"Preventing high risk gambles in securities" Essays and Research Papers

Sort By:
Satisfactory Essays
Good Essays
Better Essays
Powerful Essays
Best Essays
Page 50 of 50 - About 500 Essays
  • Powerful Essays

    credit risk

    • 4703 Words
    • 19 Pages

    Australian Journal of Business and Management Research Vol.2 No.02 [31-38] | May-2012 CREDIT RISK AND COMMERCIAL BANKS’ PERFORMANCE IN NIGERIA: A PANEL MODEL APPROACH KOLAPO‚ T. Funso (Corresponding Author) Department of Banking and Finance‚ Faculty of Management Sciences Ekiti State University‚ Ado-Ekiti‚ Nigeria. realvega1959@yahoo.com AYENI‚ R. Kolade (Ph.D) Department of Economics‚ Faculty of Social Sciences Ekiti State University‚ Ado Ekiti‚ Ekiti State‚ Nigeria. raphkolayeni@yahoo

    Premium Bank

    • 4703 Words
    • 19 Pages
    Powerful Essays
  • Powerful Essays

    security service

    • 6953 Words
    • 28 Pages

    COMPETENCY-BASED CURRICULUM Sector: HEALTH‚ SOCIAL AND OTHER COMMUNITY DEVELOPMENT SERVICES Qualification: SECURITY SERVICES NC II Technical Education and Skills Development Authority East Service Road‚ South Superhighway‚ Taguig City‚ Metro Manila TABLE OF CONTENTS Page A. COURSE DESIGN 1-5 B. MODULES OF INSTRUCTION 6-59 Basic Competencies 6 Participating in workplace communication 7-10 Working in a team environment 11-13 Practicing career professionalism 14-17

    Premium Security guard Security Occupational safety and health

    • 6953 Words
    • 28 Pages
    Powerful Essays
  • Good Essays

    Cyber Security

    • 1903 Words
    • 8 Pages

    CYBER-PHYSICAL SYSTEMS SECURITY FOR THE SMART GRID A. C´ardenas ‚ R. Moreno‚ “Cyber-Physical Systems security for the Smart Grid‚” CPS Workshop 2011.           The authors focus on giving a brief overview of why traditional security mechanisms for power systems are inadequate and the need for CPS security. They briefly describe the functional areas of the grid: State estimation-need for SE‚ mathematically modeling it‚ testing bad measurements. Constructing the network topology based

    Premium Electricity distribution Security Attack

    • 1903 Words
    • 8 Pages
    Good Essays
  • Better Essays

    Aim High to Achieve High

    • 2238 Words
    • 9 Pages

    surpluses/deficits. Cash rationing (misnomer cash budgeting) Last resort liquidity management Limits ability to commit until sufficient funds are available (delays implementation) No forward cash planning Disruptive to programs‚ vendors High corruption potential Need transparent ex ante rules Public procedure Likely to undermine budget priorities Benefits of efficient cash management Ensure obligations can be met as they fall due Minimize idle balances and associated costs

    Premium Bank Money Cash flow

    • 2238 Words
    • 9 Pages
    Better Essays
  • Better Essays

    Internet Security

    • 1945 Words
    • 8 Pages

    Internet Security Many people today are familiar with the Internet and its use. A large number of its users however‚ are not aware of the security problems they face when using the Internet. Most users feel they are anonymous when on-line‚ yet in actuality they are not. There are some very easy ways to protect the user from future problems. The Internet has brought many advantages to its users but has also created some major problems. Most people believe that they are anonymous when they

    Premium Security Computer security E-mail

    • 1945 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    Food Security

    • 2496 Words
    • 10 Pages

    ABSTRACT Food security means to create a condition where enough food is ensured to meet the dietary needs for a productive and healthy life. But‚ the fact is that About 24‚000 people die every day from hunger or hunger-related causes which testify to global food insecurity. Global food crisis is the external reason of food crisis in Bangladesh. There are many more domestic reasons. Over the last three decades rice and wheat production in Bangladesh increased more than double. But‚ as the demand

    Premium Poverty Food security

    • 2496 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Mcdonald's Risk

    • 1260 Words
    • 6 Pages

    Major risks and implications of those risks for the conduct of the audit. Financing and market risk The Company generally borrows on a long-term basis and is exposed to the impact of interest rate changes and foreign currency fluctuations. Debt obligations at December 31‚ 2007 totaled $9.3 billion‚ compared with $8.4 billion at December 31‚ 2006. The net increase in 2007 was primarily due to net issuances of $573 million and the impact of changes in exchange rates on foreign currency denominated

    Premium Debt Currency Balance sheet

    • 1260 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    Network Security

    • 6846 Words
    • 28 Pages

    registered in the U.S. Patent and Trademark Office. Copyright 2001 Carnegie Mellon University 1 Abstract In November of 1999‚ the CERT® Coordination Center (CERT/CC) sponsored the Distributed Systems Intruder Tools (DSIT) Workshop where a group of security experts outlined the emerging threat of distributed denial of service (DDoS) attack technology. Since then‚ denial of service (DoS) attack technology has continued to evolve and continues to be used to attack and impact Internet infrastructures.

    Premium IP address

    • 6846 Words
    • 28 Pages
    Powerful Essays
  • Powerful Essays

    Database Security

    • 28580 Words
    • 115 Pages

    - 1 - Database Security *) GÜNTHER PERNUL Institut für Angewandte Informatik und Informationssysteme Abteilung für Information Engineering Universität Wien Vienna‚ Austria 1. Introduction 1.1 The Relational Data Model Revisited 1.2 The Vocabulary of Security and Major DB Security Threats 2. Database Security Models 2.1 Discretionary Security Models 2.2 Mandatory Security Models 2.3 Adapted Mandatory Access Control Model 2.4 Personal Knowledge Approach 2.5 Clark and Wilson Model 2

    Premium Database Relational model Access control

    • 28580 Words
    • 115 Pages
    Powerful Essays
  • Powerful Essays

    Data Security

    • 8801 Words
    • 36 Pages

    Ensuring Data Storage Security in Cloud Computing Cong Wang‚ Qian Wang‚ and Kui Ren Department of ECE Illinois Institute of Technology Email: {cwang‚ qwang‚ kren}@ece.iit.edu Wenjing Lou Department of ECE Worcester Polytechnic Institute Email: wjlou@ece.wpi.edu Abstract—Cloud Computing has been envisioned as the nextgeneration architecture of IT Enterprise. In contrast to traditional solutions‚ where the IT services are under proper physical‚ logical and personnel controls‚ Cloud Computing

    Premium Data management Cloud computing

    • 8801 Words
    • 36 Pages
    Powerful Essays
Page 1 42 43 44 45 46 47 48 49 50
Next