LEADER 03354nam 2200793 a 450 001 9910952244003321 005 20200520144314.0 010 $a9780674053557 010 $a0674053559 024 7 $a10.4159/9780674053557 035 $a(CKB)2670000000040409 035 $a(OCoLC)648759742 035 $a(CaPaEBR)ebrary10402500 035 $a(SSID)ssj0000413070 035 $a(PQKBManifestationID)11277860 035 $a(PQKBTitleCode)TC0000413070 035 $a(PQKBWorkID)10369142 035 $a(PQKB)11150531 035 $a(DE-B1597)457552 035 $a(OCoLC)1011438670 035 $a(OCoLC)979575706 035 $a(DE-B1597)9780674053557 035 $a(Au-PeEL)EBL3300837 035 $a(CaPaEBR)ebr10402500 035 $a(MiAaPQ)EBC3300837 035 $a(Perlego)1132793 035 $a(EXLCZ)992670000000040409 100 $a20081202d2009 uy 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt 182 $cc 183 $acr 200 10$aBorderline Americans $eracial division and labor war in the Arizona borderlands /$fKatherine Benton-Cohen 205 $a1st ed. 210 $aCambridge, Mass. $cHarvard University Press$d2009 215 $a1 online resource (378 p.) 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a9780674032774 311 08$a0674032772 320 $aIncludes bibliographical references (p. [279]-348) and index. 327 $aA shared world in Tres Alamos -- Race and conflict in tombstone -- The white man's camp in Bisbee -- "A better man for us" in Warren -- Mormons and Mexicans in the San Pedro River Valley -- Women and men in the Sulphur Springs and San Simon Valleys -- The Bisbee deportation -- One country, two races. 330 $a"Are you an American, or are you not?" This is the question at the heart of Katherine Benton-Cohen's provocative history, which ties that seemingly remote corner of the country to one of America's central concerns: the historical creation of racial boundaries. By showing the multiple possibilities for racial meanings in America, Benton-Cohen's insightful and informative work challenges our assumptions about race and national identity. 606 $aWorking class$zArizona$zCochise County$xHistory 606 $aLabor movement$zArizona$zCochise County$xHistory 606 $aLabor disputes$zArizona$zCochise County$xHistory 606 $aSocial conflict$zArizona$zCochise County$xHistory 606 $aRacism$zArizona$zCochise County$xHistory 606 $aFrontier and pioneer life$zArizona$zCochise County 607 $aCochise County (Ariz.)$xEconomic conditions 607 $aCochise County (Ariz.)$xRace relations 607 $aCochise County (Ariz.)$xSocial conditions 607 $aMexican-American Border Region$xHistory 615 0$aWorking class$xHistory. 615 0$aLabor movement$xHistory. 615 0$aLabor disputes$xHistory. 615 0$aSocial conflict$xHistory. 615 0$aRacism$xHistory. 615 0$aFrontier and pioneer life 676 $a305.8009791/53 700 $aBenton-Cohen$b Katherine$0764725 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910952244003321 996 $aBorderline Americans$94353849 997 $aUNINA 999 $p$11.98$u04/12/2018$5Bus LEADER 03361nam 2200721Ia 450 001 9910967849003321 005 20200520144314.0 010 $a9786610277018 010 $a9781280277016 010 $a1280277017 010 $a9780471737445 010 $a0471737445 035 $a(CKB)1000000000355761 035 $a(EBL)231727 035 $a(OCoLC)133167886 035 $a(SSID)ssj0000180848 035 $a(PQKBManifestationID)11177728 035 $a(PQKBTitleCode)TC0000180848 035 $a(PQKBWorkID)10157750 035 $a(PQKB)11281986 035 $a(MiAaPQ)EBC231727 035 $a(Au-PeEL)EBL231727 035 $a(CaPaEBR)ebr10114253 035 $a(CaONFJC)MIL27701 035 $a(Perlego)2761993 035 $a(EXLCZ)991000000000355761 100 $a20050104d2005 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aInterest rate risk modeling $ethe fixed income valuation course /$fSanjay K. Nawalkha, Gloria M. Soto, Natalia A. Beliaeva 205 $a1st ed. 210 $aHoboken, N.J. $cJohn Wiley$dc2005 215 $a1 online resource (429 p.) 225 1 $aWiley finance series 300 $aDescription based upon print version of record. 311 08$a9780471427247 311 08$a0471427241 320 $aIncludes bibliographical references (p. 377-382) and index. 327 $aInterest rate risk modeling : an overview -- Bond price, duration, and convexity -- Estimation of the term structure of interest rates -- M-absolute and M-square risk measures -- Duration vector models -- Hedging with interest-rate futures -- Hedging with bond options: a general gaussian framework -- Hedging with interest-rate swaps and options: -- Key rate durations with var analysis -- Principal component model with var analysis -- Duration models for default-prone securities. 330 $aThe definitive guide to fixed income valuation and risk analysis The Trilogy in Fixed Income Valuation and Risk Analysis comprehensively covers the most definitive work on interest rate risk, term structure analysis, and credit risk. The first book on interest rate risk modeling examines virtually every well-known IRR model used for pricing and risk analysis of various fixed income securities and their derivatives. The companion CD-ROM contain numerous formulas and programming tools that allow readers to better model risk and value fixed income securities. This comprehensive resource provide 410 0$aWiley finance series. 517 3 $aFixed income valuation course 606 $aInterest rate risk$xMathematical models 606 $aBonds$xValuation$xMathematical models 606 $aFixed-income securities$xValuation$xMathematical models 615 0$aInterest rate risk$xMathematical models. 615 0$aBonds$xValuation$xMathematical models. 615 0$aFixed-income securities$xValuation$xMathematical models. 676 $a332.6323 686 $a83.03$2bcl 700 $aNawalkha$b Sanjay K$01608827 701 $aSoto$b Gloria M$01608829 701 $aBeliaeva$b Natalia A$g(Natalia Anatolevna),$f1975-$01608828 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910967849003321 996 $aInterest rate risk modeling$94363683 997 $aUNINA LEADER 04191nam 22007215 450 001 9910983324703321 005 20250211143731.0 010 $a9789819611485$b(electronic bk.) 010 $z9789819611478 024 7 $a10.1007/978-981-96-1148-5 035 $a(MiAaPQ)EBC31882468 035 $a(Au-PeEL)EBL31882468 035 $a(CKB)37248672000041 035 $a(DE-He213)978-981-96-1148-5 035 $a(OCoLC)1498722657 035 $a(EXLCZ)9937248672000041 100 $a20250118d2025 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aArtificial Intelligence Security and Privacy $eSecond International Conference, AIS&P 2024, Guangzhou, China, December 6-7, 2024, Proceedings /$fedited by Fangguo Zhang, Weiwei Lin, Hongyang Yan 205 $a1st ed. 2025. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2025. 215 $a1 online resource (254 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v15399 311 08$aPrint version: Zhang, Fangguo Artificial Intelligence Security and Privacy Singapore : Springer,c2025 9789819611478 327 $a -- BadHAR: Backdoor Attacks in Federated Human Activity Recognition Systems. -- Fully Automated Generation Mechanism of Rootfs for Specified Operating Systems under Linux. -- Anti-Side-Channel Attack Mechanisms in Blockchain Payment Channels. -- F2L: A Lightweight Focus Layer against Backdoor Attack in Federated Learning. -- Intelligent backpack based on ireless mobile technology. -- Tourism Industry Upgrading and Public Opinion Prevention Methods Based on BERTopic: A Case Study of Hotel Management. -- Privacy-Preserving Covert Channels in VoLTE via Inter-Frame Delay Modulation. -- Enhancing Adversarial Robustness in Object Detection via Multi-Task Learning and Class-Aware Adversarial Training. -- FedHKD: A Hierarchical Federated Learning Approach Integrating lustering and Knowledge Distillation for Non-IID Data. -- Application of Ensemble Learning Based on High-Dimensional Features in Financial Big Data. -- Collaborative Framework for Dynamic Knowledge Updating and Transparent Reasoning with Large Language Models. -- Zero-Shot Dense Retrieval based on Query Expansion. -- Lightweight Attention-CycleGAN for Nighttime-Daytime Image ransformation. -- Generative Image Steganography Based on Latent Space Vector Coding and Diffusion Model. 330 $aThis book constitutes the refereed proceedings of the Second International Conference on Artificial Intelligence Security and Privacy, AIS&P 2024, held in Guangzhou, China, during December 6-7, 2024. The 14 full papers included in this book were carefully reviewed and selected from 47 submissions. The papers help to researchers to exchange latest research progress in all areas such as artificial intelligence, security and privacy, and their applications. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v15399 606 $aArtificial intelligence 606 $aSecurity systems 606 $aData protection$xLaw and legislation 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData protection 606 $aArtificial Intelligence 606 $aSecurity Science and Technology 606 $aPrivacy 606 $aCryptology 606 $aSecurity Services 615 0$aArtificial intelligence. 615 0$aSecurity systems. 615 0$aData protection$xLaw and legislation. 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aData protection. 615 14$aArtificial Intelligence. 615 24$aSecurity Science and Technology. 615 24$aPrivacy. 615 24$aCryptology. 615 24$aSecurity Services. 676 $a006.3 700 $aZhang$b Fangguo$01754857 701 $aLin$b Weiwei$0997154 701 $aYan$b Hongyang$01783537 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 912 $a9910983324703321 996 $aArtificial Intelligence Security and Privacy$94311416 997 $aUNINA