Artboard 33 Artboard 16 Artboard 18 Artboard 15 Artboard 21 Artboard 1 Artboard 2 Artboard 5 Artboard 45 Artboard 45 Artboard 22 Artboard 9 Artboard 23 Artboard 17? Artboard 28 Artboard 43 Artboard 49 Artboard 47 Artboard 38 Artboard 32 Artboard 8 Artboard 22 Artboard 5 Artboard 25 Artboard 1 Artboard 42 Artboard 11 Artboard 41 Artboard 13 Artboard 23 Artboard 10 Artboard 4 Artboard 9 Artboard 20 Artboard 6 Artboard 11 Artboard 7 Artboard 3 Artboard 3 Artboard 12 Artboard 25 Artboard 34 Artboard 39 Artboard 24 Artboard 13 Artboard 19 Artboard 7 Artboard 24 Artboard 31 Artboard 4 Artboard 14 Artboard 27 Artboard 30 Artboard 36 Artboard 44 Artboard 12 Artboard 17 Artboard 17 Artboard 6 Artboard 27 Artboard 19 Artboard 30 Artboard 29 Artboard 29 Artboard 26 Artboard 18 Artboard 2 Artboard 20 Artboard 35 Artboard 15 Artboard 14 Artboard 48 Artboard 50 Artboard 26 Artboard 16 Artboard 40 Artboard 21 Artboard 29 Artboard 10 Artboard 37 Artboard 3 Artboard 3 Artboard 46 Artboard 8

Resultados para: security analysis

47 produtos
  • Security Analysis

    Dodd,David L.; Graham, Benjamin
    (854080)

    Security Analysis

    sob encomenda
  • Security Analysis

    Dodd,David L.; Graham, Benjamin
    (510081)

    Explains financial analysis techniques, shows how to interpret financial statements, and discusses the analysis of fixed-income securities and the valuation of stocks

    sob encomenda
  • Security Analysis And Investment Strategy

    Poitras,Geoffrey
    (1093732)

    This innovative text presents the theoretical foundations of security analysis and investment strategy, and explores the practical applications of these theories. After establishing an historical foundation, the book examines fixed income securities,...

    sob encomenda
  • Risk Analysis & Security Survey 3e

    Broder
    (1149799)

    Risk Analysis & Security Survey 3e

    sob encomenda
  • e-book

    Security Analysis - The Classic 1940 Edition

    Benjamin Graham; Dodd, David
    (7390472)

    'quot;Graham'apos;s ideas inspired the investment community for nearly a century.'quot;--Smart Money'quot;Graham'apos;s method of investing is as relevant today as it was when he first espoused it during the Roaring Twenties.'quot;--Investor'apos;s...

  • e-book

    Security Analysis - Business, Finance

    Dodd, Benjamin; CTI Reviews
    (3820725)

    Facts101 is your complete guide to Security Analysis. In this book, you will learn topics such as Blood and Judgement, Go with the Flow, The Quest for Rational Investing, and Deconstructing the Balance Sheet plus much more. With key features such as...

  • e-book

    Automated Security Analysis of Android and...

    Dalziel, Henry
    (9673748)

    Risky Behaviours in the Top 400 iOS and Android Apps is a concise overview of the security threats posed by the top apps in iOS and Android apps. These apps are ubiquitous on a phones and other mobile devices, and are vulnerable to a wide range...

  • e-book

    Security Valuation and Risk Analysis -...

    CFA Kenneth Hackel
    (3127568)

    A superior new replacement to traditional discounted cash flow valuation modelsExecutives and corporate finance practitioners now have a more reliable discount rate to value companies and make important business and investment decisions. In...

  • e-book

    Information Security Risk Analysis, Third...

    Peltier, Thomas R.
    (9540493)

    Successful security professionals have had to modify the process of responding to new threats in the high-profile, ultra-connected business environment. But just because a threat exists does not mean that your organization is at risk. This is what...

  • e-book

    Risk Analysis and the Security Survey...

    (3995253)

    Risk Analysis and the Security Survey Instructor's Manual

  • e-book

    Risk Analysis and the Security Survey

    Broder,James F.; Tucker,Eugene
    (2890571)

    Risk Analysis and the Security Survey, Third Edition, provides an understanding of the basic principles of risk analysis. Addressing such topics as cost/benefit analysis, crime prediction, and business continuity planning, the book gives an overview...

  • e-book

    Modern Security Analysis - Understanding Wall...

    Whitman,Martin J.; Fernando Diz
    (9301077)

    A legendary value investor on security analysis for a modern era This book outlines Whitman's approach to business and security analysis that departs from most conventional security analysts. This approach has more in common with corporate finance...

