All counter of AlamanShop


Janet G. Butler
Securing the Enterprise Network

— y.
Publisher: —
Description: Despite the power of internetworking, companies are faced with enormous security threats. CTR`s 250-page report analyzes today`s network security issues, describes their rapidly changing technical aspects, and forecasts future network security challenges. This report is your guide to the latest advances in security technology. Network Security: An Overview Today`s networking technologies enable the sharing of enormous amounts of information within an organization. Distributed client/server (C/S)computing and enterprisewide internetworking offer new opportunities and flexibility. But as information accessibility grows, so does vulnerability to potential security breaches. CTR`s Securing the Enterprise Network report offers an indepth discussion of current and emerging security technologies. The report addresses the major network security solutions, such as encryption, packet-level filters, auditing, and firewalls. Other important topics such as network operating system… [detailed...]

ISBN: 1566079845
Book size: —; Page extent: 0.

 

PUT TO
THE BASKET
Joseph Migga Kizza, Florence Migga Kizza
Securing the Information Infrastructure

2007 y.
Publisher: —
Description: - [detailed...]

ISBN: 1599043793
Book size: —; Page extent: 368.

 

PUT TO
THE BASKET
Douglas Schweitzer
Securing the Network from Malicious Code: A Complete Guide to Defending Against Viruses, Worms, and Trojans

— y.
Publisher: —
Description: Cover procedures and practices for everything from social engineering to effectively configuring an intrusion detection system. * Author provides the benefit of his day-to-day practices as a security expert. * Companion Website features several non-shareware products for effectively defending against malicious code. [detailed...]

ISBN: 0764549588
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
J. Kirkland Grant
Securities Arbitration for Brokers, Attorneys, and Investors

— y.
Publisher: —
Description: Contrasting arbitration of securities disputes with litigation in the courts, this book reviews the interaction of federal securities laws and arbitration in light of caselaw. This review culminates in the recent U.S. Supreme Court cases supporting the validity of predisputed arbitration agreements even when there are claims of fraud and violations of federal securities law. The common law view of arbitration and the Federal Arbitration Act of 1925 are discussed, as are the arbitration process and forumswithin the securities industry. Procedures (e.g. evaluating the merits of a claim, presenting a securities case to arbitration panels throughout the nation, and appealing an arbitration award) are also examined. It is the only book to date to discuss thenew AAA Securities Arbitration Rules. [detailed...]

ISBN: 0899306829
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Frank J. Fabozzi, Steven V. Mann
Securities Finance: Securities Lending and Repurchase Agreements (Frank J. Fabozzi Series)

2005 y.
Publisher: —
Description: In Securities Finance , editors Frank Fabozzi and Steven Mann assemble a group of prominent practitioners in the securities finance industry to provide readers with an enhanced understanding of the various arrangements in the securities finance market. Divided into three comprehensive parts—Securities Lending, Bond Financing via the Repo Market, and Equity Financing Alternatives to Securities Lending—this book covers a wide range of securities finance issues, including alternative routes to the securities lending market, evaluating risks in securities lending transactions, U.S. and European repo markets, dollar rolls and their impact on MBS valuation and strategies, derivatives for financing equity positions and equity repos, and more. Filled with in-depth insight and expert advice, Securities Finance contains the information readers need to succeed in this rapidly expanding market. [detailed...]

ISBN: 0471678910
Book size: —; Page extent: 351.

 

PUT TO
THE BASKET
Frank J. Fabozzi
Securities Lending and Repurchase Agreements

— y.
Publisher: —
Description: Revised and updated to reflect the latest developments in the field of cash flow analysis, Cash Flow and Security Analysis provides an enlightening examination into why cash flow is quickly replacing earnings as the primary tool used by securities analysts, and how they can identify undervalued securities by using cash flow analysis. [detailed...]

ISBN: 1883249163
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Hal McIntyre
Securities Operations Glossary Second Edition

— y.
Publisher: —
Description: Most glossaries that have been created for the securities industry were written by brokers and for brokers. This glossary has a broader view. It contains terms that are used by brokers, as well as by banks, investment managers and other participants inthe securities industry. When a term has more than one usage, the different definitions are shown. This glossary focuses primarily on the terms that are most often used by the operations and technical staff as well as the front office. Front office and investment terms have been defined in the context of how an operations or technical person might view them. [detailed...]

ISBN: 0966917839
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
James D. Cox, Robert W. Hillman, Donald C. Langevoort
Securities Regulation: Cases and Materials

2006 y.
Publisher: Aspen Publishers, Inc.
Description: Издание на английском языке. [detailed...]

ISBN: 0735559600
Book size: —; Page extent: 1187.

 

PUT TO
THE BASKET
Jessica Keyes
Securities Technology Handbook

— y.
Publisher: —
Description: This desk reference provides IT professionals in the securities industry with information about the latest technologies for improving efficiency and prediction.Topics include:omodelingomanagement systemsoresearchoInternet commerceoissues affecting all financial services sectors, such as the year 2000 problemSecurities Technology Handbook is geared toward all levels of technology management and financial services management responsible for developing and implementing cutting-edge technology. [detailed...]

ISBN: 0849399912
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Thomas S. Y. Ho
Securities Valuation

2005 y.
Publisher: —
Description: Book DescriptionFinancial Modeling for Securities Valuation bridges the gap between portfolio analysis theory and the behavior and function of securities in the real world. The book explains how to construct financial models of securities and goes on to present a coherent framework for understanding their behavior and function in the context of a broad range of financial instruments. It uses a binomial approach that enables readers to build and manipulate the models on a spreadsheet.LThe book is divided into three parts. Part One, Fundamental Concepts, covers the basic ideas of securities valuation-model methodology, assumptions of the model, and fundamental security models such as the bond model and the Black-Scholes model. It uses the binomial lattice method to expand coverage to other securities, from simple to complex. Part Two, Market Sectors, describes the most important and prevalent market sectors. Part Three, Derivatives and Strategies, explains the applications of financial… [detailed...]

ISBN: 0195172752
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Jan Job De Vries Robbe, Paul Ali
Securitisation of Derivatives And Alternative Asset Classes: Yearbook (Global Trade and Finance)

2005 y.
Publisher: —
Description: - [detailed...]

ISBN: 904112375X
Book size: —; Page extent: 300.

 

PUT TO
THE BASKET
Vinod Kothari
Securitization -- The Financial Instrument of the Future (Wiley Finance)

2006 y.
Publisher: —
Description: Get a thorough explanation of the nuances of securitization in the global business market with this comprehensive resource. Synthetic securitization and structured products are revolutionizing the financial industry and changing the way banks, institutional investors, and securities traders do business both domestically and globally. Written by a top international trainer and expert on securitization, this book is an ideal way for all market practitioners, whether investors, bankers, or analysts, to ensure they understand the ins and outs of this practice. [detailed...]

ISBN: 0470821957
Book size: —; Page extent: 1200.

 

PUT TO
THE BASKET
Andrew Davidson, Anthony Sanders, Lan-Ling Wolff, Anne Ching
Securitization : Structuring and Investment Analysis (Wiley Finance)

— y.
Publisher: —
Description: `This book fills a very important gap in the mindset of the bond structurer and the investor. Often, the two disciplines approach their tasks ignorant of the perspectives of the other side. But successful structuring requires providing the best value to investors in order to compete, and investors who don?t fully understand structuring will not remain investors for long. Highly recommended!` ?Bennett W. Golub Managing Director, BlackRock, Inc. `An excellent primer on asset securitization, clearly written in plain English and with straightforward mathematical expressions. This book is suitable for both business school students and structured finance market practitioners.` ?Joseph Hu, PhD Managing Director,Structured Finance Ratings Standard &, Poor?s `In their new work Securitization: Structuring and Investment Analysis, Andrew Davidson et al. reinforce their preeminence in the alchemy of mortgage securitization. Anyone… [detailed...]

ISBN: 0471022608
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
James A. Rosenthal, Juan M. Ocampo
Securitization of Credit: Inside the New Technology of Finance

— y.
Publisher: —
Description: The first guide to this new financial trend. Credit securitization (also known as asset securitization) is a financial technology for packaging, underwriting, and selling loans in the form of securities. First used in packaging mortgage loans (as in the case of GNMA and other federally insured mortgage-backed securities), credit securitization has grown rapidly and spread to other forms of credit, including auto loans, student loans, credit-card balances, and so on. This book provides lenders and other financial professionals with clear analyses of many actual credit securitization deals. Includes much information unavailable elsewhere. [detailed...]

ISBN: 0471613681
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Steven Schwarcz
Securitization, Structured Finance, and Capital Markets

2004 y.
Publisher: —
Description: - [detailed...]

ISBN: 0820548510
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Michael Himick
Securitized Insurance Risk: Strategic Opportunities for Insureres and Investors

— y.
Publisher: —
Description: — [detailed...]

ISBN: 1888998350
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Christopher A. Crayton
Security + Exam Guide (Testtaker`s Guide Series)

2003 y.
Publisher: —
Description: Book Description The Security+ Exam Guide provides exam candidates with the concepts, objectives, and test-taking skills needed to pass on their first attempt. Instead of covering every computer security topic, this book isolates those topics most likelyto be addressed on the exam. In addition, the companion CD-ROM contains original practice exams created exclusively for the book. Each interactive, timed test features a review to identify areas that need improvement. Written by an experienced network administrator and CompTIA certified instructor, the book draws upon subject expertise and teaching experience to provide everything test takers need to know for successful test-taking. [detailed...]

ISBN: 1584502517
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Geoffrey Poitras
Security Analysis And Investment Strategy

2004 y.
Publisher: —
Description: — [detailed...]

ISBN: 1405112484
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Donald E. Fischer, Ronald J. Jordan
Security Analysis and Portfolio Management (SECURITY ANALYSIS AND PORTFOLIO MANAGEMENT)

— y.
Publisher: —
Description: — [detailed...]

ISBN: 0131572563
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Jeffrey C. Hooke
Security Analysis on Wall Street

— y.
Publisher: —
Description: Advance praise for this groundbreaking look at Security Analysis on Wall Street `Mr. Hooke does an admirable job of stripping away the wrapping paper to reveal the fundamentals of analyzing companies and their stocks and bonds that are traded in the public marketplace.` —Samuel L. Hayes III Jacob H. Schiff Professor of Investment Banking Harvard University Graduate School of Business Administration `Jeffrey Hooke has provided a comprehensive and readable explanation of the issues involved in determining company valuations. This book should become required reading for analysts and investment managers.` —Steven W. Golann Director Mercury Asset Management International Ltd. `One of the toughest issues facing an investment professional is valuation. Jeffrey Hooke in his book Security Analysis on Wall Street deals with this issue in a comprehensive manner by providing not only a framework to evaluate the dynamics that determine value, but also tools that can… [detailed...]

ISBN: 0471177415
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Russ Rogers, Greg Miles, Ed Fuller, Ted Dykstra
Security Assessment: Case Studies for Implementing the NSA IAM

2004 y.
Publisher: —
Description: The National Security Agency`s INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzesthe impact to an organization if there is a loss of integrity, confidentiality, or availability. This book shows how to do a complete security assessment based on the NSA`s guidelines. This book focuses on providing a detailed organizational information tchnology security assessment using case studies. The Methodology used for the assessment is based on the National Security Agency`s (NSA) INFOSEC Assessment Methodology (IAM). Examples will be given dealing with issues related to military organizations, edical issues, critical infrastructure (power generation, etc.). The book is intended to provide an educational and entertaining analysis of an organization, showing the steps of the assessment and the challenges faced during it. It… [detailed...]

ISBN: 1932266968
Book size: —; Page extent: 448.

 

PUT TO
THE BASKET
Mark Ciampa
Security Awareness: Applying Practical Security in Your World

2006 y.
Publisher: —
Description: Building on the success of the first edition, this new text provides a non-technical approach to practical computer security for all users, from business professionals to students to home users. [detailed...]

ISBN: 1418809691
Book size: —; Page extent: 272.

 

PUT TO
THE BASKET
Deborah Sanders
Security Co-Operation between Russia and Ukraine in the Post-Soviet Era

2001 y.
Publisher: Palgrave Macmillan
Description: Using a case study with wide implications for European security, stability, and the division of former Soviet security assets between Russia and Ukraine, Deborah Sanders considers which factors promote and which hamper security cooperation. She examines the dismantling of Ukraine`s tactical nuclear weapons, the removal of their strategic nuclear weapons, and the division of the Black Sea fleet. While the collapse of the Soviet Union opened up possibilities for cooperation, it also unleashed long-suppressed national feelings. Sanders argues that the dynamics of cooperation can only be understood if these domestic political factors are taken into account. Формат издания: 14,5 см х 22,5 см. [detailed...]

ISBN: 0-333-80095-8
Book size: —; Page extent: 208.

 

PUT TO
THE BASKET
Sybex Inc, Sybex Inc
Security Complete

— y.
Publisher: —
Description: — [detailed...]

ISBN: 0782141447
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Dennis C. Brewer
Security Controls for Sarbanes-Oxley Section 404 IT Compliance: Authorization, Authentication, and Access

2005 y.
Publisher: —
Description: The Sarbanes-Oxley Act requires public companies to implement internal controls over financial reporting, operations, and assets-all of which depend heavily on installing or improving information security technology Offers an in-depth look at why a network must be set up with certain authentication computer science protocols (rules for computers to talk to one another) that guarantee security Addresses the critical concepts and skills necessary to design and create a system that integrates identity management, meta-directories, identity provisioning, authentication, and access control A companion book to Manager`s Guide to the Sarbanes-Oxley Act (0-471-56975-5) and How to Comply with Sarbanes-Oxley Section 404 (0-471-65366-7) [detailed...]

ISBN: 0764598384
Book size: —; Page extent: 262.

