Search Results - ((java programming) OR (names programming))

Search alternatives:

Refine Results
  1. 1261

    Quantitative financial risk management : theory and practice by Zopounidis, Constantin

    Published 2015
    Table of Contents: “…Cover -- Title Page -- Copyright -- Contents -- Preface -- About the Editors -- Section One Supervisory Risk Management -- Chapter 1 Measuring Systemic Risk: Structural Approaches -- Systemic Risk: Definitions -- From Structural Models to Systemic Risk -- Measuring Systemic Risk -- Systemic Risk and Copula Models -- Conclusions -- References -- Chapter 2 Supervisory Requirements and Expectations for Portfolio-Level Counterparty Credit Risk Measurement and Management -- Introduction -- Review of the Literature -- Supervisory Requirements for CCR -- Conceptual Issues in CCR: Risk versus Uncertainty -- Conclusions -- References -- Chapter 3 Nonperforming Loans in the Bank Production Technology -- Introduction -- Selective Literature Review -- Method -- Empirical Application -- Summary and Conclusion -- Appendix 3.1 Bank Names and Type -- References -- Section Two Risk Models and Measures -- Chapter 4 A Practical Guide to Regime Switching in Financial Economics -- A Brief Look at Markov Regime Switching in Academic Economics and Finance -- Regime Switching and Interest Rate Processes -- Regime Switching and Exchange Rates -- Regime Switching, Stock Returns, and Asset Allocation -- Single-Asset Markov Models -- Two-State Estimation -- Three-State Estimation -- Markov Models for Multiple Assets -- Practical Application of Regime Switching Models for Investment Purposes -- Intuitive Appeal of Such Models -- Implementation Challenges -- Selecting the "Right" Model Structure -- Calibrating the Selected Model Type to Suitable Data -- Drawing the Right Conclusions from the Model -- References -- Chapter 5 Output Analysis and Stress Testing for Risk Constrained Portfolios -- Introduction -- Worst-Case Analysis -- Stress Testing via Contamination -- Conclusions and New Problems -- References.…”
    Full text (MFA users only)
    Electronic eBook
  2. 1262

    Learning pandas by Heydt, Michael

    Published 2017
    Full text (MFA users only)
    Electronic eBook
  3. 1263

    IBM Lotus Domino 6 for iSeries implementation

    Published 2003
    Table of Contents: “…Prerequisites for running Domino 6 on an iSeries server -- 2.1 iSeries hardware -- 2.1.1 Capacity planning considerations -- 2.1.2 Sizing considerations -- 2.2 iSeries software -- 2.2.1 Program temporary fixes -- 2.2.2 Domino software -- 2.2.3 iSeries Access for Windows -- 2.3 TCP/IP considerations -- 2.3.1 Configuring TCP/IP on your iSeries server -- 2.3.2 Naming the Domino server…”
    Full text (MFA users only)
    Electronic eBook
  4. 1264

    The essential retirement guide : a contrarian's perspective by Vettese, Frederick, 1953-

    Published 2015
    Table of Contents: “…; Examples of recent financial bubbles; Common characteristics; The everything bubble -- Carpe Diem: The numbers; Healthy life years; Trends; Personal genome testing; -- A Life Well Lived: Retirement and happiness; Final thoughts Notes -- Appendix A: Similarities between the US and Canada: Social Security programs; High-level comparison of retirement vehicles; A tax comparison -- Appendix B: Social Security in the US and Canada: Name of Social Security pension plan; Purpose of Social Security; Earnings base for pension calculation; How pension is calculated; How the plans are funded; Normal retirement age; Early retirement age; Delayed retirement; Indexation; Other government-sponsored pension plans; Taxability -- Appendix C: Retirement income targets under other scenarios -- Appendix D: About the assumptions used in the book: Thoughts on Conservatism; Assumptions used to estimate personal consumption; Assumptions used to calculate future retirement savings; Assumptions used to estimate the historical accumulation of savings; Couple contemplating long-term care insurance; Assets needed to cover long-term care (LTC).…”
    Full text (MFA users only)
    Electronic eBook
  5. 1265

    Culture work : folklore for the public good

    Published 2022
    Table of Contents: “…Engaging with the Past -- "The Wisconsin Historical Society Gave Me Your Name": Doing Out-(and In-)reach on Campus, in Wisconsin, and Beyond / Troy Reeves -- Shoemaker, Frey, and Yoder and the Pennsylvania Dutch Idea / Mark L. …”
    Full text (MFA users only)
    Electronic eBook
  6. 1266
  7. 1267

