Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 808
- Application software 683
- Management 587
- Economic conditions 501
- Economic policy 407
- Economics, finance, business & management 394
- Government policy 391
- Computer networks 384
- Data processing 378
- History 372
- Engineering & Applied Sciences 370
- Computer programs 353
- Research 351
- Security measures 339
- Economic aspects 313
- Education 295
- Python (Computer program language) 286
- Business & Economics 282
- Finance 279
- Law and legislation 279
- Database management 274
- Taxation 274
- Cloud computing 268
- Programming 268
- Web site development 259
- Computer security 243
- Prevention 240
- Design 235
- Java (Computer program language) 232
- Examinations 218
-
3681por Monty, David A. authorTabla de Contenidos: “…and Win New Sales""; ""Summary""; ""Chapter 2: Identify the Silent Sales Killers""; ""“We Have a Guy for Thatâ€?""…”
Publicado 2014
Libro electrónico -
3682por OECD Development Centre.Tabla de Contenidos: “…CONTENTS; Preface; Executive Summary; Introduction; Chapter 1: Poverty, Education and Health in Indonesia: Who Benefits from Public Spending?…”
Publicado 2002
Libro electrónico -
3683por Peterson, Steven P.Tabla de Contenidos: “…Machine generated contents note: Preface Acknowledgments Chapter 1: Discount Rates and Returns Estimating Returns Geometric and Arithmetic Averages Caveats to Return Extrapolation Discounting Present Values of Cash Flow Streams Internal Rate of Return and Yield to Maturity Real and Nominal Returns Summary Chapter 2: Fixed Income Securities Coupon Bearing Bonds Infinite Cash Flow Streams (Perpetuities) General Pricing Formulas for Finite Cash Flow Streams Interest Rate Risk Analysis of Duration Interest Rate Risk Dynamics Immunization and Duration Applications - Liability Discounting and Cash Matching Pension Logic Risky Coupons Inflation Risk and TIPS A Bond Portfolio Strategy (Optional) Summary Appendix 2.1: Solving Infinite and Finite Power Series References Chapter 3: Term Structure Discounting Using Spot Rates Forward Rates NPV revisited Short Rates The Bootstrap Method Duration Redux Summary Chapter 4: Equity The Determination of Stock Prices Discount Rates Redux Price and Dividend Multiples Extrapolating Multiples to Forecast Returns Pitfalls of Trend Analysis The Gordon Growth Model Sources of Return Summary References Chapter 5: Portfolio Construction Stochastic Returns and Risk Diversification The Efficient Frontier Markowitz Portfolio Selection Criteria Capital Market Line and the CAPM Performance Evaluation Summary Appendix 5.1: Statistical Review Appendix 5.2: Risk Adjusted Performance References Chapter 6: Optimal Portfolios Portfolio 1: Minimum Variance Portfolio (Fully Invested) Portfolio 2: Minimum Variance Portfolios with Targeted Return Portfolio 3: Minimum Variance Portfolios with No Short Sales Portfolio 4: Minimum Variance Portfolios with Capped Allocations Portfolio 5: Maximum Risk-Adjusted Return Performance Attribution The Efficient Frontier (Again) Summary Appendix 6.1: Matrix Operations Chapter 7: Data and Applications Analyzing Returns on a Ten Asset Portfolio Performance Attribution Changing the Investment Horizon Benchmarking to the Market Portfolio The Cost of Constraints A Bond Strategy Summary Chapter 8: Anomalies Deviations from the CAPM Behavioral Finance Summary References Chapter 9: Factor Models Arbitrage Pricing Theory (APT) Factor Selection Model Estimation Principal Components Applications and Examples Summary References Chapter 10: Active Portfolio Management Active Portfolio Construction and Attribution Analysis Performance Attribution Summary Appendix 10.1: Active Space Chapter 11: Risk The Failure of VaR Taxonomy of Risk Visualizing Risk Estimating Volatilities Maximum Likelihood Estimation (Optional) Credit Risk Adjusting for Leverage Adjusting for Illiquidity Other Risks Summary References Chapter 12: Monte Carlo Methods Example 1: Generating Random Numbers - Estimating pi Example 2: Confirming the Central Limit Theorem Example 3: Credit Default Risk Non-Normal Distributions The Gaussian Copula Summary References Chapter 13: Systemic Risk Extreme Value Theory Estimating the Hazards of Downside Risks A Systemic Risk Indicator Summary References Chapter 14: Incorporating Subjective Views Methodological Concepts An Example using Black-Litterman Active Space Risk Attribution Summary References Chapter 15: Futures, Forwards, and Swaps Institutional Detail and Futures Mechanics The Relationship between Spot Prices and Forward (Futures) Prices Hedging Basis Risk Hedging Portfolio Risk Futures Pricing Swaps Summary References Chapter 16: Introduction to Options Option Payoffs and Put-Call Parity Pricing European Call Options Pricing European Put Options Option Strategies Real Options Summary References Chapter 17: Models of Stock Price Dynamics Stock Price Dynamics Ito Processes Lognormal Stock Prices Deriving the Parameters of the Binomial Lattice Black-Scholes-Merton Model The Greek Letters Monte Carlo Methods Summary Appendix 17.1: Derivation of Ito's Lemma Chapter 18: Hedging Portfolio Risk Simple Hedging Strategies S&P 500 Index Puts Selling Volatility VIX Calls Liability Driven Investment Summary References Chapter 19: Private Equity The Private Equity Model Return and Risk Methodology Summary Appendix 19.1: CAPM References Chapter 20: Structured Credit Securitization Credit Enhancement Basics of Pricing Interest Rate Derivatives Interest Rate Dynamics CDO Valuation The Crash of the Housing Bubble Summary References Chapter 21: Optimal Rebalancing Trigger Strategies and No-trade Regions An Optimal Control Problem Implications Optimal Rebalancing in a Static Optimization Model The Comparative Statics of Transactions Costs References Chapter 22: Data Problems* Covariance Estimation An Example Empirical Results Overlapping Observations Conclusions Appendix 22.1: Covariance Matrix Estimation Removing the effects of smoothing References About the Author Index…”
Publicado 2012
Libro electrónico -
3684Publicado 2019Tabla de Contenidos: “…Intro -- Title Page -- Copyright Page -- About the Author -- About the Technical Reviewer -- Brief Contents -- Contents in Detail -- Foreword by Michiel Prins and Jobert Abma -- Acknowledgments -- Introduction -- Who Should Read This Book -- How to Read This Book -- What's in This Book -- A Disclaimer About Hacking -- 1 Bug Bounty Basics -- Vulnerabilities and Bug Bounties -- Client and Server -- What Happens When You Visit a Website -- HTTP Requests -- Summary -- 2 Open Redirect -- How Open Redirects Work -- Shopify Theme Install Open Redirect -- Shopify Login Open Redirect -- HackerOne Interstitial Redirect -- Summary -- 3 HTTP Parameter Pollution -- Server-Side HPP -- Client-Side HPP -- HackerOne Social Sharing Buttons -- Twitter Unsubscribe Notifications -- Twitter Web Intents -- Summary -- 4 Cross-Site Request Forgery -- Authentication -- CSRF with GET Requests -- CSRF with POST Requests -- Defenses Against CSRF Attacks -- Shopify Twitter Disconnect -- Change Users Instacart Zones -- Badoo Full Account Takeover -- Summary -- 5 HTML Injection and Content Spoofing -- Coinbase Comment Injection Through Character Encoding -- HackerOne Unintended HTML Inclusion -- HackerOne Unintended HTML Include Fix Bypass -- Within Security Content Spoofing -- Summary -- 6 Carriage Return Line Feed Injection -- HTTP Request Smuggling -- v.shopify.com Response Splitting -- Twitter HTTP Response Splitting -- Summary -- 7 Cross-Site Scripting -- Types of XSS -- Shopify Wholesale -- Shopify Currency Formatting -- Yahoo! …”
Libro electrónico -
3685por James, JoyceTabla de Contenidos: “…CONTENTS; Chapter Four - Biomolecules; Chapter Nine - Fluids - liquids and gases; Preface; Introduction; Homeostasis; Measurement and units; Summary; Review questions; Chapter One - Atoms; Learning objectives; Introduction; Matter; Atoms; Elements; Atomic number and mass number; Isotopes; Relative atomic mass; Electron arrangement; Compounds; Chemical equations; Chemical bonding; The mole; Relative formula mass; Summary; Review questions; Further reading; Chapter Two - Water and electrolyte balance; Learning objectives; Introduction; Bonding in water; Water as a solvent; Concentrations…”
Publicado 2002
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
3686Publicado 2007Tabla de Contenidos: “…Getting Help from SupportSummary; Chapter 5: Automating SQL Server; Automation Components; SQL Agent Security; Configuring SQL Server Agent; Database Mail; Multiserver Administration; Problem Resolution; Summary; Chapter 6: Integration Services Administration and Performance Tuning; Tour of Integration Services; Administration of the Integration Services Service; Administration of Integration Services Packages; Applying Security to Integration Services; Summary; Chapter 7: Analysis Services Administration and Performance Tuning; Tour of Analysis Services…”
Libro electrónico -
3687Publicado 2019Tabla de Contenidos: “…-- Adding Matrices -- Multiplying Matrices -- Order Matters in Matrix Multiplication -- Drawing 2D Shapes -- Transforming Matrices -- Transposing Matrices -- Rotating Matrices in Real Time -- Creating 3D Shapes -- Creating the Rotation Matrix -- Solving Systems of Equations with Matrices -- Summary -- PART 3: BLAZING YOUR OWN TRAIL -- 9 BUILDING OBJECTS WITH CLASSES -- Bouncing Ball Program -- Grazing Sheep Program -- Summary -- 10 CREATING FRACTALS USING RECURSION -- The Length of a Coastline -- Koch Snowflake -- Sierpinski Triangle -- Square Fractal -- Dragon Curve -- Summary -- 11 CELLULAR AUTOMATA -- Creating a Cellular Automaton -- Python Lists Are Strange -- Playing the Game of Life -- The Elementary Cellular Automaton -- Summary -- 12 SOLVING PROBLEMS USING GENETIC ALGORITHMS -- Using a Genetic Algorithm to Guess Phrases -- Solving the Traveling Salesperson Problem (TSP) -- Summary -- INDEX…”
Libro electrónico -
3688Publicado 2015Tabla de Contenidos: “…Inbound AccessOutbound Access; Bidirectional Access; No Outside Access; Access Summary; Principle of Economy; Time; Targeting Capabilities; Exploitation Expertise; Networking Expertise; Software Development Expertise; Operational Expertise; Operational Analysis Expertise; Technical Resources; Economy Summary; Attacker Structure; Summary; Chapter 3 The Defender; Principle of Humanity; Humanity and Network Layout; Humanity and Security Policy; Principle of Access; The Defensive Life Cycle; Principle of Economy; The Helpful Defender; Summary; Chapter 4 Asymmetries; False Asymmetries…”
Libro electrónico -
3689Publicado 2015Tabla de Contenidos: “…Cover; Introduction; Overview of This Book; How This Book Is Organized; Who Should Read This Book; Tools You Will Need; What's on the Website; Chapter 1 Mobile Application (In)security; The Evolution of Mobile Applications; Mobile Application Security; Summary; Chapter 2 Analyzing iOS Applications; Understanding the Security Model; Understanding iOS Applications; Jailbreaking Explained; Understanding the Data Protection API; Understanding the iOS Keychain; Understanding Touch ID; Reverse Engineering iOS Binaries; Summary; Chapter 3 Attacking iOS Applications…”
Libro electrónico -
3690Publicado 2024Tabla de Contenidos: “…Build versus buy, materials, and designs -- Summary -- Chapter 8: Project: Building a CNC Laser Cutter and a Plotter -- Laser cutter/engraver -- Endstops and electronics -- Plotter -- Summary -- Chapter 9: Project: Building Your Own 4th Axis -- Design is the starting point -- Fabrication -- The final assembly -- Installation and settings -- Summary -- Chapter 10: Project: Adding a Laser to the 3018 -- Selecting a suitable laser toolhead -- Mounting adjacent to the spindle -- Mounting in place of the spindle -- Laser-cutting software -- Laser head installation examples -- Summary -- Chapter 11: Building a More Capable CNC Machine -- Building a bigger 3018 -- Standardizing and simplifying your structure -- Eliminating the moving table -- Use multiple motors -- An all-metal Z axis -- A more robust controller board -- Scaling up -- Summary -- Chapter 12: Future Projects and Going Bigger and Better -- The ShapeOKO -- The OX -- Hot wire foam cutters -- CNC lathe -- A fifth axis -- Summary -- Index -- About Packt -- Other Books You May Enjoy…”
Libro electrónico -
3691Publicado 2024Tabla de Contenidos: “…-- Industries -- Personas -- Developer experience -- Second-degree user experience -- API friction -- Summary -- Chapter 3: API-as-a-Product -- Business value…”
Libro electrónico -
3692por Porter, Thomas, PhDTabla de Contenidos: “…; VoIP Isn't Just Another Data Protocol; Security Issues in Converged Networks; A New Security Model; Summary; Chapter 2. The Hardware Infrastructure; Introduction; Traditional PBX Systems; PBX Alternatives; VoIP Telephony and Infrastructure; Summary; Chapter 3. …”
Publicado 2007
Libro electrónico -
3693Publicado 2008Tabla de Contenidos: “…Cover -- Contents -- Foreword -- Introduction -- Part I: Introduction to Network Security Solutions -- Chapter 1 Overview of Network Security Technologies -- Firewalls -- Virtual Private Networks (VPN) -- Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) -- Anomaly Detection Systems -- Authentication, Authorization, and Accounting (AAA) and Identity Management -- Network Admission Control -- Routing Mechanisms as Security Tools -- Summary -- Part II: Security Lifestyle: Frameworks and Methodologies -- Chapter 2 Preparation Phase -- Risk Analysis -- Social Engineering -- Security Intelligence -- Creating a Computer Security Incident Response Team (CSIRT) -- Building Strong Security Policies -- Infrastructure Protection -- Endpoint Security -- Network Admission Control -- Summary -- Chapter 3 Identifying and Classifying Security Threats -- Network Visibility -- Telemetry and Anomaly Detection -- Intrusion Detection and Intrusion Prevention Systems (IDS/IPS) -- Summary -- Chapter 4 Traceback -- Traceback in the Service Provider Environment -- Traceback in the Enterprise -- Summary -- Chapter 5 Reacting to Security Incidents -- Adequate Incident-Handling Policies and Procedures -- Laws and Computer Crimes -- Security Incident Mitigation Tools -- Forensics -- Summary -- Chapter 6 Postmortem and Improvement -- Collected Incident Data -- Root-Cause Analysis and Lessons Learned -- Building an Action Plan -- Summary -- Chapter 7 Proactive Security Framework -- SAVE Versus ITU-T X.805 -- Identity and Trust -- Visibility -- Correlation -- Instrumentation and Management -- Isolation and Virtualization -- Policy Enforcement -- Visualization Techniques -- Summary -- Part III: Defense-In-Depth Applied -- Chapter 8 Wireless Security -- Overview of Cisco Unified Wireless Network Architecture…”
Libro electrónico -
3694por Ambler, Scott W., 1966-Tabla de Contenidos: “…; How to Model Data; How to Become Better at Modeling Data; Summary; Chapter 4: Data Normalization; Why Data Normalization?…”
Publicado 2003
Libro electrónico -
3695por Watson, Scott A.Tabla de Contenidos: “…Front cover; The Art of War for Security Managers; Copyright page; Table of contents; Preface; Acknowledgments; Chapter 1: Introduction to The Art of War; Executive Summary; Today's Threat Environment; Who Was Sun Tzu?…”
Publicado 2007
Libro electrónico -
3696por Ulrich-Fuller, Laurie, 1961-Tabla de Contenidos: “…Photoshop CS3 Bible; Contents; Part I Welcome to Photoshop; Chapter 1 Welcome to Photoshop CS3; Image-Editing Concepts; What's New in Photoshop CS3; Summary; Chapter 2 Photoshop Inside Out; Diving in with the Splash Screen; Using the Photoshop Workspace; Navigating in Photoshop CS3; Customizing the Interface; The Preference Panels; Summary; Chapter 3 Image Management; Size versus Resolution; Changing the Printing Resolution; Changing the Page-Layout Resolution; Knowing the Best Resolution; The Resolution of Screen Images; Opening, Duplicating, and Saving Images; Using the Bridge…”
Publicado 2007
Libro electrónico -
3697por Padova, TedTabla de Contenidos: “…; Understanding the Creative Suite; OpenType fonts; Summary; Chapter 2: Taking a Tour of the Creative Suite; Starting with a Sketch in Acrobat; Editing Images in Photoshop; Creating Illustrator Objects; Using Adobe Bridge; Creating a Layout in InDesign; Preparing a Layout for Print; Soft-Proofing in Adobe Acrobat; Repurposing a Document for Web Hosting; Summary…”
Publicado 2009
Libro electrónico -
3698Publicado 2005Tabla de Contenidos: “…; Testing Concerns; Summary…”
Libro electrónico -
3699por Derakhshani, DariushTabla de Contenidos: “…; Summary; Chapter 3: The 3ds Max Interface…”
Publicado 2008
Libro electrónico -
3700por Knight, BrianTabla de Contenidos: “…; Upgrading to SQL Server 2008; Pre-Upgrade Checks; Backward Compatibility; SQL Server Component Considerations; Post-Upgrade Checks; Summary; Chapter 4: Managing and Troubleshooting the Database Engine; Configuration Tools; Management Studio; Trace Flags; Getting Help from Support; Summary; Chapter 5: Automating SQL Server; Maintenance Plans; SQL Server Agent; Summary; Chapter 6: Integration Services Administration and Performance Tuning…”
Publicado 2009
Libro electrónico