 

PUT TO
THE BASKET
Dave Tyson
Security Convergence: Managing Enterprise Security Risk

2007 y.
Publisher: —
Description: Security Convergence describes the movement in business to combine the roles of physical security and security management with network computer security measures within an organization. This is the first book to discuss the subject of security convergence, providing real-world illustrations of implementation and the cost-saving benefits that result. Security Convergence discusses security management, electronic security solutions, and network security and the manner in which all of these interact. Combining security procedures and arriving at complete security solutions improves efficiency, greatly improves security, and saves companies money. Implementation of convergence principles has increased rapidly and the number of businesses moving to this model will continue to grow over the next few years. All security professionals, regardless of background, will find this a useful reference and a practical look at the benefits of convergence and a look to the… [detailed...]

ISBN: 0750684259
Book size: —; Page extent: 232.

 

PUT TO
THE BASKET
Brian Gouin
Security Design Consulting: The Business of Security System Design

2007 y.
Publisher: —
Description: A crucial reference for the practicing or aspiring design consultant, Security Design Consulting brings you step by step through the process of becoming a security consultant, describing how to start the business, market services, write proposals, determine fees, and write a report. Specific elements of assessment, design and project management services as well as acquiring product and industry knowledge are all covered in detail. Concentrating on client-focused marketing and sales strategies as well as the crucial elements of preparing, running, and succeeding at the security consulting business, Security Design Consulting gives the reader a working knowledge of all the steps necessary to be a successful security design consultant and a smarter business owner. Security directors, architects and security management consultants will also find this reference invaluable in understanding the security design consultants important and growing role in an overall security… [detailed...]

ISBN: 0750676884
Book size: —; Page extent: 200.

 

PUT TO
THE BASKET
Markus Schumacher
Security Engineering with Patterns: Origins, Theoretical Models, and New Applications (Lecture Notes in Computer Science)

2003 y.
Publisher: Springer
Description: For quite some time, in systems and software design, security only came as a second thought or even as a nice-to-have add-on. However, since the breakthrough of the Internet as a virtual backbone for electronic commerce and similar applications, securityis now recognized as a fundamental requirement. This book presents a systematic security improvement approach based on the pattern paradigm. The author first clarifies the key concepts of security patterns, defines their semantics and syntax, demonstrates how they can be used, and then compares his model with other security approaches. Based on the author`s model and best practic in security patterns, security novices are now in a position to understand how security experts solve problems and can basically act like them by using the patterns available as building blocks for their designs. [detailed...]

ISBN: 3540407316
Book size: —; Page extent: 208.

 

PUT TO
THE BASKET
Munir Majdalawieh
Security Framework for DNP3 and SCADA

2008 y.
Publisher: —
Description: In this work I recommend a new DNPSec framework to enable con­fidentiality, integrity, and authenticity (CIA) placed directly in the DNP3. Such a framework requires some modifications in the data structure of the DNP3 Data Link layer. My main goal is to address the threats related to CIA in the DNP3 as part of SCADA architecture, with a minimum performance impact on the communication link, and without requiring modification to the much more expensive Master and Substation devices and the applications supporting them. Also, and as part of this work, I develop a proof of concept for the DNPSec framework by conducting simulation studies to measure the performance impact by adding DNPSec functionality on the communication links and end nodes. One other recommendation in my work is to enable authorization services by the usage of the Role-Based Access Control (RBAC) model to define the users` security roles, permissions, authorization, and role hierarchy as one measure to access the SCADA… [detailed...]

ISBN: 383647056X
Book size: —; Page extent: 160.

 

PUT TO
THE BASKET
Vesna Hassler
Security Fundamentals for E-Commerce (Artech House Computer Security Series)

— y.
Publisher: —
Description: If you`re charged with maintaining the security of e-commerce sites, you need this unique book that provides an in-depth understanding of basic security problems and relevant e-commerce solutions, while helping you implement today`s most advanced security technologies. From designing secure Web, e-commerce, and mobile commerce applications to securing your internal network to providing secure employee/user authentication, this cutting-edge book gives you a valuable security perspective you won`t find in other resources. Flexibly structured to give you a comprehensive overview or to help you quickly pinpoint topics of immediate concern, the book includes sections on basic security mechanisms, the specific requirements of electronic payment systems, communication security, and Web- and Java-related security issues. A full section is devoted to the security aspects of code and customer mobility, specifically mobile agents, mobile devices, and smart cards. Over 70… [detailed...]

ISBN: 1580531083
Book size: —; Page extent: 0.

 

PUT TO
THE BASKET
Glen Bruce, Rob Dempsey
Security In Distributed Computing: Did You Lock the Door?

— y.
Publisher: —
Description: — [detailed...]

ISBN: 0131829084
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Сайт создан в системе uCoz