The book essentially describes the McCumber Cube information security methodology. And the McCumber Cube methodology is indeed interesting and worth the read. Unfortunately, the author wrote around it a whole book! In the first part the author describes the bases on the information security and rel
Hybrid Securities: Structuring, Pricing and Risk Assessment
β Scribed by Kamil Liberadzki, Marcin Liberadzki (auth.)
- Publisher
- Palgrave Macmillan UK
- Year
- 2016
- Tongue
- English
- Leaves
- 228
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
The book provides a comprehensive analysis from mathematical, legal and financial perspectives on the pricing of hybrids.
β¦ Table of Contents
Front Matter....Pages i-xii
The Definition of Hybrid Securities....Pages 1-7
Evolution of Hybrids....Pages 9-22
Legal Framework for Financial Hybrids in the Banking Industry....Pages 23-25
CRD IV Package Legal Framework....Pages 27-30
CRR Additional Tier 1 Financial Instruments....Pages 31-56
CRR Tier 2 Bonds....Pages 57-61
The Role of Hybrid Securities in the BRRD....Pages 63-79
Hybrid Securities Issued by Insurers....Pages 81-85
Corporate Hybrids....Pages 87-100
Issuing Hybrids....Pages 101-104
Public Offering and Admission to Trading....Pages 105-114
Regular and Timely Ongoing Disclosure....Pages 115-119
Financial Intermediation....Pages 121-134
Non-EEA CoCos....Pages 135-142
Bonds Credit Risk Modeling....Pages 143-162
Contingent Convertible Bonds Pricing....Pages 163-181
Structural Model for Corporate Hybrid Valuation....Pages 183-192
Hybrid Securitiesβ Impact on Risk....Pages 193-208
Back Matter....Pages 209-224
β¦ Subjects
Science, general
π SIMILAR VOLUMES
The book essentially describes the McCumber Cube information security methodology. And the McCumber Cube methodology is indeed interesting and worth the read. Unfortunately, the author wrote around it a whole book! In the first part the author describes the bases on the information security and rel
Examining current trends and problems that have plagued application development for more than a decade, this book provides a foundation for security risk assessment and management during software development. It demonstrates how to achieve greater application security through assessing and managing
<p><i>Security Risk Assessment</i> is the most up-to-date and comprehensive resource available on how to conduct a thorough security assessment for any organization. </p> <p>A good security assessment is a fact-finding process that determines an organization's state of security protection. It expose
<p><i>Security Risk Assessment</i> is the most up-to-date and comprehensive resource available on how to conduct a thorough security assessment for any organization. </p><p>A good security assessment is a fact-finding process that determines an organizationβs state of security protection. It exposes