Flylib.com
Index_H
Previous page
Table of content
Next page
H
HNC software, 146–47
algorithms, 146
cluster trees, 147
See also
Text mining tools
Previous page
Table of content
Next page
Investigative Data Mining for Security and Criminal Detection
ISBN: 0750676132
EAN: 2147483647
Year: 2005
Pages: 232
Authors:
Jesus Mena
BUY ON AMAZON
Java I/O
Byte Arrays
Little-Endian Numbers
Inflaters and Deflaters
Piped Readers and Writers
Finding Devices
Strategies for Information Technology Governance
Structures, Processes and Relational Mechanisms for IT Governance
Measuring ROI in E-Commerce Applications: Analysis to Action
Technical Issues Related to IT Governance Tactics: Product Metrics, Measurements and Process Control
Managing IT Functions
The Evolution of IT Governance at NB Power
Java How to Program (6th Edition) (How to Program (Deitel))
(Optional) GUI and Graphics Case Study: Using Dialog Boxes
Color Control
Wrap-Up
Introduction
Monitors and Monitor Locks
101 Microsoft Visual Basic .NET Applications
Data Access
Working with the .NET Framework
Advanced .NET Framework
Building Enterprise Services Applications
Visual Studio .NET
InDesign Type: Professional Typography with Adobe InDesign CS2
Leading Menu Options and Keyboard Shortcuts
Apostrophes
Footnotes
Up Next
Creating Styles
Comparing, Designing, and Deploying VPNs
Summary
Configuring and Verifying L2TPv3 Pseudowires
Implementing QoS for MPLS Layer 3 VPNs
Advantages and Disadvantages of IPsec Site-to-Site VPNs
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies