Whether you are a software developer, systems architect, data analyst, or business analyst, if you want to take advantage of data mining in the development of advanced analytic applications, Java Data Mining, JDM, the new standard now implemented in core DBMS and data mining/analysis software, is a
Java Data Mining: Strategy, Standard, and Practice: A Practical Guide for architecture, design, and implementation
β Scribed by Mark F. Hornick, Erik MarcadΓΒ©, Sunil Venkayala
- Publisher
- Morgan Kaufmann
- Year
- 2006
- Tongue
- English
- Leaves
- 522
- Series
- The Morgan Kaufmann Series in Data Management Systems
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Whether you are a software developer, systems architect, data analyst, or business analyst, if you want to take advantage of data mining in the development of advanced analytic applications, Java Data Mining, JDM, the new standard now implemented in core DBMS and data mining/analysis software, is a key solution component. This book is the essential guide to the usage of the JDM standard interface, written by contributors to the JDM standard. The book discusses and illustrates how to solve real problems using the JDM API. The authors provide you with: * Data mining introduction-an overview of data mining and the problems it can address across industries; JDM's place in strategic solutions to data mining-related problems; * JDM essentials-concepts, design approach and design issues, with detailed code examples in Java; a Web Services interface to enable JDM functionality in an SOA environment; and illustration of JDM XML Schema for JDM objects; * JDM in practice-the use of JDM from vendor implementations and approaches to customer applications, integration, and usage; impact of data mining on IT infrastructure; a how-to guide for building applications that use the JDM API. * Free, downloadable KJDM source code referenced in the book available here * Data mining introduction-an overview of data mining and the problems it can address across industries; JDM's place in strategic solutions to data mining-related problems; * JDM essentials-concepts, design approach and design issues, with detailed code examples in Java; a Web Services interface to enable JDM functionality in an SOA environment; and illustration of JDM XML Schema for JDM objects; * JDM in practice-the use of JDM from vendor implementations and approaches to customer applications, integration, and usage; impact of data mining on IT infrastructure; a how-to guide for building applications that use the JDM API. * Free, downloadable KJDM source code referenced in the book available here
π SIMILAR VOLUMES
Whether you are a software developer, systems architect, data analyst, or business analyst, if you want to take advantage of data mining in the development of advanced analytic applications, Java Data Mining, JDM, the new standard now implemented in core DBMS and data mining/analysis software, is a
The book discusses and illustrates how to solve real problems using the JDM API. The authors provide you with:* Data mining introductionan overview of data mining and the problems it can address across industries; JDMs place in strategic solutions to data mining-related problems;* JDM essentialsconc
Whether you are a software developer, systems architect, data analyst, or business analyst, if you want to take advantage of data mining in the development of advanced analytic applications, Java Data Mining, JDM, the new standard now implemented in core DBMS and data mining/analysis software, is a
Whether you are a software developer, systems architect, data analyst, or business analyst, if you want to take advantage of data mining in the development of advanced analytic applications, Java Data Mining, JDM, the new standard now implemented in core DBMS and data mining/analysis software, is a
<p><b>Plan and design robust security architectures to secure your organization's technology landscape and the applications you develop</b></p><h4>Key Features</h4><ul><li>Leverage practical use cases to successfully architect complex security structures</li><li>Learn risk assessment methodologies f