Skip to main content

Morgan Kaufmann

  • Java Data Mining: Strategy, Standard, and Practice

    A Practical Guide for Architecture, Design, and Implementation
    • 1st Edition
    • Mark F. Hornick + 2 more
    • English
    Whether you are a software developer, systems architect, data analyst, or business analyst, if you want to take advantage of data mining in the development of advanced analytic applications, Java Data Mining, JDM, the new standard now implemented in core DBMS and data mining/analysis software, is a key solution component. This book is the essential guide to the usage of the JDM standard interface, written by contributors to the JDM standard.
  • Architecture and Patterns for IT Service Management, Resource Planning, and Governance: Making Shoes for the Cobbler's Children

    • 1st Edition
    • Charles T. Betz
    • English
    Architecture and Patterns for IT Service Management, Resource Planning, and Governance: Making Shoes for the Cobbler's Children provides an independent examination of developments in Enterprise Resource Planning for Information. Major companies, research firms, and vendors are offering Enterprise Resource Planning for Information Technology, which they label as ERP for IT, IT Resource Planning and related terms. This book presents on-the-ground coverage of enabling IT governance in architectural detail, which can be used to define a strategy for immediate execution. It fills the gap between high-level guidance on IT governance and detailed discussions about specific vendor technologies. It provides a unique value chain approach to integrating the COBIT, ITIL, and CMM frameworks into a coherent, unified whole. It presents a field-tested, detailed conceptual information model with definitions and usage scenarios, mapped to both process and system architectures. This book is recommended for practitioners and managers engaged in IT support in large companies, particularly those who are information architects, enterprise architects, senior software engineers, program/project managers, and IT managers/directors.
  • Web Dragons

    Inside the Myths of Search Engine Technology
    • 1st Edition
    • Ian H. Witten + 2 more
    • English
    Web Dragons offers a perspective on the world of Web search and the effects of search engines and information availability on the present and future world. In the blink of an eye since the turn of the millennium, the lives of people who work with information have been utterly transformed. Everything we need to know is on the web. It's where we learn and play, shop and do business, keep up with old friends and meet new ones. Search engines make it possible for us to find the stuff we need to know. Search engines — web dragons — are the portals through which we access society's treasure trove of information. How do they stack up against librarians, the gatekeepers over centuries past? What role will libraries play in a world whose information is ruled by the web? How is the web organized? Who controls its contents, and how do they do it? How do search engines work? How can web visibility be exploited by those who want to sell us their wares? What's coming tomorrow, and can we influence it? As we witness the dawn of a new era, this book shows readers what it will look like and how it will change their world. Whoever you are: if you care about information, this book will open your eyes and make you blink.
  • See MIPS Run

    • 2nd Edition
    • Dominic Sweetman
    • English
    See MIPS Run, Second Edition, is not only a thorough update of the first edition, it is also a marriage of the best-known RISC architecture--MIPS--... the best-known open-source OS--Linux. The first part of the book begins with MIPS design principles and then describes the MIPS instruction set and programmers’ resources. It uses the MIPS32 standard as a baseline (the 1st edition used the R3000) from which to compare all other versions of the architecture and assumes that MIPS64 is the main option. The second part is a significant change from the first edition. It provides concrete examples of operating system low level code, by using Linux as the example operating system. It describes how Linux is built on the foundations the MIPS hardware provides and summarizes the Linux application environment, describing the libraries, kernel device-drivers and CPU-specific code. It then digs deep into application code and library support, protection and memory management, interrupts in the Linux kernel and multiprocessor Linux. Sweetman has revised his best-selling MIPS bible for MIPS programmers, embedded systems designers, developers and programmers, who need an in-depth understanding of the MIPS architecture and specific guidance for writing software for MIPS-based systems, which are increasingly Linux-based.
  • Traffic Engineering and QoS Optimization of Integrated Voice and Data Networks

    • 1st Edition
    • Gerald R. Ash
    • English
    This book describes, analyzes, and recommends traffic engineering (TE) and quality of service (QoS) optimization methods for integrated voice/data dynamic routing networks. These functions control a network's response to traffic demands and other stimuli, such as link failures or node failures. TE and QoS optimization is concerned with measurement, modeling, characterization, and control of network traffic, and the application of techniques to achieve specific performance objectives. The scope of the analysis and recommendations include dimensioning, call/flow and connection routing, QoS resource management, routing table management, dynamic transport routing, and operational requirements. Case studies are included which provide the reader with a concrete way into the technical details and highlight why and how to use the techniques described in the book.
  • IPv6 Core Protocols Implementation

