2008 eCrime Researchers Summit |
Pubbl/distr/stampa | [Place of publication not identified], : I E E E, 2008 |
Descrizione fisica | 1 online resource |
Disciplina | 364.168 |
Soggetto topico | Computer crimes |
ISBN | 1-5090-8094-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996203037603316 |
[Place of publication not identified], : I E E E, 2008 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
2008 eCrime Researchers Summit |
Pubbl/distr/stampa | [Place of publication not identified], : I E E E, 2008 |
Descrizione fisica | 1 online resource |
Disciplina | 364.168 |
Soggetto topico | Computer crimes |
ISBN |
9781509080946
1509080945 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910145406503321 |
[Place of publication not identified], : I E E E, 2008 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
2015 7th International Conference on Cyber Conflict, Architectures in Cyberspace : 26-29 May 2015, Tallinn, Estonia / / technical sponsor, IEEE Advancing technology for Humanity [and five others] |
Pubbl/distr/stampa | Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2015 |
Descrizione fisica | 1 online resource (244 pages) |
Disciplina | 364.168 |
Soggetto topico |
Cyberterrorism
Computer network architectures Cyberspace - Security measures |
ISBN | 9949-9544-3-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910131505603321 |
Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2015 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
2015 7th International Conference on Cyber Conflict, Architectures in Cyberspace : 26-29 May 2015, Tallinn, Estonia / / technical sponsor, IEEE Advancing technology for Humanity [and five others] |
Pubbl/distr/stampa | Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2015 |
Descrizione fisica | 1 online resource (244 pages) |
Disciplina | 364.168 |
Soggetto topico |
Cyberterrorism
Computer network architectures Cyberspace - Security measures |
ISBN | 9949-9544-3-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996280291603316 |
Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2015 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Advances in Digital Forensics X : 10th IFIP WG 11.9 International Conference, Vienna, Austria, January 8-10, 2014, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XX, 335 p. 67 illus.) |
Disciplina | 364.168 |
Collana | IFIP Advances in Information and Communication Technology |
Soggetto topico |
Data protection
Computers and civilization Electronic commerce Information technology - Management Cryptography Data encryption (Computer science) Data and Information Security Computers and Society e-Commerce and e-Business Computer Application in Administrative Data Processing Cryptology |
ISBN | 3-662-44952-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Conditional Weighted Transaction Aggregation for Credit Card Fraud Detection -- Using Fraud Trees to Analyze Internet Credit Card Fraud -- Automated Analysis of Underground Marketplaces -- An Exploratory Profiling Study of Online Auction Fraudsters -- Web User Profiling Based on Browsing Behavior Analysis -- Validation Rules for Enhanced Foxy P2P Network Investigations -- Windows Event Forensic Process -- Schema Reconstruction in Database Forensics -- Analysis of the Use of XOR as an Obfuscation Technique in a Real Data Corpus -- Similarity Hashing Based on Levenshtein Distance -- Using Approximate Matching to Reduce the Volume of Digital Data -- Active Linguistic Authentication Using Real-Time Stylometric Evaluation for Multi-Modal Decision Fusion -- Breaking the Closed-World Assumption in Stylometric Authorship Attribution -- Preserving Dates and Timestamps for Incident Handling in Android Smartphones -- An Open Source Toolkit for iOS Filesystem Forensics -- Smartphones as Distributed Witnesses for Digital Forensics -- Smartphone Message Sentiment Analysis -- Forensic Analysis of the TomTom Navigation Application -- Performance of a Logical Five-Phase, Multithreaded, Bootable Triage Tool -- Towards Fully Automated Digital Alibis with Social Interactions -- Data Corpora for Digital Forensics Education and Research -- Educating the Next Generation of Cyberforensic Professionals. |
