03639nam 2200625Ia 450 991087683220332120200520144314.01-119-19741-41-282-02794-897866120279490-470-48892-10-470-43648-4(CKB)1000000000719653(EBL)427888(OCoLC)428967042(SSID)ssj0000127796(PQKBManifestationID)12019347(PQKBTitleCode)TC0000127796(PQKBWorkID)10054531(PQKB)11297485(MiAaPQ)EBC427888(EXLCZ)99100000000071965320080725d2009 uy 0engur|n|---|||||txtccrComputer fraud casebook the bytes that bite /edited by Joseph T. WellsHoboken, NJ Wileyc20091 online resource (443 p.)Includes index.0-470-27814-5 COMPUTER FRAUD CASEBOOK: The Bytes That Bite; Contents; Foreword; Preface; Chapter 1: Just What the Doctor Ordered; Chapter 2: Of Botnets and Bagels: Vaccinating the Hospital against Cybercrime; Chapter 3: Pandora's Box; Chapter 4: Mail-Order Fraud; Chapter 5: Lancelot Gone Missing; Chapter 6: Double Trouble; Chapter 7: Unimaginable Wealth; Chapter 8: Hacked; Chapter 9: Bad Education; Chapter 10: If Only His Nose Could Grow; Chapter 11: Keeping Up with the Jamesons; Chapter 12: Imaginary Satellites; Chapter 13: Never Pass Your Password; Chapter 14: Why Computers and Meth Don't MixChapter 15: Fishing in Dangerous WatersChapter 16: The Man Who Told on Himself; Chapter 17: Triple Threat; Chapter 18: Swiped; Chapter 19: Have Computer, Will Video; Chapter 20: Server, We Have a Problem; Chapter 21: Do It for the Kids; Chapter 22: Moving Money; Chapter 23: Operation: Overnight Identity Theft; Chapter 24: The Karma of Fraud; Chapter 25: Secret Shopper; Chapter 26: Would You Like a Receipt?; Chapter 27: The Coupon Code Crooks; Chapter 28: He Fought the Law; Chapter 30: French Connections; Chapter 31: Irreconcilable Differences; Chapter 32: Keeping It In the FamilyChapter 33: I DueChapter 34: What Lies Inside the Trojan Horse; Chapter 35: Lost in Transition; Chapter 36: Superhero Syndrome; Chapter 37: Stealing for the Sale; Chapter 38: Do as I Say, Not as I Do; Chapter 39: Cinderella: One Glass Slipper Just Wasn't Enough; Chapter 40: Bloggers: Separating the Wheat from the Chaff; Chapter 41: The Campus Con; Chapter 42: One for You, One for Me: A Tale of Crooked Insurance; IndexThis one-of-a-kind collection consists of actual cases written by fraud examiners out in the field. These cases were hand selected from hundreds of submissions and together form a comprehensive picture of the many types of computer fraud how they are investigated, across industries and throughout the world. Topics included are email fraud, on-line auction fraud, security breaches, counterfeiting, and others.Computer crimesComputer crimesInvestigationFraudFraud investigationComputer crimes.Computer crimesInvestigation.Fraud.Fraud investigation.342.5268363.259680973Wells Joseph T866165MiAaPQMiAaPQMiAaPQBOOK9910876832203321Computer fraud casebook4199592UNINA