Books on the topic 'Systemic risk measure'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Systemic risk measure.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Duffey, Romney B. The quantification of systemic risk and stability: New methods and measures. Cambridge, MA: National Bureau of Economic Research, 2011.
Find full textThomas, Norman. Risk analysis and security countermeasure selection. Boca Raton, FL: CRC Press, 2010.
Find full textThomas, Norman. Risk analysis and security countermeasure selection. Boca Raton, FL: CRC Press, 2010.
Find full textNorman, Thomas. Risk analysis and security countermeasure selection. Boca Raton, FL: CRC Press, 2010.
Find full textNorman, Thomas L. Risk analysis and security countermeasure selection. Boca Raton: CRC Press, 2010.
Find full textCanadian Institute for International Peace and Security., ed. The risk of accidental nuclear war: A conference report. Ottawa: Canadian Institute for International Peace and Security, 1986.
Find full textPractical risk management for the CIO. Boca Raton, FL: Auerbach Publications, 2011.
Find full textservice), SpringerLink (Online, ed. Linear-Quadratic Controls in Risk-Averse Decision Making: Performance-Measure Statistics and Control Decision Optimization. New York, NY: Springer New York, 2013.
Find full textOu, Xinming. Quantitative security risk assessment of enterprise networks. New York, NY: Springer, 2012.
Find full textCompany, R. S. Means, ed. Building security: Strategies & costs : risk assessment, security planning, cost data for construction & security systems. Kingston, MA: Reed Construction Data, 2003.
Find full textservice), SpringerLink (Online, ed. Game Theoretic Risk Analysis of Security Threats. Boston, MA: Springer-Verlag US, 2009.
Find full textCyber-risk informatics: Engineering evaluation with data science. Hoboken, New Jersey: John Wiley & Sons, 2016.
Find full textHeal, G. M. You only die once: Managing discrete interdependent risks. Cambridge, Mass: National Bureau of Economic Research, 2003.
Find full textAn quan guan li xin xi xi tong. Beijing Shi: Guo fang gong ye chu ban she, 2007.
Find full text(Massimo), Guarascio M., Wessex Institute of Technology, Universitaire Instelling Antwerpen, and Università degli studi di Roma "La Sapienza.", eds. Safety and security engineering IV. Southampton: WIT Press, 2011.
Find full textDeatherage, Robert H. Security operations: An introduction to planning and conducting private security details for high risk areas. Santa Fe: Turtle Press, 2008.
Find full textStrategic security management: A risk assessment guide for decision makers. Amsterdam: Butterworth-Heinemann, 2007.
Find full text1961-, Chatain Pierre-Laurent, and World Bank, eds. Integrity in mobile phone financial services: Measures for mitigating risks of money laundering and terrorist financing. Washington, D.C: World Bank, 2008.
Find full textCavanagh, Thomas E. Corporate security management: Organization and spending since 9/11. New York: Conference Board, 2003.
Find full textInformation security in healthcare: Managing risk. Chicago, IL: HIMSS, 2010.
Find full textData protection: Governance, risk management, and compliance. Boca Raton, FLA: Taylor & Francis, 2009.
Find full textUnited States. Department of Homeland Security. Office of Inspector General. Examining insider threat risk at the U.S.Citizenship and Immigration Services. Washington, DC: U.S. Dept. of Homeland Security, Office of Inspector General, 2011.
Find full textmissing], [name. System safety: Challenges and pitfalls of intervention. Amsterdam: Pergamon, 2002.
Find full textLukszo, Zofia. Securing Electricity Supply in the Cyber Age: Exploring the Risks of Information and Communication Technology in Tomorrow's Electricity Infrastructure. Dordrecht: Springer Science+Business Media B.V., 2010.
Find full textCavanagh, Thomas E. Corporate security management: Organization and spending since 9/11. New York: Conference Board, 2003.
Find full textLombardi, M. Safety and security studies. Southampton, UK: WIT Press, 2018.
Find full textEsipov, Yuriy, Besik Meshi, Mustafa Dzhilyadzhi, and Aleksandr Hazov. Scientific and applied tasks of technosphere safety. ru: INFRA-M Academic Publishing LLC., 2022. http://dx.doi.org/10.12737/1882552.
Full textEuropean Safety and Reliability Conference (1997 Lisbon, Portugal). Advances in safety and reliability: Proceedings of the ESREL'97, international conference on safety and reliability, 17-20 June, 1997, Lisbon, Portugal. Oxford, England: Pergamon, 1997.
Find full textInternational Conference on Safety and Reliability (1997 Lisbon, Portugal). Advancesin safety and reliability: Proceedings of the ESREL '97 International Conference on Safety and Reliability, 17 - 20 June 1997, Lisbon, Portugal. Oxford: Pergamon, 1997.
Find full textToigo, Jon William. Disaster recovery planning: Managing risk and catastrophe in information systems. Englewood Cliffs, N.J: Yourdon Press, 1989.
Find full textNicolet-Monnier, Michel. Quantitative Risk Assessment of Hazardous Materials Transport Systems: Rail, Road, Pipelines and Ship. Dordrecht: Springer Netherlands, 1996.
Find full textG, Apostolakis, and Society for Risk Analysis, eds. Probabilistic safety assessment and management: Proceedings of the International Conference on Probabilistic Safety Assessment and Management (PSAM) held February 4-7, 1991, in Beverly Hills, California. New York: Elsevier, 1991.
Find full textC, Wilshusen Gregory, ed. Information security: Federal agencies have taken steps to secure wireless networks, but further actions can mitigate risk : report to congressional committees. Washington, D.C.]: U.S. Govt. Accountability Office, 2010.
Find full textCraighead, Geoff. High-rise security and fire life safety. Boston: Butterworth-Heinemann, 1996.
Find full textHigh-rise security and fire life safety. 2nd ed. Amsterdam: Butterworth-Heinemann, 2003.
Find full textHigh-rise security and fire life safety. 3rd ed. Amsterdam: Butterworth-Heinemann, 2009.
Find full textCuske, Christian. Quantifizierung operationeller Technologierisiken bei Kreditinstituten: Eine Ontologie-zentrierte Vorgehensweise im Spannungsfeld bankinterner und aufsichtsrechtlicher Sichtweise. Frankfurt am Main: Peter Lang, 2007.
Find full textGupta, Manish. Threats, countermeasures and advances in applied information security. Hershey, PA: Information Science Reference, 2012.
Find full textUnited States. Department of Homeland Security. Office of Inspector General. DHS needs to address portable device security risks. Washington, DC: Department of Homeland Security, Office of Inspector General, 2012.
Find full textStuart, Mark. Wood processing industry: Work related musculoskeletal disorder risk factors for selected jobs : preliminary results. [Olympia, Wash.]: Safety & Health Assessment & Research for Prevention, 1995.
Find full textStuart, Mark. Wood processing industry: Work related musculoskeletal disorder risk factors for selected jobs : preliminary results. [Olympia, Wash.]: Safety & Health Assessment & Research for Prevention, 1995.
Find full textOffice, General Accounting. Global financial markets: International coordination can help address automation risks : report to Congressional Oversight Committees. Washington, D.C: The Office, 1991.
Find full textKaal, Wulf A., and Timothy A. Krause. Hedge Funds and Systemic Risk. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190607371.003.0017.
Full text(Editor), Ole Hanseth, and Claudio Ciborra (Editor), eds. Risk, Complexity and ICT. Edward Elgar Publishing, 2007.
Find full textCharles, Proctor. Part E Guarantees and Security, 35 Financial Collateral Arrangements. Oxford University Press, 2015. http://dx.doi.org/10.1093/law/9780199685585.003.0035.
Full textZimmerman, Aaron Z. Alternative Measures and Taxonomies. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198809517.003.0002.
Full textRisk Analysis and Security Countermeasure Selection. CRC, 2009.
Find full textNorman, Thomas L. Risk Analysis and Security Countermeasure Selection. Taylor & Francis Group, 2009.
Find full textPham, Khanh D. Linear-Quadratic Controls in Risk-Averse Decision Making: Performance-Measure Statistics and Control Decision Optimization. Springer, 2012.
Find full textRisk Propagation Assessment for Network Security Focus Series. ISTE Ltd and John Wiley & Sons Inc, 2013.
Find full text