« Back | Print 
Concordia.ca   /   Library   /   About the library   /   News   /   Acquisitions

New books by subject

sort items by: 
 RSS

Computer Science - Concordia University Libraries Recent Acquisitions

Titles in the call number range QA 75 - QA 76 (Computer Science) that were added to the Concordia University Libraries collection in the last 60 days.


  • Ancestral Knowledge Meets Computer Science Education : Environmental Change in Community / Cueponcaxochitl D. Moreno Sandoval
    QA 76.27 M37 2019eb

  • Operating system concepts / Abraham Silberschatz, Yale University, Peter Baer Galvin, Cambridge Computer and Starfish Storage, Greg Gagne, Westminster College
    QA 76.76 O63 S55825 2018

    The tenth edition of Operating System Concepts has been revised to keep it fresh and up-to-date with contemporary examples of how operating systems function, as well as enhanced interactive elements to improve learning and the student's experience with the material. It combines instruction on concepts with real-world applications so that students can understand the practical usage of the content. End-of-chapter problems, exercises, review questions, and programming exercises help to further reinforce important concepts. New interactive self-assessment problems are provided throughout the text to help students monitor their level of understanding and progress. A Linux virtual machine (including C and Java source code and development tools) allows students to complete programming exercises that help them engage further with the material.

    The Enhanced E-Text is also available bundled with an abridged print companion and can be ordered by contacting customer service here :
    ISBN: 9781119456339
    Price: $97.95
    Canadian Price: $111.50


  • Database management systems : a business-oriented approach using ORACLE, MySQL, and MS Access / Sotirios Zygiaris
    QA 76.9 D3 D38 2018eb
    More and more, the advance of enterprise computing and cloud technologies means that managers are responsible for retrieving data ad-hoc and constructing business reports for decision-making and storytelling. The technical competencies necessary for such tasks can be daunting, and most database teaching methods do little to mitigate the confusion. They tend to follow traditional computer science methods that expose all computational and matrix theory complexities as well as various design theories, and in so doing, they present an excess of information that unnecessarily complicates the learning process for business-minded readers.
    Zygiaris simplifies his teaching method in order to provide an accessible walkthrough of all technological advances of databases in the business environment. Readers learn how to design, develop, and use databases to provide business analytical reports with the three major database management systems: Microsoft Access, Oracle Express and MariaDB (formerly MySQL). This is all delivered through clearly structured, streamlined chapters, all of which link to online videos that demonstrate visually, in step-by-step tutorials, how to implement the processes outlined in the book. All of these features help the non-IT student or manager to understand the importance of databases in the business environment and to learn how to use those databases to solve real-world problems.
    This book is of particular interest to students of management and to business managers, and it is of keen interest to anyone who works with major business database systems.

  • Virtual reality - real visuality : virtual, visual, veridical / András Benedek, Ágnes Veszelszki (eds.)
    QA 76.9 C65 V57 2017eb

    This book raises the question of what visuality really is and how it is possible to explain it. Virtual reality is connected to our current environment with multiple ties. It affects the everyday operation of the media and hence all of our lives. The authors connect the concepts of pictorial turn and virtual reality from different perspectives and disciplines, from philosophy through communication theory, rhetoric and linguistics to pedagogy.


  • AUGMENTED REALITY AND VIRTUAL REALITY : the power of ar and vr for
    QA76.9.A94 A94 2019eb

  • Introduction to digital media / Alessandro Delfanti and Adam Arvidsson
    QA 76.575 D44 2019eb

    New and updated English translation of the highly successful book on digital media

    This book introduces readers to the vast and rich world of digital media. It provides a strong starting point for understanding digital media's social and political significance to our culture and the culture of others--drawing on an emergent and increasingly rich set of empirical and theoretical studies on the role and development of digital media in contemporary societies. Touching on the core points behind the discipline, the book addresses a wide range of topics, including media economics, online cooperation, open source, social media, software production, globalization, brands, marketing, the cultural industry, labor, and consumption.

    Presented in six sections--Media and Digital Technologies; The Information Society; Cultures and Identities; Digital Collaboration; Public Sphere and Power; Digital Economies--the book offers in-depth chapter coverage of new and old media; network infrastructure; networked economy and globalization; the history of information technologies; the evolution of networks; sociality and digital media; media and identity; collaborative media; open source and innovation; politics and democracy; social movements; surveillance and control; digital capitalism; global inequalities and development; and more.

    Delivers a reliable, compact and quick introduction to the core issues analyzed by digital culture studies and sociology of information societies Interweaves main topics and theories with several examples and up-to-date case studies, often linked to our everyday lives on the internet, as well as suggestions for further readings Anchors examples to discussions of the main sociological, political, and anthropological theoretical approaches at stake to help students make sense of the changes brought about by digital media Uses critical sociological and political theory alongside every day examples to discuss concepts such as online sociality, digital labor, digital value creation, and the reputation economy

    Clear and concise throughout, Introduction to Digital Media is an excellent primer for those teaching and studying digital culture and media.


  • Think like a UX researcher : how to observe users, influence design, and shape business strategy / David Travis and Philip Hodgson
    QA 76.9 U83 T73 2019eb

    Think Like a UX Researcher will challenge your preconceptions about user experience (UX) research and encourage you to think beyond the obvious. You'll discover how to plan and conduct UX research, analyze data, persuade teams to take action on the results and build a career in UX. The book will help you take a more strategic view of product design so you can focus on optimizing the user's experience. UX Researchers, Designers, Project Managers, Scrum Masters, Business Analysts and Marketing Managers will find tools, inspiration and ideas to rejuvenate their thinking, inspire their team and improve their craft.

    Key Features

    A dive-in-anywhere book that offers practical advice and topical examples. 
 Thought triggers, exercises and scenarios to test your knowledge of UX research.   
 Workshop ideas to build a development team's UX maturity. 
 War stories from seasoned researchers to show you how UX research methods can be tailored to your own organization.

  • Quantum computing for everyone / Chris Bernhardt
    QA 76.889 B47 2019eb

    An accessible introduction to an exciting new area in computation, explaining such topics as qubits, entanglement, and quantum teleportation for the general reader.

    Quantum computing is a beautiful fusion of quantum physics and computer science, incorporating some of the most stunning ideas from twentieth-century physics into an entirely new way of thinking about computation. In this book, Chris Bernhardt offers an introduction to quantum computing that is accessible to anyone who is comfortable with high school mathematics. He explains qubits, entanglement, quantum teleportation, quantum algorithms, and other quantum-related topics as clearly as possible for the general reader. Bernhardt, a mathematician himself, simplifies the mathematics as much as he can and provides elementary examples that illustrate both how the math works and what it means.

    Bernhardt introduces the basic unit of quantum computing, the qubit, and explains how the qubit can be measured; discusses entanglement--which, he says, is easier to describe mathematically than verbally--and what it means when two qubits are entangled (citing Einstein's characterization of what happens when the measurement of one entangled qubit affects the second as "spooky action at a distance"); and introduces quantum cryptography. He recaps standard topics in classical computing--bits, gates, and logic--and describes Edward Fredkin's ingenious billiard ball computer. He defines quantum gates, considers the speed of quantum algorithms, and describes the building of quantum computers. By the end of the book, readers understand that quantum computing and classical computing are not two distinct disciplines, and that quantum computing is the fundamental form of computing. The basic unit of computation is the qubit, not the bit.


  • Head first Kotlin : a brain-friendly guide / Dawn Griffiths, David Griffiths
    QA 76.62 G75 2019eb

  • Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies / edited by DacNhuong Le, Haiphong University, Haiphong, Vietnam, Raghvendra Kumar, LNCT College, India, Brojo Kishore Mishra, C. V. Raman College of Engineering, Bhubaneswar, India, Manju Khari, Ambedkar Institute of Advance Communication Technologies & Research, India, Jyotir Moy Chatterjee, Asia Pacific University of Technology & Innovation, Kathmandu, Nepal
    QA 76.9 A25 C918134 2019eb

    The main objective of this book is to explore the concept of cybersecurity in parallel and distributed computing along with recent research developments in the field. It also includes various real-time/offline applications and case studies in the fields of engineering and computer science and the modern tools and technologies used. Information on cybersecurity technologies is organized in the fifteen chapters of this book.

    This important book cover subjects such as:

    Research and solutions for the problem of hidden image detection Security aspects of data mining and possible solution techniques A comparative analysis of various methods used in e-commerce security and how to perform secure payment transactions in an efficient manner Blockchain technology and how it is crucial to the security industry Security for the Internet of Things Security issues and challenges in distributed computing security such as heterogeneous computing, cloud computing, fog computing, etc. Demonstrates the administration task issue in unified cloud situations as a multi-target enhancement issue in light of security Explores the concepts of cybercrime and cybersecurity and presents the statistical impact it is having on organizations Highlights some strategies for maintaining the privacy, integrity, confidentiality and availability of cyber information and its real-world impacts such as mobile security software for secure email and online banking, cyber health check programs for business, cyber incident response management, cybersecurity risk management Security policies and mechanisms, various categories of attacks (e.g., denial-of-service), global security architecture, along with distribution of security mechanisms Security issues in the healthcare sector with existing solutions and emerging threats.

  • Blockchain for distributed systems security / edited by Sachin S. Shetty, Charles A. Kamhoua, Laurent L. Njilla
    QA 76.9 B56 B56 2019eb

    AN ESSENTIAL GUIDE TO USING BLOCKCHAIN TO PROVIDE FLEXIBILITY, COST-SAVINGS, AND SECURITY TO DATA MANAGEMENT, DATA ANALYSIS, AND INFORMATION SHARING

    Blockchain for Distributed Systems Security contains a description of the properties that underpin the formal foundations of Blockchain technologies and explores the practical issues for deployment in cloud and Internet of Things (IoT) platforms. The authors--noted experts in the field--present security and privacy issues that must be addressed for Blockchain technologies to be adopted for civilian and military domains. The book covers a range of topics including data provenance in cloud storage, secure IoT models, auditing architecture, and empirical validation of permissioned Blockchain platforms.

    The book's security and privacy analysis helps with an understanding of the basics of Blockchain and it explores the quantifying impact of the new attack surfaces introduced by Blockchain technologies and platforms. In addition, the book contains relevant and current updates on the topic. This important resource:

    Provides an overview of Blockchain-based secure data management and storage for cloud and IoT Covers cutting-edge research findings on topics including invariant-based supply chain protection, information sharing framework, and trust worthy information federation Addresses security and privacy concerns in Blockchain in key areas, such as preventing digital currency miners from launching attacks against mining pools, empirical analysis of the attack surface of Blockchain, and more

    Written for researchers and experts in computer science and engineering, Blockchain for Distributed Systems Security contains the most recent information and academic research to provide an understanding of the application of Blockchain technology.


  • Beep to boom : the development of advanced runtime sound systems for games and extended reality / Simon N Goodwin
    QA 76.76 C672 G655 2019eb

    Drawing on decades of experience, Beep to Boom: The Development of Advanced Runtime Sound Systems for Games and Extended Reality is a rigorous, comprehensive guide to interactive audio runtime systems.

    Packed with practical examples and insights, the book explains each component of these complex geometries of sound. Using practical, lowest-common-denominator techniques, Goodwin covers soundfield creation across a range of platforms from phones to VR gaming consoles.

    Whether creating an audio system from scratch or building on existing frameworks, the book also explains costs, benefits and priorities. In the dynamic simulated world of games and extended reality, interactive audio can now consider every intricacy of real-world sound. This book explains how and why to tame it enjoyably.


  • Encyclopedia of software engineering / John J. Marciniak, editor-in-chief
    QA 76.758 E53 2002eb
    Covering all aspects of engineering for practitioners who design, write, or test computer programs, this updated edition explores all the issues and principles of software design and engineering. With terminology that adheres to the standard set by The Institute of Electrical and Electronics Engineers (IEEE), the book features over 500 entries in 35 taxonomic areas, as well as biographies of over 100 personalities who have made an impact in the field.

  • Exemplar-based knowledge acquisition : a unified approach to concept representation, classification, and learning / Ray Bareiss
    QA 76.76 E95B27 1989

  • Data visualization : a practical introduction / Kieran Healy
    QA 76.9 I52 H43 2019

    An accessible primer on how to create effective graphics from data

    This book provides students and researchers a hands-on introduction to the principles and practice of data visualization. It explains what makes some graphs succeed while others fail, how to make high-quality figures from data using powerful and reproducible methods, and how to think about data visualization in an honest and effective way.

    Data Visualization builds the reader's expertise in ggplot2, a versatile visualization library for the R programming language. Through a series of worked examples, this accessible primer then demonstrates how to create plots piece by piece, beginning with summaries of single variables and moving on to more complex graphics. Topics include plotting continuous and categorical variables; layering information on graphics; producing effective "small multiple" plots; grouping, summarizing, and transforming data for plotting; creating maps; working with the output of statistical models; and refining plots to make them more comprehensible.

    Effective graphics are essential to communicating ideas and a great way to better understand data. This book provides the practical skills students and practitioners need to visualize quantitative data and get the most out of their research findings.

    Provides hands-on instruction using R and ggplot2
    Shows how the "tidyverse" of data analysis tools makes working with R easier and more consistent
    Includes a library of data sets, code, and functions

  • Weapons of math destruction : how big data increases inequality and threatens democracy / Cathy O'Neil
    QA 76.9 B45O64 2017
    Longlisted for the National Book Award
    New York Times Bestseller

    A former Wall Street quant sounds an alarm on the mathematical models that pervade modern life -- and threaten to rip apart our social fabric

    We live in the age of the algorithm. Increasingly, the decisions that affect our lives--where we go to school, whether we get a car loan, how much we pay for health insurance--are being made not by humans, but by mathematical models. In theory, this should lead to greater fairness: Everyone is judged according to the same rules, and bias is eliminated.

    But as Cathy O'Neil reveals in this urgent and necessary book, the opposite is true. The models being used today are opaque, unregulated, and uncontestable, even when they're wrong. Most troubling, they reinforce discrimination: If a poor student can't get a loan because a lending model deems him too risky (by virtue of his zip code), he's then cut off from the kind of education that could pull him out of poverty, and a vicious spiral ensues. Models are propping up the lucky and punishing the downtrodden, creating a "toxic cocktail for democracy." Welcome to the dark side of Big Data.

    Tracing the arc of a person's life, O'Neil exposes the black box models that shape our future, both as individuals and as a society. These "weapons of math destruction" score teachers and students, sort résumés, grant (or deny) loans, evaluate workers, target voters, set parole, and monitor our health.

    O'Neil calls on modelers to take more responsibility for their algorithms and on policy makers to regulate their use. But in the end, it's up to us to become more savvy about the models that govern our lives. This important book empowers us to ask the tough questions, uncover the truth, and demand change.

    -- Longlist for National Book Award (Non-Fiction)
    -- Goodreads, semi-finalist for the 2016 Goodreads Choice Awards (Science and Technology)
    -- Kirkus, Best Books of 2016
    -- New York Times, 100 Notable Books of 2016 (Non-Fiction)
    -- The Guardian , Best Books of 2016
    -- WBUR's "On Point," Best Books of 2016: Staff Picks
    -- Boston Globe, Best Books of 2016, Non-Fiction

  • The UX book : Agile UX design for a quality user experience / Rex Hartson, Pardha Pyla
    QA 76.9 U83 H37 2019

    The discipline of user experience (UX) design has matured into a confident practice and this edition reflects, and in some areas accelerates, that evolution. Technically this is the second edition of The UX Book , but so much of it is new, it is more like a sequel.

    One of the major positive trends in UX is the continued emphasis on design--a kind of design that highlights the designer's creative skills and insights and embodies a synthesis of technology with usability, usefulness, aesthetics, and meaningfulness to the user. In this edition a new conceptual top-down design framework is introduced to help readers with this evolution.

    This entire edition is oriented toward an agile UX lifecycle process, explained in the funnel model of agile UX, as a better match to the now de facto standard agile approach to software engineering. To reflect these trends, even the subtitle of the book is changed to "Agile UX design for a quality user experience".

    Designed as a how-to-do-it handbook and field guide for UX professionals and a textbook for aspiring students, the book is accompanied by in-class exercises and team projects.

    The approach is practical rather than formal or theoretical. The primary goal is still to imbue an understanding of what a good user experience is and how to achieve it. To better serve this, processes, methods, and techniques are introduced early to establish process-related concepts as context for discussion in later chapters.


  • Location technologies in international context / edited by Rowan Wilken, Gerard Goggin, and Heather A. Horst
    QA 76.59 L635 2019

    Location Technologies in International Context offers the first international account of location technologies (in an expanded sense) and brings together a range of contributions on these technologies and their various cultures of use within the Global South.

    This collection asks: How, within the Global South, do location technologies differ across national markets, geo-linguistic communities and cultural contexts? What are the contrasting or shared meanings and practices associated with location technologies? And what innovative practices and new (or reinvigorated) theory may emerge from attention to the Global South? In exploring these questions, the collection contributes to our understanding of social, cultural, gendered and political relations on a global and local scale.

    Location Technologies in International Context is ideal for a range of disciplines, including cultural, communication and media studies; anthropology, sociology and geography; new media, Internet and mobile studies; and informatics and development studies.


  • Creating intelligent content with lightweight DITA / Carlos Evia
    QA 76.76 H94 E97 2019

    Creating Intelligent Content with Lightweight DITA documents the evolution of the Darwin Information Typing Architecture (DITA) - a widely used open standard for structuring technical content. DITA has grown in popularity and features since its origins as an internal grammar for structuring technical documentation at IBM. This book introduces Lightweight DITA (LwDITA, which should be read as "Lightweight DITA") as a proposed version of the DITA standard that reduces its dependence on complex Extensible Markup Language (XML) structures and simplifies its authoring experience. This volume aims to reconcile discrepancies and similarities in methods for authoring content in industry and academia and does so by reporting on DITA's evolution through the lens of computational thinking, which has been connected in scholarship and media to initiatives for learning to code and programming.

    Evia's core argument is that if technical communicators are trained with principles of rhetorical problem solving and computational thinking, they can create structured content in lightweight workflows with XML, HTML5, and Markdown designed to reduce the learning curve associated with DITA and similar authoring methodologies. At the same time, this book has the goal of making concepts of structured authoring and intelligent content easier to learn and teach in humanities-based writing and communication programs. This book is intended for practitioners and students interested in structured authoring or the DITA standard.


  • Computer security : art and science / Matt Bishop ; with contributions from Elisabeth Sullivan and Michelle Ruppel
    QA 76.9 A25 B56 2019
    The Comprehensive Guide to Computer Security, Extensively Revised with Newer Technologies, Methods, Ideas, and Examples

    In this updated guide, University of California at Davis Computer Security Laboratory co-director Matt Bishop offers clear, rigorous, and thorough coverage of modern computer security. Reflecting dramatic growth in the quantity, complexity, and consequences of security incidents, Computer Security, Second Edition, links core principles with technologies, methodologies, and ideas that have emerged since the first edition's publication.

    Writing for advanced undergraduates, graduate students, and IT professionals, Bishop covers foundational issues, policies, cryptography, systems design, assurance, and much more. He thoroughly addresses malware, vulnerability analysis, auditing, intrusion detection, and best-practice responses to attacks. In addition to new examples throughout, Bishop presents entirely new chapters on availability policy models and attack analysis.

    Understand computer security goals, problems, and challenges, and the deep links between theory and practice Learn how computer scientists seek to prove whether systems are secure Define security policies for confidentiality, integrity, availability, and more Analyze policies to reflect core questions of trust, and use them to constrain operations and change Implement cryptography as one component of a wider computer and network security strategy Use system-oriented techniques to establish effective security mechanisms, defining who can act and what they can do Set appropriate security goals for a system or product, and ascertain how well it meets them Recognize program flaws and malicious logic, and detect attackers seeking to exploit them This is both a comprehensive text, explaining the most fundamental and pervasive aspects of the field, and a detailed reference. It will help you align security concepts with realistic policies, successfully implement your policies, and thoughtfully manage the trade-offs that inevitably arise.

    Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.


  • Understanding security issues / Scott E. Donaldson, Chris K. Williams, and Stanley G. Siegel
    QA 76.9 A25D66 2019

    With the threats that affect every computer, phone or other device connected to the internet, security has become a responsibility not just for law enforcement authorities or business leaders, but for every individual. Your family, information, property, and business must be protected from cybercriminals in the office, at home, on travel, and in the cloud. Understanding Security Issues provides a solid understanding of the threats, and focuses on useful tips and practices for protecting yourself, all the time, everywhere and anywhere you go. 

    This book discusses security awareness issues and how you can take steps to reduce the risk of becoming a victim:

    The threats that face every individual and business, all the time. Specific indicators of threats so that you understand when you might be attacked and what to do if they occur. The security mindset and good security practices. Assets that need to be protected at work and at home. Protecting yourself and your business at work. Protecting yourself and your family at home. Protecting yourself and your assets on travel.

  • Intelligent systems : concepts, methodologies, tools, and applications / [edited by] Information Resources Management Association
    QA 76.76 E95 I53485 2018
    Ongoing advancements in modern technology have led to significant developments in intelligent systems. With the numerous applications available, it becomes imperative to conduct research and make further progress in this field. Intelligent Systems: Concepts, Methodologies, Tools, and Applications contains a compendium of the latest academic material on the latest breakthroughs and recent progress in intelligent systems. Including innovative studies on information retrieval, artificial intelligence, and software engineering, this multi-volume book is an ideal source for researchers, professionals, academics, upper-level students, and practitioners interested in emerging perspectives in the field of intelligent systems.

  • Augmented intelligence : smart systems and the future of work and learning / edited by Daniel Araya
    QA 76.9 H85 A7887 2018

    Where the Agricultural Revolution harnessed domesticated animals for pastoral farming, and the Industrial Revolution leveraged machines for factory production, so today the Computational Revolution is advancing computers to augment human intelligence. Indeed, many now argue that the promise of exascale computing and the slow migration towards a computational society may represent a new threshold in human history. This "transcension" of earlier stages of tool-mediated work and learning foreshadows a momentous change in the kinds of cities we might build, the kinds of medicine we might practice, and the kinds of education we might provide. What is perhaps most surprising about the current Computational Revolution, however, is its expanding reach. The question that many now ask is "what is the trajectory of this human-machine symbiosis?" It would appear that we are on the cusp of a sea change in our capacities to augment human intelligence. But what is the future of work and learning? Will augmented intelligence help us in transforming a waning industrial society? These are the kinds of questions that we explore in Augmented Intelligence: Smart Systems and the Future of Work and Learning .


  • Security for software engineers / James Helfrich
    QA 76.9 A25 H445 2019

    Security for Software Engineers is designed to introduce security concepts to undergraduate software engineering students. The book is divided into four units, each targeting activities that a software engineer will likely be involved in within industry.

    The book explores the key areas of attack vectors, code hardening, privacy, and social engineering. Each topic is explored from a theoretical and a practical-application standpoint.

    Features:

    Targets software engineering students - one of the only security texts to target this audience. Focuses on the white-hat side of the security equation rather than the black-hat side. Includes many practical and real-world examples that easily translate into the workplace. Covers a one-semester undergraduate course. Describes all aspects of computer security as it pertains to the job of a software engineer and presents problems similar to that which an engineer will encounter in the industry.

    This text will equip students to make knowledgeable security decisions, be productive members of a security review team, and write code that protects a user¿s information assets.


  • Data science with Julia / by Paul D. McNicholas and Peter A. Tait
    QA 76.73 J85 M37 2019

    "This book is a great way to both start learning data science through the promising Julia language and to become an efficient data scientist."- Professor Charles Bouveyron, INRIA Chair in Data Science, Universit¿¿te d¿Azur, Nice, France

    Julia, an open-source programming language, was created to be as easy to use as languages such as R and Python while also as fast as C and Fortran. An accessible, intuitive, and highly efficient base language with speed that exceeds R and Python, makes Julia a formidable language for data science. Using well known data science methods that will motivate the reader, Data Science with Julia will get readers up to speed on key features of the Julia language and illustrate its facilities for data science and machine learning work.

    Features:

    Covers the core components of Julia as well as packages relevant to the input, manipulation and representation of data. Discusses several important topics in data science including supervised and unsupervised learning. Reviews data visualization using the Gadfly package, which was designed to emulate the very popular ggplot2 package in R. Readers will learn how to make many common plots and how to visualize model results. Presents how to optimize Julia code for performance. Will be an ideal source for people who already know R and want to learn how to use Julia (though no previous knowledge of R or any other programming language is required).

    The advantages of Julia for data science cannot be understated. Besides speed and ease of use, there are already over 1,900 packages available and Julia can interface (either directly or through packages) with libraries written in R, Python, Matlab, C, C++ or Fortran. The book is for senior undergraduates, beginning graduate students, or practicing data scientists who want to learn how to use Julia for data science.

    "This book is a great way to both start learning data science through the promising Julia language and to become an efficient data scientist."

    Professor Charles Bouveyron
    INRIA Chair in Data Science
    Universit¿¿te d¿Azur, Nice, France

page last updated on: Monday 27 May 2019
Back to top Back to top