Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Practical Methods of Financial Engineering and Risk Management: Tools for Modern Financial Professionals
Practical Methods of Financial Engineering and Risk Management: Tools for Modern Financial Professionals

Risk control, capital allocation, and realistic derivative pricing and hedging are critical concerns for major financial institutions and individual traders alike. Events from the collapse of Lehman Brothers to the Greek sovereign debt crisis demonstrate the urgent and abiding need for statistical tools...

Understanding Wall Street, Fifth Edition
Understanding Wall Street, Fifth Edition

A fully revised edition of the INVESTING CLASSIC

For over 30 years this comprehensive, easy-to-read guide has served well as the definitive reference for successful investing. Now in its fifth edition and completely updated, Understanding Wall Street helps investors prosper in today’s challenging...

I. M. Wright's "Hard Code": A Decade of Hard-Won Lessons from Microsoft (Best Practices)
I. M. Wright's "Hard Code": A Decade of Hard-Won Lessons from Microsoft (Best Practices)

Get the brutal truth about coding, testing, and project management—from a Microsoft insider who tells it like it is. I. M. Wright's deliberately provocative column "Hard Code" has been sparking debate amongst thousands of engineers at Microsoft for years. And now (despite our better instincts), we're making...

Security 2020: Reduce Security Risks This Decade
Security 2020: Reduce Security Risks This Decade

Identify real security risks and skip the hype

After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today’s IT...

Risk and Interdependencies in Critical Infrastructures: A Guideline for Analysis (Springer Series in Reliability Engineering)
Risk and Interdependencies in Critical Infrastructures: A Guideline for Analysis (Springer Series in Reliability Engineering)

Today’s society is completely dependent on critical networks such as  water supply, sewage, electricity, ICT and transportation. Risk and vulnerability analyses are needed to grasp the impact of threats and hazards. However, these become quite complex as there are strong interdependencies both within and between infrastructure...

Risk, Complexity and ICT
Risk, Complexity and ICT
This book explores the challenges regarding risks and risk management related to the growing complexity of ICT solutions.

The main argument of the book is that the complexity of ICT solutions has continued to grow throughout the history of ICT, and that it has now reached a level that goes beyond our current understanding of
...
Reputation, Stock Price, and You: Why the Market Rewards Some Companies and Punishes Others
Reputation, Stock Price, and You: Why the Market Rewards Some Companies and Punishes Others

“All of our working lives we have heard the mantra, ‘a reputation lost is never regained.’ Still, the firms we work for, admire and invest in seem to take costly reputation hits all too often. Everyone interested in managing, regulating or investing in public firms will find Nir Kossovsky’s book a wonderful read...

Never Bet the Farm: How Entrepreneurs Take Risks, Make Decisionsand How You Can, Too
Never Bet the Farm: How Entrepreneurs Take Risks, Make Decisionsand How You Can, Too
In Never Bet the Farm two leading entrepreneurs, Anthony Iaquinto and Stephen Spinelli, turn much of the so-called expert advice for entrepreneurs on its head. They show that by preparing for setbacks and using a framework that can help reduce risks and simplify decision making, entrepreneurs can increase their probability for success....
Photo Retouching with Photoshop: A Designer's Notebook
Photo Retouching with Photoshop: A Designer's Notebook
Photo Retouching with Photoshop: A Designer's Notebook is at once eye candy, artistic inspiration, and incomparable technical guidance for intermediate-to-advanced digital imaging professionals, graphic artists, photographers, and just about anyone involved in creating digital images or animations. A visual splendor, this full-color book...
Hands-On Oracle Application Express Security: Building Secure Apex Applications
Hands-On Oracle Application Express Security: Building Secure Apex Applications
AT RECX we’ve been involved in the world of IT Security for more than a decade. We were involved in some of the fi rst penetration tests performed in the UK, where large organizations and government departments allowed ethical hackers into their networks to determine the risk they faced from what are now known as cyber attacks....
Metasploit Penetration Testing Cookbook
Metasploit Penetration Testing Cookbook

Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes...

Network Security Foundations : Technology Fundamentals for IT Success
Network Security Foundations : Technology Fundamentals for IT Success
The world of IT is always evolving, but in every area there are stable, core concepts that anyone just setting out needed to know last year, needs to know this year, and will still need to know next year. The purpose of the Foundations series is to identify these concepts and present them in a way that gives you the...
unlimited object storage image
Result Page: 50 49 48 47 46 45 44 43 42 41 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy