The accredited counter fraud specialist handbook / / Martin Tunley [and three others] |
Autore | Tunley Martin |
Pubbl/distr/stampa | Chichester, England : , : Wiley, , 2015 |
Descrizione fisica | 1 online resource (305 p.) |
Disciplina | 658.4/73 |
Soggetto topico |
Fraud
Fraud - Prevention Fraud investigation |
ISBN |
1-119-01725-4
1-118-79879-1 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
The Accredited Counter Fraud Specialist Handbook; Contents; CHAPTER ONE How the counter fraud profession developed and what the counter fraud professional should be; INTRODUCTION; COUNTER FRAUD PROFESSIONAL INFRASTRUCTURE; THE HISTORY OF THE COUNTER FRAUD PROFESSION; DEVELOPING A PROFESSIONAL INFRASTRUCTURE; THE ESSENCE OF THE COUNTER FRAUD PROFESSIONAL; The Enlightened Professional; The 'Reflective' Professional; The Counter Fraud Leader; REDEFINING THE COUNTER FRAUD PROFESSIONAL; REDEFINING THE LEXICON OF COUNTERING FRAUD
Communicating the Rewards of Successfully Countering Fraud to the Wider Organisation and Particularly the LeadersSecuring Positions of Influence within the Organisation; REVIEW; FURTHER READING; CHAPTER TWO The Fraud Act 2006 and fraud related legislation; INTRODUCTION; THE FRAUD ACT 2006; Offences Repealed; Overview; Criticism of the Fraud Act 2006; CRIMINAL LAW ACT 1977; CRIMINAL ATTEMPTS ACT 1981; THEFT ACT 1968; Section 1 - Basic definition of theft; Section 2 - Dishonesty; Section 3 - Appropriates; Section 4 - Property; Section 5 - Belonging to Another Section 6 - Intention to Permanently DepriveFRAUD RELATED OFFENCES; Section 16 - Obtaining Pecuniary Advantage by Deception (repealed by the Fraud Act 2006); Section 17 - False Accounting; Section 24a - Dishonestly Retaining a Wrongful Credit; BRIBERY ACT 2010; COMPUTER MISUSE ACT 1990; Section 1 - Unauthorised Access to Computer Material; Section 2 - Unauthorised Access with Intent to Commit or Facilitate Commission of Further Offences; Section 3 - Unauthorised Acts with Intent to Impair, or with Recklessness as to Impairing, Operation of Computer, etc. Section 3A - Making, Supplying or Obtaining Articles for Use in Offence under Section 1 or 3INVENTORY OF ADDITIONAL LEGISLATION; REVIEW; FURTHER READING; CHAPTER THREE Governing legislation; INTRODUCTION; CRIMINAL PROCEDURE AND INVESTIGATIONS ACT 1996; Introduction; The Role of the ACFS; Disclosure; Sensitive Material; DATA PROTECTION ACT 1998; DPA Terminology; Data Protection Principles; Criminal Offences; Statutory Exclusions; Best Practice to be DPA Compliant; HUMAN RIGHTS ACT 1998; How Does the HRA Work?; Convention Rights (the Articles); REGULATION OF INVESTIGATORY POWERS ACT 2000 What is Surveillance?Covert Surveillance; Directed Surveillance; Human and Technical Surveillance; Covert Human Intelligence Source (CHIS); Office of Surveillance Commissioner; TELECOMMUNICATIONS (LAWFUL BUSINESS PRACTICE) (INTERCEPTION OF COMMUNICATIONS) REGULATIONS 2000; POLICE AND CRIMINAL EVIDENCE ACT 1984; Scope of PACE and the Codes of Practice; Investigative Responsibilities; Right to Silence; Unreliable Evidence; Entry, Search and Seizure; Detention; Treatment in Custody; PUBLIC INTEREST DISCLOSURE ACT 1998; What Protection is Afforded to a Whistleblower? FREEDOM OF INFORMATION ACT 2000 |
Record Nr. | UNINA-9910132325803321 |
Tunley Martin
![]() |
||
Chichester, England : , : Wiley, , 2015 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
The accredited counter fraud specialist handbook / / Martin Tunley [and three others] |
Autore | Tunley Martin |
Pubbl/distr/stampa | Chichester, England : , : Wiley, , 2015 |
Descrizione fisica | 1 online resource (305 p.) |
Disciplina | 658.4/73 |
Soggetto topico |
Fraud
Fraud - Prevention Fraud investigation |
ISBN |
1-119-01725-4
1-118-79879-1 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
The Accredited Counter Fraud Specialist Handbook; Contents; CHAPTER ONE How the counter fraud profession developed and what the counter fraud professional should be; INTRODUCTION; COUNTER FRAUD PROFESSIONAL INFRASTRUCTURE; THE HISTORY OF THE COUNTER FRAUD PROFESSION; DEVELOPING A PROFESSIONAL INFRASTRUCTURE; THE ESSENCE OF THE COUNTER FRAUD PROFESSIONAL; The Enlightened Professional; The 'Reflective' Professional; The Counter Fraud Leader; REDEFINING THE COUNTER FRAUD PROFESSIONAL; REDEFINING THE LEXICON OF COUNTERING FRAUD
Communicating the Rewards of Successfully Countering Fraud to the Wider Organisation and Particularly the LeadersSecuring Positions of Influence within the Organisation; REVIEW; FURTHER READING; CHAPTER TWO The Fraud Act 2006 and fraud related legislation; INTRODUCTION; THE FRAUD ACT 2006; Offences Repealed; Overview; Criticism of the Fraud Act 2006; CRIMINAL LAW ACT 1977; CRIMINAL ATTEMPTS ACT 1981; THEFT ACT 1968; Section 1 - Basic definition of theft; Section 2 - Dishonesty; Section 3 - Appropriates; Section 4 - Property; Section 5 - Belonging to Another Section 6 - Intention to Permanently DepriveFRAUD RELATED OFFENCES; Section 16 - Obtaining Pecuniary Advantage by Deception (repealed by the Fraud Act 2006); Section 17 - False Accounting; Section 24a - Dishonestly Retaining a Wrongful Credit; BRIBERY ACT 2010; COMPUTER MISUSE ACT 1990; Section 1 - Unauthorised Access to Computer Material; Section 2 - Unauthorised Access with Intent to Commit or Facilitate Commission of Further Offences; Section 3 - Unauthorised Acts with Intent to Impair, or with Recklessness as to Impairing, Operation of Computer, etc. Section 3A - Making, Supplying or Obtaining Articles for Use in Offence under Section 1 or 3INVENTORY OF ADDITIONAL LEGISLATION; REVIEW; FURTHER READING; CHAPTER THREE Governing legislation; INTRODUCTION; CRIMINAL PROCEDURE AND INVESTIGATIONS ACT 1996; Introduction; The Role of the ACFS; Disclosure; Sensitive Material; DATA PROTECTION ACT 1998; DPA Terminology; Data Protection Principles; Criminal Offences; Statutory Exclusions; Best Practice to be DPA Compliant; HUMAN RIGHTS ACT 1998; How Does the HRA Work?; Convention Rights (the Articles); REGULATION OF INVESTIGATORY POWERS ACT 2000 What is Surveillance?Covert Surveillance; Directed Surveillance; Human and Technical Surveillance; Covert Human Intelligence Source (CHIS); Office of Surveillance Commissioner; TELECOMMUNICATIONS (LAWFUL BUSINESS PRACTICE) (INTERCEPTION OF COMMUNICATIONS) REGULATIONS 2000; POLICE AND CRIMINAL EVIDENCE ACT 1984; Scope of PACE and the Codes of Practice; Investigative Responsibilities; Right to Silence; Unreliable Evidence; Entry, Search and Seizure; Detention; Treatment in Custody; PUBLIC INTEREST DISCLOSURE ACT 1998; What Protection is Afforded to a Whistleblower? FREEDOM OF INFORMATION ACT 2000 |
Record Nr. | UNINA-9910825121103321 |
Tunley Martin
![]() |
||
