Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Recent Econometric Techniques for Macroeconomic and Financial Data (Dynamic Modeling and Econometrics in Economics and Finance, 27)
Recent Econometric Techniques for Macroeconomic and Financial Data (Dynamic Modeling and Econometrics in Economics and Finance, 27)

The book provides a comprehensive overview of the latest econometric methods for studying the dynamics of macroeconomic and financial time series. It examines alternative methodological approaches and concepts, including quantile spectra and co-spectra, and explores topics such as non-linear and non-stationary behavior, stochastic...

Microeconomics (7th Edition)
Microeconomics (7th Edition)

KEY BENEFIT: This book is well known for its coverage of modern topics (Game theory, Economics of Information, and Behavioral Economics), clarity of its writing style and graphs, and integrated use of real world examples.

KEY TOPICS: The emphasis on relevance and application to...

Splunk Certified Study Guide: Prepare for the User, Power User, and Enterprise Admin Certifications
Splunk Certified Study Guide: Prepare for the User, Power User, and Enterprise Admin Certifications

Make your Splunk certification easier with this exam study guide that covers the User, Power User, and Enterprise Admin certifications. This book is divided into three parts. The first part focuses on the Splunk User and Power User certifications starting with how to install Splunk, Splunk Processing Language (SPL), field...

.NET Framework Security
.NET Framework Security
Welcome! The book you hold in your hands is a comprehensive guide and roadmap to the security infrastructure of the Microsoft .NET Framework. The .NET Framework is Microsoft's new cross-language development environment for building rich client applications and XML Web Services. One of the key features of the .NET Framework is a robust security...
Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast
Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast
Among the tests you perform on web applications, security testing is perhaps the most important, yet it's often the most neglected. The recipes in the Web Security Testing Cookbook demonstrate how developers and testers can check for the most common web security issues, while conducting unit tests, regression tests, or exploratory tests. Unlike ad...
Managing Mission-Critical Domains and DNS
Managing Mission-Critical Domains and DNS

Manage your organization’s naming architecture effectively, from the administrative/policy side right through to the technical DNS and nameserver implementations. This practical book takes you through the basics—the anatomies of domain names and DNS requests—and covers DNS and domain issues from a variety of...

Macroeconomic Policy in Fragile States
Macroeconomic Policy in Fragile States
Setting macroeconomic policy is especially difficult in fragile states. Political legitimacy concerns are heightened, raising issues such as who the policymakers are, what incentives they face, and how the process of policymaking is likely to work under limited legitimacy and high uncertainty
both about the macroeconomic environment
...
Cloud Security Automation: Get to grips with automating your cloud security on AWS and OpenStack
Cloud Security Automation: Get to grips with automating your cloud security on AWS and OpenStack

Secure public and private cloud workloads with this comprehensive learning guide.

Key Features

  • Take your cloud security functions to the next level by automation
  • Learn to automate your security functions on AWS and OpenStack
  • Practical approach towards...
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics

Enhance your organization's secure posture by improving your attack and defense strategies

Key Features

  • Gain a clear understanding of the attack methods, and patterns to recognize abnormal behavior within your organization with Blue Team tactics.
  • Learn to unique...
Cracking DES: Secrets of Encryption Research, Wiretap Politics & Chip Design
Cracking DES: Secrets of Encryption Research, Wiretap Politics & Chip Design

Sometimes you have to do good engineering to straighten out twisted politics. The Electronic Frontier Foundation, a nonprofit organization that was founded to ensure that the principles embodied in the Constitution and Bill of Rights are protected as new communications technologies emerge, and O"Reilly, the premier publisher of computer...

Practical Handbook of Photovoltaics, Second Edition: Fundamentals and Applications
Practical Handbook of Photovoltaics, Second Edition: Fundamentals and Applications

As part of the growing sustainable and renewable energy movement, the design, manufacture and use of photovoltaic devices is increasing in pace and frequency. The Handbook of Photovoltaics will be a 'benchmark' publication for those involved in the design, manufacture and use of these devices.

The Handbook covers the...

Windows Security Monitoring: Scenarios and Patterns
Windows Security Monitoring: Scenarios and Patterns

Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security

Written by a former Microsoft security program manager, DEFCON "Forensics CTF" village author and organizer, and CISSP, this book digs deep into the Windows security auditing subsystem to help you...

unlimited object storage image
Result Page: 82 81 80 79 78 77 76 75 74 73 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy