Skip to main content

Books in Social sciences and humanities

  • Financial Planning Using Excel

    Forecasting, Planning and Budgeting Techniques
    • 2nd Edition
    • Sue Nugus
    • English
    This book covers all aspects of budget preparation, from designing and creating a budgetary control system, consolidating data and working with spreadsheets. Now fully updated to include the latest version of Excel, Excel 2007 and for easy budgeting. The book shows how things are done in Excel 2003 and Excel 2007 to ease transition from the previous version to the new version. Now in full colour throughout to aid quick understanding through numerous color screen shots.For those who use Excel on a daily basis in budget planning, this book is a must. It contains a wealth of practical examples, tips, new techniques all designed to help quickly exploit and master Excel to its full advantage and therefore use spreadsheets for more effective management accounting in your firm.
  • Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit

    • 1st Edition
    • Jesse Varsalone
    • English
    This book provides digital forensic investigators, security professionals, and law enforcement with all of the information, tools, and utilities required to conduct forensic investigations of computers running any variant of the Macintosh OS X operating system, as well as the almost ubiquitous iPod and iPhone. Digital forensic investigators and security professionals subsequently can use data gathered from these devices to aid in the prosecution of criminal cases, litigate civil cases, audit adherence to federal regulatory compliance issues, and identify breech of corporate and government usage policies on networks. MAC Disks, Partitioning, and HFS+ File System Manage multiple partitions on a disk, and understand how the operating system stores data.FileVault and Time Machine Decrypt locked FileVault files and restore files backed up with Leopard's Time Machine.Recovering Browser History Uncover traces of Web-surfing activity in Safari with Web cache and .plist filesRecovering Email Artifacts, iChat, and Other Chat Logs Expose communications data in iChat, Address Book, Apple's Mail, MobileMe, and Web-based email.Locating and Recovering Photos Use iPhoto, Spotlight, and shadow files to find artifacts pof photos (e.g., thumbnails) when the originals no longer exist.Finding and Recovering QuickTime Movies and Other Video Understand video file formats--created with iSight, iMovie, or another application--and how to find them.PDF, Word, and Other Document Recovery Recover text documents and metadata with Microsoft Office, OpenOffice, Entourage, Adobe PDF, or other formats.Forensic Acquisition and Analysis of an iPod Documentseizure of an iPod model and analyze the iPod image file and artifacts on a Mac.Forensic Acquisition and Analysis of an iPhone Acquire a physical image of an iPhone or iPod Touch and safely analyze without jailbreaking.
  • Business Modeling

    A Practical Guide to Realizing Business Value
    • 1st Edition
    • David M. Bridgeland + 1 more
    • English
    As business modeling becomes mainstream, every year more and more companies and government agencies are creating models of their businesses. But creating good business models is not a simple endeavor. Business modeling requires new skills. Written by two business modeling experts, this book shows you how to make your business modeling efforts successful. It provides in-depth coverage of each of the four distinct business modeling disciplines, helping you master them all and understand how to effectively combine them. It also details best practices for working with subject matter experts. And it shows how to develop models, and then analyze, simulate, and deploy them. This is essential, authoritative information that will put you miles ahead of everyone who continues to approach business modeling haphazardly.
  • Handbook of Management Accounting Research

    • 1st Edition
    • Volume 3
    • Anthony G. Hopwood + 2 more
    • English
    Volume one of Handbook of Management Accounting Research sets the context for all three volumes in the series. Volume two provides insights into research on different management accounting practices. This third and final volume features contributions from some of the most influential researchers in various areas of management accounting research, consolidates the content of volumes one and two, and concludes with examples of management accounting research from around the world.
  • Rating Based Modeling of Credit Risk

