Skip to main content

价值投资入门书籍介绍

价值投资入门书籍介绍 2007-05-25 12:05:49
我这帖是写给初学者看的,权当是抛砖引玉吧。
1. The Intelligent Investor 
(by Benjamin Graham, Jason Zweig) (http://www.amazon.com/Intelligent-Investor-Collins-Business-Essentials/dp/0060555661/sr=8-1/qid=1157318745/ref=pd_bbs_1/104-5697528-3530338?ie=UTF8&s=books) (ISBN: 0060555661)
    这本书是价值投资的开山祖师Benjamin Graham写给广大群众看的,书比较经典,但比较晦涩难读,Jason Zweig加了点与时俱进的注释。这书引入两个后来被反复引用的概念:Mr. Market和Margin of Safety. 用Buffett的话来说,Graham的投资方法是捡别人吸剩的烟头。 Benjamin Graham还写过另一本更经典的书Security Analysis(前四版最经典),那是写给那些professional investors读的,那本书是价值投资的Bible,可惜太厚,很难读(有言在先啊)。

2. Warren Buffett's letters to Berkshire's shareholders (http://www.berkshirehathaway.com/letters/letters.html)
    Warren Buffett是Benjamin Graham最出色的弟子,可惜从来没写过书介绍他自己的价值投资体会。但他零零碎碎在他的letters透露些自己的体会。这些信写得很好,比较简洁易 懂,充满了智慧,我推荐各位读一读。但这些信件毕竟比较零碎,要想系统地学习他的方法,你得读下面的书籍。Buffett早期是用Graham的投资方 法,现在的方法不一样,有人形容是"用丰田车的价钱,买辆奔驰车".

3. Buffettology: The Previously Unexplained Techniques That Have Made Warren Buffett The Worlds (by Mary Buffett, David Clark) (http://www.amazon.com/Buffettology-Previously-Unexplained-Techniques-Buffett/dp/068484821X/sr=1-1/qid=1157319130/ref=pd_bbs_1/104-5697528-3530338?ie=UTF8&s=books) (ISBN: 068484821X)
    Mary Buffett曾经是Warren Buffett的儿媳妇,书写得通俗易懂,我很喜欢。她还写过New Bufettology,我倒觉得这旧版的更好些。从该书来看,Warren Buffett特别喜欢那些return on equity很高的公司(奔驰车啊).

4.The Midas Touch (by John Train) (http://www.amazon.com/Midas-Touch-John-Train/dp/1897597290/sr=1-1/qid=1157319293/ref=pd_bbs_1/104-5697528-3530338?ie=UTF8&s=books) (ISBN: 1897597290)
   这本书写得通俗易懂,我也喜欢,不过我读的是1988年的旧版。

5.The Warren Buffett Way (by Robert G. Hagstrom, Bill Miller, Kenneth L. Fisher) http://www.amazon.com/Warren-Buffett-Way-Second/dp/0471743674/sr=1-2/qid=1157319602/ref=pd_bbs_2/104-5697528-3530338?ie=UTF8&s=books (ISBN: 0471743674)
  这本书在研究Buffett中最有名的,但写得不如别的书好懂,我不太喜欢,不过我读的也是1994年的旧版。

6. The Little Book That Beats the Market (By Joel Greenblatt, Andrew Tobias) http://www.amazon.com/Little-Book-That-Beats-Market/dp/0471733067/sr=1-1/qid=1157322696/ref=pd_bbs_1/104-5697528-3530338?ie=UTF8&s=books (ISBN: 0471733067)
   这本书写得通俗易懂,字数很少,特适合那些大忙人读一读.我倒是觉得所有初学者都该读读.但对书中所写方法,我持保留态度,主要是我担心你会在不适当的时机买那些周期性特强的股票.

7.Value Investing: From Graham to Buffett and Beyond (by Bruce C. N. Greenwald, Judd Kahn, Paul D. Sonkin, and Michael van Biema) (http://www.amazon.com/Value-Investing-Buffett-Finance-Paperback/dp/0471463396/sr=1-12/qid=1157319864/ref=sr_1_12/104-5697528-3530338?ie=UTF8&s=books) (ISBN: 0471463396)
  这本书的标题很吸引人,但书写得不好,学术气氛更浓一些,这书把我喜欢的课题写得居然如此枯燥无味,也算是一绝。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...