|
|
|
|
Best Career and Education Web Sites: A Quick Guide to Online Job Search"Very highly recommended for students, job seekers, career changers, teachers, parents, counselors, and school and community reference book collections."
Laura B. Ward, Ph.D., Past President, ACTE; Guidance and Placement Coordinator, Montgomery Public Schools, AL "This thorough,... | | Structured Finance: Techniques, Products and Market (Springer Finance)In recent years, financial engineering has developed new ways of financing deals based primarily on the capacity of the operations to generate sufficient cash for the repayment of loans or bonds. The business of structured finance has then become an interesting business area for non-financial companies, investment and commercial banks and... | | The Effective Incident Response TeamWhen an intruder, worm, virus, or automated attack succeeds in targeting a computer system, having specific controls and a response plan in place can greatly lessen losses. Accordingly, businesses are realizing that it is unwise to invest resources in preventing computer-related security incidents without equal consideration of how to detect and... |
|
|
|
Credit Portfolio ManagementMarket realities have forced many financial institutions (and will force many others in the future) to change the way they manage their portfolios of credit assets. Evidence of this change can be seen in the rapid growth of secondary loan trading, credit derivatives, and loan securitizations. Less obvious–but far more important–is the... | | Surveillance and Threat Detection: Prevention versus Mitigation
Surveillance and Threat Detection offers readers a complete understanding of the terrorist/criminal cycle, and how to interrupt that cycle to prevent an attack.
Terrorists and criminals often rely on pre-attack and pre-operational planning and surveillance activities that can last a period of weeks, months, or even years.... | | Spring Security 3.x Cookbook
Secure your Java applications against online threats by learning the powerful mechanisms of Spring Security. Presented as a cookbook full of recipes, this book covers a wide range of vulnerabilities and scenarios.
Overview
-
Learn about all the mandatory security measures for modern day applications using...
|
|
|
Result Page: 11 10 9 8 7 6 5 4 3 2 1 |