top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Computer fraud casebook [[electronic resource] ] : the bytes that bite / / edited by Joseph T. Wells
Computer fraud casebook [[electronic resource] ] : the bytes that bite / / edited by Joseph T. Wells
Pubbl/distr/stampa Hoboken, NJ, : Wiley, c2009
Descrizione fisica 1 online resource (443 p.)
Disciplina 342.5268
363.259680973
Altri autori (Persone) WellsJoseph T
Soggetto topico Computer crimes
Computer crimes - Investigation
Fraud
Fraud investigation
Soggetto genere / forma Electronic books.
ISBN 1-119-19741-4
1-282-02794-8
9786612027949
0-470-48892-1
0-470-43648-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto COMPUTER FRAUD CASEBOOK: The Bytes That Bite; Contents; Foreword; Preface; Chapter 1: Just What the Doctor Ordered; Chapter 2: Of Botnets and Bagels: Vaccinating the Hospital against Cybercrime; Chapter 3: Pandora's Box; Chapter 4: Mail-Order Fraud; Chapter 5: Lancelot Gone Missing; Chapter 6: Double Trouble; Chapter 7: Unimaginable Wealth; Chapter 8: Hacked; Chapter 9: Bad Education; Chapter 10: If Only His Nose Could Grow; Chapter 11: Keeping Up with the Jamesons; Chapter 12: Imaginary Satellites; Chapter 13: Never Pass Your Password; Chapter 14: Why Computers and Meth Don't Mix
Chapter 15: Fishing in Dangerous WatersChapter 16: The Man Who Told on Himself; Chapter 17: Triple Threat; Chapter 18: Swiped; Chapter 19: Have Computer, Will Video; Chapter 20: Server, We Have a Problem; Chapter 21: Do It for the Kids; Chapter 22: Moving Money; Chapter 23: Operation: Overnight Identity Theft; Chapter 24: The Karma of Fraud; Chapter 25: Secret Shopper; Chapter 26: Would You Like a Receipt?; Chapter 27: The Coupon Code Crooks; Chapter 28: He Fought the Law; Chapter 30: French Connections; Chapter 31: Irreconcilable Differences; Chapter 32: Keeping It In the Family
Chapter 33: I DueChapter 34: What Lies Inside the Trojan Horse; Chapter 35: Lost in Transition; Chapter 36: Superhero Syndrome; Chapter 37: Stealing for the Sale; Chapter 38: Do as I Say, Not as I Do; Chapter 39: Cinderella: One Glass Slipper Just Wasn't Enough; Chapter 40: Bloggers: Separating the Wheat from the Chaff; Chapter 41: The Campus Con; Chapter 42: One for You, One for Me: A Tale of Crooked Insurance; Index
Record Nr. UNINA-9910145951203321
Hoboken, NJ, : Wiley, c2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer fraud casebook [[electronic resource] ] : the bytes that bite / / edited by Joseph T. Wells
Computer fraud casebook [[electronic resource] ] : the bytes that bite / / edited by Joseph T. Wells
Pubbl/distr/stampa Hoboken, NJ, : Wiley, c2009
Descrizione fisica 1 online resource (443 p.)
Disciplina 342.5268
363.259680973
Altri autori (Persone) WellsJoseph T
Soggetto topico Computer crimes
Computer crimes - Investigation
Fraud
Fraud investigation
ISBN 1-119-19741-4
1-282-02794-8
9786612027949
0-470-48892-1
0-470-43648-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto COMPUTER FRAUD CASEBOOK: The Bytes That Bite; Contents; Foreword; Preface; Chapter 1: Just What the Doctor Ordered; Chapter 2: Of Botnets and Bagels: Vaccinating the Hospital against Cybercrime; Chapter 3: Pandora's Box; Chapter 4: Mail-Order Fraud; Chapter 5: Lancelot Gone Missing; Chapter 6: Double Trouble; Chapter 7: Unimaginable Wealth; Chapter 8: Hacked; Chapter 9: Bad Education; Chapter 10: If Only His Nose Could Grow; Chapter 11: Keeping Up with the Jamesons; Chapter 12: Imaginary Satellites; Chapter 13: Never Pass Your Password; Chapter 14: Why Computers and Meth Don't Mix
Chapter 15: Fishing in Dangerous WatersChapter 16: The Man Who Told on Himself; Chapter 17: Triple Threat; Chapter 18: Swiped; Chapter 19: Have Computer, Will Video; Chapter 20: Server, We Have a Problem; Chapter 21: Do It for the Kids; Chapter 22: Moving Money; Chapter 23: Operation: Overnight Identity Theft; Chapter 24: The Karma of Fraud; Chapter 25: Secret Shopper; Chapter 26: Would You Like a Receipt?; Chapter 27: The Coupon Code Crooks; Chapter 28: He Fought the Law; Chapter 30: French Connections; Chapter 31: Irreconcilable Differences; Chapter 32: Keeping It In the Family
Chapter 33: I DueChapter 34: What Lies Inside the Trojan Horse; Chapter 35: Lost in Transition; Chapter 36: Superhero Syndrome; Chapter 37: Stealing for the Sale; Chapter 38: Do as I Say, Not as I Do; Chapter 39: Cinderella: One Glass Slipper Just Wasn't Enough; Chapter 40: Bloggers: Separating the Wheat from the Chaff; Chapter 41: The Campus Con; Chapter 42: One for You, One for Me: A Tale of Crooked Insurance; Index
Record Nr. UNINA-9910829837803321
Hoboken, NJ, : Wiley, c2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer fraud casebook : the bytes that bite / / edited by Joseph T. Wells
Computer fraud casebook : the bytes that bite / / edited by Joseph T. Wells
Pubbl/distr/stampa Hoboken, NJ, : Wiley, c2009
Descrizione fisica 1 online resource (443 p.)
Disciplina 342.5268
363.259680973
Altri autori (Persone) WellsJoseph T
Soggetto topico Computer crimes
Computer crimes - Investigation
Fraud
Fraud investigation
ISBN 9786612027949
9781119197416
1119197414
9781282027947
1282027948
9780470488928
0470488921
9780470436486
0470436484
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto COMPUTER FRAUD CASEBOOK: The Bytes That Bite; Contents; Foreword; Preface; Chapter 1: Just What the Doctor Ordered; Chapter 2: Of Botnets and Bagels: Vaccinating the Hospital against Cybercrime; Chapter 3: Pandora's Box; Chapter 4: Mail-Order Fraud; Chapter 5: Lancelot Gone Missing; Chapter 6: Double Trouble; Chapter 7: Unimaginable Wealth; Chapter 8: Hacked; Chapter 9: Bad Education; Chapter 10: If Only His Nose Could Grow; Chapter 11: Keeping Up with the Jamesons; Chapter 12: Imaginary Satellites; Chapter 13: Never Pass Your Password; Chapter 14: Why Computers and Meth Don't Mix
Chapter 15: Fishing in Dangerous WatersChapter 16: The Man Who Told on Himself; Chapter 17: Triple Threat; Chapter 18: Swiped; Chapter 19: Have Computer, Will Video; Chapter 20: Server, We Have a Problem; Chapter 21: Do It for the Kids; Chapter 22: Moving Money; Chapter 23: Operation: Overnight Identity Theft; Chapter 24: The Karma of Fraud; Chapter 25: Secret Shopper; Chapter 26: Would You Like a Receipt?; Chapter 27: The Coupon Code Crooks; Chapter 28: He Fought the Law; Chapter 30: French Connections; Chapter 31: Irreconcilable Differences; Chapter 32: Keeping It In the Family
Chapter 33: I DueChapter 34: What Lies Inside the Trojan Horse; Chapter 35: Lost in Transition; Chapter 36: Superhero Syndrome; Chapter 37: Stealing for the Sale; Chapter 38: Do as I Say, Not as I Do; Chapter 39: Cinderella: One Glass Slipper Just Wasn't Enough; Chapter 40: Bloggers: Separating the Wheat from the Chaff; Chapter 41: The Campus Con; Chapter 42: One for You, One for Me: A Tale of Crooked Insurance; Index
Record Nr. UNINA-9911019242503321
Hoboken, NJ, : Wiley, c2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui