Skip to main content

[整理分享]耶鲁大学公开课-金融市场

讲师介绍
名称:Robert J. Shiller
职业:耶鲁大学经济学讲座教授
职位:耶鲁大学管理学院国际金融中心研究员

课程介绍
本课程将涉及的内容有:金融学理论、金融业的发展历程、金融机构(例如银行、保险
公司、证券公司、期货公司及其他衍生市场)的优势与缺陷以及这些机构的未来发展前
景。

学院介绍
耶鲁学院:开设人文科学、社会科学、自然科学以及工程学本科课程,授文学士、理学
士、文科研究学士学位。

课程内容介绍:
01金融和保险在我们经济和社会中的强大作用
02风险管理中的普遍原理:风险聚集和对冲
03金融中的科技与发明     
04投资组合多元化和辅助性的金融机构(资本资产定价模型)
05保险:典型的风险管理制度
06有效市场与过度波动之争
07行为金融学:心理的作用       
08人性弱点,欺诈,操纵与管制
09大卫•斯文森的客座演讲     
10债券市场:期限结构       
11股票
12房地产金融和其易受危机影响的脆弱性
13银行业:成功和失败       
14安德鲁•雷德利夫的客座演讲
15卡尔•伊坎的客座演讲
16货币政策的进化和完善
17投资银行和二级市场     
18职业财富管理者和他们的影响
19经纪业务,电子交易系统,等等
20斯蒂芬-施瓦茨曼的客座演讲
21远期合约和期货     
22股指,石油和其他期货市场
23期权市场
24让金融为大众所用:金融民主化
25劳伦斯•萨默斯 应对金融危机并从中学习 第一部分
26劳伦斯•萨默斯 应对金融危机并从中学习 第二部分
 


http://download.v.163.com/dl/open/00DL0QDR0QDS0QHE.html

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...