Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Statistical Analysis of Financial Data in R (Springer Texts in Statistics)
Statistical Analysis of Financial Data in R (Springer Texts in Statistics)

Although there are many books on mathematical finance, few deal with the statistical aspects of modern data analysis as applied to financial problems. This textbook fills this gap by addressing some of the most challenging issues facing financial engineers. It shows how sophisticated mathematics and modern statistical techniques can...

Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems
Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems

One of the most mysterious areas of information security is industrial system security.
No other area of information security contains that many myths, mistakes, misconceptions
and outright lies. Information available online, while voluminous, will
only lead information security professionals and industrial systems
...

An Introduction to Analysis of Financial Data with R
An Introduction to Analysis of Financial Data with R

A complete set of statistical tools for beginning financial analysts from a leading authority

Written by one of the leading experts on the topic, An Introduction to Analysis of Financial Data with R explores basic concepts of visualization of financial data. Through a fundamental balance between theory and...

Hacking: The Beginner's Complete Guide To Computer Hacking And Penetration Testing
Hacking: The Beginner's Complete Guide To Computer Hacking And Penetration Testing

Cyber crime is the biggest threat that every organization on the planet faces today! And it’s not just the organizations that are vulnerable. People too are at risk of being targeted by hackers.

Inside this book we aim to show you the importance of staying on top of this threat by learning how to hack. While it...

The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)
The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)

Actionable guidance and expert perspective for real-world cybersecurity

The Cyber Risk Handbook is the practitioner's guide to implementing, measuring and improving the counter-cyber capabilities of the modern enterprise. The first resource of its kind, this book provides authoritative guidance for real-world...

Invest Like a Guru: How to Generate Higher Returns At Reduced Risk With Value Investing
Invest Like a Guru: How to Generate Higher Returns At Reduced Risk With Value Investing

Adopt the investment strategy that built Warren Buffett's fortune

Invest Like a Guru provides an invaluable resource for high-quality-focused value investing, with expert insight and practical tools for implementation. Written by the man behind GuruFocus.com, this book expands on the site's value...

Practical Information Security Management: A Complete Guide to Planning and Implementation
Practical Information Security Management: A Complete Guide to Planning and Implementation

Create appropriate, security-focused business propositions that consider the balance between cost, risk, and usability, while starting your journey to become an information security manager. Covering a wealth of information that explains exactly how the industry works today, this book focuses on how you can set up an effective information...

The Disaster Recovery Handbook: A Step-by-Step Plan to Ensure Business Continuity and Protect Vital Operations, Facilities, and Assets
The Disaster Recovery Handbook: A Step-by-Step Plan to Ensure Business Continuity and Protect Vital Operations, Facilities, and Assets

You can't predict or prevent disasters. That's reality. But with The Disaster Recovery Handbook, you can create a plan to ensure your business will continue and your vital operations, facilities, and assets will be protected. Expect the best. Plan for the worst. Survey the headlines: superstorms, data breaches, pandemics, system...

Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework (Internal Audit and IT Audit)
Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework (Internal Audit and IT Audit)

The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain specialized knowledge in organizational...

Decision Trees for Business Intelligence and Data Mining: Using SAS Enterprise Miner
Decision Trees for Business Intelligence and Data Mining: Using SAS Enterprise Miner
Using SAS Enterprise Miner, Barry de Ville's Decision Trees for Business Intelligence and Data Mining illustrates the application and operation of decision trees in business intelligence, data mining, business analytics, prediction, and knowledge discovery. It explains in detail the use of decision trees as a data mining technique and...
Ethics of Big Data: Balancing Risk and Innovation
Ethics of Big Data: Balancing Risk and Innovation

What are your organization’s policies for generating and using huge datasets full of personal information? This book examines ethical questions raised by the big data phenomenon, and explains why enterprises need to reconsider business decisions concerning privacy and identity. Authors Kord Davis and Doug Patterson provide...

Structured Finance Modeling with Object-Oriented VBA (Wiley Finance)
Structured Finance Modeling with Object-Oriented VBA (Wiley Finance)
Praise for STRUCTURED FINANCE MODELING with Object-Oriented VBA

"This book is an excellent and interesting integration of financial engineering, structured finance, and structured programming, and the book accomplishes this with easy-to-follow examples, using the most commonly available tools, MS VBA and spreadsheets. The author is clearly...

Result Page: 91 90 89 88 87 86 85 84 83 82 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy