Anbieter: Better World Books Ltd, Dunfermline, Vereinigtes Königreich
EUR 3,95
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbZustand: Good. Ships from the UK. Used book that is in clean, average condition without any missing pages.
Verlag: Englewood Cliffs, N.J. : Prentice-Hall, 1979, 1979
ISBN 10: 0131647725 ISBN 13: 9780131647725
Sprache: Englisch
Anbieter: Joseph Valles - Books, Stockbridge, GA, USA
EUR 44,46
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbHardcover. Zustand: Fine. No Jacket. xv, 509 p. : ill. ; 25 cm. ; ISBN: 0131647725; 9780131647725; National Library: 013-16477; GB7-93673 LCCN: 78-13730 ; LC: HV6773; KF9365; Dewey: 364.1/63 ; OCLC: 4136017 ; textured brown and black cloth with gold lettering ; no dustjacket ; ex-lib, stamps, label, date due pocket ; Contents : Understanding the problem -- how it happens -- Computer fraud theory and its practical application -- Prevention, detection and deterrents -- Ethical business conduct -- Personnel practices and procedures -- Administrative and internal controls -- Computer security and controls -- Communications and data base systems safeguards -- EDP Internal audit functions and techniques -- Common computer fraud manipulations and countermeasures -- Loss recovery, legal and investigative considerations -- Fidelity bonding and crime insurance -- Legal aspects of computer fraud -- Investigative procedures for computer fraud -- Implementing your loss control program -- A multidisciplilnary prevention program -- Estimating the costs and benefits of countermeasures -- Successfully implementing your approach -- Bibliography, an annotated selection of recent books -- Good control practices for funds disbursement and receipt applications -- Application contol evaluation table -- Application control characteristics -- Advanced systems control evaluation table -- Computer abuse control evaluation table -- Systems development control evaluation table -- Information processing facility control evaluation table -- Sources of software aids for systems development and operations control -- Attributes of fifteen audit software packages -- Illustrative procedures manual section covering irregularities, reporting, investigation, and restitution -- Illustrative form for confessions -- Sample guide to sources of personal information for investigators -- Characteristics of bank checks and other sources of financial information for investigators ; although this book dates back to the beginnings of the internet, the essential structure of the approach underlies current methodology, is systematic and thorough ; the detailed list of investigative techniques for mining personal information bear study, as well as the details of printed bank check transaction data ; FINE. Book.
Anbieter: THE SAINT BOOKSTORE, Southport, Vereinigtes Königreich
EUR 132,18
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbPaperback / softback. Zustand: New. New copy - Usually dispatched within 4 working days. 322.
Anbieter: GreatBookPrices, Columbia, MD, USA
EUR 122,79
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 140,33
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
Anbieter: GreatBookPricesUK, Woodford Green, Vereinigtes Königreich
EUR 132,16
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New.
Anbieter: GreatBookPrices, Columbia, MD, USA
EUR 133,98
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: As New. Unread book in perfect condition.
Anbieter: GreatBookPricesUK, Woodford Green, Vereinigtes Königreich
EUR 148,96
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: As New. Unread book in perfect condition.
Anbieter: Lucky's Textbooks, Dallas, TX, USA
EUR 121,60
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New.
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 179,02
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 1st edition. 176 pages. 9.00x7.50x0.50 inches. In Stock.
Anbieter: BennettBooksLtd, North Las Vegas, NV, USA
EUR 159,78
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbPaperback. Zustand: New. In shrink wrap. Looks like an interesting title!
Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
EUR 233,49
Währung umrechnenAnzahl: 3 verfügbar
In den WarenkorbZustand: New.
Anbieter: Books Puddle, New York, NY, USA
EUR 242,09
Währung umrechnenAnzahl: 3 verfügbar
In den WarenkorbZustand: New.
Anbieter: Biblios, Frankfurt am main, HESSE, Deutschland
EUR 259,31
Währung umrechnenAnzahl: 3 verfügbar
In den WarenkorbZustand: New.
Anbieter: Mispah books, Redhill, SURRE, Vereinigtes Königreich
EUR 284,96
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbHardcover. Zustand: New. New. book.
Anbieter: THE SAINT BOOKSTORE, Southport, Vereinigtes Königreich
EUR 137,25
Währung umrechnenAnzahl: 5 verfügbar
In den WarenkorbPaperback / softback. Zustand: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days.
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 135,65
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 1st edition. 176 pages. 9.00x7.50x0.50 inches. In Stock. This item is printed on demand.
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
EUR 178,33
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbTaschenbuch. Zustand: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Here's your how-to manual for developing policies and procedures that maintain the security of information systems and networks in the workplace. It provides numerous checklists and examples of existing programs that you can use as guidelines for creating your own documents.You'll learn how to identify your company's overall need for data security; how to research any measures already being taken; how to develop employee awareness of security procedures; and how to devise an effective program that will get support from all members of your organization-from senior managers to end users.Topics covered include: developing the policy and mission statements; the four key elements of data classification; volume contents; establishing a review panel; creating the employee awareness program; monitoring company/employee compliance; and computer and information security laws. This results-oriented manual also gives you a list of further resources and data security definitions.Thomas R. Peltier has numerous years of field experience in corporate information security, and is a member of the Advisory Council of the Computer Security Institute (CSI).