Skip to content

Computer fraud and countermeasures. [Understanding the problem; how it happens; Computer fraud theory & its practical application; Prevention, detection & deterrents; Ethical business conduct; Personnel practices & procedures; Administrative & internal controls; Computer security & controls; Communications & data base systems safeguards; EDP Internal audit functions & techniques; Common computer fraud manipulations & countermeasures; Loss recovery, legal & investigative considerations; Fidelity bonding & crime insurance; Legal aspects of computer fraud; Investigative procedures for computer fraud; Implementing your loss control program; A multidisciplilnary prevention program; Estimating the costs & benefits of countermeasures

Computer fraud and countermeasures. [Understanding the problem; how it happens; Computer fraud theory & its practical application; Prevention, detection & deterrents; Ethical business conduct; Personnel practices & procedures; Administrative & internal controls; Computer security & controls; Communications & data base systems safeguards; EDP Internal audit functions & techniques; Common computer fraud manipulations & countermeasures; Loss recovery, legal & investigative considerations; Fidelity bonding & crime insurance; Legal aspects of computer fraud; Investigative procedures for computer fraud; Implementing your loss control program; A multidisciplilnary prevention program; Estimating the costs & benefits of countermeasures

Click for full-size.

Computer fraud and countermeasures. [Understanding the problem; how it happens; Computer fraud theory & its practical application; Prevention, detection & deterrents; Ethical business conduct; Personnel practices & procedures; Administrative & internal controls; Computer security & controls; Communications & data base systems safeguards; EDP Internal audit functions & techniques; Common computer fraud manipulations & countermeasures; Loss recovery, legal & investigative considerations; Fidelity bonding & crime insurance; Legal aspects of computer fraud; Investigative procedures for computer fraud; Implementing your loss control program; A multidisciplilnary prevention program; Estimating the costs & benefits of countermeasures

by Krauss, Leonard I. ; MacGahan, Aileen,

  • Used
  • Fine
  • Hardcover
Condition
Fine/No Jacket
ISBN 10
0131647725
ISBN 13
9780131647725
Seller
Seller rating:
This seller has earned a 5 of 5 Stars rating from Biblio customers.
Stockbridge, Georgia, United States
Item Price
$50.00
Or just $45.00 with a
Bibliophiles Club Membership
$10.95 Shipping to USA
Standard delivery: 7 to 14 days

More Shipping Options

Payment Methods Accepted

  • Visa
  • Mastercard
  • American Express
  • Discover
  • PayPal

About This Item

Englewood Cliffs, N.J. : Prentice-Hall, 1979, 1979. Book. Fine. Hardcover. xv, 509 p. : ill. ; 25 cm. ; ISBN: 0131647725; 9780131647725; National Library: 013-16477; GB7-93673 LCCN: 78-13730 ; LC: HV6773; KF9365; Dewey: 364.1/63 ; OCLC: 4136017 ; textured brown and black cloth with gold lettering ; no dustjacket ; ex-lib, stamps, label, date due pocket ; Contents : Understanding the problem -- how it happens -- Computer fraud theory and its practical application -- Prevention, detection and deterrents -- Ethical business conduct -- Personnel practices and procedures -- Administrative and internal controls -- Computer security and controls -- Communications and data base systems safeguards -- EDP Internal audit functions and techniques -- Common computer fraud manipulations and countermeasures -- Loss recovery, legal and investigative considerations -- Fidelity bonding and crime insurance -- Legal aspects of computer fraud -- Investigative procedures for computer fraud -- Implementing your loss control program -- A multidisciplilnary prevention program -- Estimating the costs and benefits of countermeasures -- Successfully implementing your approach -- Bibliography, an annotated selection of recent books -- Good control practices for funds disbursement and receipt applications -- Application contol evaluation table -- Application control characteristics -- Advanced systems control evaluation table -- Computer abuse control evaluation table -- Systems development control evaluation table -- Information processing facility control evaluation table -- Sources of software aids for systems development and operations control -- Attributes of fifteen audit software packages -- Illustrative procedures manual section covering irregularities, reporting, investigation, and restitution -- Illustrative form for confessions -- Sample guide to sources of personal information for investigators -- Characteristics of bank checks and other sources of financial information for investigators ; although this book dates back to the beginnings of the internet, the essential structure of the approach underlies current methodology, is systematic and thorough ; the detailed list of investigative techniques for mining personal information bear study, as well as the details of printed bank check transaction data ; FINE.

Reviews

(Log in or Create an Account first!)

You’re rating the book as a work, not the seller or the specific copy you purchased!

Details

Seller
Joseph Valles - Books US (US)
Seller's Inventory #
006526
Title
Computer fraud and countermeasures. [Understanding the problem; how it happens; Computer fraud theory & its practical application; Prevention, detection & deterrents; Ethical business conduct; Personnel practices & procedures; Administrative & internal controls; Computer security & controls; Communications & data base systems safeguards; EDP Internal audit functions & techniques; Common computer fraud manipulations & countermeasures; Loss recovery, legal & investigative considerations; Fidelity bonding & crime insurance; Legal aspects of computer fraud; Investigative procedures for computer fraud; Implementing your loss control program; A multidisciplilnary prevention program; Estimating the costs & benefits of countermeasures
Author
Krauss, Leonard I. ; MacGahan, Aileen,
Format/Binding
Hardcover
Book Condition
Used - Fine
Jacket Condition
No Jacket
ISBN 10
0131647725
ISBN 13
9780131647725
Publisher
Englewood Cliffs, N.J. : Prentice-Hall, 1979
Place of Publication
New Jersey
Date Published
1979
Keywords
Access control lists access controls action administrative amount application approved areas audit software audit trail bank Base Systems Safeguards batch control banks Communications checks ciphertext Communications and Data company's computer fraud

Terms of Sale

Joseph Valles - Books

All items subject to prior sale. Returns accepted in same condition within 10 business days for any reason. PAYMENT: Cash with order. International orders require payment in U.S. funds drawn on a U.S. Bank or through an International Money Order. Libraries and institutions may defer billing upon our receipt of purchase order. Books graded conservatively with prominent defects mentioned.

About the Seller

Joseph Valles - Books

Seller rating:
This seller has earned a 5 of 5 Stars rating from Biblio customers.
Biblio member since 2005
Stockbridge, Georgia

About Joseph Valles - Books

Science

(Some listings may display information using Chinese, Japanese, Korean or Russian fonts)

Glossary

Some terminology that may be used in this description includes:

Fine
A book in fine condition exhibits no flaws. A fine condition book closely approaches As New condition, but may lack the...
Cloth
"Cloth-bound" generally refers to a hardcover book with cloth covering the outside of the book covers. The cloth is stretched...
tracking-