Record Nr. | UNINA-9910298995803321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Annual Computer Security Applications Conference / / Association for Computing Machinery |
Pubbl/distr/stampa | New York, New York : , : Association for Computing Machinery, , 2020 |
Descrizione fisica | 1 online resource (962 pages) |
Disciplina | 364.168 |
Collana | ACM Other conferences |
Soggetto topico |
Computer crimes
Computer science |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910510485303321 |
New York, New York : , : Association for Computing Machinery, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Anti-Money Laundering in a Nutshell : Awareness and Compliance for Financial Personnel and Business Managers / / by Kevin Sullivan |
Autore | Sullivan Kevin |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Berkeley, CA : , : Apress : , : Imprint : Apress, , 2015 |
Descrizione fisica | 1 online resource (190 p.) |
Disciplina | 364.168 |
Soggetto topico |
Finance
Finance, general |
ISBN |
9781430261612
1430261617 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Contents; About the Author; Acknowledgments; Introduction; Chapter 1: What Is Money Laundering?; Turning "Bad" Money into "Legitimate" Money; Money Laundering All Around Us; How Money Is Laundered; Why AML Efforts Are Important; The Three Stages of Money Laundering; Placement ; Layering ; Why Layering Works ; Integration ; Putting It All Together for a Payday; Who Launders Money; Summary; Chapter 2: Methods of Money Laundering; Structuring ; Bulk Cash Smuggling; Gold ; Money Service Businesses; Money Orders ; Money Service Business
Regulations Involving Money Service Businesses Wire Transfers; How a Wire Works; Casinos; Trade-Based Money Laundering ; Over- and Under-Invoicing of Goods; Black Market Peso Exchange; Underground Banking System (Hawala) ; Cyber Banking ; Smart Cards ; Internet ; ATMs; Prepaid Cards; Autos ; Correspondent Banking; Credit Cards ; Real Estate ; Cash-Intense Business ; Insurance ; Digital Currencies; Summary; Chapter 3: Federal Regulations; 1970: Bank Secrecy Act ; What Constitutes a Financial Institution ; Currency Transaction Report; Currency Transaction Exemptions Why a CTR Is Important to Law Enforcement United States to World Comparison: Currency Transaction Reporting ; Form 8300 ; 1986: Money Laundering Control Act; 1990: FinCEN ; 1992: Annunzio-Wylie Act ; 1994: Money Laundering Suppression Act; 1998: Money Laundering and Financial Crimes Strategy Act; 2001: USA PATRIOT Act ; Office of Foreign Assets and Control; Foreign Account Tax Compliance Act; Summary; Chapter 4: Building a Quality AML Program; Recommended Elements of a Quality AML Program; The Four Pillars; Internal Policies and Procedures; Designated Compliance Officer Independent Audit Function Training ; Risk Management; Conducting Due Diligence ; Customer Risk ; Product and Service Risk ; Geographic Risk ; Common Program Deficiencies; Summary; Chapter 5: Know Your Customer and Customer Identification Program; Elements of a KYC Program; Customer Identification; Basic Customer Due Diligence; Beware Shell Companies; Identifying Customers Online ; Monitor Transactions ; The Diligences; Start with a Checklist; Beware of "Voo-Due" Diligence ; When to Perform Due Diligence or Enhanced Due Diligence ; The Investigative Mind-Set Trust Your Gut Perform Risk-Based Due Diligence; Sources of Intelligence; Other Special Considerations; Transaction Monitoring; Correspondent Banking - Know Your Correspondents; Politically Exposed Persons; Summary; Chapter 6: A SAR Is Born; The Back Story; Getting to Suspicious; Hidden Value of SARs; 30/60/90 Rule ; Completing the SAR; Why Financial Institutions Need to File; What Happens After You File; Law Enforcement Contact; Suspicious Activity Report Statistics; Summary; Chapter 7: Tips for Law Enforcement and Financial Crimes Investigators The "You Must Be An Accountant Theory" |
Altri titoli varianti | Awareness and compliance for financial personnel and business |
Record Nr. | UNINA-9910298473103321 |
Sullivan Kevin
![]() |
||
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2015 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Anti-money laundering transaction monitoring systems implementation : finding anomalies / / Derek Chau, Maarten van Dijck Nemcsik |
Autore | Chau Derek |
Pubbl/distr/stampa | Hoboken, New Jersey : , : Wiley, , [2021] |
Descrizione fisica | 1 online resource (xviii, 286 pages) : illustrations |
Disciplina | 364.168 |
Collana | Wiley and SAS business series |
Soggetto topico | Money laundering - Prevention |
ISBN |
1-119-38196-7
1-119-38187-8 1-119-38193-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910555061703321 |
Chau Derek
![]() |
||
Hoboken, New Jersey : , : Wiley, , [2021] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Anti-Money Laundering, Counter Financing Terrorism and Cybersecurity in the Banking Industry : A Comparative Study within the G-20 / / by Felix I. Lessambo |
Autore | Lessambo Felix I. |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Palgrave Macmillan, , 2023 |
Descrizione fisica | 1 online resource (245 pages) |
Disciplina | 364.168 |
Collana | Palgrave Macmillan Studies in Banking and Financial Institutions |
Soggetto topico |
Financial services industry
Finance - Law and legislation Computer crimes Financial Services Financial Law Cybercrime |
ISBN |
9783031234842
9783031234835 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1. Money Laundering and Combating Finance Terrorism -- 2. The Cybersecurity Counteroffensive -- 3. Cybersecurity and International Organization -- 4. AML and Cybersecurity in Banking Industry: Challenges -- 5. AML/CFT and Cyber Security Laws in the United States -- 6. AML/CFT and Cyber Security Laws in the European Union -- 7. AML/CFT and Cybersecurity Laws in Germany -- AML/CFT and Cybersecurity Laws in France -- 9. AML/CFT and Cybersecurity Laws in Italy -- 10. AML/CFT and Cybersecurity Laws in Spain -- 11. AML/CFT and Cybersecurity Laws in Switzerland -- 12. AML/CFT and Cybersecurity Laws in China -- 13. AML/CFT and Cybersecurity Laws in Japan -- 14. AML/CFT and Cybersecurity Laws in India -- 15. AML/CFT and Cybersecurity Laws in South Korea -- 16. AML/CFT and Cybersecurity Laws in Indonesia -- 17. AML/CFT and Cybersecurity Law in the United Kingdom -- 18. AML/CFT and Cybersecurity Law in Canada -- 19. AML/CFT and Cybersecurity Laws in Australia -- 20. AML/CFT and Cybersecurity Laws in Russia -- 21. AML/CFT and Cybersecurity Laws in Turkey -- 22. AML/CFT and Cybersecurity Laws in Brazil -- 23. AML/CFT and Cybersecurity Laws in Mexico -- 24. AML/CFT and Cybersecurity Laws in Argentina -- 25. AML/CFT and Cybersecurity Laws in Saudi Arabia -- 26. AML/CFT and Cybersecurity Laws in South Africa -- 27. AML/CFT Compliance and Audit -- 28. International and Regional Cooperation. . |
Record Nr. | UNINA-9910647789003321 |
Lessambo Felix I.
![]() |
||
Cham : , : Springer Nature Switzerland : , : Imprint : Palgrave Macmillan, , 2023 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Articolo 1 : l'Italia è una Repubblica fondata sul lavoro sfruttato / Marco Omizzolo (a cura di) ; con testi di Marco Benati ... [et al.] |
Pubbl/distr/stampa | Formigine, : Infinito, 2022 |
Descrizione fisica | 91 p. ; 21 cm |
Disciplina | 364.168 |
Collana | Tempi moderni |
Soggetto non controllato | Lavoratori - Sfruttamento - Italia |
ISBN | 978-88-6861-621-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | ita |
Record Nr. | UNINA-9910843101003321 |
Formigine, : Infinito, 2022 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|