Internet fraud casebook the World Wide Web of deceit
| Main Author: | Wells, Joseph T. (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Hoboken, New Jersey
John Wiley & Sons
c2010
|
| Subjects: | |
| Online Access: | Table of contents only Contributor biographical information Publisher description |
Similar Items
Risky business protect your business from being stalked, conned, or blackmailed on the Web
by: Janal, Daniel S.
Published: (1998)
by: Janal, Daniel S.
Published: (1998)
History of greed financial fraud from tulip mania to Bernie Madoff
by: Sarna, David E. Y.
Published: (2010)
by: Sarna, David E. Y.
Published: (2010)
Handbook of digital and multimedia forensic evidence
by: Barbara, John J.
Published: (2008)
by: Barbara, John J.
Published: (2008)
The new forensics investigating corporate fraud and the theft of intellectual property
by: Anastasi, Joe 1953-
Published: (2003)
by: Anastasi, Joe 1953-
Published: (2003)
Cyber terrorism policy and technical perspective
by: Shahrin Sahib, et al.
Published: (2015)
by: Shahrin Sahib, et al.
Published: (2015)
Handbook of research on computational forensics, digital crime, and investigation methods and solutions
by: Li, Chang-Tsun 1914-
Published: (2010)
by: Li, Chang-Tsun 1914-
Published: (2010)
Cyber crime, security and digital intelligence
by: Johnson, Mark 1959-
Published: (2013)
by: Johnson, Mark 1959-
Published: (2013)
Corporate fraud case studies in detection and prevention
by: O'Gara, John D.
Published: (2004)
by: O'Gara, John D.
Published: (2004)
The CERT guide to insider threats how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud)
by: Cappelli, Dawn, et al.
Published: (2012)
by: Cappelli, Dawn, et al.
Published: (2012)
Profiling hackers the science of criminal profiling as applied to the world of hacking
by: Chiesa, Raoul 1973-, et al.
Published: (2009)
by: Chiesa, Raoul 1973-, et al.
Published: (2009)
Cybercrime and society
by: Yar, Majid
Published: (2006)
by: Yar, Majid
Published: (2006)
Computer misuse response, regulation and the law
by: Fafinski, Stefan
Published: (2009)
by: Fafinski, Stefan
Published: (2009)
Information security contemporary cases
by: Wright, Marie A., et al.
Published: (2007)
by: Wright, Marie A., et al.
Published: (2007)
Fraud : the growth industry
by: West, Harry
Published: (1988)
by: West, Harry
Published: (1988)
The manager's casebook of business strategy
by: Taylor, Bernard, et al.
Published: (1990)
by: Taylor, Bernard, et al.
Published: (1990)
The family counselling casebook
by: Gunzburg, John C.
Published: (1991)
by: Gunzburg, John C.
Published: (1991)
الجرائم الدولية للانترنت
by: يوسف، يوسف حسن
Published: (2011)
by: يوسف، يوسف حسن
Published: (2011)
How to define and build an effective cyber threat intelligence capability
by: Dalziel, Henry
Published: (2015)
by: Dalziel, Henry
Published: (2015)
The Asian marketing casebook
by: Capon, Neol 1937-, et al.
Published: (1999)
by: Capon, Neol 1937-, et al.
Published: (1999)
Cases in e-commerce
by: Rayport, Jeffrey F., et al.
Published: (2002)
by: Rayport, Jeffrey F., et al.
Published: (2002)
Management consulting today and tomorrow casebook enhancing skills to become better professionals
by: Greiner, Larry, et al.
Published: (2010)
by: Greiner, Larry, et al.
Published: (2010)
Cases on technologies for teaching criminology and victimology methodologies and practices
by: Sette, Raffaella
Published: (2010)
by: Sette, Raffaella
Published: (2010)
Legal framework affecting cybercrimes in Yemen with special reference to Malaysia
by: Mohammed, Ammar Abdullah Saeed
by: Mohammed, Ammar Abdullah Saeed
Fraud : prevention and detection
by: Huntington, I. K. [ (Ian K.)]
Published: (1992)
by: Huntington, I. K. [ (Ian K.)]
Published: (1992)
Managerial guide for handling cyber-terrorism and information warfare
by: Janczewski, Lech , 1943-, et al.
Published: (2005)
by: Janczewski, Lech , 1943-, et al.
Published: (2005)
Ontological security in international relation self-identity and the IR state
by: Steele, Brent J.
Published: (2008)
by: Steele, Brent J.
Published: (2008)
Financial accounting and corporate reporting a casebook
by: Ferris, Kenneth R.
Published: (1996)
by: Ferris, Kenneth R.
Published: (1996)
A machine learning approach to phishing detection and defense
by: Akanbi, Oluwatobi Ayodeji, et al.
Published: (2015)
by: Akanbi, Oluwatobi Ayodeji, et al.
Published: (2015)
Corporate policy a casebook
by: Schwartz, Jules J.
Published: (1978)
by: Schwartz, Jules J.
Published: (1978)
How to detect and prevent business fraud
by: Albrecht, W. Steve
Published: (1982)
by: Albrecht, W. Steve
Published: (1982)
Borderlands ethnographic approaches to security, power, and identity
by: Donnan, Hastings, et al.
Published: (2010)
by: Donnan, Hastings, et al.
Published: (2010)
Managing the risk of fraud and misconduct [ meeting the challenges of a global, regulated and digital environment
by: Girgenti, Richard H., et al.
Published: (2011)
by: Girgenti, Richard H., et al.
Published: (2011)
Steal this computer book 3 : what they won't tell you about the Internet
by: Wang, Wallace
Published: (2003)
by: Wang, Wallace
Published: (2003)
Asian competitors marketing for competitiveness in the age of digital consumers
by: Kotler, Philip, et al.
by: Kotler, Philip, et al.
Financial accounting and corporate reporting a casebook
by: Ferris, Kenneth R.
Published: (1993)
by: Ferris, Kenneth R.
Published: (1993)
Insider computer fraud an in-depth framework for detecting and defending against insider IT attacks
by: Brancik, Kenneth C.
Published: (2008)
by: Brancik, Kenneth C.
Published: (2008)
Communicating in organizations : a casebook
by: Peterson, Gary L. , 1935-
Published: (2000)
by: Peterson, Gary L. , 1935-
Published: (2000)
The Oxford guide to financial modeling : applications for capital markets, corporate finance, risk management, and financial institutions
by: Ho, Thomas S.Y, et al.
Published: (2004)
by: Ho, Thomas S.Y, et al.
Published: (2004)
Network forensics tracking hackers through cyberspace
by: Davidoff, Sherri, et al.
Published: (2012)
by: Davidoff, Sherri, et al.
Published: (2012)
Computer crime law
by: Kerr, Orin S.
Published: (2006)
by: Kerr, Orin S.
Published: (2006)
Similar Items
-
Risky business protect your business from being stalked, conned, or blackmailed on the Web
by: Janal, Daniel S.
Published: (1998) -
History of greed financial fraud from tulip mania to Bernie Madoff
by: Sarna, David E. Y.
Published: (2010) -
Handbook of digital and multimedia forensic evidence
by: Barbara, John J.
Published: (2008) -
The new forensics investigating corporate fraud and the theft of intellectual property
by: Anastasi, Joe 1953-
Published: (2003) -
Cyber terrorism policy and technical perspective
by: Shahrin Sahib, et al.
Published: (2015)