![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Applications of computing > Databases > Data mining
Learn How to Properly Use the Latest Analytics Approaches in Your Organization Computational Business Analytics presents tools and techniques for descriptive, predictive, and prescriptive analytics applicable across multiple domains. Through many examples and challenging case studies from a variety of fields, practitioners easily see the connections to their own problems and can then formulate their own solution strategies. The book first covers core descriptive and inferential statistics for analytics. The author then enhances numerical statistical techniques with symbolic artificial intelligence (AI) and machine learning (ML) techniques for richer predictive and prescriptive analytics. With a special emphasis on methods that handle time and textual data, the text: Enriches principal component and factor analyses with subspace methods, such as latent semantic analyses Combines regression analyses with probabilistic graphical modeling, such as Bayesian networks Extends autoregression and survival analysis techniques with the Kalman filter, hidden Markov models, and dynamic Bayesian networks Embeds decision trees within influence diagrams Augments nearest-neighbor and k-means clustering techniques with support vector machines and neural networks These approaches are not replacements of traditional statistics-based analytics; rather, in most cases, a generalized technique can be reduced to the underlying traditional base technique under very restrictive conditions. The book shows how these enriched techniques offer efficient solutions in areas, including customer segmentation, churn prediction, credit risk assessment, fraud detection, and advertising campaigns.
This comprehensive volume presents the foundations of linear algebra ideas and techniques applied to data mining and related fields. Linear algebra has gained increasing importance in data mining and pattern recognition, as shown by the many current data mining publications, and has a strong impact in other disciplines like psychology, chemistry, and biology. The basic material is accompanied by more than 550 exercises and supplements, many accompanied with complete solutions and MATLAB applications.
Powerful, Flexible Tools for a Data-Driven WorldAs the data deluge continues in today's world, the need to master data mining, predictive analytics, and business analytics has never been greater. These techniques and tools provide unprecedented insights into data, enabling better decision making and forecasting, and ultimately the solution of increasingly complex problems. Learn from the Creators of the RapidMiner Software Written by leaders in the data mining community, including the developers of the RapidMiner software, RapidMiner: Data Mining Use Cases and Business Analytics Applications provides an in-depth introduction to the application of data mining and business analytics techniques and tools in scientific research, medicine, industry, commerce, and diverse other sectors. It presents the most powerful and flexible open source software solutions: RapidMiner and RapidAnalytics. The software and their extensions can be freely downloaded at www.RapidMiner.com. Understand Each Stage of the Data Mining ProcessThe book and software tools cover all relevant steps of the data mining process, from data loading, transformation, integration, aggregation, and visualization to automated feature selection, automated parameter and process optimization, and integration with other tools, such as R packages or your IT infrastructure via web services. The book and software also extensively discuss the analysis of unstructured data, including text and image mining. Easily Implement Analytics Approaches Using RapidMiner and RapidAnalytics Each chapter describes an application, how to approach it with data mining methods, and how to implement it with RapidMiner and RapidAnalytics. These application-oriented chapters give you not only the necessary analytics to solve problems and tasks, but also reproducible, step-by-step descriptions of using RapidMiner and RapidAnalytics. The case studies serve as blueprints for your own data mining applications, enabling you to effectively solve similar problems.
There are many webinars and training courses on Data Analytics for Internal Auditors, but no handbook written from the practitioner's viewpoint covering not only the need and the theory, but a practical hands-on approach to conducting Data Analytics. The spread of IT systems makes it necessary that auditors as well as management have the ability to examine high volumes of data and transactions to determine patterns and trends. The increasing need to continuously monitor and audit IT systems has created an imperative for the effective use of appropriate data mining tools. This book takes an auditor from a zero base to an ability to professionally analyze corporate data seeking anomalies.
Expert Bytes: Computer Expertise in Forensic Documents - Players, Needs, Resources and Pitfalls -introduces computer scientists and forensic document examiners to the computer expertise of forensic documents and assists them with the design of research projects in this interdisciplinary field. This is not a textbook on how to perform the actual forensic document expertise or program expertise software, but a project design guide, an anthropological inquiry, and a technology, market, and policies review. After reading this book you will have deepened your knowledge on: What computational expertise of forensic documents is What has been done in the field so far and what the future looks like What the expertise is worth, what its public image is, and how to improve both Who is doing what in the field, where, and for how much How the expertise software functions The primary target readers are computer scientists and forensic document examiners, at the student and professional level. Paleographers, historians of science and technology, and scientific policy makers can also profit from the book. Concise and practical, featuring an attractive and functional layout design, the book is supplemented with graphical data representations, statistics, resource lists, and extensive references to facilitate further study.
New technologies have enabled us to collect massive amounts of data in many fields. However, our pace of discovering useful information and knowledge from these data falls far behind our pace of collecting the data. Data Mining: Theories, Algorithms, and Examples introduces and explains a comprehensive set of data mining algorithms from various data mining fields. The book reviews theoretical rationales and procedural details of data mining algorithms, including those commonly found in the literature and those presenting considerable difficulty, using small data examples to explain and walk through the algorithms. The book covers a wide range of data mining algorithms, including those commonly found in data mining literature and those not fully covered in most of existing literature due to their considerable difficulty. The book presents a list of software packages that support the data mining algorithms, applications of the data mining algorithms with references, and exercises, along with the solutions manual and PowerPoint slides of lectures. The author takes a practical approach to data mining algorithms so that the data patterns produced can be fully interpreted. This approach enables students to understand theoretical and operational aspects of data mining algorithms and to manually execute the algorithms for a thorough understanding of the data patterns produced by them.
Going beyond performing simple analyses, researchers involved in the highly dynamic field of computational intelligent data analysis design algorithms that solve increasingly complex data problems in changing environments, including economic, environmental, and social data. Computational Intelligent Data Analysis for Sustainable Development presents novel methodologies for automatically processing these types of data to support rational decision making for sustainable development. Through numerous case studies and applications, it illustrates important data analysis methods, including mathematical optimization, machine learning, signal processing, and temporal and spatial analysis, for quantifying and describing sustainable development problems. With a focus on integrated sustainability analysis, the book presents a large-scale quadratic programming algorithm to expand high-resolution input-output tables from the national scale to the multinational scale to measure the carbon footprint of the entire trade supply chain. It also quantifies the error or dispersion between different reclassification and aggregation schemas, revealing that aggregation errors have a high concentration over specific regions and sectors. The book summarizes the latest contributions of the data analysis community to climate change research. A profuse amount of climate data of various types is available, providing a rich and fertile playground for future data mining and machine learning research. The book also pays special attention to several critical challenges in the science of climate extremes that are not handled by the current generation of climate models. It discusses potential conceptual and methodological directions to build a close integration between physical understanding, or physics-based modeling, and data-driven insights. The book then covers the conservation of species and ecologically valuable land. A case study on the Pennsylvania Dirt and Gravel Roads Program demonstrates that multiple-objective linear programming is a more versatile and efficient approach than the widely used benefit targeting selection process. Moving on to renewable energy and the need for smart grids, the book explores how the ongoing transformation to a sustainable energy system of renewable sources leads to a paradigm shift from demand-driven generation to generation-driven demand. It shows how to maximize renewable energy as electricity by building a supergrid or mixing renewable sources with demand management and storage. It also presents intelligent data analysis for real-time detection of disruptive events from power system frequency data collected using an existing Internet-based frequency monitoring network as well as evaluates a set of computationally intelligent techniques for long-term wind resource assessment. In addition, the book gives an example of how temporal and spatial data analysis tools are used to gather knowledge about behavioral data and address important social problems such as criminal offenses. It also applies constraint logic programming to a planning problem: the environmental and social impact assessment of the regional energy plan of the Emilia-Romagna region of Italy. Sustainable development problems, such as global warming, resource shortages, global species loss, and pollution, push researchers to create powerful data analysis approaches that analysts can then use to gain insight into these issues to support rational decision making. This volume shows both the data analysis and sustainable development communities how to use intelligent data analysis tools to address practical problems and encourages researchers to develop better methods.
A Fruitful Field for Researching Data Mining Methodology and for
Solving Real-Life Problems Learn from Real Case Studies of Contrast Mining
Applications
An up-to-date, self-contained introduction to a state-of-the-art machine learning approach, Ensemble Methods: Foundations and Algorithms shows how these accurate methods are used in real-world tasks. It gives you the necessary groundwork to carry out further research in this evolving field. After presenting background and terminology, the book covers the main algorithms and theories, including Boosting, Bagging, Random Forest, averaging and voting schemes, the Stacking method, mixture of experts, and diversity measures. It also discusses multiclass extension, noise tolerance, error-ambiguity and bias-variance decompositions, and recent progress in information theoretic diversity. Moving on to more advanced topics, the author explains how to achieve better performance through ensemble pruning and how to generate better clustering results by combining multiple clusterings. In addition, he describes developments of ensemble methods in semi-supervised learning, active learning, cost-sensitive learning, class-imbalance learning, and comprehensibility enhancement.
Leverage the full power of Bayesian analysis for competitive advantage Bayesian methods can solve problems you can't reliably handle any other way. Building on your existing Excel analytics skills and experience, Microsoft Excel MVP Conrad Carlberg helps you make the most of Excel's Bayesian capabilities and move toward R to do even more. Step by step, with real-world examples, Carlberg shows you how to use Bayesian analytics to solve a wide array of real problems. Carlberg clarifies terminology that often bewilders analysts, and offers sample R code to take advantage of the rethinking package in R and its gateway to Stan. As you incorporate these Bayesian approaches into your analytical toolbox, you'll build a powerful competitive advantage for your organization-and yourself. Explore key ideas and strategies that underlie Bayesian analysis Distinguish prior, likelihood, and posterior distributions, and compare algorithms for driving sampling inputs Use grid approximation to solve simple univariate problems, and understand its limits as parameters increase Perform complex simulations and regressions with quadratic approximation and Richard McElreath's quap function Manage text values as if they were numeric Learn today's gold-standard Bayesian sampling technique: Markov Chain Monte Carlo (MCMC) Use MCMC to optimize execution speed in high-complexity problems Discover when frequentist methods fail and Bayesian methods are essential-and when to use both in tandem
Drawing on the authors' two decades of experience in applied modeling and data mining, Foundations of Predictive Analytics presents the fundamental background required for analyzing data and building models for many practical applications, such as consumer behavior modeling, risk and marketing analytics, and other areas. It also discusses a variety of practical topics that are frequently missing from similar texts. The book begins with the statistical and linear algebra/matrix foundation of modeling methods, from distributions to cumulant and copula functions to Cornish-Fisher expansion and other useful but hard-to-find statistical techniques. It then describes common and unusual linear methods as well as popular nonlinear modeling approaches, including additive models, trees, support vector machine, fuzzy systems, clustering, naive Bayes, and neural nets. The authors go on to cover methodologies used in time series and forecasting, such as ARIMA, GARCH, and survival analysis. They also present a range of optimization techniques and explore several special topics, such as Dempster-Shafer theory. An in-depth collection of the most important fundamental material on predictive analytics, this self-contained book provides the necessary information for understanding various techniques for exploratory data analysis and modeling. It explains the algorithmic details behind each technique (including underlying assumptions and mathematical formulations) and shows how to prepare and encode data, select variables, use model goodness measures, normalize odds, and perform reject inference. Web ResourceThe book's website at www.DataMinerXL.com offers the DataMinerXL software for building predictive models. The site also includes more examples and information on modeling.
With continuous advancements and an increase in user popularity, data mining technologies serve as an invaluable resource for researchers across a wide range of disciplines in the humanities and social sciences. In this comprehensive guide, author and research scientist Kalev Leetaru introduces the approaches, strategies, and methodologies of current data mining techniques, offering insights for new and experienced users alike. Designed as an instructive reference to computer-based analysis approaches, each chapter of this resource explains a set of core concepts and analytical data mining strategies, along with detailed examples and steps relating to current data mining practices. Every technique is considered with regard to context, theory of operation and methodological concerns, and focuses on the capabilities and strengths relating to these technologies. In addressing critical methodologies and approaches to automated analytical techniques, this work provides an essential overview to a broad innovative field.
