Book by Krauss Leonard I
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
EUR 12,00 per la spedizione da Paesi Bassi a Italia
Destinazione, tempi e costiDa: Kloof Booksellers & Scientia Verlag, Amsterdam, Paesi Bassi
Condizione: very good. Englewood Cliffs : Prentice-Hall, 1971. Hardcover. xvi,509 pp. Library stamps. Very good clean copy. Condition : very good copy. ISBN 9780131647725. Keywords : RECHT, Codice articolo 83219
Quantità: 1 disponibili
Da: J J Basset Books, bassettbooks, bookfarm.co.uk, Peter Tavy, Regno Unito
Brown Leather. Condizione: NEAR FINE (NEAR BRAND NEW). No Jacket. Graphs. (illustratore). This is a First Edition. .Please e-mail for further details. Size: 8vo - over 7¾" - 9¾". Not Signed or Inscribed. Codice articolo 999865
Quantità: 1 disponibili
Da: Wonder Book, Frederick, MD, U.S.A.
Condizione: Good. Good condition. Poor dust jacket. A copy that has been read but remains intact. May contain markings such as bookplates, stamps, limited notes and highlighting, or a few light stains. Codice articolo N13O-00032
Quantità: 1 disponibili
Da: Bingo Books 2, Vancouver, WA, U.S.A.
Hardcover. Condizione: Near Fine. 1st Edition. hardback book in near fine condition. Codice articolo 85385
Quantità: 1 disponibili
Da: Joseph Valles - Books, Stockbridge, GA, U.S.A.
Hardcover. Condizione: Fine. No Jacket. xv, 509 p. : ill. ; 25 cm. ; ISBN: 0131647725; 9780131647725; National Library: 013-16477; GB7-93673 LCCN: 78-13730 ; LC: HV6773; KF9365; Dewey: 364.1/63 ; OCLC: 4136017 ; textured brown and black cloth with gold lettering ; no dustjacket ; ex-lib, stamps, label, date due pocket ; Contents : Understanding the problem -- how it happens -- Computer fraud theory and its practical application -- Prevention, detection and deterrents -- Ethical business conduct -- Personnel practices and procedures -- Administrative and internal controls -- Computer security and controls -- Communications and data base systems safeguards -- EDP Internal audit functions and techniques -- Common computer fraud manipulations and countermeasures -- Loss recovery, legal and investigative considerations -- Fidelity bonding and crime insurance -- Legal aspects of computer fraud -- Investigative procedures for computer fraud -- Implementing your loss control program -- A multidisciplilnary prevention program -- Estimating the costs and benefits of countermeasures -- Successfully implementing your approach -- Bibliography, an annotated selection of recent books -- Good control practices for funds disbursement and receipt applications -- Application contol evaluation table -- Application control characteristics -- Advanced systems control evaluation table -- Computer abuse control evaluation table -- Systems development control evaluation table -- Information processing facility control evaluation table -- Sources of software aids for systems development and operations control -- Attributes of fifteen audit software packages -- Illustrative procedures manual section covering irregularities, reporting, investigation, and restitution -- Illustrative form for confessions -- Sample guide to sources of personal information for investigators -- Characteristics of bank checks and other sources of financial information for investigators ; although this book dates back to the beginnings of the internet, the essential structure of the approach underlies current methodology, is systematic and thorough ; the detailed list of investigative techniques for mining personal information bear study, as well as the details of printed bank check transaction data ; FINE. Book. Codice articolo 006526
Quantità: 1 disponibili
Da: HPB-Red, Dallas, TX, U.S.A.
paperback. Condizione: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority! Codice articolo S_376937206
Quantità: 1 disponibili