top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
CISSP [[electronic resource] ] : Certified Information systems Security Professional ; study guide / / James Michael Stewart, Ed Tittel, Mike Chapple
CISSP [[electronic resource] ] : Certified Information systems Security Professional ; study guide / / James Michael Stewart, Ed Tittel, Mike Chapple
Autore Stewart James Michael
Edizione [4th ed.]
Pubbl/distr/stampa Indianapolis, Ind., : Wiley Pub., 2008
Descrizione fisica 1 online resource (893 p.)
Disciplina 005.8
Altri autori (Persone) TittelEd
ChappleMike
Collana Serious skills
Soggetto topico Electronic data processing personnel - Certification
Computer networks - Examinations
Computer security - Examinations
Soggetto genere / forma Electronic books.
ISBN 1-281-75235-5
9786611752354
0-470-39591-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto CISSP Certified Information Systems Security Professional Study Guide, Fourth Edition; Acknowledgments; About the Authors; Contents at a Glance; Contents; Introduction; Assessment Test; Answers to Assessment Test; Chapter 1: Accountability and Access Control; Access Control Overview; Identification and Authentication Techniques; Access Control Techniques; Access Control Methodologies and Implementation; Access Control Administration; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 2: Attacks and Monitoring; Monitoring
Intrusion DetectionIDS-Related Tools; Penetration Testing; Methods of Attack; Access Control Compensations; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 3: ISO Model, Protocols, Network Security, and Network Infrastructure; OSI Model; Communications and Network Security; Internet/Intranet/Extranet Components; Remote Access Security Management; Network and Protocol Security Mechanisms; Avoiding Single Points of Failure; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions
Chapter 4: Communications Security and CountermeasuresVirtual Private Network (VPN); Network Address Translation; Switching Technologies; WAN Technologies; Miscellaneous Security Control Characteristics; Managing Email Security; Securing Voice Communications; Security Boundaries; Network Attacks and Countermeasures; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 5: Security Management Concepts and Principles; Security Management Concepts and Principles; Protection Mechanisms; Change Control/Management; Data Classification
Planning to PlanSummary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 6: Asset Value, Policies, and Roles; Employment Policies and Practices; Security Roles; Security Management Planning; Policies, Standards, Baselines, Guidelines, and Procedures; Risk Management; Security Awareness Training; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 7: Data and Application Security Issues; Application Issues; Databases and Data Warehousing; Data/Information Storage
Knowledge-Based SystemsSystems Development Controls; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 8: Malicious Code and Application Attacks; Malicious Code; Password Attacks; Denial-of-Service Attacks; Application Attacks; Web Application Security; Reconnaissance Attacks; Masquerading Attacks; Decoy Techniques; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 9: Cryptography and Private Key Algorithms; Historical Milestones in Cryptography
Cryptographic Basics
Record Nr. UNINA-9910454076303321
Stewart James Michael  
Indianapolis, Ind., : Wiley Pub., 2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
CISSP [[electronic resource] ] : Certified Information systems Security Professional ; study guide / / James Michael Stewart, Ed Tittel, Mike Chapple
CISSP [[electronic resource] ] : Certified Information systems Security Professional ; study guide / / James Michael Stewart, Ed Tittel, Mike Chapple
Autore Stewart James Michael
Edizione [4th ed.]
Pubbl/distr/stampa Indianapolis, Ind., : Wiley Pub., 2008
Descrizione fisica 1 online resource (893 p.)
