Search alternatives:
data collection » a collection

1
by Sharma, A. K.
Published 2013
Pearson
Subjects: ...Data structures (Computer science) / http://id.loc.gov/authorities/subjects/sh85035862...

2
by Kalyvas, James R., Overly, Michael R.
Published 2015
CRC Press
Table of Contents: ... and risk assessment / Eileen R. Ridley -- chapter 7. Licensing big data / Aaron K. Tantleff -- chapter 8...

3 Subjects: ...data processing / aat...

4
by Grus, Joel
Published 2015
O'Reilly Media
Table of Contents: ... Books About Data -- Using APIs -- JSON (and XML) -- Using an Unauthenticated API -- Finding APIs...

5
by Reddy, K. Siva Prasad
Published 2017
[Apress], Distributed to the Book trade worldwide by Springer
Subjects: ...data processing / aat...

6
by Ravikumar, Y. V, Krishnakumar, K. M., Basha, Nassyam
Published 2017
Apress, Distributed to the Book trade worldwide by Springer
Table of Contents: ... Collection; Time Zone Version; Datafile Status; CONNECT Role...

7
by Doraiswamy, L. K., Üner, Deniz
Published 2014
Taylor & Francis
Table of Contents: ... -- Reactions with an interface: mass and heat transfer effects -- Laboratory reactors: collection and analysis...

8
by Choy, Esther K.
Published 2017
Amacom
Table of Contents: ...'s Listening -- CHAPTER 4: Telling Stories with Data -- CHAPTER 5: Making the Complex Clear -- CHAPTER 6...

9
by Chatekar, Suhas
Published 2015
Packt Publishing
Table of Contents: ... by code for the employee benefits domain; Fluent mapping a.k.a. Fluent NHibernate; Inheritance mappings...

10
by Tan, Joseph K. H.
Published 2005
Jossey-Bass
Table of Contents: ... intelligence : a multiple-level clustering approach for e-health data mining / Chih-Ping Wei [and others] -- E...

11
Published 2019
John Wiley & Sons, Inc.
Table of Contents: ..., and Sandeep K. S. Gupta --...

12
by Rogers, Paul
Published 2007
IBM
Subjects: ...Data encryption (Computer science) / fast...

13
by Sachowski, Jason
Published 2019
CRC Press
Table of Contents: ... -- H. Threat modeling -- I. Data warehouse introduction -- J. Requirements analysis -- K. Investigative...

14
Published 2013
CRC Press, Taylor & Francis Group
Table of Contents: ... security monitoring data streams / Y. Ren, H. Li, H. Lv and H. Lv -- Arithmetic labeling about the Graph C4...

15
by Panzarino, Onofrio
Published 2014
Packt Pub.
Table of Contents: ...-and-write queries; Modifying existing data; Creating unique patterns; Complex patterns; Setting properties...

16
by Fields, Edward
Published 2016
AMACOM, American Management Association
Table of Contents: ...The 10-K Report; The Proxy Statement; Other Sources of Information; The Securities and Exchange...

17
by Andersson, Oivind
Published 2012
Wiley
Table of Contents: ...: Data Collection -- Phase III: Analysis and Synthesis...

18 Table of Contents: ...Chapter 2: Market Basket Analysis (Association Rule Mining) -- Implementation -- Data Collection...

19
by Deitel, Paul J.
Published 2007
Pearson Prentice Hall
Table of Contents: ... handling -- Files and streams -- Recursion -- Searching and sorting -- Data structures -- Generics...

20
Published 2017
Syngress
Table of Contents: ... -- References -- 13. Cloud Storage Forensics: Analysis of Data Remnants on SpiderOak, JustCloud, and pCloud / K...