 |
|
 Data Mining : Concepts, Models, Methods, and AlgorithmsWe are surrounded by data, numerical and otherwise, which must be analyzed and processed to convert it into information that informs, instructs, answers, or otherwise aids understanding and decision-making. Due to the ever-increasing complexity and size of today’s data sets, a new term, data mining, was created to describe the... |  |  XML and ASP.NETXML and ASP.NET is the one book you need to master XML in the .NET Framework. It includes all of the technologies needed to program .NET web applications including XPath, XSLT, XML Schemas, and the Microsoft XML Parsers. This book also incorporates an incredible breadth of XML technologies... |  |  Understanding WMI Scripting (HP Technologies)Understanding WMI Scripting is the first book of two dedicated to Windows Management Instrumentation (WMI). This first book explains to Windows Administrators the various WMI scripting techniques available to ease their day-to-day management tasks. Under Windows Server 2003, Microsoft made solid enhancements in WMI. This... |
|
|
|
 The Art of Computer Programming, Volume 2: Seminumerical Algorithms (2nd Edition)Knuth's multivolume work, widely recognized as the definitive description of classical computer science, is now available in an attractive, boxed set. The three volumes included in this set have each been revised recently to reflect developments in the field. As earlier editions clearly demonstrated, they comprise an invaluable resource in... |  |  Cisco IOS in a NutshellThis two-part reference covers IOS configuration for the TCP/IP protocol family. The first part includes chapters on the user interface, configuring lines and interfaces, access lists, routing protocols, and dial-on-demand routing and security. The second part is a classic O'Reilly-style quick reference to all the commands you need to work with... |  |  IT Security: Risking the CorporationEven the world's largest and most sophisticated networks are vulnerable to attack-and so is yours. The scenarios described in IT Security:Risking the Corporation expose crucial flaws in operating systems, networks, servers, and software-as well as the vulnerability caused by poor training,... |
|
Result Page: 85 84 83 82 81 80 79 78 77 76 75 74 73 72 71 70 69 68 67 |