Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Finance 74
- Economics 64
- Investments 53
- Management 43
- Business & Economics 40
- Options (Finance) 40
- Research & information: general 38
- Technology: general issues 32
- Leadership 30
- Investment analysis 29
- Economic conditions 28
- Mathematical models 28
- Portfolio management 28
- Investment & Speculation 26
- Development 25
- volatile compounds 25
- Environment 24
- Computer crimes 23
- Computer security 21
- History 21
- Stocks 21
- Technology 21
- Risk management 20
- Science 20
- Ciencias 19
- Investigation 19
- Tecnología 19
- Tipo de cambio 19
- Organizational change 18
- Security measures 17
-
801Publicado 2023Tabla de Contenidos: “…Chapter 11 Storage: Objective 2.5: Compare and contrast storage types -- Volatile Storage -- Nonvolatile Storage -- Chapter 12 Computing Devices: Objective 2.6: Compare and contrast common computing devices and their purposes -- Computing Device Types -- Internet of Things -- Chapter 13 TCP/IP Networking: Objective 2.7: Explain basic networking concepts -- Network Types -- TCP/IP Networking -- Network Addressing -- Chapter 14 Application Protocols: Objective 2.7: Explain basic networking concepts -- Application Protocols -- Chapter 15 Network Devices: Objective 2.7: Explain basic networking concepts -- Modems -- Switches -- Routers -- Firewalls -- Access Points -- Chapter 16 Wireless Networks: Objective 2.8: Given a scenario, install, configure, and secure a basic wireless network -- Wireless Networking -- Wireless Signal Propagation -- Wireless Security -- Wireless Encryption -- Part III Domain 3.0: Applications and Software -- Chapter 17 Operating Systems: Objective 3.1: Explain the purpose of operating systems -- Operating System Roles -- Operating System Types -- Chapter 18 Virtualization: Objective 3.1: Explain the purpose of operating systems -- Virtualization -- Chapter 19 Filesystems: Objective 3.2: Compare and contrast components of an operating system -- Files and Filesystems -- Filesystem Features -- Filesystem Types -- Chapter 20 Services and Processes: Objective 3.2: Compare and contrast components of an operating system -- Applications -- Processes -- Services -- Chapter 21 Drivers, Utilities, and Interfaces: Objective 3.2: Compare and contrast components of an operating system -- Drivers -- Interfaces -- Utilities -- Chapter 22 Software Types: Objective 3.3: Explain the purpose and proper use of software -- Software…”
Libro electrónico -
802Publicado 2015Tabla de Contenidos: “…Matthias Thomas xiii Preface xv Preface to Part Two xvii Acknowledgements xix List of Figures xxi Reader's Manual xxiii Part One Chapter 1 Introduction to Property Financing 3 1.1 Forms of financing: debt and equity 3 1.1.1 Debt 4 1.1.2 Equity 6 1.2 A different approach to property financing 6 1.3 Corporate finance and project finance 7 1.4 Bank financing 8 1.4.1 Property Loans to Private Individuals 9 1.4.2 Property Financing to Cover Financial Requirements 9 1.4.3 Structured Real Estate Financing 10 1.5 Fund raising, securitization, and syndication 10 1.5.1 Traditional Funding and Securitization 11 1.5.2 Funding for Real Estate Loans and Syndication 12 1.5.3 Syndication of Real Estate Loans 13 Chapter 2 Structured Real Estate Financing 15 2.1 Bank roles 17 2.2 Bank loan contractual forms 17 2.3 Loans for development projects 18 2.4 Parts and stages of a structured loan 18 2.4.1 Analysis of the Transaction and Term Sheet 19 2.4.2 Real Estate Valuation 21 2.4.3 Basics of Property Appraisal 23 2.4.4 Due Diligence Process 32 2.4.5 Legal Due Diligence 32 Chapter 3 Loan Agreement 33 3.1 Object and purpose of the loan 34 3.2 Conditions precedent 34 3.3 Amount of the loan 35 3.4 Interest rates 36 3.5 Interest rate risk hedging 38 3.5.1 Interest Rate Cap 38 3.5.2 Collar 38 3.5.3 Interest Rate Swap 38 3.6 Loan allocation 41 3.7 Loan repayment schedule 43 3.8 Fees 43 3.9 Frequency of drawdown and procedures 45 3.10 Events of default 46 3.11 Property insurance 48 3.12 Representations and warranties 49 3.13 Duty to provide information 53 3.14 Costs, taxes, and ancillary charges 56 3.15 Contractual covenants 56 3.15.1 Balance Sheet Covenants 57 3.15.2 Financial Covenants 57 Chapter 4 Loan Repayment, Interest, and Renegotiation 63 4.1 Bullet payments 63 4.2 Pre-amortizing (semi-bullet) 63 4.3 Balloon payment 64 4.4 Fully amortizing repayment plans 65 4.4.1 Fixed-Capital Loan Repayment Plan 66 4.4.2 Floating-Rate Loan Repayment Plan 68 4.4.3 Loan with Interest Rate Caps 71 4.5 Other repayment schedules 73 4.5.1 Negative Amortizing Constant Payment Loan 73 4.5.2 Declining Payment Loan with Constant Amortizing 74 4.6 Restructuring and renegotiation of real estate loans 75 4.6.1 Grant of a New Loan 76 4.6.2 Deferral of Payment Deadlines 76 4.6.3 Restructuring Arrangement 77 Chapter 5 Effects of Financial Leverage on Real Estate Investments 79 5.1 An illustration of financial leverage 80 5.2 The effects of an increase in volatility 81 5.3 The effect of financial leverage on returns 82 5.4 The effect of financial leverage on risk 82 5.5 "No Free Lunch" 84 5.6 The mechanics of financial leverage 84 5.7 The effect of the spread 85 5.8 A brief summary of when to use financial leverage 86 Chapter 6 Structured Real Estate Financing Case Studies 89 6.1 Structured financing for an income producing property 90 6.1.1 Description of the Transaction 90 6.1.2 Term Sheet for an Income Producing Property 90 6.2 Structured financing for a real estate portfolio acquisition 100 6.2.1 Description of the Portfolio Acquisition 100 6.2.2 Term Sheet for the Financing of a Real Estate Portfolio 101 6.3 Financing of a real estate development project 113 6.3.1 Description of the Residential Development Project 113 6.3.2 Term Sheet for the Development Project Loan 113 6.4 Financing a shopping centre: credit application 121 6.4.1 Players Involved 121 6.4.2 Financial Analysis and Key Figures 126 6.4.3 Risk Appraisal 128 6.4.4 Risk Rating and Risk-Reward 131 6.4.5 Conclusion and Recommendation 131 Chapter 7 Hybrid Forms of Financing 133 7.1 Description 133 7.2 Procedures for establishing mezzanine finance and cost 137 7.2.1 The Debt Component 137 7.2.2 Equity Kicker 139 7.3 Covenants in a mezzanine financing 140 7.4 Economic mechanics of hybrid financing 141 7.4.1 Mezzanine Financing for an Income Producing Property 142 7.4.2 Preferred Equity for Development Projects 144 7.5 Waterfall payout agreement 148 7.6 Intercreditor agreement 154 Chapter 8 Basel Accords and Effects on Real Estate Financing 159 8.1 Basel II 160 8.2 Basel III 160 8.3 The Basel Accords and real estate financing 161 8.4 Standardized Approach 162 8.5 IRB Foundation and Advanced methods 163 Part two Outline of the most relevant legal issues in selected jurisdictions Chapter 9 China 171 Chapter 10 England and Wales 177 Chapter 11 France 185 Chapter 12 Germany 201 Chapter 13 India 207 Chapter 14 Italy 215 Chapter 15 Spain 229 Authors 235 Giacomo Morri 235 Antonio Mazza 235 Alessandro P. …”
Libro electrónico -
803Publicado 2022Tabla de Contenidos: “…-- 5.2.6 Sources of overhead -- 5.3 Block-structured concurrency (pre-Java 5) -- 5.3.1 Synchronization and locks -- 5.3.2 The state model for a thread -- 5.3.3 Fully synchronized objects -- 5.3.4 Deadlocks -- 5.3.5 Why synchronized? -- 5.3.6 The volatile keyword -- 5.3.7 Thread states and methods -- 5.3.8 Immutability -- 5.4 The Java Memory Model (JMM) -- 5.5 Understanding concurrency through bytecode -- 5.5.1 Lost Update -- 5.5.2 Synchronization in bytecode -- 5.5.3 Synchronized methods -- 5.5.4 Unsynchronized reads -- 5.5.5 Deadlock revisited -- 5.5.6 Deadlock resolved, revisited -- 5.5.7 Volatile access -- Summary -- 6 JDK concurrency libraries…”
Libro electrónico -
804Publicado 2013Tabla de Contenidos: “…Capturing a Network Share with FTK Imager -- Mobile Devices -- Servers -- Chapter 9: Nontraditional Digital Forensics -- Breaking the Rules: Nontraditional Digital Forensic Techniques -- Volatile Artifacts -- Malware -- Encrypted File Systems -- Challenges to Accessing Encrypted Data -- Mobile Devices: Smart Phones and Tablets -- Solid State Drives -- Virtual Machines -- Part III: Case Examples: How to Work a Case -- Chapter 10: Establishing the Investigation Type and Criteria -- Determining What Type of Investigation Is Required -- Human Resources Cases -- Administrator Abuse -- Stealing Information -- Internal Leaks -- Keyloggers and Malware -- What to Do When Criteria Causes an Overlap -- What to Do When No Criteria Matches -- Where Should the Evidence Be? …”
Libro electrónico -
805Publicado 2017Tabla de Contenidos: “…. -- See also -- Windows memory image analysis with Volatility -- Getting ready -- How to do it... -- How it works... -- See also -- Variations in Windows versions -- Getting ready -- How to do it... -- There is more... -- Chapter 3: Windows Drive Acquisition -- Introduction -- Drive acquisition in E01 format with FTK Imager -- Getting ready -- How to do it... -- How it works... -- See more -- Drive acquisition in RAW format with dc3dd -- Getting ready -- How to do it... -- How it works... -- See also -- Mounting forensic images with Arsenal Image Mounter -- Getting ready -- How to do it... -- How it works... -- See also -- Chapter 4: Windows File System Analysis -- Introduction -- NTFS Analysis with The Sleuth Kit -- Getting ready -- How to do it... -- How it works... -- See also -- Undeleting files from NTFS with Autopsy -- Getting ready... -- How to do it... -- How it works... -- See also…”
Libro electrónico -
806Publicado 2022Tabla de Contenidos: “…9.7 Deep Rao-Blackwellized Particle Filter -- 9.8 Deep Variational Bayes Filter -- 9.9 Kalman Variational Autoencoder -- 9.10 Deep Variational Information Bottleneck -- 9.11 Wasserstein Distributionally Robust Kalman Filter -- 9.12 Hierarchical Invertible Neural Transport -- 9.13 Applications -- 9.13.1 Prediction of Drug Effect -- 9.13.2 Autonomous Driving -- 9.14 Concluding Remarks -- Chapter 10 Expectation Maximization -- 10.1 Introduction -- 10.2 Expectation Maximization Algorithm -- 10.3 Particle Expectation Maximization -- 10.4 Expectation Maximization for Gaussian Mixture Models -- 10.5 Neural Expectation Maximization -- 10.6 Relational Neural Expectation Maximization -- 10.7 Variational Filtering Expectation Maximization -- 10.8 Amortized Variational Filtering Expectation Maximization -- 10.9 Applications -- 10.9.1 Stochastic Volatility -- 10.9.2 Physical Reasoning -- 10.9.3 Speech, Music, and Video Modeling -- 10.10 Concluding Remarks -- Chapter 11 Reinforcement Learning‐Based Filter -- 11.1 Introduction -- 11.2 Reinforcement Learning -- 11.3 Variational Inference as Reinforcement Learning -- 11.4 Application -- 11.4.1 Battery State‐of‐Charge Estimation -- 11.5 Concluding Remarks -- Chapter 12 Nonparametric Bayesian Models -- 12.1 Introduction -- 12.2 Parametric vs Nonparametric Models -- 12.3 Measure‐Theoretic Probability -- 12.4 Exchangeability -- 12.5 Kolmogorov Extension Theorem -- 12.6 Extension of Bayesian Models -- 12.7 Conjugacy -- 12.8 Construction of Nonparametric Bayesian Models -- 12.9 Posterior Computability -- 12.10 Algorithmic Sufficiency -- 12.11 Applications -- 12.11.1 Multiple Object Tracking -- 12.11.2 Data‐Driven Probabilistic Optimal Power Flow -- 12.11.3 Analyzing Single‐Molecule Tracks -- 12.12 Concluding Remarks -- References -- Index -- EULA…”
Libro electrónico -
807Publicado 2018Tabla de Contenidos: “…Chae, Hyoungjae Jang and Kanghee Lee / Development of the CO2 Emission Evaluation Tool for the Life Cycle Assessment of Concrete, Reprinted from: Sustainability 2017, 9, 2116, doi: 10.3390/su9112116 -- Mateusz Kozicki, Michal Piasecki, Anna Goljan, Halina Deptula and Adam Nieslochowski / Emission of Volatile Organic Compounds (VOCs) from Dispersion and Cementitious Waterproofing Products, Reprinted from: Sustainability 2018, 10, 2178, doi: 10.3390/su10072178 -- Bozena Hola and Tomasz Nowobilski / Classification of Economic Regions with Regards to Selected Factors Characterizing the Construction Industry, Reprinted from: Sustainability 2018, 10, 1637, doi: 10.3390/su10051637 -- Serdar Durdyev, Edmundas Kazimieras Zavadskas, Derek Thurnell, Audrius Banaitis and Ali Ihtiyar / Sustainable Construction Industry in Cambodia: Awareness, Drivers and Barriers, Reprinted from: Sustainability 2018, 10, 392, doi: 10.3390/su10020392 -- Marius Reizgevi?…”
Libro electrónico -
808Publicado 2013Tabla de Contenidos: “…Intro -- ENCYCLOPEDIA OF FINANCIAL MODELS -- About the Editor -- Contents -- Contributors -- Preface -- Guide to the Encyclopedia of Financial Models -- Mortgage-Backed Securities Analysis and Valuation -- Valuing Mortgage-Backed and Asset-Backed Securities -- CASH-FLOW YIELD ANALYSIS -- ZERO-VOLATILITY SPREAD -- VALUATION USING MONTE CARLO SIMULATION AND OAS ANALYSIS -- Simulating Interest Rate Paths and Cash Flows -- Calculating the Present Value of a Bond Class for a Scenario Interest Rate Path -- Option-Adjusted Spread -- Option Cost -- Simulated Average Life -- MEASURING INTEREST RISK -- Duration -- Convexity -- KEY POINTS -- NOTES -- REFERENCES -- The Active-Passive Decomposition Model for MBS -- PATH-DEPENDENCE AND PRICING PARTIAL DIFFERENTIAL EQUATION -- EXTENDED ACTIVE-PASSIVE DECOMPOSITION MODEL -- The Details -- How the Model Works Forward -- How the Model Works in Backward Induction -- Initializing the Burnout Factor -- EXTENSIONS AND NUANCES -- Computing Interest Rate Sensitivities Directly Off a Pricing Tree -- More Components, More Prepay Sources -- Residual Sources of Path-Dependence -- Modeling Prepayments Universally: Refinancing Speed as a Function of Price -- KEY POINTS -- NOTES -- REFERENCES -- Analysis of Nonagency Mortgage-Backed Securities -- FACTORS IMPACTING RETURNS FROM NONAGENCY MBS -- The Amount and Timing of Principal Return -- Deal-Specific Factors -- UNDERSTANDING THE EVOLUTION OF CREDIT PERFORMANCE WITHIN A TRANSACTION -- THE PROCESS OF ESTIMATING PRIVATE-LABEL MBS RETURNS -- Differentiating between Collateral and Tranche Losses -- The Interaction of Credit Inputs -- Evaluating Available Credit Support -- Yield and Loss Matrix Analysis -- Model-Generated Analysis -- Interpreting the Outputs -- KEY POINTS -- NOTES -- REFERENCES -- Measurement of Prepayments for Residential Mortgage-Backed Securities…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
809Publicado 2019Tabla de Contenidos: “…Java's Approach to Memory and Concurrency -- Basic Concepts of Java Memory Management -- Memory Leaks in Java -- Introducing Mark-and-Sweep -- The Basic Mark-and-Sweep Algorithm -- How the JVM Optimizes Garbage Collection -- Evacuation -- The HotSpot Heap -- Other Collectors -- ParallelOld -- Finalization -- Finalization Details -- Java's Support for Concurrency -- Thread Lifecycle -- Visibility and Mutability -- Exclusion and Protecting State -- volatile -- Useful Methods of Thread -- Deprecated Methods of Thread…”
Libro electrónico -
810Publicado 2015Tabla de Contenidos: “…-- Notes -- Chapter 7 Flattener #4 - The Energy Broadband -- Pipelines open new markets -- Pipelines are very capital- and time-intensive investments -- The Eurasian continental network -- LNG and the globalization of natural gas -- From regional to global -- LNG super-cycle -- The winners and losers of the big asset write-off -- Solid methane -- Storage bottlenecks and commodity islands -- The high watermark and volatility dampeners -- Global strategic petroleum reserves -- Shipping, floating pipelines and storage -- The boom and bust of shipping -- Debottlenecking and super-backwardation -- Notes -- Chapter 8 Flattener #5 - Overcapacity -- Déjà-Vu -- Diplomatic demand outlook -- Saudi Arabia heavy sour crude oil -- Location, location, location -- Pro-cyclical behaviour -- Notes…”
Libro electrónico -
811Publicado 2023Tabla de Contenidos: “…Role-based access control via UDS service 0x29 -- Securing flash programming services -- Secure decommissioning -- Summary -- Further reading -- Chapter 9: ECU-Level Security Controls -- Understanding control actions and layers -- Exploring policy controls -- Exploring hardware controls -- RoT -- OTP memory -- Hardware-protected keystore -- Secure Universal Flash Storage -- Cryptographic accelerators -- Lockable hardware configuration -- CPU security -- Isolation through MMUs and MPUs -- Encrypted volatile memories -- Debug access management -- Exploring software security controls -- Software debug and configuration management -- Secure manufacturing -- Key management policies -- Multi-stage secure boot -- Trusted runtime configuration -- TEEs -- Secure update -- Spatial isolation -- Temporal isolation -- Encrypted and authenticated filesystems -- Runtime execution hardening -- Security monitors -- Exploring physical security controls -- Tamper detection and prevention -- Printed circuit board layout pin and trace hiding -- Concealment and shielding -- Summary -- Further reading -- Index -- Other Books You May Enjoy…”
Libro electrónico -
812Publicado 2023Tabla de Contenidos: “…. -- 6.7.1 Gas chromatography coupled with mass spectroscopy in analysis of wheat components/chemical composition -- 6.7.2 Gas chromatography coupled with mass spectroscopy analysis of volatile organic compounds in wheat flour and wheat-bas... -- 6.8 Gas chromatography coupled with mass spectroscopy-based metabolomics in wheat study -- 6.9 Gas chromatography coupled with mass spectroscopy wheat authentication -- 6.10 Gas chromatography coupled with mass spectroscopy in wheat and wheat-based food spoilage and storage…”
Libro electrónico -
813Publicado 2017Tabla de Contenidos: “…4.4.1 Para el afluente -- 4.4.2 Para el sistema -- 4.4.2.1 Masa de sólidos suspendidos volátiles (SSV) en el reactor -- 4.4.2.2 Masa de sólidos suspendidos inorgánicos (SSI) en el Reactor -- 4.4.2.3 Masa de SST en el reactor -- 4.4.2.4 Demanda carbonácea de oxígeno -- 4.4.3 Volumen del reactor y tiempo de retención -- 4.4.4 Irrelevancia del TRH -- 4.4.5 Concentración de DQO en el efluente -- 4.4.6 Balance de masa de la DQO (o balance de electrones) -- 4.4.7 Fracción activa de lodos -- 4.4.8 Diseño en estado estacionario -- 4.4.9 Procedimiento de diseño en estado estacionario -- 4.5 Ejemplo de diseño -- 4.5.1 Efectos de la temperatura -- 4.5.2 Cálculos para la degradación de materia orgánica -- 4.5.3 Balance de masa de la DQO -- 4.6 Requerimientos de volumen del reactor -- 4.7 Determinación de la concentración de sólidos suspendidos totales (SST) -- 4.7.1 Costo del reactor biológico -- 4.7.2 Costo del clarificador secundario -- 4.7.3 Costo total -- 4.8 Demanda carbonacea de oxígeno -- 4.8.1 Condiciones de estado estacionario (promedios diarios) -- 4.8.2 Condiciones cíclicas (dinámicas) diarias -- 4.9 Producción diaria de lodos -- 4.10 Diseño y control del sistema -- 4.10.1 Sistema controlado por la masa de lodos -- 4.10.2 Sistema controlado por la edad de lodos (Control Hidráulico) -- 4.11 Selección de la edad de lodos -- 4.11.1 Edad de lodos baja (1 a 5 días) -- 4.11.1.1 Plantas convencionales -- 4.11.1.2 Lagunas aireadas -- 4.11.2 Edad de lodos intermedia (10 a 15 días) -- 4.11.3 Edad de lodos alta (20 días o más) -- 4.11.3.1 Plantas aerobias -- 4.11.3.2 Plantas aerobias‐anóxicas -- 4.11.3.3 Plantas anaerobias‐anóxicas‐aerobias -- 4.11.4 Factores predominantes aplicados al dimensionamiento de un sistema de lodos activados -- 4.11.5 Comentarios generales -- Referencias -- Nomenclatura -- Abreviaciones -- 5. …”
Libro electrónico -
814Publicado 2020Tabla de Contenidos: “…The literature -- 3.1 'Dutch disease' and volatility -- 3.2 Natural resources and institutions -- 4. …”
Libro electrónico -
815Publicado 2013Tabla de Contenidos: “…The Fundamentals of Fundamental Factor Models -- FUNDAMENTAL ANALYSIS AND THE BARRA FUNDAMENTAL FACTOR MODEL -- CRITICAL INSIGHTS FROM THE BARRA FUNDAMENTAL FACTOR MODEL -- RISK DECOMPOSITION -- Performance Attribution -- KEY POINTS -- NOTES -- REFERENCES -- Multifactor Equity Risk Models and Their Applications -- MODEL DESCRIPTION AND ESTIMATION -- RISK DECOMPOSITION -- Total Risk Decomposition -- Systematic-Residual Risk Decomposition -- Active Risk Decomposition -- Active Systematic-Active Residual Risk Decomposition -- Summary of Risk Decomposition -- APPLICATIONS IN PORTFOLIO CONSTRUCTION AND RISK CONTROL -- Risk Control against a Stock Market Index -- Tilting a Portfolio -- KEY POINTS -- NOTES -- REFERENCES -- Multifactor Fixed Income Risk Models and Their Applications -- APPROACHES USED TO ANALYZE RISK -- Market Structure and Exposure Contributions -- Adding Volatility and Correlations into the Analysis -- A Detailed Risk Report -- APPLICATIONS OF RISK MODELING -- Portfolio Construction and Risk Budgeting -- Portfolio Rebalancing -- Scenario Analysis -- KEY POINTS -- NOTES -- REFERENCES -- Financial Econometrics -- Scope and Methods of Financial Econometrics -- THE DATA GENERATING PROCESS -- FINANCIAL ECONOMETRICS AT WORK -- Implications of Empirical Series with Only One Realization -- Determining the Model -- TIME HORIZON OF MODELS -- Model Risk and Model Robustness -- Performance Measurement of Models -- APPLICATIONS -- Portfolio Construction and Optimization -- Risk Management -- Asset-Liability Management -- KEY POINTS -- REFERENCES -- Regression Analysis: Theory and Estimation -- THE CONCEPT OF DEPENDENCE -- REGRESSIONS AND LINEAR MODELS -- Case Where All Regressors Are Random Variables -- Linear Models and Linear Regressions -- Case Where Regressors Are Deterministic Variables -- ESTIMATION OF LINEAR REGRESSIONS…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
816por Organisation for Economic Co-operation and Development.Tabla de Contenidos: “…Transfrontier Air Pollution -- Sulphur oxides -- Nitrogen oxides -- Volatile organic compounds -- Long-range transport of air pollutants -- 5. …”
Publicado 2000
Libro electrónico -
817Publicado 2018Tabla de Contenidos: “…Types of cryptography -- Symmetric cryptography -- Asymmetric (public-key) cryptography -- Signatures -- Hashing -- The avalanche effect -- Collisions -- Hashing a block -- Hashing outside PoW -- Summary -- Chapter 5: Bitcoin -- The history of Bitcoin -- Why Bitcoin is volatile -- Keys and addresses -- Currency units -- Vanity addresses -- Base58 check encoding -- Transactions -- Types -- Pay-to-Public-Key Hash -- Pay-to-Script Hash -- Blocks -- Genesis block -- Bitcoin network -- Types of nodes -- Full node -- Lightweight nodes -- Other nodes -- Network discovery -- Finding peers -- DNS seeds -- Static IPs -- Wallets -- Types -- Deterministic wallet -- Deterministic wallets -- HD wallets -- Non-deterministic wallet -- Summary -- Chapter 6: Altcoins -- Introducing Altcoins -- Tokens -- Ethereum -- Omni Layer -- NEO -- Waves -- Counterparty -- Alternative currency -- Monetary alternatives -- Consensus alternatives -- Litecoin -- Ether -- Ripple -- Bitcoin Cash -- Acquiring cryptocurrency -- Mining of cryptocurrency -- Bitcoin mining -- Mining difficulty -- Mining pools -- Altcoin mining -- Cryptocurrency exchanges -- Cryptocurrency wallets -- Summary -- Chapter 7: Achieving Consensus -- Practical Byzantine fault tolerance algorithm -- Byzantine faults -- How PBFT works -- Proof of Work -- How the PoW problem works in Bitcoin -- Proof of Stake -- The nothing-at-stake attack -- Variations -- Delegated Proof of Stake -- Tendermint consensus -- Proof of Authority -- Establishing authority -- Proof of Elapsed time -- Summary -- References -- Chapter 8: Advanced Blockchain Concepts -- Blockchain and banks -- Unbanked - going pure crypto -- Fixing pegs -- Buying options -- Why regulated exchanges? …”
Libro electrónico -
818Publicado 2022Tabla de Contenidos: “…The Java Thread Model -- Thread Priorities -- Synchronization -- Messaging -- The Thread Class and the Runnable Interface -- The Main Thread -- Creating a Thread -- Implementing Runnable -- Extending Thread -- Choosing an Approach -- Creating Multiple Threads -- Using isAlive( ) and join( ) -- Thread Priorities -- Synchronization -- Using Synchronized Methods -- The synchronized Statement -- Interthread Communication -- Deadlock -- Suspending, Resuming, and Stopping Threads -- Obtaining a Thread's State -- Using a Factory Method to Create and Start a Thread -- Using Multithreading -- Chapter 12 Enumerations, Autoboxing, and Annotations -- Enumerations -- Enumeration Fundamentals -- The values( ) and valueOf( ) Methods -- Java Enumerations Are Class Types -- Enumerations Inherit Enum -- Another Enumeration Example -- Type Wrappers -- Character -- Boolean -- The Numeric Type Wrappers -- Autoboxing -- Autoboxing and Methods -- Autoboxing/Unboxing Occurs in Expressions -- Autoboxing/Unboxing Boolean and Character Values -- Autoboxing/Unboxing Helps Prevent Errors -- A Word of Warning -- Annotations -- Annotation Basics -- Specifying a Retention Policy -- Obtaining Annotations at Run Time by Use of Reflection -- The AnnotatedElement Interface -- Using Default Values -- Marker Annotations -- Single-Member Annotations -- The Built-In Annotations -- Type Annotations -- Repeating Annotations -- Some Restrictions -- Chapter 13 I/O, Try-with-Resources, and Other Topics -- I/O Basics -- Streams -- Byte Streams and Character Streams -- The Predefined Streams -- Reading Console Input -- Reading Characters -- Reading Strings -- Writing Console Output -- The PrintWriter Class -- Reading and Writing Files -- Automatically Closing a File -- The transient and volatile Modifiers -- Introducing instanceof -- strictfp -- Native Methods -- Using assert…”
Libro electrónico -
