Privacy Preserving Data Mining
Data mining has emerged as a significant technology for gaining knowledge from vast quantities of data. However, concerns are growing that use of this technology can violate individual privacy. These concerns have led to a backlash against the technology, for example, a "Data-Mining Moratorium Act" introduced in the U.S. Senate that would have banned all data-mining programs (including research and development) by the U.S. Department of Defense.

Privacy Preserving Data Mining provides a comprehensive overview of available approaches, techniques and open problems in privacy preserving data mining. This book demonstrates how these approaches can achieve data mining, while operating within legal and commercial restrictions that forbid release of data. Furthermore, this research crystallizes much of the underlying foundation, and inspires further research in the area.

Privacy Preserving Data Mining is designed for a professional audience composed of practitioners and researchers in industry. This volume is also suitable for graduate-level students in computer science.

1101515523
Privacy Preserving Data Mining
Data mining has emerged as a significant technology for gaining knowledge from vast quantities of data. However, concerns are growing that use of this technology can violate individual privacy. These concerns have led to a backlash against the technology, for example, a "Data-Mining Moratorium Act" introduced in the U.S. Senate that would have banned all data-mining programs (including research and development) by the U.S. Department of Defense.

Privacy Preserving Data Mining provides a comprehensive overview of available approaches, techniques and open problems in privacy preserving data mining. This book demonstrates how these approaches can achieve data mining, while operating within legal and commercial restrictions that forbid release of data. Furthermore, this research crystallizes much of the underlying foundation, and inspires further research in the area.

Privacy Preserving Data Mining is designed for a professional audience composed of practitioners and researchers in industry. This volume is also suitable for graduate-level students in computer science.

109.99 In Stock
Privacy Preserving Data Mining

Privacy Preserving Data Mining

Privacy Preserving Data Mining

Privacy Preserving Data Mining

Hardcover(2006)

$109.99 
  • SHIP THIS ITEM
    In stock. Ships in 1-2 days.
  • PICK UP IN STORE

    Your local store may have stock of this item.

Related collections and offers


Overview

Data mining has emerged as a significant technology for gaining knowledge from vast quantities of data. However, concerns are growing that use of this technology can violate individual privacy. These concerns have led to a backlash against the technology, for example, a "Data-Mining Moratorium Act" introduced in the U.S. Senate that would have banned all data-mining programs (including research and development) by the U.S. Department of Defense.

Privacy Preserving Data Mining provides a comprehensive overview of available approaches, techniques and open problems in privacy preserving data mining. This book demonstrates how these approaches can achieve data mining, while operating within legal and commercial restrictions that forbid release of data. Furthermore, this research crystallizes much of the underlying foundation, and inspires further research in the area.

Privacy Preserving Data Mining is designed for a professional audience composed of practitioners and researchers in industry. This volume is also suitable for graduate-level students in computer science.


Product Details

ISBN-13: 9780387258867
Publisher: Springer US
Publication date: 11/29/2005
Series: Advances in Information Security , #19
Edition description: 2006
Pages: 122
Product dimensions: 6.10(w) x 9.25(h) x 0.01(d)

Table of Contents

Privacy and Data Mining.- What is Privacy?.- Solution Approaches / Problems.- Predictive Modeling for Classification.- Predictive Modeling for Regression.- Finding Patterns and Rules (Association Rules).- Descriptive Modeling (Clustering, Outlier Detection).- Future Research - Problems remaining.
From the B&N Reads Blog

Customer Reviews