  • e-book

    Modern Security Analysis

    Whitman,Martin J.; Fernando Diz
    (9301072)

    A legendary value investor on security analysis for a modern era This book outlines Whitman's approach to business and security analysis that departs from most conventional security analysts. This approach has more in common with corporate finance...

  • e-book

    Security as Practice - Discourse Analysis and...

    Hansen,Lene
    (9462232)

    This important text offers a full and detailed account of how to use discourse analysis to study foreign policy. It provides a poststructuralist theory of the relationship between identity and foreign policy and an in-depth discussion of the...

  • e-book

    Data-Driven Security - Analysis,...

    Jay Jacobs; Bob Rudis
    (9446875)

    Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most...

  • e-book

    Data-Driven Security - Analysis,...

    Jay Jacobs; Bob Rudis
    (9446857)

    Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most...

  • e-book

    Software Vulnerability Analysis: Chapter 2...

    Miller,Charles; Takanen,Ari; DeMott,Jared D.
    (2989839)

    Chapter 2 from Fuzzing for Software Security Testing and Quality Assurance

  • e-book

    Cyber Security and Global Information...

    (2991873)

    Foreword by Merrill Warkentin, Mississippi State University, USA. The increasing societal dependence on information technology has pushed cyber-security to the forefront as one of the most urgent challenges facing the global community. Cyber Security...

  • e-book

    Risk Analysis and Security Countermeasure...

    Norman, Cpp/Psp/Csc Thomas L.
    (2976628)

    When properly conducted, risk analysis enlightens, informs, and illuminates, helping management organize their thinking into properly prioritized, cost-effective action. Poor analysis, on the other hand, usually results in vague programs with no...

  • e-book

    Audio Content Security - Attack Analysis on...

    Iraj Sadegh Amiri; Sogand Ghorbani
    (9459788)

    Audio Content Security: Attack Analysis on Audio Watermarking describes research using a common audio watermarking method for four different genres of music, also providing the results of many test attacks to determine the robustness of the...

  • e-book

    Risk Analysis and the Security Survey

    Broder,James F.; Tucker, Gene
    (3738027)

    As there is a need for careful analysis in a world where threats are growing more complex and serious, you need the tools to ensure that sensible methods are employed and correlated directly to risk. Counter threats such as terrorism, fraud, natural...

  • e-book

    Android Forensics - Investigation, Analysis...

    Hoog, Andrew
    (3690600)

    Android Forensics: Investigation, Analysis, and Mobile Security for Google Android provides the background, techniques and analysis tools you need to effectively investigate an Android phone. This book offers a thorough review of the Android platform...

  • e-book

    HIPAA Security and Risk Analysis

    Pabrai, Uday O. Ali
    (2967841)

    Risk analysis and information system activity review are required implementation specifications defined in the System Management Process standard in the HIPAA Security Rule. Business Impact Analysis (BIA) is a critical initial step in contingency...

  • e-book

    Instant SQL Server Analysis Services 2012...

    Jayanty Satya SK
    (9498506)

    Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. Instant Microsoft SQL Server Analysis Services 2012 Cube Security is a practical, hands-on guide that provides a number of clear,...

  • e-book

    Applied Network Security Monitoring -...

    Smith, Jason; Sanders, Chris
    (9757138)

    Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. Network...

  • e-book

    Breakdowns in Computer Security - Commentary...

    Michael E Rentell
    (9571722)

    Breakdowns in Computer Security: Commentary and Analysis is a compendium of 100 genuine incidents that have taken place in the past three or so years.The book describes computer breakdown incidents during the years 1988-1990 and provides to each...

  • e-book

    Perl Scripting for Windows Security - Live...

    (3028825)

    I decided to write this book for a couple of reasons. One was that I'apos;ve now written a couple of books that have to do with incident response and forensic analysis on Windows systems, and I used a lot of Perl in both books. Okay...I'apos;ll come...

  • e-book

    Getting Started in Security Analysis

    Klein, Peter J.; Brian R. Iammartino
    (9294525)

    An updated look at security analysis and how to use it during tough financial times Due to the current economic climate, individual investors are starting to take much more time and effort to really understand their investments. They've been...

  • e-book

    Risk Analysis and Security Countermeasure...

    Norman,Cpp/Psp/Csc Thomas L.
    (9799178)

    This new edition of Risk Analysis and Security Countermeasure Selection presents updated case studies and introduces existing and new methodologies and technologies for addressing existing and future threats. It covers risk analysis methodologies...

  • e-book

    Financial Statement Analysis and Security...

