AfiqEfendy Zaen, profile picture

AfiqEfendy Zaen

Sort by
Network Security Chapter 7
OS Database Security Chapter 6
Virus and Malicious Code Chapter 5
Protocols and Practices in Using Encryption Chapter 4
Secure Encyrption Systems Chapter 2
Basic Encryption Decryption Chapter 2
Basic Security Chapter 1
10. cash flow in capital budgeting
10. short term financial planning
9. cost of capital
8. stock valuation
6. risk return
6. bond valuation
4. time value of money
3 financial ratio