Computer Fraud and Countermeasures shows you how to take reasonable steps to prevent, detect, and deter computer fraud. It is addressed to business executives, financial and administrative officers, computer managers, auditors, and corporate and computer security supervisors, law enforcement investigators, and others who are responsible for providing direction in coping with the risk of computer fraud. This book shows you how to understand the risks and offers practical guidelines, detailed methods, techniques, and approaches for dealing with them. The book explains the kinds of computer fraud exposures to expect - theft of money in all forms, theft of merchandise and inventory of all types, theft of negotiable securities, theft of services of all types, theft of data and software, and data misrepresentations which result in financial, personal or political advantage. The authors point to the tremendous growth of computer usage in industry and government and forecast a future of increased computer fraud. Their book offers sound directions not only for uncovering these crimes but for avoiding them and recovering losses.
"synopsis" may belong to another edition of this title.
Seller: Bingo Books 2, Vancouver, WA, U.S.A.
Hardcover. Condition: Near Fine. 1st Edition. hardback book in near fine condition. Seller Inventory # 85385
Seller: COLLINS BOOKS, Seattle, WA, U.S.A.
Hardcover. Condition: Very Good. Dust Jacket Condition: Good+. 1st Ed. 509pp, large octavo hardcover in dj. boards clean, slight lean to upper half of book when flat yet binding and block remain solid and strong, interior text clean. DJ covers mildly worn with some minor creasing, some chipping to dj spine ends and upper rear dj edge, no major tears. Seller Inventory # 159479
Seller: J J Basset Books, bassettbooks, bookfarm.co.uk, Peter Tavy, United Kingdom
Brown Leather. Condition: NEAR FINE (NEAR BRAND NEW). No Jacket. Graphs. (illustrator). This is a First Edition. .Please e-mail for further details. Size: 8vo - over 7¾" - 9¾". Not Signed or Inscribed. Seller Inventory # 999865
Quantity: 1 available
Seller: Joseph Valles - Books, Stockbridge, GA, U.S.A.
Hardcover. Condition: Fine. No Jacket. xv, 509 p. : ill. ; 25 cm. ; ISBN: 0131647725; 9780131647725; National Library: 013-16477; GB7-93673 LCCN: 78-13730 ; LC: HV6773; KF9365; Dewey: 364.1/63 ; OCLC: 4136017 ; textured brown and black cloth with gold lettering ; no dustjacket ; ex-lib, stamps, label, date due pocket ; Contents : Understanding the problem -- how it happens -- Computer fraud theory and its practical application -- Prevention, detection and deterrents -- Ethical business conduct -- Personnel practices and procedures -- Administrative and internal controls -- Computer security and controls -- Communications and data base systems safeguards -- EDP Internal audit functions and techniques -- Common computer fraud manipulations and countermeasures -- Loss recovery, legal and investigative considerations -- Fidelity bonding and crime insurance -- Legal aspects of computer fraud -- Investigative procedures for computer fraud -- Implementing your loss control program -- A multidisciplilnary prevention program -- Estimating the costs and benefits of countermeasures -- Successfully implementing your approach -- Bibliography, an annotated selection of recent books -- Good control practices for funds disbursement and receipt applications -- Application contol evaluation table -- Application control characteristics -- Advanced systems control evaluation table -- Computer abuse control evaluation table -- Systems development control evaluation table -- Information processing facility control evaluation table -- Sources of software aids for systems development and operations control -- Attributes of fifteen audit software packages -- Illustrative procedures manual section covering irregularities, reporting, investigation, and restitution -- Illustrative form for confessions -- Sample guide to sources of personal information for investigators -- Characteristics of bank checks and other sources of financial information for investigators ; although this book dates back to the beginnings of the internet, the essential structure of the approach underlies current methodology, is systematic and thorough ; the detailed list of investigative techniques for mining personal information bear study, as well as the details of printed bank check transaction data ; FINE. Book. Seller Inventory # 006526