Stochastic dominance and applications to finance, risk and economics.
By: Contributor(s): Material type:
TextLanguage: English Publication details: Boca Raton CRC Press 2010Description: xii,443p cmSubject(s): DDC classification: - X:8D, Q0
Textual
| Cover image | Item type | Current library | Home library | Collection | Shelving location | Call number | Materials specified | Vol info | URL | Copy number | Status | Notes | Date due | Barcode | Item holds | Item hold queue priority | Course reserves | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Textual
|
South Campus Library | South Campus Library | X:8D Q0 (Browse shelf(Opens below)) | Available | SC1464696 |
There are no comments on this title.
Log in to your account to post a comment.
-
251
DNS security management
by Dooley Michael -
252
Dynamic Networks and Cyber-Security
by Adams Niall M & Heard Nicholas A -
253
E-Commerce security: Advice from experts
by Khosrow-Pour Mehdi -
254
Elementary information security
by Smith Richard E -
255
Elementary information security
by Smith Richard E -
256
Elementary information security
by Smith Richard E -
257
Elementary information security
by Smith Richard E -
258
Elements of computer security
by Salomon David -
259
Elements of computer security
by Salomon David -
260
Embedded cryptographic hardware:design and security
by Nedjah Nadia Ed. -
261
Embedded Java security
by Debbabi Mourad -
262
Emerging security algorithms and techniques
by Ahmad Khaleel Ed. -
263
Energy-efficient wireless sensor networks
by Sharma Vidushi Ed. -
264
Engineering information security : The application of systems engineering concepts to achieve information assurance
by Jacobs Stuart -
265
Engineering Information Security
by Jacobs, Stuart -
266
Enhancing cryptographic pimitives with techniques from error correcting codes
by Preneel Bart Ed. -
267
Enterprise information systems assurance and system security: managerial and technical issues
by Warkentin Merrill -
268
Enterprise security: IT security solutions; Concepts, practical experiences, technologies
by Fumy Walter Ed. -
269
Evaluating indirect and direct classification techniques for network intrusion detection
by Ibrahim Nawal H -
270
Financial cryptography and data security
by Sion Radu Ed. -
271
Firewall design and analysis
by Liu Alex X -
272
Firewalls and internet seurity: repelling the wily hacker
by Cheswick William R -
273
Firewalls and internet seurity: repelling the wily hacker
by Cheswick William R -
274
Framework for network intelligence and security
by El-Semary Aly Mohamed -
275
Fundamentals of computer security
by Pieprzyk Josef Ed. -
276
Fundamentals of computer security
by Pieprzyk Josef -
277
Fundamentals of information systems security
by Kim David -
278
Fundamentals of network security
by Maiwald Eric -
279
Fundamentals of network security
by Maiwald Eric -
280
Fundamentals of secure system modelling
by Matulevicius Raimundas -
281
Fuzzing for software security testing and quality assurance
by Takanen Ari -
282
Grid computing security
by Chakrabarti Anirban -
283
Guide to computer network security
by Kizza Joseph Migga -
284
Guide to computer network security
by Kizza Joseph Migga -
285
Guide to Computer Network Security
by Joseph Migga Kizza -
286
Guide to Computer Network Security
by Joseph Migga Kizza -
287
Guide to elliptic curve cryptography
by Hankerson Darrel -
288
Guide to elliptic curve cryptography
by Hankerson Darrel -
289
Guide to wireless network security
by Vacca John R -
290
Halting the hacker
by Pipkin Donald L -
291
Hand book of eId security : concepts, practical experiences, technologies
by Fumy W Ed.; Paeschke M Ed. -
292
Handbook of Computer Networks and Cyber Security
by Brij B. Gupta, Gregorio Martinez Perez, Dharma P. Agrawal, Deepak Gupta -
293
Handbook of database security: applications and trends
by Gertz Michael -
294
Handbook of electronic security and digital forensics
by Jahankhani Hamid Ed. -
295
Handbook of Electronic Security and Digital Forensics
by Jahankhani Hamid Et Al -
296
Handbook of Security and Networks
by Xiao Yang Et Al -
297
Handbook of security, cryptography and digital signature
by Bhaskar S M -
298
Handbook of wireless local area networks:applications,technology,security and standards
by Ilyas Mohammad Ed. -
299
Handbook on securing cyber-physical critical infrastructure : foundations and challenges
by Das Sajal K; Kant Krishna; Zhang Nan -
300
Hardware-based computer security techniques to defeat hackers from biometrics to quantum cryptography
by Dube Roger
Stochastic dominance and applications to finance, risk and economics.
APA
Sriboonchitta Songsak, Dhompongsa Sompong & Wong Wing-keung. (2010). Stochastic dominance and applications to finance, risk and economics. Boca Raton: CRC Press.
Chicago
Sriboonchitta Songsak, Dhompongsa Sompong and Wong Wing-keung. 2010. Stochastic dominance and applications to finance, risk and economics. Boca Raton: CRC Press.
Harvard
Sriboonchitta Songsak, Dhompongsa Sompong and Wong Wing-keung. (2010). Stochastic dominance and applications to finance, risk and economics. Boca Raton: CRC Press.
MLA
Sriboonchitta Songsak, Dhompongsa Sompong and Wong Wing-keung. Stochastic dominance and applications to finance, risk and economics. Boca Raton: CRC Press. 2010.
