You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This textbook presents a practical approach to predictive analytics for classroom learning. It focuses on using analytics to solve business problems and compares several different modeling techniques, all explained from examples using the SAS Enterprise Miner software. The authors demystify complex algorithms to show how they can be utilized and explained within the context of enhancing business opportunities. Each chapter includes an opening vignette that provides real-life example of how business analytics have been used in various aspects of organizations to solve issue or improve their results. A running case provides an example of a how to build and analyze a complex analytics model and utilize it to predict future outcomes.
The new edition of this textbook presents a practical, updated approach to predictive analytics for classroom learning. The authors focus on using analytics to solve business problems and compares several different modeling techniques, all explained from examples using the SAS Enterprise Miner software. The authors demystify complex algorithms to show how they can be utilized and explained within the context of enhancing business opportunities. Each chapter includes an opening vignette that provides real-life examples of how business analytics have been used in various aspects of organizations to solve issues or improve their results. A running case provides an example of a how to build and analyze a complex analytics model and utilize it to predict future outcomes. The new edition includes chapters on clusters and associations and text mining to support predictive models. An additional case is also included that can be used with each chapter or as a semester project.
"This book's goal is to define electronic SPAM and place its legal implications into context for the readers"--Provided by publisher.
"This book offers a review of recent developments of computer security, focusing on the relevance and implications of global privacy, law, and politics for society, individuals, and corporations.It compiles timely content on such topics as reverse engineering of software, understanding emerging computer exploits, emerging lawsuits and cases, global and societal implications, and protection from attacks on privacy"--Provided by publisher.
Threatening the safety of individuals, computers, and entire networks, cyber crime attacks vary in severity and type. Studying this continually evolving discipline involves not only understanding different types of attacks, which range from identity theft to cyberwarfare, but also identifying methods for their prevention. Cyber Crime: Concepts, Methodologies, Tools and Applications is a three-volume reference that explores all aspects of computer-based crime and threats, offering solutions and best practices from experts in software development, information security, and law. As cyber crime continues to change and new types of threats emerge, research focuses on developing a critical understanding of different types of attacks and how they can best be managed and eliminated.
Containing cases decided by the Supreme Court of Pennsylvania.
From 1900 to 1908 includes the "Annual digest of Canadian cases ... decided in the Judicial Committee of the Privy Council, in the Supreme and Exchequer Courts of Canada, and in the courts of the provinces ... Edited by Edward B. Brown."
The book deals the main and compulsory lessons of the Department of Computer Engineering, in an easy, simple and adequate way to understand the topics of computer engineering and similar departments, this book is considered as a booklet for undergraduate students, and even for doctoral students, where it shortens the way for doctoral students to review the basic lessons of the Department of Computer Engineering, and Also, the way is shortened for engineering students and those interested in the Computer Department to learn the main curriculum for the department in a brief way. The book deals with topics COMPUTER NETWORKS, PROGRAMMING LANGUAGES, SOFTWARE ENGINEERING, SOFTWARE MODELING LANGUAGES AND UML, OBJECT ORIENTED PROGRAMMING, DATA STRUCTURES AND DATA MODELS, DATABASE MANAGEMENT AND SQL, DISCRETE MATHEMATICS, BOOLEAN ALGEBRA, LOGIC CIRCUITS, ALGORITHM AND FLOW CHARTS, MICROPROCESSOR, PROGRAMMING IN ASSEMBLY LANGUAGE, and OPERATING SYSTEMS.
This collection of papers from the 2005 International Conference on Knowledge Management, organized jointly by the Information and Knowledge Management Society and the American Society for Information Science and Technology, represents some of the best work by researchers and practitioners in the field of knowledge management.It covers a wide range of topics that include knowledge sharing and knowledge utilization, knowledge discovery, knowledge organization, communities and collaborations, organizational issues, knowledge management strategies and implementations, knowledge management education, innovation, measurements, and business intelligence.This book will appeal to knowledge management professionals as well as academicians looking for a deeper understanding of knowledge management research and practical implementations.
The rapid development of new Information Infrastructure combined with the increased user needs in specific areas of Information Technology (mostly related to Web applications) has created the need for designing new modeling techniques more innovative and targeted on specific areas of Information Systems in order to successfully model the rapidly changed environment, along with the newly introduced concepts and user requirements. Therefore, this book aims to introduce readers to a number of innovative Information modeling techniques. It is titled "Innovative Information Systems Modelling Techniques" and includes 9 chapters. The focus is on the exploration and coverage of the innovations of recently presented modeling techniques and their applicability on the Information Systems' modeling.