Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1
-
2
Fuzzy Estimation of the Character of the Securities Market
Published 2015-04-01“…To make the right decisions regarding the purchase or sale of financial assets the definition of the nature of the securities market is required. Existing methods of evaluation of the state securities market does not fully take into account the probability distribution of the states and fuzzy-multiple description of the character of securities market. …”
Get full text
Article -
3
Shaping the Securities Industry Spatial Pattern by Institutional Arrangements in China: An Analysis Based on Headquarters Location of Securities Companies
Published 2025-01-01Subjects: “…securities industry…”
Get full text
Article -
4
Combined strategies for managing the securities portfolio structure
Published 2024-04-01Subjects: “…securities portfolio…”
Get full text
Article -
5
Heterogeneous Expectations and Speculative Behavior in Insurance-Linked Securities
Published 2015-01-01“…Within the framework of heterogeneous agent models, this paper analyzes the impact factors on the issuance of an insurance-linked security (ILS), and gives an ILS pricing formula and the conditions of existence and stability of the issue price. …”
Get full text
Article -
6
VALUATION OF DEBT SECURITIES FOR THE OBJECTIVES OF ACCOUNTING REPORTING IN THE RUSSIAN BANK
Published 2017-12-01Subjects: “…debt securities…”
Get full text
Article -
7
The evolution of the securities market and modern problems of control of its participants
Published 2022-09-01Subjects: “…securities market…”
Get full text
Article -
8
-
9
Financial security as a factor of military security
Published 2023-03-01Subjects: Get full text
Article -
10
TRANSPARENCY AND SECURITY CULTURE IN THE SECURITY SECTOR REFQRM
Published 2010-03-01Get full text
Article -
11
Analyzing and Choosing the Appropriate Model for Issuing Islamic Securities for Financing SMEs
Published 2023-06-01Get full text
Article -
12
Secure User Authentication With Information Theoretic Security Using Secret Sharing-Based Secure Computation
Published 2025-01-01Subjects: Get full text
Article -
13
Role of tax security in organization economic security system
Published 2023-07-01Subjects: “…economic security…”
Get full text
Article -
14
Human resources security as an element of economic security in region
Published 2018-06-01Subjects: “…personnel security…”
Get full text
Article -
15
Secure Pesticide Storage: Security Against Terrorist Threats
Published 2005-06-01Get full text
Article -
16
Secure Pesticide Storage: Security Against Terrorist Threats
Published 2005-06-01Get full text
Article -
17
Securing the Clicks : network security in the age of social media /
Published 2012Subjects: “…Computer networks Security measures. 8590…”
View in OPAC
Book -
18
Hospitality security : managing security in today's hotel, lodging, entertainment and tourism environment /
Published 2023Subjects: “…Hotels Security measures. 13984…”
View in OPAC
Book -
19
Security: Exploring Alternative Methods in Curbing Security Challenges in Nigeria
Published 2022-11-01Subjects: “…Security…”
Get full text
Article -
20
SECURING WEB APPLICATIONS WITH OWASP ZAP FOR COMPREHENSIVE SECURITY TESTING
Published 2024-12-01Subjects: “…zed attack proxy, web application security, vulnerability detection, security testing, threat mitigation.…”
Get full text
Article