| Data Mining, the automatic extraction of implicit and potentially useful information from data, is increasingly used in commercial, scientific and other application areas.
This book explains and explores the principal techniques of Data Mining: for classification, generation of association rules and clustering. It is written for readers without a strong background in mathematics or statistics and focuses on detailed examples and explanations of the algorithms given. This should prove of value to readers of all kinds, from those whose only use of data mining techniques will be via commercial packages right through to academic researchers.
This book aims to help the general reader develop the necessary understanding to use commercial data mining packages discriminatingly, as well as enabling the advanced reader to understand or contribute to future technical advances in the field. Each chapter has practical exercises to enable readers to check their progress. A full glossary of technical terms used is included. |
|
|
Forecasting Oracle PerformanceThis book is a “how to” book filled with examples to transform theory and mathematics into something you can practically apply. You will learn how to use a variety of forecasting models, which will enable you to methodically:
- Help manage service levels from a business value perspective,
- Identify the risk of
... | | Wireless Communications (Wiley - IEEE)
"Professor Andreas F. Molisch, renowned researcher and educator, has put together the comprehensive book, Wireless Communications. The second edition, which includes a wealth of new material on important topics, ensures the role of the text as the key resource for every student, researcher, and practitioner in the... | | Firewalls: Jumpstart for Network and Systems AdministratorsSecurity advice for any organization from a consultant with decades of experience
In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement... |
|