Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Series Title
      Series Title
      Clear All
      Series Title
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Content Type
    • Item Type
    • Is Full-Text Available
    • Subject
    • Publisher
    • Source
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
2,708,106 result(s) for "Securities analysis"
Sort by:
On Combining Static, Dynamic and Interactive Analysis Security Testing Tools to Improve OWASP Top Ten Security Vulnerability Detection in Web Applications
The design of the techniques and algorithms used by the static, dynamic and interactive security testing tools differ. Therefore, each tool detects to a greater or lesser extent each type of vulnerability for which they are designed for. In addition, their different designs mean that they have different percentages of false positives. In order to take advantage of the possible synergies that different analysis tools types may have, this paper combines several static, dynamic and interactive analysis security testing tools—static white box security analysis (SAST), dynamic black box security analysis (DAST) and interactive white box security analysis (IAST), respectively. The aim is to investigate how to improve the effectiveness of security vulnerability detection while reducing the number of false positives. Specifically, two static, two dynamic and two interactive security analysis tools will be combined to study their behavior using a specific benchmark for OWASP Top Ten security vulnerabilities and taking into account various scenarios of different criticality in terms of the applications analyzed. Finally, this study analyzes and discuss the values of the selected metrics applied to the results for each n-tools combination.
Empowering IoV Security: A Novel Secure Cryptographic Algorithm (OpCKEE) for Network Protection in Connected Vehicles
According to Fortune Business Insights, the market share of the Internet of Vehicless is expected to grow from USD 95.62 billion in 2021 to USD 369.61 billion in 2028, at a compound annual growth rate of 21.4%. However, the Internet of Vehicles system still faces several challenges, including regulation, scalability, data management, connectivity, interoperability, privacy, and security. To improve communication security within the Internet of Vehicle system, we have implemented a secure cryptographic algorithm called Optimized Certificateless Key-Encapsulated Encryption, resulting from a fusion of the key-insulated cryptosystem and the cryptographic key-encapsulated mechanism. The formal security analysis of our algorithm using the AVISPA version 1.1 software shows us that our protocol is safe. Informal analysis shows that our algorithm ensures authenticity, confidentiality, integrity, and non-repudiation and resists several other attacks. Our algorithm’s computational and communicational costs are slightly better than those at which it inherits the functionalities.
Risk Takers
Risk Takers: Uses and Abuses of Financial Derivatives goes to the heart of the arcane and largely misunderstood world of derivative finance and makes it accessible to everyone—even novice readers. Marthinsen takes us behind the scenes, into the back alleyways of corporate finance and derivative trading, to provide a bird’s-eye view of the most shocking financial disasters of the past quarter century. The book draws on real-life stories to explain how financial derivatives can be used to create or to destroy value. In an approachable, non-technical manner, Marthinsen brings these financial derivatives situations to life, fully exploring the context of each event, evaluating their outcomes, and bridging the gap between theory and practice.
Candlestick Charting
Investors and traders seek methods to identify reversal and continuation to better time their trades.This applies for virtually everyone, whether employing a swing trading strategy, engaging in options trading, or timing entry and exit to spot bull and bear reversals.
Stock Market Math
Stock Market Math shows you how to calculate return, leverage, risk, fundamental and technical analysis problems, price, volume, momentum and moving averages, including over 125 formulas and Excel programs for each, enabling readers to simply plug formulas into a spread sheet. This book is the definitive reference for all investors and traders. It introduces the many formulas and legends every investor needs, and explains their application through examples and narrative discussions providing the Excel spreadsheet programs for each. Readers can find instant answers to every calculation required to pick the best trades for your portfolio, quantify risk, evaluate leverage, and utilize the best technical indicators. Michael C. Thomsett is a market expert, author, speaker and coach. His many books include Mathematics of Options, Real Estate Investor's Pocket Calculator, and A Technical Approach to Trend Analysis. In Stock Market Math, the author advances the science of risk management and stock evaluation with more than 50 endnotes, 50 figures and tables, and a practical but thoughtful exploration of how investors and traders may best quantify their portfolio decisions.