Disciplina 005.8
Altri autori (Persone) TittelEd
ChappleMike
Collana Serious skills
Soggetto topico Electronic data processing personnel - Certification
Computer networks - Examinations
Computer security - Examinations
ISBN 1-281-75235-5
9786611752354
0-470-39591-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto CISSP Certified Information Systems Security Professional Study Guide, Fourth Edition; Acknowledgments; About the Authors; Contents at a Glance; Contents; Introduction; Assessment Test; Answers to Assessment Test; Chapter 1: Accountability and Access Control; Access Control Overview; Identification and Authentication Techniques; Access Control Techniques; Access Control Methodologies and Implementation; Access Control Administration; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 2: Attacks and Monitoring; Monitoring
Intrusion DetectionIDS-Related Tools; Penetration Testing; Methods of Attack; Access Control Compensations; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 3: ISO Model, Protocols, Network Security, and Network Infrastructure; OSI Model; Communications and Network Security; Internet/Intranet/Extranet Components; Remote Access Security Management; Network and Protocol Security Mechanisms; Avoiding Single Points of Failure; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions
Chapter 4: Communications Security and CountermeasuresVirtual Private Network (VPN); Network Address Translation; Switching Technologies; WAN Technologies; Miscellaneous Security Control Characteristics; Managing Email Security; Securing Voice Communications; Security Boundaries; Network Attacks and Countermeasures; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 5: Security Management Concepts and Principles; Security Management Concepts and Principles; Protection Mechanisms; Change Control/Management; Data Classification
Planning to PlanSummary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 6: Asset Value, Policies, and Roles; Employment Policies and Practices; Security Roles; Security Management Planning; Policies, Standards, Baselines, Guidelines, and Procedures; Risk Management; Security Awareness Training; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 7: Data and Application Security Issues; Application Issues; Databases and Data Warehousing; Data/Information Storage
Knowledge-Based SystemsSystems Development Controls; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 8: Malicious Code and Application Attacks; Malicious Code; Password Attacks; Denial-of-Service Attacks; Application Attacks; Web Application Security; Reconnaissance Attacks; Masquerading Attacks; Decoy Techniques; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 9: Cryptography and Private Key Algorithms; Historical Milestones in Cryptography
Cryptographic Basics
Record Nr. UNINA-9910782132103321
Stewart James Michael  
Indianapolis, Ind., : Wiley Pub., 2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
CISSP [[electronic resource] ] : Certified Information systems Security Professional ; study guide / / James Michael Stewart, Ed Tittel, Mike Chapple
CISSP [[electronic resource] ] : Certified Information systems Security Professional ; study guide / / James Michael Stewart, Ed Tittel, Mike Chapple
Autore Stewart James Michael
Edizione [4th ed.]
Pubbl/distr/stampa Indianapolis, Ind., : Wiley Pub., 2008
Descrizione fisica 1 online resource (893 p.)
Disciplina 005.8
Altri autori (Persone) TittelEd
ChappleMike
Collana Serious skills
Soggetto topico Electronic data processing personnel - Certification
Computer networks - Examinations
Computer security - Examinations
ISBN 1-281-75235-5
9786611752354
0-470-39591-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto CISSP Certified Information Systems Security Professional Study Guide, Fourth Edition; Acknowledgments; About the Authors; Contents at a Glance; Contents; Introduction; Assessment Test; Answers to Assessment Test; Chapter 1: Accountability and Access Control; Access Control Overview; Identification and Authentication Techniques; Access Control Techniques; Access Control Methodologies and Implementation; Access Control Administration; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 2: Attacks and Monitoring; Monitoring
Intrusion DetectionIDS-Related Tools; Penetration Testing; Methods of Attack; Access Control Compensations; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 3: ISO Model, Protocols, Network Security, and Network Infrastructure; OSI Model; Communications and Network Security; Internet/Intranet/Extranet Components; Remote Access Security Management; Network and Protocol Security Mechanisms; Avoiding Single Points of Failure; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions
Chapter 4: Communications Security and CountermeasuresVirtual Private Network (VPN); Network Address Translation; Switching Technologies; WAN Technologies; Miscellaneous Security Control Characteristics; Managing Email Security; Securing Voice Communications; Security Boundaries; Network Attacks and Countermeasures; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 5: Security Management Concepts and Principles; Security Management Concepts and Principles; Protection Mechanisms; Change Control/Management; Data Classification
Planning to PlanSummary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 6: Asset Value, Policies, and Roles; Employment Policies and Practices; Security Roles; Security Management Planning; Policies, Standards, Baselines, Guidelines, and Procedures; Risk Management; Security Awareness Training; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 7: Data and Application Security Issues; Application Issues; Databases and Data Warehousing; Data/Information Storage
Knowledge-Based SystemsSystems Development Controls; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 8: Malicious Code and Application Attacks; Malicious Code; Password Attacks; Denial-of-Service Attacks; Application Attacks; Web Application Security; Reconnaissance Attacks; Masquerading Attacks; Decoy Techniques; Summary; Exam Essentials; Written Lab; Answers to Written Lab; Review Questions; Answers to Review Questions; Chapter 9: Cryptography and Private Key Algorithms; Historical Milestones in Cryptography
Cryptographic Basics
Record Nr. UNINA-9910828073303321
Stewart James Michael  
Indianapolis, Ind., : Wiley Pub., 2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
CISSP [[electronic resource] ] : Certified Information Systems Security Professional study guide / / James Michael Stewart, Ed Tittel, Mike Chapple
CISSP [[electronic resource] ] : Certified Information Systems Security Professional study guide / / James Michael Stewart, Ed Tittel, Mike Chapple
Autore Stewart James Michael
Edizione [3rd ed.]
