Join thousands of book lovers
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.You can, at any time, unsubscribe from our newsletters.
This book is a useful resource for researchers, software developers, educators and managers who want to understand both the high level concepts as well as the technical details on the design and implementation of secure data science-based systems. It can also be used as a reference book for a graduate course in Secure Data Science.
Taking a data-centric perspective, this book provides a complete overview of data mining: its uses, methods, technologies, commercial products, and future challenges. Three parts divide Data Mining: Part I describes technologies for data mining; Part II presents tools and techniques; Part III examines emerging trends. Accessible and self-contained, the book also contains two appendices that provide information on technologies such as data management, and artificial intelligence. The book provides singular guidance on appropriate techniques for specific applications and thoroughly assesses data mining product information.
This reference for database administrators, database designers, and Web designers working in tandem with database technologists covers three emerging technologies of significant impact for electronic business: Extensible Markup Language (XML), Semi-structured Databases, and the Semantic Web. The first three parts of the book explore these emerging technologies. The fourth part highlights the implications of these technologies for E-Business. Overall, the book presents a comprehensive view of critical technologies for the Web in general and XML in particular.
Reviews various developments in security, with an emphasis on the protection of databases. This book covers such topics as discretionary access control, multilevel secure databases, and models, functions, prototypes, and products of multilevel secure relational systems.
Showing how data mining tools are developed, this practical guide explains how to use intrusion detection for security applications, Web page surfing prediction for e-commerce applications, and image classification for multimedia applications. It reviews data mining techniques, such as neural networks and support vector machines.
Including exercises, this book presents discussions of XML security, RDF security, and secure information integration. It provides coverage of privacy for the semantic web, secure web services, as well as dependability issues such as real-time processing, faulty tolerance, and integrity for the semantic web.
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.