Angebote zu "Financial" (70 Treffer)

Kategorien

Shops

Financial Business Intelligence
34,99 € *
ggf. zzgl. Versand

Financial Business Intelligence ab 34.99 € als pdf eBook: Trends Technology Software Selection and Implementation. Aus dem Bereich: eBooks, Wirtschaft,

Anbieter: hugendubel
Stand: 03.12.2020
Zum Angebot
The Fear Index , Hörbuch, Digital, 1, 588min
9,95 € *
ggf. zzgl. Versand

His name is carefully guarded from the general public but within the secretive inner circles of the ultra-rich Dr Alex Hoffmann is a legend – a visionary scientist whose computer software turns everything it touches into gold. Together with his partner, an investment banker, Hoffmann has developed a revolutionary form of artificial intelligence that tracks human emotions, enabling it to predict movements in the financial markets with uncanny accuracy. His hedge fund, based in Geneva, makes billions. But then in the early hours of the morning, while he lies asleep with his wife, a sinister intruder breaches the elaborate security of their lakeside house. So begins a waking nightmare of paranoia and violence as Hoffmann attempts, with increasing desperation, to discover who is trying to destroy him. His quest forces him to confront the deepest questions of what it is to be human. By the time night falls over Geneva, the financial markets will be in turmoil and Hoffmann's world – and ours – transformed forever. 1. Language: English. Narrator: Christian Rodska. Audio sample: http://samples.audible.de/bk/rhuk/001130/bk_rhuk_001130_sample.mp3. Digital audiobook in aax.

Anbieter: Audible
Stand: 03.12.2020
Zum Angebot
The Zima Confession , Hörbuch, Digital, 1, 631min
9,95 € *
ggf. zzgl. Versand

Can one man bring down the world's financial systems?Glasgow 1977 - A young Trotskyite, Richard Slater, comes up with the idea that if he hid in deep cover until he was in a position of responsibility, he could unleash a devastating act of sabotage capable of starting a revolution. Party activists develop the plan - code name Zima - and lie in wait....London 2013 - Richard is in London, working for a financial software company.  He has held onto the Zima plan all this time and has been signalling he can activate it. Is anyone listening? Have others stayed true to the ideology?The “suicide” of Richard’s work colleague shows British and Russian Intelligence have been listening and waiting, too. Tension mounts as more players reveal themselves and the battle for power and control moves to Moscow. As the coil of agents, misinformation, and mind control experiments connected to Zima unravel - where do allegiances lie? Can Richard trust anyone - even himself?Can MI9 stop a catastrophic act of sabotage on the banking system?  Will the revolution succeed? Can Richard uncover the truth and save himself? 1. Language: English. Narrator: Paul Hilliar. Audio sample: http://samples.audible.de/bk/acx0/199169/bk_acx0_199169_sample.mp3. Digital audiobook in aax.

Anbieter: Audible
Stand: 03.12.2020
Zum Angebot
Financial Modeling
96,99 € *
ggf. zzgl. Versand

A substantially revised edition of a bestselling text combining explanation and implementation using Excel; for classroom use or as a reference for finance practitioners. Financial Modeling is now the standard text for explaining the implementation of financial models in Excel. This long-awaited fourth edition maintains the "cookbook” features and Excel dependence that have made the previous editions so popular. As in previous editions, basic and advanced models in the areas of corporate finance, portfolio management, options, and bonds are explained with detailed Excel spreadsheets. Sections on technical aspects of Excel and on the use of Visual Basic for Applications (VBA) round out the book to make Financial Modeling a complete guide for the financial modeler. The new edition of Financial Modeling includes a number of innovations. A new section explains the principles of Monte Carlo methods and their application to portfolio management and exotic option valuation. A new chapter discusses term structure modeling, with special emphasis on the Nelson-Siegel model. The discussion of corporate valuation using pro forma models has been rounded out with the introduction of a new, simple model for corporate valuation based on accounting data and a minimal number of valuation parameters. New print copies of this book include a card affixed to the inside back cover with a unique access code. Access codes are required to download Excel worksheets and solutions to end-of-chapter exercises. If you have a used copy of this book, you may purchase a digitally-delivered access code separately via the Supplemental Material link on this page. If you purchased an e-book, you may obtain a unique access code by emailing digitalproducts-cs@mit.edu or calling 617-253-2889 or 800-207-8354 (toll-free in the U.S. and Canada). Praise for earlier editions "Financial Modeling belongs on the desk of every finance professional. Its no-nonsense, hands-on approach makes it an indispensable tool.” —Hal R. Varian, Dean, School of Information Management and Systems, University of California, Berkeley "Financial Modeling is highly recommended to readers who are interested in an introduction to basic, traditional approaches to financial modeling and analysis, as well as to those who want to learn more about applying spreadsheet software to financial analysis." —Edward Weiss, Journal of Computational Intelligence in Finance "Benninga has a clear writing style and uses numerous illustrations, which make this book one of the best texts on using Excel for finance that I've seen.” —Ed McCarthy, Ticker Magazine

