[生物数据挖掘].Biological.Data.Mining
This series aims to capture new developments and applications in data mining and knowledge
discovery, while summarizing the computational tools and techniques useful in data analysis. This
series encourages the integration of mathematical, statistical, and computational methods and
techniques through the publication of a broad range of textbooks, reference works, and handbooks.
The inclusion of concrete examples and applications is highly encouraged. The scope of the
series includes, but is not limited to, titles in the areas of data mining and knowledge discovery
methods and applications, modeling, algorithms, theory and foundations, data and knowledge
visualization, data mining systems and tools, and privacy and security issues.
数据挖掘:概念与技术 第三版 韩家炜
数据挖掘经典著作,韩家炜编,不比多说。内容覆盖广泛,条理明晰,学习数据挖掘的必读之书。
Mastering Network Security.pdf
The book is specifically geared toward the individual who does not have ten years of experience in the security field—but is still expected to run a tight ship. If you are a security guru who is looking to fill in that last five percent of your knowledge base, this may not be the book for you.
If, however, you are looking for a practical guide that will help you to identify your areas of greatest weakness, you have come to the right place. This book was written with the typical network or system administrator in mind, those administrators who have a good handle on networking and the servers they are expected to manage, but who need to find out what they can do to avoid being victimized by a security breach.
管理:模型、方法和系统(Workflow Management-Models Methods and Systems)
This book is about the management of business processes. This is certainly
not a new topic. Since the beginning of the Industrial Revolution, it
has been written about from every possible point of view—economic,
sociological, psychological, accountancy, mechanical engineering and
business administration. In this book, we examine the management of
business processes from the perspective of computing, or—to put it more
broadly—of information technology. The reason is that information
technology has made huge leaps forward in recent years, resulting in
the creation of completely new ways of organizing business processes.
The development of generic software packages for managing business
processes—so-called workflow management systems (WFMS)—is particularly
important in this respect.
Prentice.Hall.PTR How Secure is Your Wireless Network--Safeguarding.Your.Wi-Fi.LAN
Title:How Secure is Your Wireless Network? Safeguarding Your Wi-Fi LAN
URL:http://www.amazon.com/exec/obidos/tg/detail/-/0131402064
ISBN:0131402064
Author:Lee Barken
Publisher:Prentice Hall PTR
Page:240 pages
Edition:1st edition (August 29, 2003)
Catalog:Computer networks
Format:CHM
Size:3.13 MB
Supplier:Team LiB
Summary:Now you can have the awesome benefits of wireless LANswithout falling victim to their notorious security flaws. Leadingwireless security expert Lee Barken shows you practicalworkarounds and fixes for the vulnerabilities in today'sWLANs, introduces high-security wireless protocols new to themarketplace, and offers step-by-step instructions for protectingall your wireless information, from the home to the enterprise.This is the definitive and easy-to-use WLAN security book you'vebeen searching for--whether you're a network administrator,security specialist, manager, or home user.
Artech House Role Based Access Control
书名:《Role-Based.Access.Control》
作者:David F. Ferraiolo, D. Richard Kuhn and Ramaswamy Chandramouli
访问控制经典书