mastering ethereum
2021-01-28 05:07:04 790KB Blockchain
1
mastering-perl-scripts.zip mastering-perl-scripts.zip
2021-01-28 02:23:49 85KB mastering perl scripts
1
mastering-spark-sql
2021-01-28 02:23:35 8.75MB java
1
Mastering Cmake 完整 高清 pdf 版,带目录、书签 CMake学习参考手册
2020-03-28 03:13:08 43.88MB mastering cmake cmake学习手册
1
Use R to optimize your trading strategy and build up your own risk management system About This Book Learn to manipulate, visualize, and analyze a wide range of financial data with the help of built-in functions and programming in R Understand the concepts of financial engineering and create trading strategies for complex financial instruments Explore R for asset and liability management and capital adequacy modeling Who This Book Is For This book is intended for those who want to learn how to use R's capabilities to build models in quantitative finance at a more advanced level. If you wish to perfectly take up the rhythm of the chapters, you need to be at an intermediate level in quantitative finance and you also need to have a reasonable knowledge of R. What You Will Learn Analyze high frequency financial data Build, calibrate, test, and implement theoretical models such as cointegration, VAR, GARCH, APT, Black-Scholes, Margrabe, logoptimal portfolios, core-periphery, and contagion Solve practical, real-world financial problems in R related to big data, discrete hedging, transaction costs, and more. Discover simulation techniques and apply them to situations where analytical formulas are not available Create a winning arbitrage, speculation, or hedging strategy customized to your risk preferences Understand relationships between market factors and their impact on your portfolio Assess the trade-off between accuracy and the cost of your trading strategy In Detail R is a powerful open source functional programming language that provides high level graphics and interfaces to other languages. Its strength lies in data analysis, graphics, visualization, and data manipulation. R is becoming a widely used modeling tool in science, engineering, and business. The book is organized as a step-by-step practical guide to using R. Starting with time series analysis, you will also learn how to forecast the volume for VWAP Trading. Among other topics, the book covers FX deriva
2020-03-13 03:14:43 3.71MB R Quantitative Finance
1
webGIS 开发,openlayers教程电子书。webGIS 开发,openlayers教程电子书。
2020-03-11 03:09:57 7.07MB openlayers webGIS  教程
1
Mastering AWS Security Create and maintain a secure cloud ecosystem 英文无水印原版pdf pdf所有页面使用FoxitReader、PDF-XChangeViewer、SumatraPDF和Firefox测试都可以打开 本资源转载自网络,如有侵权,请联系上传者或csdn删除 查看此书详细信息请在美国亚马逊官网搜索此书
2020-03-04 03:13:19 7.66MB Mastering AWS Security Create
1
This book is intended for intermediate to advanced C++ game developers who are looking to take their skills to the next level and learn the deep concepts of 3D game development. The reader will learn the key concepts used in the development of AAA-level games. Advanced topics, such as library creation, artificial intelligence, shader techniques, advanced effects and lighting, tool creation, physics, networking, and other critical game systems, will be covered throughout the journey.
2020-02-09 03:12:24 6.87MB c++ game
1
云计算推荐图书:《Mastering Cloud Computing 2013》
2020-02-04 03:15:39 21.27MB Cloud Comput
1
Use Wireshark 2 to overcome real-world network problems Key Features Delve into the core functionalities of the latest version of Wireshark Master network security skills with Wireshark 2 Efficiently find the root cause of network-related issues Book Description Wireshark, a combination of a Linux distro (Kali) and an open source security framework (Metasploit), is a popular and powerful tool. Wireshark is mainly used to analyze the bits and bytes that flow through a network. It efficiently deals with the second to the seventh layer of network protocols, and the analysis made is presented in a form that can be easily read by people. Mastering Wireshark 2 helps you gain expertise in securing your network. We start with installing and setting up Wireshark2.0, and then explore its interface in order to understand all of its functionalities. As you progress through the chapters, you will discover different ways to create, use, capture, and display filters. By halfway through the book, you will have mastered Wireshark features, analyzed different layers of the network protocol, and searched for anomalies. You’ll learn about plugins and APIs in depth. Finally, the book focuses on pocket analysis for security tasks, command-line utilities, and tools that manage trace files. By the end of the book, you'll have learned how to use Wireshark for network security analysis and configured it for troubleshooting purposes. What you will learn Understand what network and protocol analysis is and how it can help you Use Wireshark to capture packets in your network Filter captured traffic to only show what you need Explore useful statistic displays to make it easier to diagnose issues Customize Wireshark to your own specifications Analyze common network and network application protocols Who this book is for If you are a security professional or a network enthusiast and are interested in understanding the internal working of networks, and if you have some prior knowledge of usi
2020-02-04 03:11:13 55.97MB wireshark2 抓包 网络 流量分析
1