Description : With nearly a million copies sold, Security Analysis has been continuously in print for more than sixty years. No investment book in history had either the immediate impact, or the long-term relevance and value, of its first edition in 1934. By 1951, seventeen years past its original publication and more than a decade beyond its revised and acclaimed 1940 second edition, authors Benjamin Graham and David Dodd had seen business and investment markets travel from the depths of Depression to the heights of recovery, and had observed investor behavior during both the calm of peacetime and the chaos of World War II. The prescient thinking and insight displayed by Graham and Dodd in the first two editions of Security Analysis reached new heights in the third edition. In words that could just as easily have been written today as fifty years ago, they detail techniques and strategies for attaining success as individual investors, as well as the responsibilities of corporate decision makers to build shareholder value and transparency for those investors. The focus of the book, however, remains its timeless guidance and advice--that careful analysis of balance sheets is the primary road to investment success, with all other considerations little more than distractions. The authors had seen and survived the Great Depression as well as the political and financial instabilities of World War II and were now better able to outline a program for sensible and profitable investing in the latter half of the century. Security Analysis: The Classic 1951 Edition marks the return of this long-out-of-print work to the investment canon. It will reacquaint you with the foundations of value investing--more relevant than ever in tumultuous twenty-first century markets--and allow you to own the third installment in what has come to be regarded as the most accessible and usable title in the history of investment publishing.
Description : The second edition of the book on Security Analysis and Portfolio Management covers all the areas relevant to the theme of investment in securities. It begins with an introduction to the investment process and the risk involved in it and then explains the different methods of security analysis such as Fundamental Analysis (including economy, industry and company analysis), Technical Analysis and Random Walk Theory (including Efficient Market Hypothesis). The valuation of securities such as shares and bonds is illustrated with examples. The securities market environment and the trading system in India are also discussed in sufficient detail. The different phases of Portfolio Management such as portfolio analysis, portfolio selection, portfolio revision and portfolio evaluation are explained in separate chapters. Pricing theories such as Capital Asset Pricing Model (CAPM), Arbitrage Pricing Theory (APT), and Option Pricing Theory are explained with suitable examples. The book also provides an introduction to Derivative Instruments in four chapters. Each chapter is supported with examples, review questions and practice exercises to facilitate learning of the concepts and theories. The book is intended to serve as a basic textbook for the students of finance, commerce, and management. It will be useful to the students pursuing professional courses such as chartered accountancy (CA), cost and management accountancy (CMA), and chartered financial analysis (CFA). The professionals in the field of investment will find this book of immense value in enhancing their knowledge. New to the SECOND Edition • Two new chapters on Arbitrage Pricing Theory (APT) and Option Pricing are introduced. • Two new sections on MCX-SX (the new stock exchange in India) and Value at Risk (VaR) Analysis are also added. • A Glossary of important terms has also been appended for the benefit of readers.
Description : Advances in hardware, software, and audiovisual rendering technologies of recent years have unleashed a wealth of new capabilities and possibilities for multimedia applications, creating a need for a comprehensive, up-to-date reference. The Encyclopedia of Multimedia Technology and Networking provides hundreds of contributions from over 200 distinguished international experts, covering the most important issues, concepts, trends, and technologies in multimedia technology. This must-have reference contains over 1,300 terms, definitions, and concepts, providing the deepest level of understanding of the field of multimedia technology and networking for academicians, researchers, and professionals worldwide.
Description : Malware Forensics Field Guide for Linux Systems is a handy reference that shows students the essential tools needed to do computer forensics analysis at the crime scene. It is part of Syngress Digital Forensics Field Guides, a series of companions for any digital and computer forensic student, investigator or analyst. Each Guide is a toolkit, with checklists for specific tasks, case studies of difficult situations, and expert analyst tips that will aid in recovering data from digital media that will be used in criminal prosecution. This book collects data from all methods of electronic data storage and transfer devices, including computers, laptops, PDAs and the images, spreadsheets and other types of files stored on these devices. It is specific for Linux-based systems, where new malware is developed every day. The authors are world-renowned leaders in investigating and analyzing malicious code. Chapters cover malware incident response - volatile data collection and examination on a live Linux system; analysis of physical and process memory dumps for malware artifacts; post-mortem forensics - discovering and extracting malware and associated artifacts from Linux systems; legal considerations; file identification and profiling initial analysis of a suspect file on a Linux system; and analysis of a suspect program. This book will appeal to computer forensic investigators, analysts, and specialists. A compendium of on-the-job tasks and checklists Specific for Linux-based systems in which new malware is developed every day Authors are world-renowned leaders in investigating and analyzing malicious code
Description : The revised and enlarged second edition of Security Analysis and Portfolio Management provides a more comprehensive coverage of concepts. It has been expanded to strengthen the conceptual foundation and incorporates the latest research and up-to-date thinking in all the chapters. This edition contains completely new chapters on portfolio risk analysis, portfolio building process, mutual fund management, portfolio performance evaluations and hedging portfolio risk have been included. The volume also contains an Indian perspective that has been presented through cases and examples to help students from Indian business schools relate to the concepts discussed. Each chapter begins with a feature called ‘The Situation’, in which managers in a fictitious company must make certain key decisions in the derivatives market.
Description : The second edition of this concise and compact text recognises the significance of portfolio management as an essential skill rather than just a theoretical base for investors in today's world. It is a comprehensive, well-organised text on various aspects of portfolio management such as analysis, selection, revision and evaluation of portfolios of securities for deriving maximum benefit from one's investments. The book also discusses in detail the basic methods of security analysis such as fundamental analysis and technical analysis, shares and bond valuation, efficient market theory, and the capital asset pricing model. NEW TO THE SECOND EDITION Provides numerous new examples that illustrate mathematical aspects of the theory. Gives enough exercises at the end of each chapter to test the student's understanding of the subject.This book, with many student friendly features, would be best suited for students of commerce and management. It would be equally useful to postgraduate students pursuing courses in financial control (MFC), chartered accountancy (CA), cost and work accountancy (CWA), and chartered financial analysis (CFA). It would also prove to be an asset to the professionals in the investment field.
Description : Security Analysis and Portfolio Management endeavours to provide concepts, text and cases for a course on Security Analysis and Portfolio Management, which is widely taught in the business schools around the world. It is consciously planned to help students to acquire knowledge, develop analytical skills and gain insights pertaining to how a fund manager strikes winning strategies for investment by using time-tested, validated and proven techniques which ranges from fundamental analysis to mundane mathematical models. The book is divided in four broad parts. " Part One describes the global investment scenario, major investment decisions, and the dynamics of the securities markets. " Part Two deals with the critical aspects of risk and return culminating in Capital Asset Pricing Model (CAPM). " Part Three discusses the most important analysis in investment decisions, wherein good mathematical models are factored in and applied to live conditions through building up case analysis. " Part Four deals with the exotic instruments of derivatives and its applications, where cutting-edge research around the globe is going on. The book is designed to meet the expectations of common investors as well as hard core professionals (fund managers) in putting the precious resources at risk for higher returns. New in this edition: The following chapters are added to make the book more result oriented, contemporary, focused and comprehensive. " Dynamics of the Indian economy " Fundamental Analysis: Valuation of companies " Performance of mutual fund in India " Sub-prime crisis and securitization " Private equity
Description : Many different people, from social scientists to government agencies to business professionals, depend on the results of multivariate models to inform their decisions. Researchers use these advanced statistical techniques to analyze relationships among multiple variables, such as how exercise and weight relate to the risk of heart disease, or how unemployment and interest rates affect economic growth. Yet, despite the widespread need to plainly and effectively explain the results of multivariate analyses to varied audiences, few are properly taught this critical skill. The Chicago Guide to Writing about Multivariate Analysis is the book researchers turn to when looking for guidance on how to clearly present statistical results and break through the jargon that often clouds writing about applications of statistical analysis. This new edition features even more topics and real-world examples, making it the must-have resource for anyone who needs to communicate complex research results. For this second edition, Jane E. Miller includes four new chapters that cover writing about interactions, writing about event history analysis, writing about multilevel models, and the “Goldilocks principle” for choosing the right size contrast for interpreting results for different variables. In addition, she has updated or added numerous examples, while retaining her clear voice and focus on writers thinking critically about their intended audience and objective. Online podcasts, templates, and an updated study guide will help readers apply skills from the book to their own projects and courses. This continues to be the only book that brings together all of the steps involved in communicating findings based on multivariate analysis—finding data, creating variables, estimating statistical models, calculating overall effects, organizing ideas, designing tables and charts, and writing prose—in a single volume. When aligned with Miller’s twelve fundamental principles for quantitative writing, this approach will empower readers—whether students or experienced researchers—to communicate their findings clearly and effectively.
Description : "Aswath Damodaran is simply the best valuation teacher around. If you are interested in the theory or practice of valuation, you should have Damodaran on Valuation on your bookshelf. You can bet that I do." -- Michael J. Mauboussin, Chief Investment Strategist, Legg Mason Capital Management and author of More Than You Know: Finding Financial Wisdom in Unconventional Places In order to be a successful CEO, corporate strategist, or analyst, understanding the valuation process is a necessity. The second edition of Damodaran on Valuation stands out as the most reliable book for answering many of today?s critical valuation questions. Completely revised and updated, this edition is the ideal book on valuation for CEOs and corporate strategists. You'll gain an understanding of the vitality of today?s valuation models and develop the acumen needed for the most complex and subtle valuation scenarios you will face.
Description : Now in its second edition, Nuclear Forensic Analysis provides a multidisciplinary reference for forensic scientists, analytical and nuclear chemists, and nuclear physicists in one convenient source. The authors focus particularly on the chemical, physical, and nuclear aspects associated with the production or interrogation of a radioactive sample. They consolidate fundamental principles of nuclear forensic analysis, all pertinent protocols and procedures, computer modeling development, interpretational insights, and attribution considerations. The principles and techniques detailed are then demonstrated and discussed in their applications to real-world investigations and casework conducted over the past several years. Highlights of the Second Edition include: A new section on sample analysis considerations and interpretation following a post-detonation nuclear forensic collection New case studies, including the most wide-ranging and multidisciplinary nuclear forensic investigation conducted by Lawrence Livermore National Laboratory to date Expanded treatments of radiologic dispersal devices (RDDs) and statistical analysis methodologies The material is presented with minimal mathematical formality, using consistent terminology with limited jargon, making it a reliable, accessible reference. The broad-based coverage provides important insight into the multifaceted changes facing this recently developed science.