Anbieter: buecher
Stand: 03.12.2020
Zum Angebot
Financial Modeling
96,99 € *
ggf. zzgl. Versand

A substantially revised edition of a bestselling text combining explanation and implementation using Excel; for classroom use or as a reference for finance practitioners. Financial Modeling is now the standard text for explaining the implementation of financial models in Excel. This long-awaited fourth edition maintains the "cookbook” features and Excel dependence that have made the previous editions so popular. As in previous editions, basic and advanced models in the areas of corporate finance, portfolio management, options, and bonds are explained with detailed Excel spreadsheets. Sections on technical aspects of Excel and on the use of Visual Basic for Applications (VBA) round out the book to make Financial Modeling a complete guide for the financial modeler. The new edition of Financial Modeling includes a number of innovations. A new section explains the principles of Monte Carlo methods and their application to portfolio management and exotic option valuation. A new chapter discusses term structure modeling, with special emphasis on the Nelson-Siegel model. The discussion of corporate valuation using pro forma models has been rounded out with the introduction of a new, simple model for corporate valuation based on accounting data and a minimal number of valuation parameters. New print copies of this book include a card affixed to the inside back cover with a unique access code. Access codes are required to download Excel worksheets and solutions to end-of-chapter exercises. If you have a used copy of this book, you may purchase a digitally-delivered access code separately via the Supplemental Material link on this page. If you purchased an e-book, you may obtain a unique access code by emailing digitalproducts-cs@mit.edu or calling 617-253-2889 or 800-207-8354 (toll-free in the U.S. and Canada). Praise for earlier editions "Financial Modeling belongs on the desk of every finance professional. Its no-nonsense, hands-on approach makes it an indispensable tool.” —Hal R. Varian, Dean, School of Information Management and Systems, University of California, Berkeley "Financial Modeling is highly recommended to readers who are interested in an introduction to basic, traditional approaches to financial modeling and analysis, as well as to those who want to learn more about applying spreadsheet software to financial analysis." —Edward Weiss, Journal of Computational Intelligence in Finance "Benninga has a clear writing style and uses numerous illustrations, which make this book one of the best texts on using Excel for finance that I've seen.” —Ed McCarthy, Ticker Magazine

Anbieter: buecher
Stand: 03.12.2020
Zum Angebot
Personal Cybersecurity
25,99 € *
ggf. zzgl. Versand

Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat.Personal Cybersecurity addresses the needs of individual users at work and at home. This book covers personal cybersecurity for all modes of personal computing whether on consumer-acquired or company-issued devices: desktop PCs, laptops, mobile devices, smart TVs, WiFi and Bluetooth peripherals, and IoT objects embedded with network-connected sensors. In all these modes, the frequency, intensity, and sophistication of cyberattacks that put individual users at risk are increasing in step with accelerating mutation rates of malware and cybercriminal delivery systems.Traditional anti-virus software and personal firewalls no longer suffice to guarantee personal security. Users who neglect to learn and adopt the new ways of protecting themselves in their work and private environments put themselves, their associates, and their companies at risk of inconvenience, violation, reputational damage, data corruption, data theft, system degradation, system destruction, financial harm, and criminal disaster. This book shows what actions to take to limit the harm and recover from the damage.Instead of laying down a code of "thou shalt not" rules that admit of too many exceptions and contingencies to be of much practical use, cloud expert Marvin Waschke equips you with the battlefield intelligence, strategic understanding, survival training, and proven tools you need to intelligently assess the security threats in your environment and most effectively secure yourself from attacks. Through instructive examples and scenarios, the author shows you how to adapt and apply best practices to your own particular circumstances, how to automate and routinize your personal cybersecurity, how to recognize security breaches and act swiftly to seal them, and how to recover losses and restore functionality when attacks succeed.What You'll LearnDiscover how computer security works and what it can protect us fromSee how a typical hacker attack works Evaluate computer security threats to the individual user and corporate systemsIdentify the critical vulnerabilities of a computer connected to the InternetManage your computer to reduce vulnerabilities to yourself and your employerDiscover how the adoption of newer forms of biometric authentication affects youStop your router and other online devices from being co-opted into disruptive denial of service attacks Who This Book Is For Proficient and technically knowledgeable computer users who are anxious about cybercrime and want to understand the technology behind both attack and defense but do not want to go so far as to become security experts. Some of this audience will be purely home users, but many will be executives, technical managers, developers, and members of IT departments who need to adopt personal practices for their own safety and the protection of corporate systems. Many will want to impart good cybersecurity practices to their colleagues. IT departments tasked with indoctrinating their users with good safety practices may use the book as training material.

