 |
|
|
 |  |  Options, Futures and Other Derivatives, Fifth Edition (Solutions Manual)For undergraduate and graduate courses in Options and Futures, Financial Engineering, and Risk Management, typically found in business, finance, economics and mathematics departments. This fifth edition text represents how academia and real-world practice have come together with a common respect and focus of theory and practice. It provides a... |  |  Windows Server 2008 PKI and Certificate Security (PRO-Other)Get in-depth guidance for designing and implementing certificate-based security solutions straight from PKI expert Brian Komar. No need to buy or outsource costly PKI services when you can use the robust PKI and certificate-based security services already built into Windows Server 2008! This in-depth reference teaches you how to design and... |
|
 Knowledge Retention: Strategies and Solutions‘‘Knowledge Retention: Strategies and Solutions will become paramount toward achieving success in an increasingly competitive environment.’’
—Jay Liebowitz
As the baby boomer generation approaches retirement age, many organizations are facing the potential... |  |  Voice over Internet Protocol (VoIP) Security"Voice Over Internet Protocol Security is both unique and timely. Ransome and Rittinghouse expertly describe the technical fundamentals, salient business drivers, and converged network infrastructure security risks and challenges IT and security professionals encounter when implementing enterprise-level VoIP systems." - William M.... |  |  Soft Methods for Handling Variability and Imprecision (Advances in Soft Computing)Probability theory has been the only well-founded theory of uncertainty for a long time. It was viewed either as a powerful tool for modelling random phenomena, or as a rational approach to the notion of degree of belief. During the last thirty years, in areas centered around decision theory, artificial intelligence and information processing,... |
|
 Wireless SecurityGet full details on major mobile/wireless clients and operating systems-including Windows CE, Palm OS, UNIX, and Windows. You'll learn how to design and implement a solid security system to protect your wireless network and keep hackers out. Endorsed by RSA Security - the most trusted name in e-security - this is your one-stop guide to wireless... |  |  Computational Finance Using C and C# (Quantitative Finance)In Computational Finance Using C and C# George Levy raises computational finance to the next level using the languages of both standard C and C#. The inclusion of both these languages enables readers to match their use of the book to their firms internal software and code requirements. Levy also provides derivatives pricing information for: ... |  |  Financial Products: An Introduction using Mathematics and ExcelFinancial Products provides a step-by-step guide to some of the most important ideas in financial mathematics. It describes and explains interest rates, discounting, arbitrage, risk neutral probabilities, forward contracts, futures, bonds, FRA and swaps. It shows how to construct both elementary and complex (Libor) zero curves. Options are... |
|
Result Page: 93 92 91 90 89 88 87 86 85 84 83 82 81 80 79 78 77 76 75 |