These reviews are the most popular with readers.
All Media Types
For the last:
Introduction to data mining (2nd ed.)
Tan P., Steinbach M., Karpatne A., Kumar V., Pearson, New York, NY, 2018. 864 pp. Type: Book (978-0-133128-90-1)
The first edition of this book, published in 2006 , was probably the best introductory textbook on data mining available. A dozen years later, the field has evolved to become mainstream under the commercial denomination of “big data,̶...
The Oxford handbook of causal reasoning
Waldmann M., Oxford University Press, Inc., New York, NY, 2017. 768 pp. Type: Book (978-0-199399-55-0)
A few years ago, Weisberg’s
 distinguished two facets of uncertainty: doubt, which is the focus of modern statistics, and ambiguity about the causal structure of the world, which researchers in many domains have n...
Teaching computing: a practitioner’s perspective
Walker H., CRC Press, Inc., Boca Raton, FL, 2018. 514 pp. Type: Book (978-1-138034-43-3)
Computing is a very popular option among undergraduates and graduates because it relates to many other disciplines, including finance, graphic design, game development, and biology, among others. The teaching of computing requires up-to-date knowl...
Digital business leadership: digital transformation, business model innovation, agile organization, change management
Kreutzer R., Neugebauer T., Pattloch A., Springer International Publishing, New York, NY, 2018. 263 pp. Type: Book (978-3-662565-47-6)
Industry 4.0 denotes the fourth industrial evolution: “the interconnection of value creation processes beyond the boundaries of individual companies.” For this to happen, “powerful Internet access must be available.” The co...
Predictive statistics: analysis and inference beyond models
Clarke B., Clarke J., Cambridge University Press, New York, NY, 2018. 656 pp. Type: Book (978-1-107028-28-9)
As stated in the preface,
“is an attempt to focus more heavily on the data than the formalism and to focus more heavily on the performance of predictors rather than the fit or physical interpretation of a model o...
Advances in computers: volume 108
Memon A., Academic Press, Inc., Cambridge, MA, 2018. 364 pp. Type: Book (978-0-128151-19-8)
Advances in Computers
series started in 1960 . Each year, several volumes are printed; each volume contains four to seven chapters, with each chapter written by leading researchers who summarize the state of the art in their specific...
Usability testing for survey research
Geisen E., Bergstrom J., Morgan Kaufmann Publishers Inc., Cambridge, MA, 2017. 250 pp. Type: Book (978-0-128036-56-3)
Understanding user behavior to improve software products is the main purpose of usability testing. Usability testing is an important issue for any interactive application. There are many books on this topic. This book focuses on usability testing ...
Random numbers and computers
Kneusel R., Springer International Publishing, New York, NY, 2018. 260 pp. Type: Book (978-3-319776-96-5)
Randomness is a fascinating topic, with contradictory opinions on what causes it. Rather than using this term to mean lawlessness, I personally define it as the presence of an inherent variability in the experimental setup that makes the response ...
Building games with Ethereum smart contracts: intermediate projects for solidity developers
Iyer K., Dannen C., Apress, New York, NY, 2018. 269 pp. Type: Book (978-1-484234-91-4)
Cryptocurrencies are a source of much speculation. While Bitcoin is the most widely known form of cryptocurrency, Ethereum is operating in a similar space. Here, two veteran actors in the field, Kedar Iyer and Chris Dannen, join forces to write a ...
Where did I leave my keys?: Lessons from the Juniper dual EC incident
Checkoway S., Maskiewicz J., Garman C., Fried J., Cohney S., Green M., Heninger N., Weinmann R., Rescorla E., Shacham H. Communications of the ACM 61(11): 148-155, 2018. Type: Article
Safe networks require reliable operating systems free from security vulnerabilities. Trustworthy routers ought to use dependable cryptographic algorithms to protect data transmitted over insecure networks. But how should effective guidelines be de...
Reproduction in whole or in part without permission is prohibited. Copyright © 2000-2019 ThinkLoud, Inc.