Undergraduate Topics in Computer Science)
Data Mining, the automatic extraction of implicit and potentially useful information from data, is increasingly used in commercial, scientific and other application areas.
Principles of Data Mining explains and explores the principal techniques of Data Mining: for classification, association rule mining and clustering. Each... |
|
|
Result Page: 297 296 295 294 293 292 291 290 289 288 287 286 285 284 283 282 281 280 279 |