    CTI Reviews
    (9518123)

    Facts101 is your complete guide to Financial Statement Analysis and Security Valuation. In this book, you will learn topics such as Three How Financial Statements Are Used in Valuation, Four Cash Accounting, Accrual Accounting, and Discounted Cash...

  • e-book

    Financial Statement Analysis and Security...

    CTI Reviews
    (3736469)

    Facts101 is your complete guide to Financial Statement Analysis and Security Valuation. In this book, you will learn topics such as How Financial Statements Are Used in Valuation, Cash Accounting, Accrual Accounting, and Discounted Cash Flow Valuatio...

  • e-book

    Financial Statement Analysis and Security...

    CTI Reviews
    (9820835)

    Facts101 is your complete guide to Financial Statement Analysis and Security Valuation. In this book, you will learn topics such as How Financial Statements Are Used in Valuation, Cash Accounting, Accrual Accounting, Discounted Cash Flow Valuation,...

  • e-book

    Financial Statement Analysis and Security...

    CTI Reviews
    (9632667)

    Facts101 is your complete guide to Financial Statement Analysis and Security Valuation. In this book, you will learn topics such as How Financial Statements Are Used in Valuation, Cash Accounting, Accrual Accounting, and Discounted Cash Flow Valuatio...

  • e-book

    Food Security, Poverty and Nutrition Policy...

    Babu, Suresh; Shailendra N. Gajanan
    (9613237)

    Food insecurity, the lack of access at all times to the food needed for an active and healthy life, continues to be a growing problem as populations increase while the world economy struggles. Formulating effective policies for addressing these...

  • e-book

    Food Security, Poverty and Nutrition Policy...

    Sanyal, Prabuddha; Babu, Suresh
    (3032110)

    Food Security, Poverty and Nutrition Analysis provides essential insights into the evaluative techniques necessary for creating appropriate and effective policies and programs to address these worldwide issues. Food scientists and nutritionists will...

  • e-book

    Modeling and Analysis of Wireless Networked...

    Sastry,Shankar; Chen,Phoebus; Oh,Songhwai
    (2989925)

    Chapter 8 from Homeland Security Challenges: From Sensing and Encrypting to Mining and Modeling, Giorgio Franceschetti, Marina Grossi, Editors

  • e-book

    Benjamin Graham, Building a Profession - The...

    Zweig, Jason
    (3081483)

    Learn and profit from the early writings of a financial genius Benjamin Graham is widely known as the father of Value Investing, and mentor to Warren Buffett. But Graham made another critically important contribution by advocating that securities...

  • Damodaran On Valuation - Security Analysis...

    Damodaran
    (1545021)

    Damondaran on Valuation will not only convince you of the vitality of the many valuation models available to you, it will help ensure that you develop the acumen needed to select the right model for any valuation scenario. Written by a gifted teacher...

    sob encomenda
  • Food Security, Poverty, And Nutrition Policy...

    Sanyal, Prabuddha; Babu,Suresh C; Gajanan,Shailendra N
    (9237755)

    Food insecurity, the lack of access at all times to the food needed for an active and healthy life, continues to be a growing problem as populations increase while the world economy struggles. Formulating effective policies for addressing these...

    sob encomenda
  • e-book

    The BRICs Superpower Challenge - Foreign and...

    Kwang Ho Professor Chun
    (9695604)

    In an imaginative and interesting way, Kwang Ho Chun seeks to capture the dynamics of the changing international system and the prospects for a change in the international distribution of power. The idea that new superpowers could rise and that some...

  • e-book

    The BRICs Superpower Challenge - Foreign and...

    Kwang Ho Chun
    (9552485)

    In an imaginative and interesting way, Kwang Ho Chun seeks to capture the dynamics of the changing international system and the prospects for a change in the international distribution of power. The idea that new superpowers could rise and that some...

  • e-book

    The BRICs Superpower Challenge - Foreign and...

    Kwang Ho Chun
    (9691355)

    In an imaginative and interesting way, Kwang Ho Chun seeks to capture the dynamics of the changing international system and the prospects for a change in the international distribution of power. The idea that new superpowers could rise and that some...

  • Damodaran On Valuation - Security Analysis...

    Damodaran
    (1552586)

    'Aswath Damodaran is simply the best valuation teacher around. If you are interested in the theory or practice of valuation, you should have Damodaran on Valuation on your bookshelf. You can bet that I do.' -- Michael J. Mauboussin, Chief Investment...

    Produto indisponível

  • Security Analysis

    Benjamin Graham
    (3461637)

    First published in 1934, Security Analysis is one of the most influential financial books ever written. Selling more than one million copies through five editions, it has provided generations of investors with the timeless value investing philosophy...

    Produto indisponível

Busca por