FRM Part II Book 2: Credit risk Measurement and management (2014 SchweserNotes)
View more
FRM Part II Book 2: Credit risk Measurement and management (2014 SchweserNotes)
Primer for Design of Commercial Buildings to Mitigate Terrorist Attacks: Providing Protection to People and Buildings (Risk Management)
View more
Primer for Design of Commercial Buildings to Mitigate Terrorist Attacks: Providing Protection to People and Buildings (Risk Management)
FRM Part II Book 1: Market risk measurement and management (2015 SchweserNotes)
View more
FRM Part II Book 1: Market risk measurement and management (2015 SchweserNotes)
FRM Part II Book 3: Operational and integrated risk-management (2014 SchweserNotes)
View more
FRM Part II Book 3: Operational and integrated risk-management (2014 SchweserNotes)
FRM Part II Book 4: Risk Management and Investment Management; Current Issues in Financial Markets (2013 SchweserNotes)
View more
FRM Part II Book 4: Risk Management and Investment Management; Current Issues in Financial Markets (2013 SchweserNotes)
FRM Exam Handbook, Financial Risk Manager Handbook
View more
FRM Exam Handbook, Financial Risk Manager Handbook
Building a Cyber Risk Management Program - Brian Allen and Brandon Bapst
View more
Building a Cyber Risk Management Program - Brian Allen and Brandon Bapst
Integrating Risk and Security w ithin a TOGAF® Enterprise Architecture
View more
Integrating Risk and Security w ithin a TOGAF® Enterprise Architecture
Prospect Theory: For Risk and Ambiguity
View more
Prospect Theory: For Risk and Ambiguity
FRM Part I Book 4: Valuation and Risk Models (2014 Schweser Notes)
View more
FRM Part I Book 4: Valuation and Risk Models (2014 Schweser Notes)
Financial Risk Manager Handbook + Test Bank: FRM Part I Part II (Wiley Finance)
View more
Financial Risk Manager Handbook + Test Bank: FRM Part I Part II (Wiley Finance)
Design Patterns for Cloud Native Applications - Kasun Indrasiri and Sriskandarajah Suhothayan
View more
Design Patterns for Cloud Native Applications - Kasun Indrasiri and Sriskandarajah Suhothayan
Risk management for computer security : Protecting your network and information assets
View more
Risk management for computer security : Protecting your network and information assets
The Internet of Risky Things - Sean Smith
View more
The Internet of Risky Things - Sean Smith
Asterisk: The Definitive Guide 5th Edition - Jim Van Meggelen, Russell Bryant, and Leif Madsen
View more
Asterisk: The Definitive Guide 5th Edition - Jim Van Meggelen, Russell Bryant, and Leif Madsen
Asterisk: The Definitive Guide 3rd Edition - Leif Madsen, Jim Van Meggelen, and Russell Bryant
View more
Asterisk: The Definitive Guide 3rd Edition - Leif Madsen, Jim Van Meggelen, and Russell Bryant
《Linux-UNIX系统编程手册(上、下册)》Michael Kerrisk
View more
《Linux-UNIX系统编程手册(上、下册)》Michael Kerrisk