    • 1st Edition
    • Qing Li + 2 more
    • English
    IPv6 was introduced in 1994 and has been in development at the IETF for over 10 years. It has now reached the deployment stage. KAME, the de-facto open-source reference implementation of the IPv6 standards, played a significant role in the acceptance and the adoption of the IPv6 technology. The adoption of KAME by key companies in a wide spectrum of commercial products is a testimonial to the success of the KAME project, which concluded not long ago. This book is the first and the only one of its kind, which reveals all of the details of the KAME IPv6 protocol stack, explaining exactly what every line of code does and why it was designed that way. Through the dissection of both the code and its design, the authors illustrate how IPv6 and its related protocols have been interpreted and implemented from the specifications. This reference will demystify those ambiguous areas in the standards, which are open to interpretation and problematic in deployment, and presents solutions offered by KAME in dealing with these implementation challenges.
  • IT Manager's Handbook

    Getting Your New Job Done
    • 2nd Edition
    • Bill Holtsnider + 1 more
    • English
    IT Manager's Handbook, Second Edition, provides essential information to help students understand the responsibilities of today’s IT Management professionals: not only planning network security and implementing disaster recovery plans, but also such vital tasks as creating budgets, administering compliance, and managing staff. In particular, the book discusses business practices that are most critical to effective IT operations: recruiting, budgeting, resource planning, managing personnel, and working with vendor. This updated version includes expanded coverage on such critical IT management topics as security, disaster recovery, storage, government/regulator... compliance, and project management. Information is organized modularly so that instructors and students can delve directly into only the topics needed. Each chapter contains additional resources sections for books, articles, and websites relevant to that topic. It contains new material on key technology topics such as open source, outsourcing, offshoring, and handhelds, plus updated coverage of e-commerce, remote access, intranets, and LAN/WAN management.
  • Data Preparation for Data Mining Using SAS

    • 1st Edition
    • Mamdouh Refaat
    • English
    Are you a data mining analyst, who spends up to 80% of your time assuring data quality, then preparing that data for developing and deploying predictive models? And do you find lots of literature on data mining theory and concepts, but when it comes to practical advice on developing good mining views find little “how to” information? And are you, like most analysts, preparing the data in SAS?This book is intended to fill this gap as your source of practical recipes. It introduces a framework for the process of data preparation for data mining, and presents the detailed implementation of each step in SAS. In addition, business applications of data mining modeling require you to deal with a large number of variables, typically hundreds if not thousands. Therefore, the book devotes several chapters to the methods of data transformation and variable selection.
  • Joe Celko's SQL Puzzles and Answers

    • 2nd Edition
    • Joe Celko
    • English
    Joe Celko's SQL Puzzles and Answers, Second Edition, challenges you with his trickiest puzzles and then helps solve them with a variety of solutions and explanations. Author Joe Celko demonstrates the thought processes that are involved in attacking a problem from an SQL perspective to help advanced database programmers solve the puzzles you frequently face. These techniques not only help with the puzzle at hand, but also help develop the mindset needed to solve the many difficult SQL puzzles you face every day. This updated edition features many new puzzles; dozens of new solutions to puzzles; and new chapters on temporal query puzzles and common misconceptions about SQL and RDBMS that leads to problems. This book is recommended for database programmers with a good knowledge of SQL.
  • High-Performance Embedded Computing

    Architectures, Applications, and Methodologies
    • 1st Edition
    • Wayne Wolf
    • English
    Over the past several years, embedded systems have emerged as an integral though unseen part of many consumer, industrial, and military devices. The explosive growth of these systems has resulted in embedded computing becoming an increasingly important discipline. The need for designers of high-performance, application-specific computing systems has never been greater, and many universities and colleges in the US and worldwide are now developing advanced courses to help prepare their students for careers in embedded computing.High-Perfo... Embedded Computing: Architectures, Applications, and Methodologies is the first book designed to address the needs of advanced students and industry professionals. Focusing on the unique complexities of embedded system design, the book provides a detailed look at advanced topics in the field, including multiprocessors, VLIW and superscalar architectures, and power consumption. Fundamental challenges in embedded computing are described, together with design methodologies and models of computation. HPEC provides an in-depth and advanced treatment of all the components of embedded systems, with discussions of the current developments in the field and numerous examples of real-world applications.