top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
2008 eCrime Researchers Summit
2008 eCrime Researchers Summit
Pubbl/distr/stampa [Place of publication not identified], : I E E E, 2008
Descrizione fisica 1 online resource
Disciplina 364.168
Soggetto topico Computer crimes
ISBN 1-5090-8094-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996203037603316
[Place of publication not identified], : I E E E, 2008
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
2008 eCrime Researchers Summit
2008 eCrime Researchers Summit
Pubbl/distr/stampa [Place of publication not identified], : I E E E, 2008
Descrizione fisica 1 online resource
Disciplina 364.168
Soggetto topico Computer crimes
ISBN 9781509080946
1509080945
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910145406503321
[Place of publication not identified], : I E E E, 2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
2015 7th International Conference on Cyber Conflict, Architectures in Cyberspace : 26-29 May 2015, Tallinn, Estonia / / technical sponsor, IEEE Advancing technology for Humanity [and five others]
2015 7th International Conference on Cyber Conflict, Architectures in Cyberspace : 26-29 May 2015, Tallinn, Estonia / / technical sponsor, IEEE Advancing technology for Humanity [and five others]
Pubbl/distr/stampa Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2015
Descrizione fisica 1 online resource (244 pages)
Disciplina 364.168
Soggetto topico Cyberterrorism
Computer network architectures
Cyberspace - Security measures
ISBN 9949-9544-3-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910131505603321
Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
2015 7th International Conference on Cyber Conflict, Architectures in Cyberspace : 26-29 May 2015, Tallinn, Estonia / / technical sponsor, IEEE Advancing technology for Humanity [and five others]
2015 7th International Conference on Cyber Conflict, Architectures in Cyberspace : 26-29 May 2015, Tallinn, Estonia / / technical sponsor, IEEE Advancing technology for Humanity [and five others]
Pubbl/distr/stampa Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2015
Descrizione fisica 1 online resource (244 pages)
Disciplina 364.168
Soggetto topico Cyberterrorism
Computer network architectures
Cyberspace - Security measures
ISBN 9949-9544-3-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996280291603316
Piscataway, New Jersey : , : Institute of Electrical and Electronics Engineers, , 2015
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in Digital Forensics X : 10th IFIP WG 11.9 International Conference, Vienna, Austria, January 8-10, 2014, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
Advances in Digital Forensics X : 10th IFIP WG 11.9 International Conference, Vienna, Austria, January 8-10, 2014, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XX, 335 p. 67 illus.)
Disciplina 364.168
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Data protection
Computers and civilization
Electronic commerce
Information technology - Management
Cryptography
Data encryption (Computer science)
Data and Information Security
Computers and Society
e-Commerce and e-Business
Computer Application in Administrative Data Processing
Cryptology
ISBN 3-662-44952-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Conditional Weighted Transaction Aggregation for Credit Card Fraud Detection -- Using Fraud Trees to Analyze Internet Credit Card Fraud -- Automated Analysis of Underground Marketplaces -- An Exploratory Profiling Study of Online Auction Fraudsters -- Web User Profiling Based on Browsing Behavior Analysis -- Validation Rules for Enhanced Foxy P2P Network Investigations -- Windows Event Forensic Process -- Schema Reconstruction in Database Forensics -- Analysis of the Use of XOR as an Obfuscation Technique in a Real Data Corpus -- Similarity Hashing Based on Levenshtein Distance -- Using Approximate Matching to Reduce the Volume of Digital Data -- Active Linguistic Authentication Using Real-Time Stylometric Evaluation for Multi-Modal Decision Fusion -- Breaking the Closed-World Assumption in Stylometric Authorship Attribution -- Preserving Dates and Timestamps for Incident Handling in Android Smartphones -- An Open Source Toolkit for iOS Filesystem Forensics -- Smartphones as Distributed Witnesses for Digital Forensics -- Smartphone Message Sentiment Analysis -- Forensic Analysis of the TomTom Navigation Application -- Performance of a Logical Five-Phase, Multithreaded, Bootable Triage Tool -- Towards Fully Automated Digital Alibis with Social Interactions -- Data Corpora for Digital Forensics Education and Research -- Educating the Next Generation of Cyberforensic Professionals.
Record Nr. UNINA-9910298995803321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Annual Computer Security Applications Conference / / Association for Computing Machinery
Annual Computer Security Applications Conference / / Association for Computing Machinery
Pubbl/distr/stampa New York, New York : , : Association for Computing Machinery, , 2020
Descrizione fisica 1 online resource (962 pages)
Disciplina 364.168
Collana ACM Other conferences
Soggetto topico Computer crimes
Computer science
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910510485303321
New York, New York : , : Association for Computing Machinery, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Anti-Money Laundering in a Nutshell : Awareness and Compliance for Financial Personnel and Business Managers / / by Kevin Sullivan
Anti-Money Laundering in a Nutshell : Awareness and Compliance for Financial Personnel and Business Managers / / by Kevin Sullivan
Autore Sullivan Kevin
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Berkeley, CA : , : Apress : , : Imprint : Apress, , 2015
Descrizione fisica 1 online resource (190 p.)
Disciplina 364.168
Soggetto topico Finance
Finance, general
ISBN 9781430261612
1430261617
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Contents; About the Author; Acknowledgments; Introduction; Chapter 1: What Is Money Laundering?; Turning "Bad" Money into "Legitimate" Money; Money Laundering All Around Us; How Money Is Laundered; Why AML Efforts Are Important; The Three Stages of Money Laundering; Placement ; Layering ; Why Layering Works ; Integration ; Putting It All Together for a Payday; Who Launders Money; Summary; Chapter 2: Methods of Money Laundering; Structuring ; Bulk Cash Smuggling; Gold ; Money Service Businesses; Money Orders ; Money Service Business
Regulations Involving Money Service Businesses Wire Transfers; How a Wire Works; Casinos; Trade-Based Money Laundering ; Over- and Under-Invoicing of Goods; Black Market Peso Exchange; Underground Banking System (Hawala) ; Cyber Banking ; Smart Cards ; Internet ; ATMs; Prepaid Cards; Autos ; Correspondent Banking; Credit Cards ; Real Estate ; Cash-Intense Business ; Insurance ; Digital Currencies; Summary; Chapter 3: Federal Regulations; 1970: Bank Secrecy Act ; What Constitutes a Financial Institution ; Currency Transaction Report; Currency Transaction Exemptions
Why a CTR Is Important to Law Enforcement United States to World Comparison: Currency Transaction Reporting ; Form 8300 ; 1986: Money Laundering Control Act; 1990: FinCEN ; 1992: Annunzio-Wylie Act ; 1994: Money Laundering Suppression Act; 1998: Money Laundering and Financial Crimes Strategy Act; 2001: USA PATRIOT Act ; Office of Foreign Assets and Control; Foreign Account Tax Compliance Act; Summary; Chapter 4: Building a Quality AML Program; Recommended Elements of a Quality AML Program; The Four Pillars; Internal Policies and Procedures; Designated Compliance Officer
Independent Audit Function Training ; Risk Management; Conducting Due Diligence ; Customer Risk ; Product and Service Risk ; Geographic Risk ; Common Program Deficiencies; Summary; Chapter 5: Know Your Customer and Customer Identification Program; Elements of a KYC Program; Customer Identification; Basic Customer Due Diligence; Beware Shell Companies; Identifying Customers Online ; Monitor Transactions ; The Diligences; Start with a Checklist; Beware of "Voo-Due" Diligence ; When to Perform Due Diligence or Enhanced Due Diligence ; The Investigative Mind-Set
Trust Your Gut Perform Risk-Based Due Diligence; Sources of Intelligence; Other Special Considerations; Transaction Monitoring; Correspondent Banking - Know Your Correspondents; Politically Exposed Persons; Summary; Chapter 6: A SAR Is Born; The Back Story; Getting to Suspicious; Hidden Value of SARs; 30/60/90 Rule ; Completing the SAR; Why Financial Institutions Need to File; What Happens After You File; Law Enforcement Contact; Suspicious Activity Report Statistics; Summary; Chapter 7: Tips for Law Enforcement and Financial Crimes Investigators
The "You Must Be An Accountant Theory"
Altri titoli varianti Awareness and compliance for financial personnel and business
Record Nr. UNINA-9910298473103321
Sullivan Kevin  
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Anti-money laundering transaction monitoring systems implementation : finding anomalies / / Derek Chau, Maarten van Dijck Nemcsik
Anti-money laundering transaction monitoring systems implementation : finding anomalies / / Derek Chau, Maarten van Dijck Nemcsik
Autore Chau Derek
Pubbl/distr/stampa Hoboken, New Jersey : , : Wiley, , [2021]
Descrizione fisica 1 online resource (xviii, 286 pages) : illustrations
Disciplina 364.168
Collana Wiley and SAS business series
Soggetto topico Money laundering - Prevention
ISBN 1-119-38196-7
1-119-38187-8
1-119-38193-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910555061703321
Chau Derek  
Hoboken, New Jersey : , : Wiley, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Anti-Money Laundering, Counter Financing Terrorism and Cybersecurity in the Banking Industry : A Comparative Study within the G-20 / / by Felix I. Lessambo
Anti-Money Laundering, Counter Financing Terrorism and Cybersecurity in the Banking Industry : A Comparative Study within the G-20 / / by Felix I. Lessambo
Autore Lessambo Felix I.
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Palgrave Macmillan, , 2023
Descrizione fisica 1 online resource (245 pages)
Disciplina 364.168
Collana Palgrave Macmillan Studies in Banking and Financial Institutions
Soggetto topico Financial services industry
Finance - Law and legislation
Computer crimes
Financial Services
Financial Law
Cybercrime
ISBN 9783031234842
9783031234835
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Money Laundering and Combating Finance Terrorism -- 2. The Cybersecurity Counteroffensive -- 3. Cybersecurity and International Organization -- 4. AML and Cybersecurity in Banking Industry: Challenges -- 5. AML/CFT and Cyber Security Laws in the United States -- 6. AML/CFT and Cyber Security Laws in the European Union -- 7. AML/CFT and Cybersecurity Laws in Germany -- AML/CFT and Cybersecurity Laws in France -- 9. AML/CFT and Cybersecurity Laws in Italy -- 10. AML/CFT and Cybersecurity Laws in Spain -- 11. AML/CFT and Cybersecurity Laws in Switzerland -- 12. AML/CFT and Cybersecurity Laws in China -- 13. AML/CFT and Cybersecurity Laws in Japan -- 14. AML/CFT and Cybersecurity Laws in India -- 15. AML/CFT and Cybersecurity Laws in South Korea -- 16. AML/CFT and Cybersecurity Laws in Indonesia -- 17. AML/CFT and Cybersecurity Law in the United Kingdom -- 18. AML/CFT and Cybersecurity Law in Canada -- 19. AML/CFT and Cybersecurity Laws in Australia -- 20. AML/CFT and Cybersecurity Laws in Russia -- 21. AML/CFT and Cybersecurity Laws in Turkey -- 22. AML/CFT and Cybersecurity Laws in Brazil -- 23. AML/CFT and Cybersecurity Laws in Mexico -- 24. AML/CFT and Cybersecurity Laws in Argentina -- 25. AML/CFT and Cybersecurity Laws in Saudi Arabia -- 26. AML/CFT and Cybersecurity Laws in South Africa -- 27. AML/CFT Compliance and Audit -- 28. International and Regional Cooperation. .
Record Nr. UNINA-9910647789003321
Lessambo Felix I.  
Cham : , : Springer Nature Switzerland : , : Imprint : Palgrave Macmillan, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Articolo 1 : l'Italia è una Repubblica fondata sul lavoro sfruttato / Marco Omizzolo (a cura di) ; con testi di Marco Benati ... [et al.]
Articolo 1 : l'Italia è una Repubblica fondata sul lavoro sfruttato / Marco Omizzolo (a cura di) ; con testi di Marco Benati ... [et al.]
Pubbl/distr/stampa Formigine, : Infinito, 2022
Descrizione fisica 91 p. ; 21 cm
Disciplina 364.168
Collana Tempi moderni
Soggetto non controllato Lavoratori - Sfruttamento - Italia
ISBN 978-88-6861-621-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione ita
Record Nr. UNINA-9910843101003321
Formigine, : Infinito, 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui

Data di pubblicazione

Altro...