Used by corporations, industry, and government to inform and fuel everything from focused advertising to homeland security, data mining can be a very useful tool across a wide range of applications. Unfortunately, most books on the subject are designed for the computer scientist and statistical illuminati and leave the reader largely adrift in technical waters. Revealing the lessons known to the seasoned expert, yet rarely written down for the uninitiated, Practical Data Mining explains the ins-and-outs of the detection, characterization, and exploitation of actionable patterns in data. This working field manual outlines the what, when, why, and how of data mining and offers an easy-to-follow, six-step spiral process. Catering to IT consultants, professional data analysts, and sophisticated data owners, this systematic, yet informal treatment will help readers answer questions, such as:
Helping you avoid common mistakes, the book describes specific genres of data mining practice. Most chapters contain one or more case studies with detailed projects descriptions, methods used, challenges encountered, and results obtained. The book includes working checklists for each phase of the data mining process. Your passport to successful technical and planning discussions with management, senior scientists, and customers, these checklists lay out the right questions to ask and the right points to make from an insider's point of view. Visit the book's webpage for access to additional resources-including checklists, figures, PowerPoint slides, and a small set of simple prototype data mining tools. http: //www.celestech.com/PracticalDataMining
Written by renowned data science experts Foster Provost and Tom Fawcett, Data Science for Business introduces the fundamental principles of data science, and walks you through the "data-analytic thinking" necessary for extracting useful knowledge and business value from the data you collect. This guide also helps you understand the many data-mining techniques in use today. Based on an MBA course Provost has taught at New York University over the past ten years, Data Science for Business provides examples of real-world business problems to illustrate these principles. You'll not only learn how to improve communication between business stakeholders and data scientists, but also how participate intelligently in your company's data science projects. You'll also discover how to think data-analytically, and fully appreciate how data science methods can support business decision-making. Understand how data science fits in your organization - and how you can use it for competitive advantage Treat data as a business asset that requires careful investment if you're to gain real value Approach business problems data-analytically, using the data-mining process to gather good data in the most appropriate way Learn general concepts for actually extracting knowledge from data Apply data science principles when interviewing data science job candidates
Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical aspects. Breaking the mold, Data Mining Tools for Malware Detection provides a step-by-step breakdown of how to develop data mining tools for malware detection. Integrating theory with practical techniques and experimental results, it focuses on malware detection applications for email worms, malicious code, remote exploits, and botnets. The authors describe the systems they have designed and developed: email worm detection using data mining, a scalable multi-level feature extraction technique to detect malicious executables, detecting remote exploits using data mining, and flow-based identification of botnet traffic by mining multiple log files. For each of these tools, they detail the system architecture, algorithms, performance results, and limitations.
From algorithms to experimental results, this is one of the few books that will be equally valuable to those in industry, government, and academia. It will help technologists decide which tools to select for specific applications, managers will learn how to determine whether or not to proceed with a data mining project, and developers will find innovative alternative designs for a range of applications.
Distribution-free resampling methods permutation tests, decision trees, and the bootstrap are used today in virtually every research area. A Practitioner s Guide to Resampling for Data Analysis, Data Mining, and Modeling explains how to use the bootstrap to estimate the precision of sample-based estimates and to determine sample size, data permutations to test hypotheses, and the readily-interpreted decision tree to replace arcane regression methods. Highlights
Statistics practitioners will find the methods described in the text easy to learn and to apply in a broad range of subject areas from A for Accounting, Agriculture, Anthropology, Aquatic science, Archaeology, Astronomy, and Atmospheric science to V for Virology and Vocational Guidance, and Z for Zoology. Practitioners and research workers and in the biomedical, engineering and social sciences, as well as advanced students in biology, business, dentistry, medicine, psychology, public health, sociology, and statistics will find an easily-grasped guide to estimation, testing hypotheses and model building.
The research area of music information retrieval has gradually evolved to address the challenges of effectively accessing and interacting large collections of music and associated data, such as styles, artists, lyrics, and reviews. Bringing together an interdisciplinary array of top researchers, Music Data Mining presents a variety of approaches to successfully employ data mining techniques for the purpose of music processing. The book first covers music data mining tasks and algorithms and audio feature extraction, providing a framework for subsequent chapters. With a focus on data classification, it then describes a computational approach inspired by human auditory perception and examines instrument recognition, the effects of music on moods and emotions, and the connections between power laws and music aesthetics. Given the importance of social aspects in understanding music, the text addresses the use of the Web and peer-to-peer networks for both music data mining and evaluating music mining tasks and algorithms. It also discusses indexing with tags and explains how data can be collected using online human computation games. The final chapters offer a balanced exploration of hit song science as well as a look at symbolic musicology and data mining. The multifaceted nature of music information often requires algorithms and systems using sophisticated signal processing and machine learning techniques to better extract useful information. An excellent introduction to the field, this volume presents state-of-the-art techniques in music data mining and information retrieval to create novel ways of interacting with large music collections.
Increasingly, crimes and fraud are digital in nature, occurring at breakneck speed and encompassing large volumes of data. To combat this unlawful activity, knowledge about the use of machine learning technology and software is critical. Machine Learning Forensics for Law Enforcement, Security, and Intelligence integrates an assortment of deductive and instructive tools, techniques, and technologies to arm professionals with the tools they need to be prepared and stay ahead of the game. Step-by-step instructions The book is a practical guide on how to conduct forensic investigations using self-organizing clustering map (SOM) neural networks, text extraction, and rule generating software to "interrogate the evidence." This powerful data is indispensable for fraud detection, cybersecurity, competitive counterintelligence, and corporate and litigation investigations. The book also provides step-by-step instructions on how to construct adaptive criminal and fraud detection systems for organizations. Prediction is the key Internet activity, email, and wireless communications can be captured, modeled, and deployed in order to anticipate potential cyber attacks and other types of crimes. The successful prediction of human reactions and server actions by quantifying their behaviors is invaluable for pre-empting criminal activity. This volume assists chief information officers, law enforcement personnel, legal and IT professionals, investigators, and competitive intelligence analysts in the strategic planning needed to recognize the patterns of criminal activities in order to predict when and where crimes and intrusions are likely to take place.
Data mining can help pinpoint hidden information in medical data and accurately differentiate pathological from normal data. It can help to extract hidden features from patient groups and disease states and can aid in automated decision making. Data Mining in Biomedical Imaging, Signaling, and Systems provides an in-depth examination of the biomedical and clinical applications of data mining. It supplies examples of frequently encountered heterogeneous data modalities and details the applicability of data mining approaches used to address the computational challenges in analyzing complex data. The book details feature extraction techniques and covers several critical feature descriptors. As machine learning is employed in many diagnostic applications, it covers the fundamentals, evaluation measures, and challenges of supervised and unsupervised learning methods. Both feature extraction and supervised learning are discussed as they apply to seizure-related patterns in epilepsy patients. Other specific disorders are also examined with regard to the value of data mining for refining clinical diagnoses, including depression and recurring migraines. The diagnosis and grading of the world's fourth most serious health threat, depression, and analysis of acoustic properties that can distinguish depressed speech from normal are also described. Although a migraine is a complex neurological disorder, the text demonstrates how metabonomics can be effectively applied to clinical practice. The authors review alignment-based clustering approaches, techniques for automatic analysis of biofilm images, and applications of medical text mining, including text classification applied to medical reports. The identification and classification of two life-threatening heart abnormalities, arrhythmia and ischemia, are addressed, and a unique segmentation method for mining a 3-D imaging biomarker, exemplified by evaluation of osteoarthritis, is also present
With the rapid advancement of information discovery techniques, machine learning and data mining continue to play a significant role in cybersecurity. Although several conferences, workshops, and journals focus on the fragmented research topics in this area, there has been no single interdisciplinary resource on past and current works and possible paths for future research in this area. This book fills this need. From basic concepts in machine learning and data mining to advanced problems in the machine learning domain, Data Mining and Machine Learning in Cybersecurity provides a unified reference for specific machine learning solutions to cybersecurity problems. It supplies a foundation in cybersecurity fundamentals and surveys contemporary challenges-detailing cutting-edge machine learning and data mining techniques. It also: Unveils cutting-edge techniques for detecting new attacks Contains in-depth discussions of machine learning solutions to detection problems Categorizes methods for detecting, scanning, and profiling intrusions and anomalies Surveys contemporary cybersecurity problems and unveils state-of-the-art machine learning and data mining solutions Details privacy-preserving data mining methods This interdisciplinary resource includes technique review tables that allow for speedy access to common cybersecurity problems and associated data mining methods. Numerous illustrative figures help readers visualize the workflow of complex techniques and more than forty case studies provide a clear understanding of the design and application of data mining and machine learning techniques in cybersecurity.
Security and Policy Driven Computing covers recent advances in security, storage, parallelization, and computing as well as applications. The author incorporates a wealth of analysis, including studies on intrusion detection and key management, computer storage policy, and transactional management. The book first describes multiple variables and index structure derivation for high dimensional data distribution and applies numeric methods to proposed search methods. It also focuses on discovering relations, logic, and knowledge for policy management. To manage performance, the text discusses contention management for transactional structures, buffer tuning, and test environments. It then illustrates search optimization using truncated functions with paralleled techniques. The final chapters present structures, recovery, message conflicts, and test coverage of quantum policies and explain methods of quantum protection for intrusion prevention. An overview of security and policy applications for systems and computing, this book explores the latest R&D, emerging technology, and state-of-the-art technical studies of security and policy issues. It also looks to future research and technologies that will propel the innovation of next-generation systems.