    Security configuration in a TCP/IP Sysplex environment

    Published 2003
    Table of Contents: “….* FACILITY class profiles -- 1.5.15 Programs in the Hierarchical File System -- 1.5.16 z/OS UNIX kernel address space -- 1.5.17 z/OS UNIX security considerations for TCP/IP -- 1.5.18 IBM-supplied daemons -- 1.5.19 MVS sockets server applications -- 1.5.20 Summary -- 1.6 Access control list (ACL) support for z/OS 1.3 -- 1.6.1 File access authorization checking -- 1.6.2 New UNIXPRIV profiles with z/OS V1R3 -- 1.6.3 ACL overview -- 1.6.4 Security product and ACLs -- 1.7 Enhancements for UID/GID support in z/OS 1.4 -- 1.7.1 RACF database and AIM.…”
    Full text (MFA users only)
    Electronic eBook
  8. 1268

    Behavioral marketing : delivering personalized experiences at scale by Walters, Dave, 1968-

    Published 2015
    Table of Contents: “…Chapter 15: Best Friend Brands: Becoming Indispensable to Your Customer -- My Best Friend Brands -- Number Five: Spotify -- Number Four: GILT Group -- Number Three: eBags -- Number Two: Creative Market -- Number One: Delta Air Lines -- Conclusion -- Chapter 16: Riding the Wave: Career Success Powered by Behavioral Marketing -- A Dude Named Rand -- Your Personal Brand -- It's All About the Benjamins -- And Finally, Getting Yourself Promoted -- Chapter 17: Closing Thoughts and the Power of Actions -- Index -- End User License Agreement.…”
    Full text (MFA users only)
    Electronic eBook
  9. 1269
  10. 1270
  11. 1271
  12. 1272

    Advanced penetration testing for highly-secured environments by Allen, Lee (Information security specialist), Cardwell, Kevin

    Published 2016
    Table of Contents: “…C"ing is believing -- Create a vulnerable program -- Turning ASLR on and off in Kali -- Understanding the basics of buffer overflows -- 64-bit exploitation -- Introducing vulnserver -- Fuzzing tools included in Kali -- Bruteforce Exploit Detector (BED) -- sfuzz -- Simple fuzzer -- Social Engineering Toolkit -- Fast-Track -- Reader challenge -- Summary -- Chapter 9: Post-Exploitation -- Rules of Engagement -- What is permitted? …”
    Full text (MFA users only)
    Electronic eBook
  13. 1273
  14. 1274
  15. 1275

    V5 TCP/IP applications on the IBM e-server iSeries server

    Published 2004
    Table of Contents: “…Telnet on the iSeries -- 2.1 Virtual device descriptions -- 2.2 QAUTOVRT system value -- 2.3 Telnet naming conventions for virtual devices/controllers -- 2.3.1 Unpredictable system-assigned devices -- 2.3.2 Specifically assigned Telnet session device names -- 2.4 Telnet device initialization and termination exit points -- 2.4.1 Registering an exit program -- 2.5 Mapping a Virtual device description to an IP address -- 2.6 Other Telnet enhancements -- 2.6.1 Connection feedback to the Telnet client -- 2.6.2 Number of servers to start -- 2.7 Extended administrative flexibility -- 2.8 Security -- 2.8.1 Prevent Telnet access -- 2.8.2 Control Telnet client access -- 2.8.3 Telnet exit program security -- 2.9 Telnet problem determination -- 2.10 More information -- Chapter 3. …”
    Full text (MFA users only)
    Electronic eBook
  16. 1276

    AutoCAD 2015 and AutoCAD LT 2015 Bible by Finkelstein, Ellen, Ambrosius, Lee

    Published 2014
    Table of Contents: “…Ch. 7 Drawing Curves and Points -- Drawing Circles -- Understanding the circle options -- Creating circles -- Drawing Arcs -- Understanding arc options -- Creating arcs -- Creating Ellipses and Elliptical Arcs -- Understanding ellipse options -- Understanding elliptical arc options -- Drawing ellipses and elliptical arcs -- Making Donuts -- Understanding DONUT options -- Drawing donuts -- Placing Points -- Changing the point style -- Creating points -- Summary -- ch. 8 Viewing Your Drawing -- Regenerating and Redrawing the Display -- Panning -- Using the ZOOM Command -- Understanding ZOOM options -- Using ZOOM Dynamic -- Using the SteeringWheels -- Creating Named Views -- Saving a view -- Displaying a view -- Managing named views -- Creating animated presentations from named views -- Using named views to manage a drawing -- Working with Tiled Viewports -- Configuring tiled viewports -- Using tiled viewports.…”
    Full text (MFA users only)
    Electronic eBook
  17. 1277

    Filemaker Pro 7 bible by Schwartz, Steven A., 1951-

    Published 2004
    Full text (MFA users only)
    Electronic eBook
  18. 1278

    Quantum theory : a philosopher's overview by Cannavo, S. (Salvator)

    Published 2009
    Full text (MFA users only)
    Electronic eBook
  19. 1279

    Participatory archives : theory and practice

    Published 2019
    Full text (MFA users only)
    Electronic eBook
  20. 1280