Pubbl/distr/stampa San Francisco, : SYBEX, c2005
Descrizione fisica 1 online resource (803 p.)
Disciplina 005.8
Altri autori (Persone) TittelEd
ChappleMike
Soggetto topico Electronic data processing personnel - Certification
Computer networks - Examinations
Computer security - Examinations
Soggetto genere / forma Electronic books.
ISBN 1-280-28704-7
9786610287048
0-471-77981-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto CISSP: Certified Information Systems Security Professional Study Guide, 3rd Edition; Acknowledgments; Contents At A Glance; Contents; Introduction; Assessment Test; Answers to Assessment Test; Chapter 1: Accountability and Access Control; Access Control Overview; Identification and Authentication Techniques; Access Control Techniques; Access Control Methodologies and Implementation; Access Control Administration; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 2: Attacks and Monitoring; Monitoring; Intrusion Detection; IDS-Related Tools; Penetration Testing
Methods of AttacksAccess Control Compensations; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 3: ISO Model, Network Security, and Protocols; OSI Model; Communications and Network Security; Internet/Intranet/Extranet Components; Remote Access Security Management; Network and Protocol Security Mechanisms; Network and Protocol Services; Avoiding Single Points of Failure; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 4: Communications Security and Countermeasures; Virtual Private Network (VPN); Network Address Translation
Switching TechnologiesWAN Technologies; Miscellaneous Security Control Characteristics; Managing E-Mail Security; Securing Voice Communications; Security Boundaries; Network Attacks and Countermeasures; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 5: Security Management Concepts and Principles; Security Management Concepts and Principles; Protection Mechanisms; Change Control/Management; Data Classification; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 6: Asset Value, Policies, and Roles; Employment Policies and Practices
Security RolesSecurity Management Planning; Policies, Standards, Baselines, Guidelines, and Procedures; Risk Management; Security Awareness Training; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 7: Data and Application Security Issues; Application Issues; Databases and Data Warehousing; Data/Information Storage; Knowledge-Based Systems; Systems Development Controls; Summary; Exam Essentials; Written Lab; Review Questions; Answers to Review Questions; Answers to Written Lab; Chapter 8: Malicious Code and Application Attacks; Malicious Code; Password Attacks
Denial of Service AttacksApplication Attacks; Reconnaissance Attacks; Masquerading Attacks; Decoy Techniques; Summary; Exam Essentials; Written Lab; Review Questions; Answers to Review Questions; Answers to Written Lab; Chapter 9: Cryptography and Private Key Algorithms; History; Cryptographic Basics; Modern Cryptography; Symmetric Cryptography; Summary; Exam Essentials; Written Lab; Review Questions; Answers to Review Questions; Answers to Written Lab; Chapter 10: PKI and Cryptographic Applications; Asymmetric Cryptography; Hash Functions; Digital Signatures; Public Key Infrastructure
Applied Cryptography
Record Nr. UNINA-9910457935803321
Stewart James Michael  
San Francisco, : SYBEX, c2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
CISSP [[electronic resource] ] : Certified Information Systems Security Professional study guide / / James Michael Stewart, Ed Tittel, Mike Chapple
CISSP [[electronic resource] ] : Certified Information Systems Security Professional study guide / / James Michael Stewart, Ed Tittel, Mike Chapple
Autore Stewart James Michael
Edizione [3rd ed.]
Pubbl/distr/stampa San Francisco, : SYBEX, c2005
Descrizione fisica 1 online resource (803 p.)
