Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Financial Analysis with Microsoft  Excel

Buy
FAME explores the use of Excel as THE calculating tool for finance professionals. As students enter College with basic skills for using Excel and other software packages they need for their business courses, the materials they read must be ramped up. The book as it stands covers the main topics that students would see in a typical corporate finance course: financial statements, budgets, TVM, capital budgeting, the Market Security Line, some options materials, pro forma statements, cost of capital, equities, and debt. In the final chapter of this revision, we include a section on how students can build their own models (or macros) to perform everyday financial analyses.

About the Author

Timothy R. Mayes is a finance professor at Metropolitan State College of Denver. He holds a BS/BA in Finance and a Ph.D. in Finance from the University of Central Florida. His research interests include portfolio performance analysis and reporting, portfolio theory, derivatives, and, of course, the use of spreadsheets in financial education. Dr. Mayes may be contacted by e-mail at mayest@mscd.edu. Todd M. Shank, Ph.D. is Associate Dean and MBA Director, Robert B. Pamplin, Jr. School of Business Administration at the University of Portland in Portland, Oregon. He was recently chosen to serve as a Fulbright Lecturer in China (during the Spring, 2003 semester), where he will teach corporate financial management in the graduate school at Sun Yat-sen University in Guangzhou. Shank formerly worked for the U.S. Treasury Department's Office of Comptroller of the Currency as a banking regulator and has been teaching, consulting, and writing for over 20 years. During that time, he has served on the faculties of three universities, published two textbooks and academic articles in journals including American Business Review, Global Business and Finance Review, Journal of Foreign Exchange and International Finance, and the Journal of Financial Education, among others. He has received numerous teaching awards, including the University's Teacher of the Year and the Pamplin School's Best Graduate Professor. He also serves on several national panels that promote technological applications in business education.
(HTML tags aren't allowed.)

Role Engineering for Enterprise Security Management (Information Security and Privacy)
Role Engineering for Enterprise Security Management (Information Security and Privacy)
Role-based access control (RBAC) promises to provide several benefits to organizations. These benefits include simplified security provisioning and administration, ease of reporting on privileges and to whom they are available, and finer grained security authorization. By being policy-neutral, RBAC can be used to enforce the variety of access...
Modeling & Simulation-Based Data Engineering: Introducing Pragmatics into Ontologies for Net-Centric Information Exchange
Modeling & Simulation-Based Data Engineering: Introducing Pragmatics into Ontologies for Net-Centric Information Exchange

Data Engineering has become a necessary and critical activity for business, engineering, and scientific organizations as the move to service oriented architecture and web services moves into full swing. Notably, the US Department of Defense is mandating that all of its agencies and contractors assume a defining presence on the Net-centric...

Instant Netcat Starter
Instant Netcat Starter

As a featured networking utility, Netcat uses TCP/IP protocols to read and write data across network connections. Netcat is a feature rich backend network debugging and exploration tool with the ability to create almost any type of connection you would need.

"Instant Netcat Starter Guide" is a practical, hands-on guide...


Web Penetration Testing with Kali Linux - Third Edition: Explore the methods and tools of ethical hacking with Kali Linux
Web Penetration Testing with Kali Linux - Third Edition: Explore the methods and tools of ethical hacking with Kali Linux

Build your defense against web attacks with Kali Linux, including command injection flaws, crypto implementation layers, and web application security holes

Key Features

  • Know how to set up your lab with Kali Linux
  • Discover the core concepts of web penetration testing
  • ...
Volume 3, The Organic Chemistry of Drug Synthesis
Volume 3, The Organic Chemistry of Drug Synthesis
Ihe first volume in this series represented the launching of a trial balloon on the part of the authors. In the first place, wo were not entirely convinced that contemporary medicinal (hemistry could in fact be organized coherently on the basis of organic chemistry. If, however, one granted that this might be done, we were not at all certain that...
Computability and Unsolvability (Mcgraw-Hill Series in Information Processing and Computers.)
Computability and Unsolvability (Mcgraw-Hill Series in Information Processing and Computers.)
Classic text considers general theory of computability, computable functions, operations on computable functions, Turing machines self-applied, unsolvable decision problems, applications of general theory, mathematical logic, Kleene hierarchy, computable functionals, classification of unsolvable decision problems and more.

This book is
...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy