Home | Amazing | Today | Tags | Publishers | Years | Search 
Applications of Data Mining in E-Business and Finance (Frontiers in Artificial Intelligence and Applications)
Applications of Data Mining in E-Business and Finance (Frontiers in Artificial Intelligence and Applications)
The application of Data Mining (DM) technologies has shown an explosive growth in an increasing number of different areas of business, government and science. Two of the most important business areas are finance, in particular in banks and insurance companies, and e-business, such as web portals, e-commerce and ad management services.In...
Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence
Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence
Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism investigations as well as performing business competition analysis and acquiring...
Databases and Information Systems VI: Selected Papers from the Ninth International Baltic Conference, DB&IS 2010 - Volume 224 Frontiers in Artificial Intelligence and Applications
Databases and Information Systems VI: Selected Papers from the Ninth International Baltic Conference, DB&IS 2010 - Volume 224 Frontiers in Artificial Intelligence and Applications
This volume presents papers from the Ninth International Baltic Conference on Databases and Information Systems (Baltic DB&IS 2010) which took place in Riga, Latvia, in July 2010. Since this successful biennial series began in 1994, the Baltic DB&IS conferences have become an international forum of high scientific criteria for...
Prehospital Trauma Care
Prehospital Trauma Care

Comprehensive in scope and content, Prehospital Trauma Care (PTC) covers all aspects of emergency medicine-triage assessment and treatment, anesthesia, intensive care, psychiatry, health and military disasters, burns, shock, and surgery.
Written by over 70 distinguished international experts representing Australia, Austria, Belgium,
...

Use of Force: A Thriller (The Scot Harvath Series)
Use of Force: A Thriller (The Scot Harvath Series)

“With his latest pulse-pounding adventure, Brad Thor puts the rest of the genre on notice—Use of Force is the thriller to beat in 2017.”—The Real Book Spy

From #1 New York Times bestselling author Brad Thor.

As a storm rages across the Mediterranean Sea, a
...

Alzheimer's Disease: A Century of Scientific And Clinical Research (Stand Alone)
Alzheimer's Disease: A Century of Scientific And Clinical Research (Stand Alone)

This publication is a landmark work commemorating the centennial of Alois Alzheimer's discovery of what would be known as Alzheimer's disease (AD). The centennial of Alois Alzheimer's original description of the disease that would come to bear his name offers a vantage point from which to commemorate the seminal discoveries in the...

Differential Diagnosis in Neurology (Biomedical and Health Research, Vol. 67)
Differential Diagnosis in Neurology (Biomedical and Health Research, Vol. 67)

Differential Diagnosis in Neurology grew out of the author's daily morning reports with neurology residents and the examination of patients in front of colleagues over the last 30 years. The essence of 'differential diagnosis' is 'splitting' rather than 'lumping'. It requires bringing knowledge to the table and...

The Dynamics of Radicalization: A Relational and Comparative Perspective
The Dynamics of Radicalization: A Relational and Comparative Perspective

Why is it that some social movements engaged in contentious politics experience radicalization whereas others do not? The Dynamics of Radicalization offers an innovative reply by investigating how and when social movement organizations switch from a nonviolent mode of contention to a violent one. Moving beyond existing explanations...

Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions
Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions

The intersection of politics, law, privacy, and security in the context of computer technology is both sensitive and complex. Computer viruses, worms, Trojan horses, spy-ware, computer exploits, poorly designed software, inadequate technology laws, politics and terrorism all of these have a profound effect on our daily computing operations...

Preparing for the Worst: A Comprehensive Guide to Protecting Your Family from Terrorist Attacks, Natural Disasters, and Other Catastrophes
Preparing for the Worst: A Comprehensive Guide to Protecting Your Family from Terrorist Attacks, Natural Disasters, and Other Catastrophes

Preparing for the Worst details the best practices in antiterrorism tactics and preparing for disaster. This book is for typical American families, business travelers, corporate executive management personnel, emergency first responders, school administrators, and local government officials responsible for public safety and emergency...

Business Continuity Management: Building an Effective Incident Management Plan
Business Continuity Management: Building an Effective Incident Management Plan

Whether an international corporation or a small business, developing and utilizing

a Business Continuity Management (BCM) Plan protects companies and their personnel, facilities, materials, and activities from the broad spectrum of risks that face businesses and government agencies on a daily basis, whether at home or
...
Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols
Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols

As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present day and next generation of tools and techniques used in covert communications,...

Result Page: 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy