Сборник - От Зайцев Нет. На Новогодний Корпоратив Музыка 2017 (2016) MP3 | - Wild Hokkaido S01E10 Kushiro Wetland XviD-AFG | Chiwetel Ejiofor
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Handbook of Financial Risk Management: Simulations and Case Studies
Handbook of Financial Risk Management: Simulations and Case Studies

An authoritative handbook on risk management techniques and simulations as applied to financial engineering topics, theories, and statistical methodologies

The Handbook of Financial Risk Management: Simulations and Case Studies illustrates the prac­tical implementation of simulation techniques in the banking and...

Microsoft SQL Server 2012 Analysis Services: The BISM Tabular Model
Microsoft SQL Server 2012 Analysis Services: The BISM Tabular Model

When we, the authors of this book, first learned what Microsoft’s plans were for Analysis Services in the SQL Server 2012 release, we were not happy. Analysis Services hadn’t acquired much in the way of new features since 2005, even though in the meantime it had grown to become the biggest-selling OLAP tool. It seemed as...

Network Intrusion Detection (3rd Edition)
Network Intrusion Detection (3rd Edition)

Our goal in writing Network Intrusion Detection, Third Edition has been toempower you as an analyst. We believe that if you read this book cover to cover,and put the material into practice as you go, you will be ready to enter theworld of intrusion analysis. Many people have read our books, or attended ourlive class offered by SANS, and the...

Multiobjective Genetic Algorithms for Clustering: Applications in Data Mining and Bioinformatics
Multiobjective Genetic Algorithms for Clustering: Applications in Data Mining and Bioinformatics

Clustering is an important unsupervised classification technique where a set of patterns, usually vectors in multidimensional space, are grouped into clusters based on some similarity or dissimilarity criteria. In crisp clustering, each pattern is assigned to exactly one cluster, whereas in fuzzy clustering, each pattern is given a...

Why Kids Kill: Inside the Minds of School Shooters
Why Kids Kill: Inside the Minds of School Shooters

Ten years after the school massacre at Columbine High School in Colorado, school shootings are a new and alarming epidemic. While sociologists have attributed the trigger of violence to peer pressure, such as bullying and social isolation, prominent...

Post-mining of Association Rules: Techniques for Effective Knowledge Extraction
Post-mining of Association Rules: Techniques for Effective Knowledge Extraction

Since its introduction for market basket analysis in the early 1990s, association rule mining has had a lot of research attention, and it is now widely used in many fields, for example in retail, telecom, insurance, and bioinformatics applications.

One familiar problem encountered in association mining exercises is that they...

SQL The Complete Reference, 3rd Edition
SQL The Complete Reference, 3rd Edition

Get comprehensive coverage of every aspect of SQL from three leading industry experts. Revised with coverage of the latest RDBMS software versions, this one-stop guide explains how to build, populate, and administer high-performance databases and develop robust SQL-based applications. 

SQL: The Complete Reference, Third...

Maintaining Team Performance (Center for Creative Leadership)
Maintaining Team Performance (Center for Creative Leadership)
Between the time a team is launched and the time it delivers results, managers need to know that the team is on course. Whether they have launched a team to achieve a business objective or have inherited a team, they need to monitor effectiveness on an ongoing basis and make course corrections that keep small problems from becoming major...
Distributed Algorithms (The Morgan Kaufmann Series in Data Management Systems)
Distributed Algorithms (The Morgan Kaufmann Series in Data Management Systems)
In Distributed Algorithms, Nancy Lynch provides a blueprint for designing, implementing, and analyzing distributed algorithms. She directs her book at a wide audience, including students, programmers, system designers, and researchers.

Distributed Algorithms
contains the most significant algorithms and impossibility
...
Clustering (IEEE Press Series on Computational Intelligence)
Clustering (IEEE Press Series on Computational Intelligence)
Clustering has become an increasingly important topic in recent years, caused by the glut of data from a wide variety of disciplines. However, due to the lack of good communication among these communities, similar theories or algorithms are redeveloped many times, causing unnecessary waste of time and resources. Furthermore, different terminologies...
Numerical Methods for Image Registration (Numerical Mathematics and Scientific Computation)
Numerical Methods for Image Registration (Numerical Mathematics and Scientific Computation)

Based on the author's lecture notes and research, this well-illustrated and comprehensive text is one of the first to provide an introduction to image registration with particular emphasis on numerical methods in medical imaging. Ideal for researchers in industry and academia, it is also a suitable study guide for graduate mathematicians,...

Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It
Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It

As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to...

Result Page: 37 36 35 34 33 32 31 30 29 28 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy