Archive for August 26th, 2009

Post-Modern Security Analysis: Part Five (Managing Complexity)

This is the fifth article in a series about Post-Modern Security Analysis. The challenge of complexity In part three of this series, I wrote: … the first step of Post-Modern Security Analysis is simply to identify issuers or instruments that are too complex to analyze and move on to more worthy objects of analysis. […]

copyright | privacy | home

Powered by WordPress | Entries (RSS) | Comments (RSS)