Paperback. Condizione: Very Good. Ex-library paperback in very nice condition with the usual markings and attachments.
Da: Ria Christie Collections, Uxbridge, Regno Unito
EUR 58,58
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. In.
Da: Chiron Media, Wallingford, Regno Unito
EUR 56,32
Quantità: 10 disponibili
Aggiungi al carrelloPF. Condizione: New.
Lingua: Inglese
Editore: Springer-Verlag New York Inc, 2008
ISBN 10: 3540784772 ISBN 13: 9783540784777
Da: Revaluation Books, Exeter, Regno Unito
EUR 76,43
Quantità: 2 disponibili
Aggiungi al carrelloPaperback. Condizione: Brand New. 2008 edition. 171 pages. 9.25x6.25x0.50 inches. In Stock.
Lingua: Inglese
Editore: Springer Berlin Heidelberg, 2008
ISBN 10: 3540784772 ISBN 13: 9783540784777
Da: AHA-BUCH GmbH, Einbeck, Germania
EUR 53,49
Quantità: 1 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. Druck auf Anfrage Neuware - Printed after ordering - Vast amounts of data are collected by service providers and system administ- tors, and are available in public information systems. Data mining technologies provide an ideal framework to assist in analyzing such collections for computer security and surveillance-related endeavors. For instance, system administrators can apply data mining to summarize activity patterns in access logs so that potential malicious incidents can be further investigated. Beyond computer - curity, data mining technology supports intelligence gathering and summari- tion for homeland security. For years, and most recently fueled by events such as September 11, 2001, government agencies have focused on developing and applying data mining technologies to monitor terrorist behaviors in public and private data collections. Theapplicationof data mining to person-speci cdata raisesseriousconcerns regarding data con dentiality and citizens privacy rights. These concerns have led to the adoption of various legislation and policy controls. In 2005, the - ropean Union passed a data-retention directive that requires all telephone and Internetservice providersto store data ontheir consumers for up to two yearsto assist in the prevention of terrorismand organized crime. Similar data-retention regulationproposalsareunderheateddebateintheUnitedStatesCongress. Yet, the debate often focuses on ethical or policy aspects of the problem, such that resolutions have polarized consequences; e. g. , an organization can either share data for data mining purposes or it can not. Fortunately, computer scientists, and data mining researchers in particular, have recognized that technology can beconstructedtosupportlesspolarizedsolutions. Computerscientistsaredev- oping technologies that enable data mining goals without sacri cing the privacy and security of the individuals to whom the data correspond.
Da: UK BOOKS STORE, London, LONDO, Regno Unito
EUR 118,13
Quantità: 1 disponibili
Aggiungi al carrelloCondizione: New. Brand New! Fast Delivery "International Edition " and ship within 24-48 hours. Deliver by FedEx and Dhl, & Aramex, UPS, & USPS and we do accept APO and PO BOX Addresses. Order can be delivered worldwide within 4-6 Working days .and we do have flat rate for up to 2LB. Extra shipping charges will be requested This Item May be shipped from India, United states & United Kingdom. Depending on your location and availability.
Da: preigu, Osnabrück, Germania
EUR 50,25
Quantità: 5 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. Privacy, Security, and Trust in KDD | First ACM SIGKDD International Workshop, PinKDD 2007, San Jose, CA, USA, August 12, 2007, Revised, Selected Papers | Francesco Bonchi (u. a.) | Taschenbuch | ix | Englisch | 2008 | Springer | EAN 9783540784777 | Verantwortliche Person für die EU: Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu.
Da: Buchpark, Trebbin, Germania
EUR 37,87
Quantità: 1 disponibili
Aggiungi al carrelloCondizione: Sehr gut. Zustand: Sehr gut | Sprache: Englisch | Produktart: Bücher | without sacri?cing the privacy and security of the individuals to whom the data correspond.
Lingua: Inglese
Editore: Springer Berlin Heidelberg Mrz 2008, 2008
ISBN 10: 3540784772 ISBN 13: 9783540784777
Da: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germania
EUR 53,49
Quantità: 2 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Vast amounts of data are collected by service providers and system administ- tors, and are available in public information systems. Data mining technologies provide an ideal framework to assist in analyzing such collections for computer security and surveillance-related endeavors. For instance, system administrators can apply data mining to summarize activity patterns in access logs so that potential malicious incidents can be further investigated. Beyond computer - curity, data mining technology supports intelligence gathering and summari- tion for homeland security. For years, and most recently fueled by events such as September 11, 2001, government agencies have focused on developing and applying data mining technologies to monitor terrorist behaviors in public and private data collections. Theapplicationof data mining to person-speci cdata raisesseriousconcerns regarding data con dentiality and citizens privacy rights. These concerns have led to the adoption of various legislation and policy controls. In 2005, the - ropean Union passed a data-retention directive that requires all telephone and Internetservice providersto store data ontheir consumers for up to two yearsto assist in the prevention of terrorismand organized crime. Similar data-retention regulationproposalsareunderheateddebateintheUnitedStatesCongress. Yet, the debate often focuses on ethical or policy aspects of the problem, such that resolutions have polarized consequences; e. g. , an organization can either share data for data mining purposes or it can not. Fortunately, computer scientists, and data mining researchers in particular, have recognized that technology can beconstructedtosupportlesspolarizedsolutions. Computerscientistsaredev- oping technologies that enable data mining goals without sacri cing the privacy and security of the individuals to whom the data correspond. 192 pp. Englisch.
Lingua: Inglese
Editore: Springer Berlin Heidelberg, 2008
ISBN 10: 3540784772 ISBN 13: 9783540784777
Da: moluna, Greven, Germania
EUR 48,37
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Invited Paper.- An Ad Omnia Approach to Defining and Achieving Private Data Analysis.- Contributed Papers.- Phoenix: Privacy Preserving Biclustering on Horizontally Partitioned Data.- Allowing Privacy Protection Algorithms to Jump Out of Local Optimums: An .
Lingua: Inglese
Editore: Springer Berlin Heidelberg, J.B. Metzler Mär 2008, 2008
ISBN 10: 3540784772 ISBN 13: 9783540784777
Da: buchversandmimpf2000, Emtmannsberg, BAYE, Germania
EUR 53,49
Quantità: 1 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. This item is printed on demand - Print on Demand Titel. Neuware -without sacri cing the privacy and security of the individuals to whom the data correspond.Springer-Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 192 pp. Englisch.