|
|
|
|
|
|
Date Reviewed |
|
|
1 - 7 of 7
reviews
|
|
|
|
|
|
|
|
Core data analysis: summarization, correlation, and visualization (2nd ed.) Mirkin B., Springer International Publishing, New York, NY, 2019. 540 pp. Type: Book (978-3-030002-70-1), Reviews: (2 of 2)
This interesting textbook on data analysis considers summarization as a means for developing and augmenting analytical concepts; correlation for enhancing and establishing relations; and visualization as a means to “presentin...
|
May 5 2022 |
|
|
|
|
|
|
Introduction to the new statistics: estimation, open science, and beyond Cumming G., Calin-Jageman R., Routledge, New York, NY, 2016. 594 pp. Type: Book (978-1-138825-52-9)
Statistics has many varied uses in society. This introductory statistics book would be of interest to undergraduate statistics students, university lecturers, and researchers. The book examines the use of statistics with regard to deve...
|
Aug 31 2017 |
|
|
|
|
|
|
Big data applications and use cases Hung P., Springer International Publishing, New York, NY, 2016. 214 pp. Type: Book (978-3-319301-44-0)
This book would be of interest to researchers and practitioners in the data analytics field. It examines the characteristics of big data; the uses of big data, including government, marketing, insurance, the Internet of Things, and hea...
|
Aug 9 2017 |
|
|
|
|
|
|
MySQL for the Internet of Things Bell C., Apress, New York, NY, 2016. 335 pp. Type: Book (978-1-484212-94-3), Reviews: (1 of 2)
This book would be of interest to researchers and practitioners in the field of the Internet of Things (IoT). It examines the nature of IoT, hardware for IoT systems, how IoT data is stored and transmitted, and how MySQL can be used in...
|
Nov 29 2016 |
|
|
|
|
|
|
Applications of secure multiparty computation Kamm P., Laud L., IOS PRESS, Amsterdam, The Netherlands, 2015. 264 pp. Type: Book (978-1-614995-31-9)
This book will be of interest to researchers and practitioners in the field of secure analysis of confidential data. It examines the security-efficiency tradeoffs relating to different aspects of secure multiparty computation. In parti...
|
Apr 5 2016 |
|
|
|
|
|
|
The InfoSec handbook: an introduction to information security Rao U., Nayak U., Apress, New York, NY, 2014. 392 pp. Type: Book (978-1-430263-82-1)
This book comprehensively covers the main principles and practices of information security, application security, network security, and physical security at an introductory level. It would be suitable as an undergraduate textbook for s...
|
Apr 2 2015 |
|
|
|
|
|
|
Android apps for absolute beginners (2nd ed.) Jackson W., Apress, Berkeley, CA, 2012. 404 pp. Type: Book (978-1-430247-88-3)
Complete beginners to Android application development will find this guide easy to read and follow, covering what is involved in Android application development and how it is done. In particular, the book clearly explains each new tech...
|
Feb 27 2013 |
|
|
|
|
|
|
|
|
|
|
|