Anbieter: buecher
Stand: 03.12.2020
Zum Angebot
Personal Cybersecurity
25,99 € *
ggf. zzgl. Versand

Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat.Personal Cybersecurity addresses the needs of individual users at work and at home. This book covers personal cybersecurity for all modes of personal computing whether on consumer-acquired or company-issued devices: desktop PCs, laptops, mobile devices, smart TVs, WiFi and Bluetooth peripherals, and IoT objects embedded with network-connected sensors. In all these modes, the frequency, intensity, and sophistication of cyberattacks that put individual users at risk are increasing in step with accelerating mutation rates of malware and cybercriminal delivery systems.Traditional anti-virus software and personal firewalls no longer suffice to guarantee personal security. Users who neglect to learn and adopt the new ways of protecting themselves in their work and private environments put themselves, their associates, and their companies at risk of inconvenience, violation, reputational damage, data corruption, data theft, system degradation, system destruction, financial harm, and criminal disaster. This book shows what actions to take to limit the harm and recover from the damage.Instead of laying down a code of "thou shalt not" rules that admit of too many exceptions and contingencies to be of much practical use, cloud expert Marvin Waschke equips you with the battlefield intelligence, strategic understanding, survival training, and proven tools you need to intelligently assess the security threats in your environment and most effectively secure yourself from attacks. Through instructive examples and scenarios, the author shows you how to adapt and apply best practices to your own particular circumstances, how to automate and routinize your personal cybersecurity, how to recognize security breaches and act swiftly to seal them, and how to recover losses and restore functionality when attacks succeed.What You'll LearnDiscover how computer security works and what it can protect us fromSee how a typical hacker attack works Evaluate computer security threats to the individual user and corporate systemsIdentify the critical vulnerabilities of a computer connected to the InternetManage your computer to reduce vulnerabilities to yourself and your employerDiscover how the adoption of newer forms of biometric authentication affects youStop your router and other online devices from being co-opted into disruptive denial of service attacks Who This Book Is For Proficient and technically knowledgeable computer users who are anxious about cybercrime and want to understand the technology behind both attack and defense but do not want to go so far as to become security experts. Some of this audience will be purely home users, but many will be executives, technical managers, developers, and members of IT departments who need to adopt personal practices for their own safety and the protection of corporate systems. Many will want to impart good cybersecurity practices to their colleagues. IT departments tasked with indoctrinating their users with good safety practices may use the book as training material.

Anbieter: buecher
Stand: 03.12.2020
Zum Angebot
Financial Business Intelligence
34,99 € *
ggf. zzgl. Versand

Financial Business Intelligence ab 34.99 EURO Trends Technology Software Selection and Implementation

Anbieter: ebook.de
Stand: 03.12.2020
Zum Angebot
Token como Direitos de Valor & Token Offerings ...
44,90 € *
ggf. zzgl. Versand

Este livro foi traduzido do alemão para o português por meio de inteligência artificial (tradução automática).This book was translated from German into Portuguese by means of artificial intelligence (machine translation).This academic paper deals with both civil (securities) law and regulatory (securities) law aspects. Thus, a summary of the property law is provided, which deals with the classification of tokens under Liechtenstein law.Furthermore, dematerialized securities, which have been known to the Liechtenstein legal system for almost 100 years, will be dis-cussed. The civil and corporate law focus is on Liechtenstein, while the Swiss corporate law and the general civil law of Austrian law are also taken into account. The supervisory part of the work is clearly in the focus of Union law, but also takes into account national specialties of Liechtenstein, Austria and Germany in addition to European legal acts.Thus, tokens and token-based business models are also examined in the light of European legal acts such as MiFIR, MiFID II, CRR, CRD IV, CSDR, EMIR, AIFMD, UCITSD, E-Money Directive II, PSD II, MAD/MAR, Prospectus Regulation, 5th AML Directive and other regulations, directives, as well as implementing regulations and delegated regulations. A special focus is placed on crypto exchanges and decentralized trading places (DEX). In addition, a focus will be placed on consumer law in terms of tokens and distance selling contracts, taking into account the Consumer Rights Directives. In this context, tokens as data or software and thus as digital content and consequently merchandise are also dealt with in more detail and the parallels to tokens as tokens with intrinsic value or virtual currencies in contrast to fiat money are shown. Furthermore, the author aims at explaining deposit business, e-money transactions and financial instruments as communicating vessels in contrast to virtual currencies. Although this is primarily a legal work, technical aspects of Distributed Ledger Technologies, such as the blockchain, smart contracts, agoric computing, self-sovereign identity, etc. - as far as this is necessary for the legal assessment - are also explained in more detail.The present discussion is to be understood as scientific work with practical relevance for advice in connection with blockchain based business models.

Anbieter: Dodax
Stand: 03.12.2020
Zum Angebot