Covering research at the frontier of this field, Privacy-Aware Knowledge Discovery: Novel Applications and New Techniques presents state-of-the-art privacy-preserving data mining techniques for application domains, such as medicine and social networks, that face the increasing heterogeneity and complexity of new forms of data. Renowned authorities from prominent organizations not only cover well-established results -- they also explore complex domains where privacy issues are generally clear and well defined, but the solutions are still preliminary and in continuous development. Divided into seven parts, the book provides in-depth coverage of the most novel reference scenarios for privacy-preserving techniques. The first part gives general techniques that can be applied to various applications discussed in the rest of the book. The second section focuses on the sanitization of network traces and privacy in data stream mining. After the third part on privacy in spatio-temporal data mining and mobility data analysis, the book examines time series analysis in the fourth section, explaining how a perturbation method and a segment-based method can tackle privacy issues of time series data. The fifth section on biomedical data addresses genomic data as well as the problem of privacy-aware information sharing of health data. In the sixth section on web applications, the book deals with query log mining and web recommender systems. The final part on social networks analyzes privacy issues related to the management of social network data under different perspectives. While several new results have recently occurred in the privacy, database, and data mining research communities, a uniform presentation of up-to-date techniques and applications is lacking. Filling this void, Privacy-Aware Knowledge Discovery presents novel algorithms, patterns, and models, along with a significant collection of open problems for future investigation.
This is an applied handbook for the application of data mining techniques in the CRM framework. It combines a technical and a business perspective to cover the needs of business users who are looking for a practical guide on data mining. It focuses on Customer Segmentation and presents guidelines for the development of actionable segmentation schemes. By using non-technical language it guides readers through all the phases of the data mining process.
Gaining access to high-quality data is a vital necessity in knowledge-based decision making. But data in its raw form often contains sensitive information about individuals. Providing solutions to this problem, the methods and tools of privacy-preserving data publishing enable the publication of useful information while protecting data privacy. Introduction to Privacy-Preserving Data Publishing: Concepts and Techniques presents state-of-the-art information sharing and data integration methods that take into account privacy and data mining requirements. The first part of the book discusses the fundamentals of the field. In the second part, the authors present anonymization methods for preserving information utility for specific data mining tasks. The third part examines the privacy issues, privacy models, and anonymization methods for realistic and challenging data publishing scenarios. While the first three parts focus on anonymizing relational data, the last part studies the privacy threats, privacy models, and anonymization methods for complex data, including transaction, trajectory, social network, and textual data. This book not only explores privacy and information utility issues but also efficiency and scalability challenges. In many chapters, the authors highlight efficient and scalable methods and provide an analytical discussion to compare the strengths and weaknesses of different solutions.
This accessible and engaging textbook/guide provides a concise introduction to data structures and associated algorithms. Emphasis is placed on the fundamentals of data structures, enabling the reader to quickly learn the key concepts, and providing a strong foundation for later studies of more complex topics. The coverage includes discussions on stacks, queues, lists, (using both arrays and links), sorting, and elementary binary trees, heaps, and hashing. This content is also a natural continuation from the material provided in the separate Springer title Guide to Java by the same authors.Topics and features: reviews the preliminary concepts, and introduces stacks and queues using arrays, along with a discussion of array-based lists; examines linked lists, the implementation of stacks and queues using references, binary trees, a range of varied sorting techniques, heaps, and hashing; presents both primitive and generic data types in each chapter, and makes use of contour diagrams to illustrate object-oriented concepts; includes chapter summaries, and asks the reader questions to help them interact with the material; contains numerous examples and illustrations, and one or more complete program in every chapter; provides exercises at the end of each chapter, as well as solutions to selected exercises, and a glossary of important terms. This clearly-written work is an ideal classroom text for a second semester course in programming using the Java programming language, in preparation for a subsequent advanced course in data structures and algorithms. The book is also eminently suitable as a self-study guide in either academe or industry. |
![]() ![]() You may like...
Exploring Sport and Fitness - Work-Based…
Caroline Heaney, Ben Oakley, …
Hardcover
R3,434
Discovery Miles 34 340
|