    Theory and Application of Migration Matrices
    • 1st Edition
    • Stefan Trueck + 1 more
    • English
    In the last decade rating-based models have become very popular in credit risk management. These systems use the rating of a company as the decisive variable to evaluate the default risk of a bond or loan. The popularity is due to the straightforwardness of the approach, and to the upcoming new capital accord (Basel II), which allows banks to base their capital requirements on internal as well as external rating systems. Because of this, sophisticated credit risk models are being developed or demanded by banks to assess the risk of their credit portfolio better by recognizing the different underlying sources of risk. As a consequence, not only default probabilities for certain rating categories but also the probabilities of moving from one rating state to another are important issues in such models for risk management and pricing. It is widely accepted that rating migrations and default probabilities show significant variations through time due to macroeconomics conditions or the business cycle. These changes in migration behavior may have a substantial impact on the value-at-risk (VAR) of a credit portfolio or the prices of credit derivatives such as collateralized debt obligations (D+CDOs). In Rating Based Modeling of Credit Risk the authors develop a much more sophisticated analysis of migration behavior. Their contribution of more sophisticated techniques to measure and forecast changes in migration behavior as well as determining adequate estimators for transition matrices is a major contribution to rating based credit modeling.
  • Disappearing Cryptography

    Information Hiding: Steganography and Watermarking
    • 3rd Edition
    • Peter Wayner
    • English
    Cryptology is the practice of hiding digital information by means of various obfuscatory and steganographic techniques. The application of said techniques facilitates message confidentiality and sender/receiver identity authentication, and helps to ensure the integrity and security of computer passwords, ATM card information, digital signatures, DVD and HDDVD content, and electronic commerce. Cryptography is also central to digital rights management (DRM), a group of techniques for technologically controlling the use of copyrighted material that is being widely implemented and deployed at the behest of corporations that own and create revenue from the hundreds of thousands of mini-transactions that take place daily on programs like iTunes. This new edition of our best-selling book on cryptography and information hiding delineates a number of different methods to hide information in all types of digital media files. These methods include encryption, compression, data embedding and watermarking, data mimicry, and scrambling. During the last 5 years, the continued advancement and exponential increase of computer processing power have enhanced the efficacy and scope of electronic espionage and content appropriation. Therefore, this edition has amended and expanded outdated sections in accordance with new dangers, and includes 5 completely new chapters that introduce newer more sophisticated and refined cryptographic algorithms and techniques (such as fingerprinting, synchronization, and quantization) capable of withstanding the evolved forms of attack. Each chapter is divided into sections, first providing an introduction and high-level summary for those who wish to understand the concepts without wading through technical explanations, and then presenting concrete examples and greater detail for those who want to write their own programs. This combination of practicality and theory allows programmers and system designers to not only implement tried and true encryption procedures, but also consider probable future developments in their designs, thus fulfilling the need for preemptive caution that is becoming ever more explicit as the transference of digital media escalates.
  • Virtualization for Security

    Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting
    • 1st Edition
    • John Hoopes
    • English
    One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for intrusion and malware detection, prevention, recovery, and analysis. Taking a practical approach in a growing market underserved by books, this hands-on title is the first to combine in one place the most important and sought-after uses of virtualization for enhanced security, including sandboxing, disaster recovery and high availability, forensic analysis, and honeypotting.Already gaining buzz and traction in actual usage at an impressive rate, Gartner research indicates that virtualization will be the most significant trend in IT infrastructure and operations over the next four years. A recent report by IT research firm IDC predicts the virtualization services market will grow from $5.5 billion in 2006 to $11.7 billion in 2011. With this growth in adoption, becoming increasingly common even for small and midsize businesses, security is becoming a much more serious concern, both in terms of how to secure virtualization and how virtualization can serve critical security objectives. Titles exist and are on the way to fill the need for securing virtualization, but security professionals do not yet have a book outlining the many security applications of virtualization that will become increasingly important in their job requirements. This book is the first to fill that need, covering tactics such as isolating a virtual environment on the desktop for application testing, creating virtualized storage solutions for immediate disaster recovery and high availability across a network, migrating physical systems to virtual systems for analysis, and creating complete virtual systems to entice hackers and expose potential threats to actual production systems.About the TechnologiesA sandbox is an isolated environment created to run and test applications that might be a security risk. Recovering a compromised system is as easy as restarting the virtual machine to revert to the point before failure. Employing virtualization on actual production systems, rather than just test environments, yields similar benefits for disaster recovery and high availability. While traditional disaster recovery methods require time-consuming reinstallation of the operating system and applications before restoring data, backing up to a virtual machine makes the recovery process much easier, faster, and efficient. The virtual machine can be restored to same physical machine or an entirely different machine if the original machine has experienced irreparable hardware failure. Decreased downtime translates into higher availability of the system and increased productivity in the enterprise.Virtualiz... has been used for years in the field of forensic analysis, but new tools, techniques, and automation capabilities are making it an increasingly important tool. By means of virtualization, an investigator can create an exact working copy of a physical computer on another machine, including hidden or encrypted partitions, without altering any data, allowing complete access for analysis. The investigator can also take a live ?snapshot? to review or freeze the target computer at any point in time, before an attacker has a chance to cover his tracks or inflict further damage.A honeypot is a system that looks and acts like a production environment but is actually a monitored trap, deployed in a network with enough interesting data to attract hackers, but created to log their activity and keep them from causing damage to the actual production environment. A honeypot exposes new threats, tools, and techniques used by hackers before they can attack the real systems, which security managers patch based on the information gathered. Before virtualization became mainstream, setting up a machine or a whole network (a honeynet) for research purposes only was prohibitive in both cost and time management. Virtualization makes this technique more viable as a realistic approach for companies large and small.
  • Securing Intellectual Property

    Protecting Trade Secrets and Other Information Assets
    • 1st Edition
    • Information Information Security
    • English
    Most employeers are astounded at how easily and quickly their proprietary information can get out of their control. In a large number of cases, theft of trade secrets often involves employees leaving a company to start their own business or work for a direct competitor.Nearly all books that address the topic of trade secrets have the “spy vs. spy” perspective. The author approaches the topic from a practical business perspective and not simply creating “paranoia” for paranoia’s sake. The material for this book comes from the author’s extensive work experience as a computer forensics consultant and manager on numerous theft of trade secrets cases.
  • Principles of Financial Engineering

    • 2nd Edition
    • Salih N. Neftci
    • English
    Principles of Financial Engineering, Second Edition, is a highly acclaimed text on the fast-paced and complex subject of financial engineering. This updated edition describes the "engineering" elements of financial engineering instead of the mathematics underlying it. It shows you how to use financial tools to accomplish a goal rather than describing the tools themselves. It lays emphasis on the engineering aspects of derivatives (how to create them) rather than their pricing (how they act) in relation to other instruments, the financial markets, and financial market practices. This volume explains ways to create financial tools and how the tools work together to achieve specific goals. Applications are illustrated using real-world examples. It presents three new chapters on financial engineering in topics ranging from commodity markets to financial engineering applications in hedge fund strategies, correlation swaps, structural models of default, capital structure arbitrage, contingent convertibles, and how to incorporate counterparty risk into derivatives pricing. Poised midway between intuition, actual events, and financial mathematics, this book can be used to solve problems in risk management, taxation, regulation, and above all, pricing. This latest edition of Principles of Financial Engineering is ideal for financial engineers, quantitative analysts in banks and investment houses, and other financial industry professionals. It is also highly recommended to graduate students in financial engineering and financial mathematics programs.
  • Strategic Marketing Decision-Making within Japanese and South Korean Companies

    • 1st Edition
    • Yang-Im Lee + 1 more
    • English
    This book acts as a bridge between marketing and strategic management, as it is written from a strategic marketing perspective. It provides students and practising managers with an appreciation and an understanding of how managers in Japanese and South Korean companies formulate and implement strategic marketing decisions, how they embrace the organizational learning concept, and how they formulate working relationships with staff in partner organizations. It provides an explanation of the role that culture plays in the management process and various problems are cited in the text and solutions are offered that reinforce the theories and concepts covered. A number of case studies highlight the link between theory and practice, and the work is structured in a way that allows the reader to think through and reflect upon the key issues associated with decision-making within Japanese and South Korean companies.