819por Hahn, Marcelo GuerraTabla de Contenidos: “…Exploring template parameters and arguments -- Template parameters -- Non-type template parameter -- Type template parameter -- Template template parameter -- Template arguments -- Traits -- Type trait implementation -- Optimizing algorithms using traits -- TMP and its applications -- Summary -- Questions -- Further reading -- Chapter 4: Template Meta Programming -- Technical requirements -- Back to basics (compile-time programming with templates) -- Compile-time evaluation using constexpr -- Constant expression-specified constructors (constexpr) -- SFINAE AND enable_if< -- > -- -- Argument substitution failure -- Disabling templates with enable_if< -- > -- -- Type traits -- isFundamental -- isArithmetic -- isScalar -- isConst -- isVolatile -- isPolymorphic -- isAbstract -- is_signed -- Summary -- Questions -- Chapter 5: Memory Management and Smart Pointers -- Technical requirements -- Understanding computer memory -- Designing a memory storage device -- Understanding computer memory from a higher-level perspective -- An example of memory management -- Using smart pointers -- Leveraging the RAII idiom -- std::unique_ptr -- std::shared_ptr and std::weak_ptr -- Garbage collection -- Using allocators -- Types of allocators -- Summary -- Questions -- Part 2: Designing Robust and Efficient Applications -- Chapter 6: Digging into Data Structures and Algorithms in STL -- Technical requirements -- Sequential data structures -- STL containers -- Iterating containers -- Concepts and iterators -- Understanding concepts -- Using iterators in C++20 -- Node-based data structures -- Graphs and trees -- Trees -- Graphs -- Hash tables -- Algorithms -- Search algorithms -- Sorting -- Summary -- Further reading -- Questions -- Chapter 7: Advanced Data Structures -- Technical requirements -- B-trees -- Searching -- Insertion -- Deletion…”
Publicado 2023
Libro electrónico -
820Publicado 2012Tabla de Contenidos: “…Chapter 12 Security Administration and Planning -- Understanding Security Policies -- Security Policy Characteristics -- Enforcing Security Policies -- Value of a Security Policy -- Understanding Code of Ethics -- Policy Awareness -- Updating Security Policies -- Understanding Business Continuity Plans -- Business Impact Analysis -- Disaster Recovery Plan -- Comparing a BCP and a DRP -- Alternate Locations -- Identifying Security Organizations -- NIST -- US-CERT -- CERT/CC -- Questions -- Answers -- Chapter 13 Legal Issues -- Exploring Computer Forensics -- First Responders and Preserving the Scene -- Three Phases of a Computer Forensics Investigation -- Forensic Evidence Guiding Principles -- Volatile Data -- Comparing Computer Abuse and Computer Crime -- Understanding Fraud and Embezzlement Crime -- Mandatory Vacations -- Job Rotation -- Understanding Privacy Issues -- European Directives -- California Supreme Court Rules That Zip Codes Are PII -- Connecticut's Public Act No. 08-167 -- Children's Online Privacy Protection -- California Online Privacy Protection Act of 2003 -- Questions -- Answers -- Chapter 14 Cryptography -- An Overview of Cryptography Concepts -- Enforcing Integrity with Hashing -- Hashing Algorithms Provide One-Way Encryption -- Hashing Algorithms -- Verifying a Hash -- Exploring Symmetric Encryption -- ROT13 -- Comparing Block and Stream Ciphers -- Advanced Encryption Standard -- Other Symmetric Encryption Algorithms -- Exploring Asymmetric Encryption -- Secure Sockets Layer -- Protecting E-mail with S/MIME -- Other Encryption Schemes -- Steganography -- IPsec -- Public Key Infrastructure -- Certificates -- Certification Authority -- Comparing Cryptanalysis Attacks -- Known Plaintext Attack -- Cipher Text Attack -- Questions -- Answers -- Appendix: About the CD -- Glossary -- A -- B -- C -- D -- E -- F -- G -- H -- I -- J -- K.…”
Libro electrónico