Chichester, England : , : Wiley, , 2015 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Anatomy of a fraud bust : from investigation to conviction : hearing before the Committee on Finance, United States Senate, One Hundred Twelfth Congress, second session, April 24, 2012 |
Pubbl/distr/stampa | Washington : , : U.S. G.P.O., , 2012 |
Descrizione fisica | 1 online resource (iii, 102 pages) : illustrations |
Collana | S. hrg. |
Soggetto topico |
Medicare fraud - Florida
Insurance fraud - Florida Fraud investigation - Florida Medicare fraud - Prevention Medicaid fraud - Prevention Insurance fraud - United States - Prevention Fraud investigation - United States Fraud investigation Insurance crimes Insurance crimes - Prevention Medicare fraud |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Anatomy of a fraud bust |
Record Nr. | UNINA-9910704554303321 |
Washington : , : U.S. G.P.O., , 2012 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Anatomy of a fraud investigation [[electronic resource] ] : from detection to prosecution / / Stephen Pedneault |
Autore | Pedneault Stephen <1966-> |
Pubbl/distr/stampa | Hoboken, NJ, : John Wiley & Sons, 2010 |
Descrizione fisica | 1 online resource (211 p.) |
Disciplina | 363.25963 |
Soggetto topico |
Fraud
Fraud investigation |
Soggetto genere / forma | Electronic books. |
ISBN |
0-470-59114-5
1-119-19980-8 1-282-68271-7 9786612682711 0-470-59112-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
ANATOMY OF A FRAUD INVESTIGATION: From Detection to Prosecution; CONTENTS; ACKNOWLEDGMENTS; INTRODUCTION; CHAPTER 1: FIRST INDICATIONS (THEY'RE DOING WHAT?); CHAPTER 2: THE IMPORTANCE OF PLANNING (MAXIMIZING DESIRED OUTCOMES); CHAPTER 3: COLLECTING THE EVIDENCE (A.K.A. ""THE RAID""); CHAPTER 4: REVIEWING THE EVIDENCE (THE DAY AFTER); CHAPTER 5: ELECTRONIC EVIDENCE CONSIDERATIONS (COMPUTERS, FILES, AND COMMUNICATIONS); CHAPTER 6: INTERVIEWING (RESPONDING TO TEARS); CHAPTER 7: IMPORTANCE OF DOCUMENTATION (KEEPING TRACK OF THINGS)
CHAPTER 8: FURTHER INVESTIGATIVE MEASURES (OBTAINING MORE EVIDENCE)CHAPTER 9: TRACKING DOWN LEADS (THE PLOT THICKENS); CHAPTER 10: DRAWING CONCLUSIONS (WHAT DOES IT ALL SHOW?); CHAPTER 11: CONFRONTING THE SUSPECT (''I DIDN'T DO ANYTHING WRONG''); CHAPTER 12: DOCUMENTING THE INVESTIGATION (YOUR WRITTEN REPORT); CHAPTER 13: WORKING TOWARD A RESOLUTION (""I DON'T WANT TO GO TO PRISON""); CHAPTER 14: CASE CLOSED!; EPILOGUE: DO YOU WANT TO KNOW THE OUTCOME?; NOTES; ABOUT THE AUTHOR; INDEX |
Record Nr. | UNINA-9910139516703321 |
Pedneault Stephen <1966->
![]() |
||
Hoboken, NJ, : John Wiley & Sons, 2010 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Anatomy of a fraud investigation [[electronic resource] ] : from detection to prosecution / / Stephen Pedneault |
Autore | Pedneault Stephen <1966-> |
Pubbl/distr/stampa | Hoboken, NJ, : John Wiley & Sons, 2010 |
Descrizione fisica | 1 online resource (211 p.) |
Disciplina | 363.25963 |
Soggetto topico |
Fraud
Fraud investigation |
ISBN |
0-470-59114-5
1-119-19980-8 1-282-68271-7 9786612682711 0-470-59112-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
ANATOMY OF A FRAUD INVESTIGATION: From Detection to Prosecution; CONTENTS; ACKNOWLEDGMENTS; INTRODUCTION; CHAPTER 1: FIRST INDICATIONS (THEY'RE DOING WHAT?); CHAPTER 2: THE IMPORTANCE OF PLANNING (MAXIMIZING DESIRED OUTCOMES); CHAPTER 3: COLLECTING THE EVIDENCE (A.K.A. ""THE RAID""); CHAPTER 4: REVIEWING THE EVIDENCE (THE DAY AFTER); CHAPTER 5: ELECTRONIC EVIDENCE CONSIDERATIONS (COMPUTERS, FILES, AND COMMUNICATIONS); CHAPTER 6: INTERVIEWING (RESPONDING TO TEARS); CHAPTER 7: IMPORTANCE OF DOCUMENTATION (KEEPING TRACK OF THINGS)
CHAPTER 8: FURTHER INVESTIGATIVE MEASURES (OBTAINING MORE EVIDENCE)CHAPTER 9: TRACKING DOWN LEADS (THE PLOT THICKENS); CHAPTER 10: DRAWING CONCLUSIONS (WHAT DOES IT ALL SHOW?); CHAPTER 11: CONFRONTING THE SUSPECT (''I DIDN'T DO ANYTHING WRONG''); CHAPTER 12: DOCUMENTING THE INVESTIGATION (YOUR WRITTEN REPORT); CHAPTER 13: WORKING TOWARD A RESOLUTION (""I DON'T WANT TO GO TO PRISON""); CHAPTER 14: CASE CLOSED!; EPILOGUE: DO YOU WANT TO KNOW THE OUTCOME?; NOTES; ABOUT THE AUTHOR; INDEX |
Record Nr. | UNINA-9910830050003321 |
Pedneault Stephen <1966->
![]() |
||
Hoboken, NJ, : John Wiley & Sons, 2010 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Anatomy of a fraud investigation [[electronic resource] ] : from detection to prosecution / / Stephen Pedneault |
Autore | Pedneault Stephen <1966-> |
Pubbl/distr/stampa | Hoboken, NJ, : John Wiley & Sons, 2010 |
Descrizione fisica | 1 online resource (211 p.) |
Disciplina | 363.25963 |
Soggetto topico |
Fraud
Fraud investigation |
ISBN |
0-470-59114-5
1-119-19980-8 1-282-68271-7 9786612682711 0-470-59112-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
ANATOMY OF A FRAUD INVESTIGATION: From Detection to Prosecution; CONTENTS; ACKNOWLEDGMENTS; INTRODUCTION; CHAPTER 1: FIRST INDICATIONS (THEY'RE DOING WHAT?); CHAPTER 2: THE IMPORTANCE OF PLANNING (MAXIMIZING DESIRED OUTCOMES); CHAPTER 3: COLLECTING THE EVIDENCE (A.K.A. ""THE RAID""); CHAPTER 4: REVIEWING THE EVIDENCE (THE DAY AFTER); CHAPTER 5: ELECTRONIC EVIDENCE CONSIDERATIONS (COMPUTERS, FILES, AND COMMUNICATIONS); CHAPTER 6: INTERVIEWING (RESPONDING TO TEARS); CHAPTER 7: IMPORTANCE OF DOCUMENTATION (KEEPING TRACK OF THINGS)
CHAPTER 8: FURTHER INVESTIGATIVE MEASURES (OBTAINING MORE EVIDENCE)CHAPTER 9: TRACKING DOWN LEADS (THE PLOT THICKENS); CHAPTER 10: DRAWING CONCLUSIONS (WHAT DOES IT ALL SHOW?); CHAPTER 11: CONFRONTING THE SUSPECT (''I DIDN'T DO ANYTHING WRONG''); CHAPTER 12: DOCUMENTING THE INVESTIGATION (YOUR WRITTEN REPORT); CHAPTER 13: WORKING TOWARD A RESOLUTION (""I DON'T WANT TO GO TO PRISON""); CHAPTER 14: CASE CLOSED!; EPILOGUE: DO YOU WANT TO KNOW THE OUTCOME?; NOTES; ABOUT THE AUTHOR; INDEX |
Record Nr. | UNINA-9910841523703321 |
Pedneault Stephen <1966->
![]() |
||
Hoboken, NJ, : John Wiley & Sons, 2010 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Auditoría forense / / René Humberto Márquez Arcila |
Autore | Márquez Arcila René Humberto |
Pubbl/distr/stampa | México, D.F. : , : Instituto Mexicano de Contadores Públicos, , 2018 |
Descrizione fisica | 1 online resource (171 páginas) : ilustraciones |
Disciplina | 363.25963 |
Collana | Auditoría |
Soggetto topico |
Fraud investigation
Forensic accounting Auditing Auditoría |
Soggetto genere / forma | Libros electronicos. |
ISBN | 607-8552-63-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | spa |
Record Nr. | UNINA-9910671157403321 |
Márquez Arcila René Humberto
![]() |
||
México, D.F. : , : Instituto Mexicano de Contadores Públicos, , 2018 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Bribery and corruption casebook [[electronic resource] ] : the view from under the table / / edited by Joseph T. Wells, Laura Hymes |
Edizione | [1st edition] |
Pubbl/distr/stampa | Hoboken, N.J., : John Wiley & Sons, Inc., c2012 |
Descrizione fisica | 1 online resource (401 p.) |
Disciplina | 363.25/9323 |
Altri autori (Persone) |
WellsJoseph T
HymesLaura |
Soggetto topico |
Fraud investigation
Bribery Corruption |
ISBN |
1-118-28263-9
1-119-20471-2 1-280-59081-5 9786613620644 1-118-28710-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Bribery andCorruption Casebook; Contents; Preface; Chapter 1 The Hot-Tub Highwaymen; Chapter 2 Trouble Brewing; Chapter 3 In the State's Interest; Chapter 4 Odd Bedfellows; Chapter 5 When Bribery Becomes a Way of Doing Business; Chapter 6 Kickbacks for Comic Books; Chapter 7 Interrupted Production; Chapter 8 High-Plains Grifter; Chapter 9 Getting a Free Ride; Chapter 10 Conflicting Interests, Conflicting Cultures; Chapter 11 But We Thought He Was SavingUs Millions; Chapter 12 The Construction of a Fraud; Chapter 13 The Summer Bribe; Chapter 14 Brazen Bank Manager
Chapter 15 In Bed with the Tax ManChapter 16 High-Rise Rollers; Chapter 17 Decorum Across the International Date Line; Chapter 18 The Kickback Mine; Chapter 19 A Sweet Deal; Chapter 20 Da' Money; Chapter 21 The Seemingly Upstanding Citizen; Chapter 22 Big Dangers from a Small Vendor; Chapter 23 A Drop in the Ocean; Chapter 24 The Professor and the Deputy; Chapter 25 Calling for Kickbacks; Chapter 26 Going Green in Mexico; Chapter 27 A Wolf in Sheep's Clothing; Chapter 28 Dances with Fraud; Chapter 29 The Corrupt Public Servant; Chapter 30 Romance, Jewels and Kickbacks: All in a Day's Work Chapter 31 Power Corrupts and Absolute Power Corrupts AbsolutelyChapter 32 For Love or Money?; Chapter 33 Ethical Governance: A Mandate for Outsourcing; Chapter 34 Friends and Lovers in High Places; Chapter 35 Kickbacks on Demand; Chapter 36 High-Flying Ambition; Chapter 37 The Cleaner Who Swept His Way to the Top; Chapter 38 Sorry, This Fraud Has Been Disconnected; Chapter 39 Bid Rigging and Kickbacks under the Bridge; Index |
Record Nr. | UNINA-9910141316803321 |
Hoboken, N.J., : John Wiley & Sons, Inc., c2012 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Bribery and corruption casebook [[electronic resource] ] : the view from under the table / / edited by Joseph T. Wells, Laura Hymes |
Edizione | [1st edition] |
Pubbl/distr/stampa | Hoboken, N.J., : John Wiley & Sons, Inc., c2012 |
Descrizione fisica | 1 online resource (401 p.) |
Disciplina | 363.25/9323 |
Altri autori (Persone) |
WellsJoseph T
HymesLaura |
Soggetto topico |
Fraud investigation
Bribery Corruption |
ISBN |
1-118-28263-9
1-119-20471-2 1-280-59081-5 9786613620644 1-118-28710-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Bribery andCorruption Casebook; Contents; Preface; Chapter 1 The Hot-Tub Highwaymen; Chapter 2 Trouble Brewing; Chapter 3 In the State's Interest; Chapter 4 Odd Bedfellows; Chapter 5 When Bribery Becomes a Way of Doing Business; Chapter 6 Kickbacks for Comic Books; Chapter 7 Interrupted Production; Chapter 8 High-Plains Grifter; Chapter 9 Getting a Free Ride; Chapter 10 Conflicting Interests, Conflicting Cultures; Chapter 11 But We Thought He Was SavingUs Millions; Chapter 12 The Construction of a Fraud; Chapter 13 The Summer Bribe; Chapter 14 Brazen Bank Manager
Chapter 15 In Bed with the Tax ManChapter 16 High-Rise Rollers; Chapter 17 Decorum Across the International Date Line; Chapter 18 The Kickback Mine; Chapter 19 A Sweet Deal; Chapter 20 Da' Money; Chapter 21 The Seemingly Upstanding Citizen; Chapter 22 Big Dangers from a Small Vendor; Chapter 23 A Drop in the Ocean; Chapter 24 The Professor and the Deputy; Chapter 25 Calling for Kickbacks; Chapter 26 Going Green in Mexico; Chapter 27 A Wolf in Sheep's Clothing; Chapter 28 Dances with Fraud; Chapter 29 The Corrupt Public Servant; Chapter 30 Romance, Jewels and Kickbacks: All in a Day's Work Chapter 31 Power Corrupts and Absolute Power Corrupts AbsolutelyChapter 32 For Love or Money?; Chapter 33 Ethical Governance: A Mandate for Outsourcing; Chapter 34 Friends and Lovers in High Places; Chapter 35 Kickbacks on Demand; Chapter 36 High-Flying Ambition; Chapter 37 The Cleaner Who Swept His Way to the Top; Chapter 38 Sorry, This Fraud Has Been Disconnected; Chapter 39 Bid Rigging and Kickbacks under the Bridge; Index |
Record Nr. | UNINA-9910825409703321 |
Hoboken, N.J., : John Wiley & Sons, Inc., c2012 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Computer fraud casebook [[electronic resource] ] : the bytes that bite / / edited by Joseph T. Wells |
Pubbl/distr/stampa | Hoboken, NJ, : Wiley, c2009 |
Descrizione fisica | 1 online resource (443 p.) |
Disciplina |
342.5268
363.259680973 |
Altri autori (Persone) | WellsJoseph T |
Soggetto topico |
Computer crimes
Computer crimes - Investigation Fraud Fraud investigation |
Soggetto genere / forma | Electronic books. |
ISBN |
1-119-19741-4
1-282-02794-8 9786612027949 0-470-48892-1 0-470-43648-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
COMPUTER FRAUD CASEBOOK: The Bytes That Bite; Contents; Foreword; Preface; Chapter 1: Just What the Doctor Ordered; Chapter 2: Of Botnets and Bagels: Vaccinating the Hospital against Cybercrime; Chapter 3: Pandora's Box; Chapter 4: Mail-Order Fraud; Chapter 5: Lancelot Gone Missing; Chapter 6: Double Trouble; Chapter 7: Unimaginable Wealth; Chapter 8: Hacked; Chapter 9: Bad Education; Chapter 10: If Only His Nose Could Grow; Chapter 11: Keeping Up with the Jamesons; Chapter 12: Imaginary Satellites; Chapter 13: Never Pass Your Password; Chapter 14: Why Computers and Meth Don't Mix
Chapter 15: Fishing in Dangerous WatersChapter 16: The Man Who Told on Himself; Chapter 17: Triple Threat; Chapter 18: Swiped; Chapter 19: Have Computer, Will Video; Chapter 20: Server, We Have a Problem; Chapter 21: Do It for the Kids; Chapter 22: Moving Money; Chapter 23: Operation: Overnight Identity Theft; Chapter 24: The Karma of Fraud; Chapter 25: Secret Shopper; Chapter 26: Would You Like a Receipt?; Chapter 27: The Coupon Code Crooks; Chapter 28: He Fought the Law; Chapter 30: French Connections; Chapter 31: Irreconcilable Differences; Chapter 32: Keeping It In the Family Chapter 33: I DueChapter 34: What Lies Inside the Trojan Horse; Chapter 35: Lost in Transition; Chapter 36: Superhero Syndrome; Chapter 37: Stealing for the Sale; Chapter 38: Do as I Say, Not as I Do; Chapter 39: Cinderella: One Glass Slipper Just Wasn't Enough; Chapter 40: Bloggers: Separating the Wheat from the Chaff; Chapter 41: The Campus Con; Chapter 42: One for You, One for Me: A Tale of Crooked Insurance; Index |
Record Nr. | UNINA-9910145951203321 |
Hoboken, NJ, : Wiley, c2009 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|