Search Results - ((java programming) OR (names programming))
Suggested Topics within your search.
Suggested Topics within your search.
- Development 172
- Application software 164
- Java (Computer program language) 128
- JavaScript (Computer program language) 109
- Computer programs 106
- Web site development 95
- History 80
- Programming 80
- Web sites 68
- Design 65
- Data processing 44
- Internet programming 44
- Video games 33
- Computer programming 32
- Management 32
- Web applications 32
- Computer software 31
- Web servers 29
- computer programming 28
- Authoring programs 27
- Social aspects 27
- Business 25
- Programming languages (Electronic computers) 25
- Python (Computer program language) 24
- Computer networks 23
- Database management 23
- Medical care 22
- Open source software 22
- Research 22
- Mobile computing 21
Search alternatives:
- names programming »
- java programming »
-
1261
Quantitative financial risk management : theory and practice
Published 2015Table of Contents: “…Cover -- Title Page -- Copyright -- Contents -- Preface -- About the Editors -- Section One Supervisory Risk Management -- Chapter 1 Measuring Systemic Risk: Structural Approaches -- Systemic Risk: Definitions -- From Structural Models to Systemic Risk -- Measuring Systemic Risk -- Systemic Risk and Copula Models -- Conclusions -- References -- Chapter 2 Supervisory Requirements and Expectations for Portfolio-Level Counterparty Credit Risk Measurement and Management -- Introduction -- Review of the Literature -- Supervisory Requirements for CCR -- Conceptual Issues in CCR: Risk versus Uncertainty -- Conclusions -- References -- Chapter 3 Nonperforming Loans in the Bank Production Technology -- Introduction -- Selective Literature Review -- Method -- Empirical Application -- Summary and Conclusion -- Appendix 3.1 Bank Names and Type -- References -- Section Two Risk Models and Measures -- Chapter 4 A Practical Guide to Regime Switching in Financial Economics -- A Brief Look at Markov Regime Switching in Academic Economics and Finance -- Regime Switching and Interest Rate Processes -- Regime Switching and Exchange Rates -- Regime Switching, Stock Returns, and Asset Allocation -- Single-Asset Markov Models -- Two-State Estimation -- Three-State Estimation -- Markov Models for Multiple Assets -- Practical Application of Regime Switching Models for Investment Purposes -- Intuitive Appeal of Such Models -- Implementation Challenges -- Selecting the "Right" Model Structure -- Calibrating the Selected Model Type to Suitable Data -- Drawing the Right Conclusions from the Model -- References -- Chapter 5 Output Analysis and Stress Testing for Risk Constrained Portfolios -- Introduction -- Worst-Case Analysis -- Stress Testing via Contamination -- Conclusions and New Problems -- References.…”
Full text (MFA users only)
Electronic eBook -
1262
-
1263
IBM Lotus Domino 6 for iSeries implementation
Published 2003Table of Contents: “…Prerequisites for running Domino 6 on an iSeries server -- 2.1 iSeries hardware -- 2.1.1 Capacity planning considerations -- 2.1.2 Sizing considerations -- 2.2 iSeries software -- 2.2.1 Program temporary fixes -- 2.2.2 Domino software -- 2.2.3 iSeries Access for Windows -- 2.3 TCP/IP considerations -- 2.3.1 Configuring TCP/IP on your iSeries server -- 2.3.2 Naming the Domino server…”
Full text (MFA users only)
Electronic eBook -
1264
The essential retirement guide : a contrarian's perspective
Published 2015Table of Contents: “…; Examples of recent financial bubbles; Common characteristics; The everything bubble -- Carpe Diem: The numbers; Healthy life years; Trends; Personal genome testing; -- A Life Well Lived: Retirement and happiness; Final thoughts Notes -- Appendix A: Similarities between the US and Canada: Social Security programs; High-level comparison of retirement vehicles; A tax comparison -- Appendix B: Social Security in the US and Canada: Name of Social Security pension plan; Purpose of Social Security; Earnings base for pension calculation; How pension is calculated; How the plans are funded; Normal retirement age; Early retirement age; Delayed retirement; Indexation; Other government-sponsored pension plans; Taxability -- Appendix C: Retirement income targets under other scenarios -- Appendix D: About the assumptions used in the book: Thoughts on Conservatism; Assumptions used to estimate personal consumption; Assumptions used to calculate future retirement savings; Assumptions used to estimate the historical accumulation of savings; Couple contemplating long-term care insurance; Assets needed to cover long-term care (LTC).…”
Full text (MFA users only)
Electronic eBook -
1265
Culture work : folklore for the public good
Published 2022Table of Contents: “…Engaging with the Past -- "The Wisconsin Historical Society Gave Me Your Name": Doing Out-(and In-)reach on Campus, in Wisconsin, and Beyond / Troy Reeves -- Shoemaker, Frey, and Yoder and the Pennsylvania Dutch Idea / Mark L. …”
Full text (MFA users only)
Electronic eBook -
1266
The blended workbook : learning to design the schools of our future
Published 2017Full text (MFA users only)
Electronic eBook -
1267
Security configuration in a TCP/IP Sysplex environment
Published 2003Table of Contents: “….* FACILITY class profiles -- 1.5.15 Programs in the Hierarchical File System -- 1.5.16 z/OS UNIX kernel address space -- 1.5.17 z/OS UNIX security considerations for TCP/IP -- 1.5.18 IBM-supplied daemons -- 1.5.19 MVS sockets server applications -- 1.5.20 Summary -- 1.6 Access control list (ACL) support for z/OS 1.3 -- 1.6.1 File access authorization checking -- 1.6.2 New UNIXPRIV profiles with z/OS V1R3 -- 1.6.3 ACL overview -- 1.6.4 Security product and ACLs -- 1.7 Enhancements for UID/GID support in z/OS 1.4 -- 1.7.1 RACF database and AIM.…”
Full text (MFA users only)
Electronic eBook -
1268
Behavioral marketing : delivering personalized experiences at scale
Published 2015Table of Contents: “…Chapter 15: Best Friend Brands: Becoming Indispensable to Your Customer -- My Best Friend Brands -- Number Five: Spotify -- Number Four: GILT Group -- Number Three: eBags -- Number Two: Creative Market -- Number One: Delta Air Lines -- Conclusion -- Chapter 16: Riding the Wave: Career Success Powered by Behavioral Marketing -- A Dude Named Rand -- Your Personal Brand -- It's All About the Benjamins -- And Finally, Getting Yourself Promoted -- Chapter 17: Closing Thoughts and the Power of Actions -- Index -- End User License Agreement.…”
Full text (MFA users only)
Electronic eBook -
1269
That sheep may safely graze : rebuilding animal health care in war-torn Afghanistan
Published 2019Full text (MFA users only)
Electronic eBook -
1270
Content-based image classification : efficient machine learning using robust feature extraction techniques
Published 2020Full text (MFA users only)
Electronic eBook -
1271
Current Perspectives on Pedagogy for English as a Lingua Franca.
Published 2015Full text (MFA users only)
Electronic eBook -
1272
Advanced penetration testing for highly-secured environments
Published 2016Table of Contents: “…C"ing is believing -- Create a vulnerable program -- Turning ASLR on and off in Kali -- Understanding the basics of buffer overflows -- 64-bit exploitation -- Introducing vulnserver -- Fuzzing tools included in Kali -- Bruteforce Exploit Detector (BED) -- sfuzz -- Simple fuzzer -- Social Engineering Toolkit -- Fast-Track -- Reader challenge -- Summary -- Chapter 9: Post-Exploitation -- Rules of Engagement -- What is permitted? …”
Full text (MFA users only)
Electronic eBook -
1273
-
1274
American Protestantism in the age of psychology
Published 2011Full text (MFA users only)
Electronic eBook -
1275
V5 TCP/IP applications on the IBM e-server iSeries server
Published 2004Table of Contents: “…Telnet on the iSeries -- 2.1 Virtual device descriptions -- 2.2 QAUTOVRT system value -- 2.3 Telnet naming conventions for virtual devices/controllers -- 2.3.1 Unpredictable system-assigned devices -- 2.3.2 Specifically assigned Telnet session device names -- 2.4 Telnet device initialization and termination exit points -- 2.4.1 Registering an exit program -- 2.5 Mapping a Virtual device description to an IP address -- 2.6 Other Telnet enhancements -- 2.6.1 Connection feedback to the Telnet client -- 2.6.2 Number of servers to start -- 2.7 Extended administrative flexibility -- 2.8 Security -- 2.8.1 Prevent Telnet access -- 2.8.2 Control Telnet client access -- 2.8.3 Telnet exit program security -- 2.9 Telnet problem determination -- 2.10 More information -- Chapter 3. …”
Full text (MFA users only)
Electronic eBook -
1276
AutoCAD 2015 and AutoCAD LT 2015 Bible
Published 2014Table of Contents: “…Ch. 7 Drawing Curves and Points -- Drawing Circles -- Understanding the circle options -- Creating circles -- Drawing Arcs -- Understanding arc options -- Creating arcs -- Creating Ellipses and Elliptical Arcs -- Understanding ellipse options -- Understanding elliptical arc options -- Drawing ellipses and elliptical arcs -- Making Donuts -- Understanding DONUT options -- Drawing donuts -- Placing Points -- Changing the point style -- Creating points -- Summary -- ch. 8 Viewing Your Drawing -- Regenerating and Redrawing the Display -- Panning -- Using the ZOOM Command -- Understanding ZOOM options -- Using ZOOM Dynamic -- Using the SteeringWheels -- Creating Named Views -- Saving a view -- Displaying a view -- Managing named views -- Creating animated presentations from named views -- Using named views to manage a drawing -- Working with Tiled Viewports -- Configuring tiled viewports -- Using tiled viewports.…”
Full text (MFA users only)
Electronic eBook -
1277
-
1278
Quantum theory : a philosopher's overview
Published 2009Full text (MFA users only)
Electronic eBook -
1279
Participatory archives : theory and practice
Published 2019Full text (MFA users only)
Electronic eBook -
1280
Debating Disney : pedagogical perspectives on commercial cinema
Published 2016Full text (MFA users only)
Electronic eBook