EUR 3,96
Convertir monedaCantidad disponible: 1 disponibles
Añadir al carritoCondición: Good. Ships from the UK. Used book that is in clean, average condition without any missing pages.
Publicado por Englewood Cliffs, N.J. : Prentice-Hall, 1979, 1979
ISBN 10: 0131647725 ISBN 13: 9780131647725
Idioma: Inglés
Librería: Joseph Valles - Books, Stockbridge, GA, Estados Unidos de America
EUR 43,93
Convertir monedaCantidad disponible: 1 disponibles
Añadir al carritoHardcover. Condición: Fine. No Jacket. xv, 509 p. : ill. ; 25 cm. ; ISBN: 0131647725; 9780131647725; National Library: 013-16477; GB7-93673 LCCN: 78-13730 ; LC: HV6773; KF9365; Dewey: 364.1/63 ; OCLC: 4136017 ; textured brown and black cloth with gold lettering ; no dustjacket ; ex-lib, stamps, label, date due pocket ; Contents : Understanding the problem -- how it happens -- Computer fraud theory and its practical application -- Prevention, detection and deterrents -- Ethical business conduct -- Personnel practices and procedures -- Administrative and internal controls -- Computer security and controls -- Communications and data base systems safeguards -- EDP Internal audit functions and techniques -- Common computer fraud manipulations and countermeasures -- Loss recovery, legal and investigative considerations -- Fidelity bonding and crime insurance -- Legal aspects of computer fraud -- Investigative procedures for computer fraud -- Implementing your loss control program -- A multidisciplilnary prevention program -- Estimating the costs and benefits of countermeasures -- Successfully implementing your approach -- Bibliography, an annotated selection of recent books -- Good control practices for funds disbursement and receipt applications -- Application contol evaluation table -- Application control characteristics -- Advanced systems control evaluation table -- Computer abuse control evaluation table -- Systems development control evaluation table -- Information processing facility control evaluation table -- Sources of software aids for systems development and operations control -- Attributes of fifteen audit software packages -- Illustrative procedures manual section covering irregularities, reporting, investigation, and restitution -- Illustrative form for confessions -- Sample guide to sources of personal information for investigators -- Characteristics of bank checks and other sources of financial information for investigators ; although this book dates back to the beginnings of the internet, the essential structure of the approach underlies current methodology, is systematic and thorough ; the detailed list of investigative techniques for mining personal information bear study, as well as the details of printed bank check transaction data ; FINE. Book.
Librería: GreatBookPrices, Columbia, MD, Estados Unidos de America
EUR 118,23
Convertir monedaCantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New.
Librería: THE SAINT BOOKSTORE, Southport, Reino Unido
EUR 132,81
Convertir monedaCantidad disponible: 1 disponibles
Añadir al carritoPaperback / softback. Condición: New. New copy - Usually dispatched within 4 working days. 322.
Librería: Ria Christie Collections, Uxbridge, Reino Unido
EUR 141,00
Convertir monedaCantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New. In.
Librería: GreatBookPricesUK, Woodford Green, Reino Unido
EUR 132,80
Convertir monedaCantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New.
Librería: GreatBookPrices, Columbia, MD, Estados Unidos de America
EUR 132,37
Convertir monedaCantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: As New. Unread book in perfect condition.
Librería: GreatBookPricesUK, Woodford Green, Reino Unido
EUR 148,20
Convertir monedaCantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: As New. Unread book in perfect condition.
Librería: Lucky's Textbooks, Dallas, TX, Estados Unidos de America
EUR 120,14
Convertir monedaCantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New.
Librería: Revaluation Books, Exeter, Reino Unido
EUR 177,70
Convertir monedaCantidad disponible: 2 disponibles
Añadir al carritoPaperback. Condición: Brand New. 1st edition. 176 pages. 9.00x7.50x0.50 inches. In Stock.
Librería: BennettBooksLtd, North Las Vegas, NV, Estados Unidos de America
EUR 157,87
Convertir monedaCantidad disponible: 1 disponibles
Añadir al carritoPaperback. Condición: New. In shrink wrap. Looks like an interesting title!
Librería: Best Price, Torrance, CA, Estados Unidos de America
EUR 113,55
Convertir monedaCantidad disponible: 1 disponibles
Añadir al carritoCondición: New. SUPER FAST SHIPPING.
Librería: Majestic Books, Hounslow, Reino Unido
EUR 230,70
Convertir monedaCantidad disponible: 3 disponibles
Añadir al carritoCondición: New.
Librería: Books Puddle, New York, NY, Estados Unidos de America
EUR 240,06
Convertir monedaCantidad disponible: 3 disponibles
Añadir al carritoCondición: New.
Librería: Biblios, Frankfurt am main, HESSE, Alemania
EUR 259,45
Convertir monedaCantidad disponible: 3 disponibles
Añadir al carritoCondición: New.
Librería: Mispah books, Redhill, SURRE, Reino Unido
EUR 286,33
Convertir monedaCantidad disponible: 1 disponibles
Añadir al carritoHardcover. Condición: New. New. book.
Librería: THE SAINT BOOKSTORE, Southport, Reino Unido
EUR 137,91
Convertir monedaCantidad disponible: 5 disponibles
Añadir al carritoPaperback / softback. Condición: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days.
Librería: AHA-BUCH GmbH, Einbeck, Alemania
EUR 178,33
Convertir monedaCantidad disponible: 1 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Here's your how-to manual for developing policies and procedures that maintain the security of information systems and networks in the workplace. It provides numerous checklists and examples of existing programs that you can use as guidelines for creating your own documents.You'll learn how to identify your company's overall need for data security; how to research any measures already being taken; how to develop employee awareness of security procedures; and how to devise an effective program that will get support from all members of your organization-from senior managers to end users.Topics covered include: developing the policy and mission statements; the four key elements of data classification; volume contents; establishing a review panel; creating the employee awareness program; monitoring company/employee compliance; and computer and information security laws. This results-oriented manual also gives you a list of further resources and data security definitions.Thomas R. Peltier has numerous years of field experience in corporate information security, and is a member of the Advisory Council of the Computer Security Institute (CSI).