Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
Taking a data-centric perspective, this book provides a complete overview of data mining: its uses, methods, technologies, commercial products, and future challenges. Three parts divide Data Mining: Part I describes technologies for data mining; Part II presents tools and techniques; Part III examines emerging trends. Accessible and self-contained, the book also contains two appendices that provide information on technologies such as data management, and artificial intelligence. The book provides singular guidance on appropriate techniques for specific applications and thoroughly assesses data mining product information.
This reference for database administrators, database designers, and Web designers working in tandem with database technologists covers three emerging technologies of significant impact for electronic business: Extensible Markup Language (XML), Semi-structured Databases, and the Semantic Web. The first three parts of the book explore these emerging technologies. The fourth part highlights the implications of these technologies for E-Business. Overall, the book presents a comprehensive view of critical technologies for the Web in general and XML in particular.
Reviews various developments in security, with an emphasis on the protection of databases. This book covers such topics as discretionary access control, multilevel secure databases, and models, functions, prototypes, and products of multilevel secure relational systems.
Covers three technologies of impact for electronic business: Extensible Markup Language (XML), Semi-structured Databases, and the Semantic Web. This book highlights the implications of these technologies for E-Business. It presents a comprehensive view of critical technologies for the Web in general and XML in particular.
Showing how data mining tools are developed, this practical guide explains how to use intrusion detection for security applications, Web page surfing prediction for e-commerce applications, and image classification for multimedia applications. It reviews data mining techniques, such as neural networks and support vector machines.
Including exercises, this book presents discussions of XML security, RDF security, and secure information integration. It provides coverage of privacy for the semantic web, secure web services, as well as dependability issues such as real-time processing, faulty tolerance, and integrity for the semantic web.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.