Títulos similares: Outlier Analysis /
- Secure Data Management : 10th VLDB Workshop, SDM 2013, Trento, Italy, August 30, 2013 : Proceedings /
- Principles of Security and Trust : Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014 : Proceedings /
- Research in Attacks, Intrusions, and Defenses : 17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014 : Proceedings /
- Detection of Intrusions and Malware, and Vulnerability Assessment : 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014 : Proceedings /
- Information Security and Cryptology, ICISC 2013 : 16th International Conference, Seoul, Korea, November 27–29, 2013 : Revised Selected Papers /
- Foundations of Security Analysis and Design VII : FOSAD 2012-2013 : Tutorial Lectures /
Tópico: Análisis de Datos - Tema Principal
- Métodos multivariados aplicados al análisis de datos /
- Statistics and Data Analysis for Financial Engineering /
- Practical MDX Queries for Microsoft SQL Server Analysis Services 2008 /
- Practical PowerPivot and DAX Formulas for Excel 2010 /
- PowerPivot for the Data Analyst : Microsoft Excel 2010 /
- Practical DMX Queries for Microsoft SQL Server Analysis Services 2008 /
Tópico: Proceso de Datos
- Heuristics : intelligent search strategies for computer problem solving /
- Los negocios en la era digital /
- Modelo para la administración de requerimientos en agrupamietos empresariales para la micro y pequeña empresa /
- Readings in groupware and computer-supported cooperative work : assisting human-human collaboration /
- Advanced Course on Petri Nets /
- Real-Time Systems Design and Analysis : An Engineer's Handbook /