Not what you expected? Check for suggestions
Data mining : concepts and techniques

by Han, Jiawei; Kamber, Micheline.

Edition: 2nd ed.Type: book Book bibliography bibliography; Literary form: not fiction ; Audience: Specialized; Publisher: San Francisco : Morgan Kaufmann Publishers / Elsevier, c.2006Online Access: Publisher description | Table of contents Availability: Copies available for loan: [005.741 HAN] (2). Copies available for reference: Central Library [006.3 HAN] (1 ).
Checked out (1).
Actions: Log in to add tags. Add to cart
Data matching : concepts and techniques for record linkage, entity resolution, and duplicate detection

by Christenen, Peter L. (Peter Lindskou).

Type: book Book bibliography bibliography; Literary form: not fiction ; Audience: Specialized; Publisher: Berlin : Springer, c.2012Availability: Copies available for loan: [005.74068 CHR] (2). Actions: Add to cart
Languages and machines : an introduction to the theory of computer science

by Sudkamp, Thomas A.

Edition: 3rd ed., Pearson international ed.Type: book Book bibliography bibliography; Literary form: not fiction ; Audience: Specialized; Publisher: Boston ; London : Pearson Addison-Wesley, c.2006Availability: Copies available for loan: [511.3 SUD] (2). Actions: Add to cart
Intelligent systems for knowledge management

by Nguyen, Ngoc Thanh (Computer scientist); Szczerbicki, Edward.

Type: book Book bibliography bibliography conference publication ; Literary form: not fiction ; Audience: Specialized; Publisher: Berlin : Springer, c.2009Online Access: Publisher description | Table of contents only Availability: Copies available for loan: [006.3 INT] (1). Actions: Add to cart
Information security illuminated

by Solomon, Michael (Michael G.); Chapple, Mike.

Type: book Book dictionary ; Literary form: not fiction ; Audience: Specialized; Publisher: Sudbury : Jones and Bartlett Publishers, c.2005Online Access: Table of contents Availability: Copies available for loan: [005.8 SOL] (1). Actions: Add to cart
Practical ontologies for information professionals

by Stuart, David (David Patrick).

Edition: 1st ed.Type: book Book bibliography bibliography; Literary form: not fiction ; Audience: Specialized; Publisher: London : Fact Publishing, 2016Availability: Copies available for loan: [006.332 STU] (1). Actions: Add to cart
Security patterns : integrating security and systems engineering

by Schumacher, Markus.

Edition: Wiley India ed.Type: book Book bibliography bibliography; Literary form: not fiction ; Audience: Specialized; Publisher: New Delhi : Wiley India, 2006Online Access: Publisher description | Contributor biographical information Availability: Copies available for loan: [005.8 SEC] (1). Actions: Add to cart
Java 2 : the complete reference

by Schildt, Herbert.

Edition: 5th ed.Type: book Book; Literary form: not fiction ; Audience: Specialized; Publisher: New York : McGraw-Hill / Osborne, c.2002Online Access: Contributor biographical information | Publisher description | Table of contents Availability: Copies available for loan: [005.133 SCH] (1). Actions: Add to cart
Comparing, designing, and deploying VPNs

by Lewis, Mark, CCIE.

Type: book Book; Literary form: not fiction ; Audience: Specialized; Publisher: Indianapolis : Cisco Press, c.2006Availability: Copies available for loan: [004.678 LEW] (1). Actions: Add to cart
PHP in Action : objects, design, agility

by Reiersøl, Dagfinn; Baker, Marcus; Shiflett, Chris.

Type: book Book bibliography bibliography; Literary form: not fiction ; Audience: Specialized; Publisher: Greenwich : Manning Publications, c.2007Online Access: Table of contents Availability: Copies available for loan: [005.2762 REI] (1). Actions: Add to cart
SPSS 14.0 brief guide

by -- SPSS Inc

Type: book Book; Format: print ; Literary form: not fiction Publisher: Chicago : SPSS Inc., c.2005Availability: Copies available for loan: [005.55 SPS] (2). Actions: Add to cart
C++ classes and data structures

by Childs, Jeffrey S.

Type: book Book; Literary form: not fiction ; Audience: Specialized; Publisher: Upper Saddle River : Pearson Prentice Hall, c.2008Availability: Copies available for loan: [005.133 CHI] (3). Copies available for reference: Central Library [005.133 CHI] (2 ).
Actions: Add to cart
Data structures using C

by Thareja, Reema.

Edition: 2nd ed.Type: book Book; Literary form: not fiction ; Audience: Specialized; Publisher: New Delhi : Oxford University Press, 2018Availability: Copies available for loan: [005.73 THA] (2). Copies available for reference: Central Library [005.73 THA] (1 ).
Actions: Add to cart
An introduction to database systems

by Date, C. J. (Christopher John).

Edition: 7th ed., International ed.Type: book Book; Audience: Specialized; Publisher: Reading, Mass. ; Harlow : Addison-Wesley, c2000Availability: Copies available for loan: [005.74 DAT] (1). Actions: Add to cart
Artificial intelligence techniques for rational decision making

by Marwala, Tshilidzi.

Type: book Book bibliography bibliography; Literary form: not fiction ; Audience: Specialized; Publisher: Cham : Springer, c.2014Online Access: Publisher description | Table of contents only Availability: Copies available for loan: [658.4030028563 MAR] (1). Actions: Add to cart
Data warehouse systems : design and implementation

by Vaisman, Alejandro; Zimányi, Esteban.

Type: book Book bibliography bibliography; Literary form: not fiction ; Audience: Specialized; Publisher: Berlin : Springer, c.2014Online Access: Contributor biographical information | Publisher description | Table of contents only Availability: Copies available for loan: [005.745 VAI] (1). Actions: Add to cart
Wireless mobility : the why of wireless

by Reid, Neil P.

Type: book Book; Literary form: not fiction ; Audience: Specialized; Publisher: New York : McGraw-Hill, c.2010Availability: Copies available for loan: [621.3821 REI] (1). Actions: Add to cart
Android application development for the Intel® platform

by Wang, Tao; Cohen, Ryan. -- SpringerLink (Online service)

Source: Springer eBooksType: book Book; Literary form: not fiction ; Audience: Specialized; Publisher: New York : Apress Media, c.2014Online Access: Click here to access online | Click here to access online | Click here to access online | Click here to access online | Click here to access online | Click here to access online | Click here to access online | Click here to access online Availability: Copies available for loan: [005.1 AND] (1). Actions: Add to cart
Introduction to cryptography : principles and applications

by Delfs, Hans; Knebl, Helmut.

Edition: Springer international ed.Type: book Book bibliography bibliography; Literary form: not fiction ; Audience: Specialized; Publisher: Berlin : Springer, c.2002Availability: Copies available for loan: [005.8 DEL] (2). Actions: Add to cart
Security and privacy in social networks

by Altshuler, Yaniv.

Type: book Book bibliography bibliography; Literary form: not fiction ; Audience: Specialized; Publisher: New York : Springer, c.2013Online Access: Publisher description | Table of contents only Availability: Copies available for loan: [006.754 SEC] (1). Actions: Add to cart