Showing 1 - 20 results of 5,943 for search '"Securities ', query time: 0.06s Refine Results
  1. 1
  2. 2

    Fuzzy Estimation of the Character of the Securities Market by G. Y. Ratushnyak, A. G. Sukhanova

    Published 2015-04-01
    “…To make the right decisions regarding the purchase or sale of financial assets the definition of the nature of the securities market is required. Existing methods of evaluation of the state securities market does not fully take into account the probability distribution of the states and fuzzy-multiple description of the character of securities market. …”
    Get full text
    Article
  3. 3
  4. 4

    Combined strategies for managing the securities portfolio structure by M. A. Sevodin

    Published 2024-04-01
    Subjects: “…securities portfolio…”
    Get full text
    Article
  5. 5

    Heterogeneous Expectations and Speculative Behavior in Insurance-Linked Securities by Min Zheng

    Published 2015-01-01
    “…Within the framework of heterogeneous agent models, this paper analyzes the impact factors on the issuance of an insurance-linked security (ILS), and gives an ILS pricing formula and the conditions of existence and stability of the issue price. …”
    Get full text
    Article
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17

    Securing the Clicks : network security in the age of social media / by Bahadur, Gary

    Published 2012
    Subjects: “…Computer networks Security measures. 8590…”
    View in OPAC
    Book
  18. 18

    Hospitality security : managing security in today's hotel, lodging, entertainment and tourism environment / by Clifton, Darrell

    Published 2023
    Subjects: “…Hotels Security measures. 13984…”
    View in OPAC
    Book
  19. 19
  20. 20

    SECURING WEB APPLICATIONS WITH OWASP ZAP FOR COMPREHENSIVE SECURITY TESTING by S. P. Maniraj, Chitra Sabapathy Ranganathan, Satheeshkumar Sekar

    Published 2024-12-01
    Subjects: “…zed attack proxy, web application security, vulnerability detection, security testing, threat mitigation.…”
    Get full text
    Article