Disciplina 005.8
Altri autori (Persone) TittelEd
ChappleMike
Soggetto topico Electronic data processing personnel - Certification
Computer networks - Examinations
Computer security - Examinations
ISBN 1-280-28704-7
9786610287048
0-471-77981-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto CISSP: Certified Information Systems Security Professional Study Guide, 3rd Edition; Acknowledgments; Contents At A Glance; Contents; Introduction; Assessment Test; Answers to Assessment Test; Chapter 1: Accountability and Access Control; Access Control Overview; Identification and Authentication Techniques; Access Control Techniques; Access Control Methodologies and Implementation; Access Control Administration; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 2: Attacks and Monitoring; Monitoring; Intrusion Detection; IDS-Related Tools; Penetration Testing
Methods of AttacksAccess Control Compensations; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 3: ISO Model, Network Security, and Protocols; OSI Model; Communications and Network Security; Internet/Intranet/Extranet Components; Remote Access Security Management; Network and Protocol Security Mechanisms; Network and Protocol Services; Avoiding Single Points of Failure; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 4: Communications Security and Countermeasures; Virtual Private Network (VPN); Network Address Translation
Switching TechnologiesWAN Technologies; Miscellaneous Security Control Characteristics; Managing E-Mail Security; Securing Voice Communications; Security Boundaries; Network Attacks and Countermeasures; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 5: Security Management Concepts and Principles; Security Management Concepts and Principles; Protection Mechanisms; Change Control/Management; Data Classification; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 6: Asset Value, Policies, and Roles; Employment Policies and Practices
Security RolesSecurity Management Planning; Policies, Standards, Baselines, Guidelines, and Procedures; Risk Management; Security Awareness Training; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 7: Data and Application Security Issues; Application Issues; Databases and Data Warehousing; Data/Information Storage; Knowledge-Based Systems; Systems Development Controls; Summary; Exam Essentials; Written Lab; Review Questions; Answers to Review Questions; Answers to Written Lab; Chapter 8: Malicious Code and Application Attacks; Malicious Code; Password Attacks
Denial of Service AttacksApplication Attacks; Reconnaissance Attacks; Masquerading Attacks; Decoy Techniques; Summary; Exam Essentials; Written Lab; Review Questions; Answers to Review Questions; Answers to Written Lab; Chapter 9: Cryptography and Private Key Algorithms; History; Cryptographic Basics; Modern Cryptography; Symmetric Cryptography; Summary; Exam Essentials; Written Lab; Review Questions; Answers to Review Questions; Answers to Written Lab; Chapter 10: PKI and Cryptographic Applications; Asymmetric Cryptography; Hash Functions; Digital Signatures; Public Key Infrastructure
Applied Cryptography
Record Nr. UNINA-9910784482903321
Stewart James Michael  
San Francisco, : SYBEX, c2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
CISSP [[electronic resource] ] : Certified Information Systems Security Professional study guide / / James Michael Stewart, Ed Tittel, Mike Chapple
CISSP [[electronic resource] ] : Certified Information Systems Security Professional study guide / / James Michael Stewart, Ed Tittel, Mike Chapple
Autore Stewart James Michael
Edizione [3rd ed.]
Pubbl/distr/stampa San Francisco, : SYBEX, c2005
Descrizione fisica 1 online resource (803 p.)
Disciplina 005.8
Altri autori (Persone) TittelEd
ChappleMike
Soggetto topico Electronic data processing personnel - Certification
Computer networks - Examinations
Computer security - Examinations
ISBN 1-280-28704-7
9786610287048
0-471-77981-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto CISSP: Certified Information Systems Security Professional Study Guide, 3rd Edition; Acknowledgments; Contents At A Glance; Contents; Introduction; Assessment Test; Answers to Assessment Test; Chapter 1: Accountability and Access Control; Access Control Overview; Identification and Authentication Techniques; Access Control Techniques; Access Control Methodologies and Implementation; Access Control Administration; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 2: Attacks and Monitoring; Monitoring; Intrusion Detection; IDS-Related Tools; Penetration Testing
Methods of AttacksAccess Control Compensations; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 3: ISO Model, Network Security, and Protocols; OSI Model; Communications and Network Security; Internet/Intranet/Extranet Components; Remote Access Security Management; Network and Protocol Security Mechanisms; Network and Protocol Services; Avoiding Single Points of Failure; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 4: Communications Security and Countermeasures; Virtual Private Network (VPN); Network Address Translation
Switching TechnologiesWAN Technologies; Miscellaneous Security Control Characteristics; Managing E-Mail Security; Securing Voice Communications; Security Boundaries; Network Attacks and Countermeasures; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 5: Security Management Concepts and Principles; Security Management Concepts and Principles; Protection Mechanisms; Change Control/Management; Data Classification; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 6: Asset Value, Policies, and Roles; Employment Policies and Practices
Security RolesSecurity Management Planning; Policies, Standards, Baselines, Guidelines, and Procedures; Risk Management; Security Awareness Training; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 7: Data and Application Security Issues; Application Issues; Databases and Data Warehousing; Data/Information Storage; Knowledge-Based Systems; Systems Development Controls; Summary; Exam Essentials; Written Lab; Review Questions; Answers to Review Questions; Answers to Written Lab; Chapter 8: Malicious Code and Application Attacks; Malicious Code; Password Attacks
Denial of Service AttacksApplication Attacks; Reconnaissance Attacks; Masquerading Attacks; Decoy Techniques; Summary; Exam Essentials; Written Lab; Review Questions; Answers to Review Questions; Answers to Written Lab; Chapter 9: Cryptography and Private Key Algorithms; History; Cryptographic Basics; Modern Cryptography; Symmetric Cryptography; Summary; Exam Essentials; Written Lab; Review Questions; Answers to Review Questions; Answers to Written Lab; Chapter 10: PKI and Cryptographic Applications; Asymmetric Cryptography; Hash Functions; Digital Signatures; Public Key Infrastructure
Applied Cryptography
Record Nr. UNINA-9910827601203321
Stewart James Michael  
San Francisco, : SYBEX, c2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Practical machine learning in R / / Fred Nwanganga, Mike Chapple
Practical machine learning in R / / Fred Nwanganga, Mike Chapple
Autore Nwanganga Fred Chukwuka
Pubbl/distr/stampa Indianapolis : , : John Wiley and Sons, , [2020]
Descrizione fisica 1 online resource (466 pages) : illustrations
Disciplina 617.9
Soggetto topico Machine learning
R (Computer program language)
Aprenentatge automàtic
R (Llenguatge de programació)
Soggetto genere / forma Electronic books.
Llibres electrònics
ISBN 1-5231-3319-8
1-119-59157-0
1-119-59153-8
1-119-59154-6
9781119591535
1119591538
9781119591573
1119591570
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910554806603321
Nwanganga Fred Chukwuka  
Indianapolis : , : John Wiley and Sons, , [2020]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Practical machine learning in R / / Fred Nwanganga, Mike Chapple
Practical machine learning in R / / Fred Nwanganga, Mike Chapple
Autore Nwanganga Fred Chukwuka
Pubbl/distr/stampa Indianapolis : , : John Wiley and Sons, , [2020]
Descrizione fisica 1 online resource (466 pages) : illustrations
Disciplina 617.9
Soggetto topico Machine learning
R (Computer program language)
Aprenentatge automàtic
R (Llenguatge de programació)
Soggetto genere / forma Llibres electrònics
ISBN 1-5231-3319-8
1-119-59157-0
1-119-59153-8
1-119-59154-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910677891003321
Nwanganga Fred Chukwuka  
Indianapolis : , : John Wiley and Sons, , [2020]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Practical machine learning in R / / Fred Nwanganga, Mike Chapple
Practical machine learning in R / / Fred Nwanganga, Mike Chapple
Autore Nwanganga Fred Chukwuka
Pubbl/distr/stampa Indianapolis : , : John Wiley and Sons, , [2020]
Descrizione fisica 1 online resource (466 pages) : illustrations
Disciplina 617.9
Soggetto topico Machine learning
R (Computer program language)
Aprenentatge automàtic
R (Llenguatge de programació)
Soggetto genere / forma Llibres electrònics
ISBN 1-5231-3319-8
1-119-59157-0
1-119-59153-8
1-119-59154-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910815757803321
Nwanganga Fred Chukwuka  
Indianapolis : , : John Wiley and Sons, , [2020]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui