Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Computer Fraud Casebook: The Bytes that Bite

Buy
In 1995, computer fraud took down England's oldest bank. In 1996, Omega Engineering Company lost over $10 million to one disgruntled employee's computer fraud. In 2001, two Cisco Systems employees stole $8 million in computer stock option refunds through computer fraud. And technology experts and professional crime fighters predict that computer crime will continue to explode in the coming years. Brimming with these and other astonishing real-life case studies written by the ACFE members who investigated them, Computer Fraud Casebook reveals how vulnerable all businesses are to fraud and offers investigation and prevention guidance to stop cyber-thieves in their virtual tracks.

Gone are the days when a small business might lose only a few thousand dollars to fraud. Today, computer fraud costs companies and consumers billions of dollars. In cyberspace, the fraudster has morphed from a hapless rip-off artist into a clever, diabolical techno-thief with the ability to steal and destroy on a grand scale around the world. High-tech criminals can obliterate records, bankrupt companies, steal money, cheat consumers, rob identities, and cause unprecedented havoc, often with a single click of the mouse.

Author Joseph Wells, founder and Chairman of the Association of Certified Fraud Examiners—the world's leading anti-fraud organization—provides readers with an understanding of the scope and complexity of computer crime. Focusing on cases committed in the workplace, Wells introduces the scam methods and techniques that were unheard of just a few years ago. His comprehensive compilation forms a clear picture of the many types of computer fraud out there—including e-mail fraud, online auction fraud, security breaches, and counterfeiting—and how they were investigated across industries and throughout the world. Once fraud occurs, recovering the victim's money is difficult, if not impossible. The forty-two case studies in Computer Fraud Casebook reveal how and why prevention is the number-one goal of theanti-fraud specialist.

From their rise to success through their cunning and diabolical schemes to their eventual capture and downfall, Computer Fraud Casebook is full of amazing stories of the investigators' dedication, skill, and intelligence to uncover fraudsters and put an end to corruption. From these stories, auditors, controllers, IT managers, investigators, law enforcement professionals, fraud examiners, clients, employers, managers, consumers, students—virtually anyone with a computer—will discover a wealth of resources available to snare criminals and, even more importantly, prevent fraud from happening in the first place.

About the Author

Joseph T. Wells, CFE, CPA, is the founder and Chairman of the Association of Certified Fraud Examiners (ACFE). Mr. Wells writes, researches, andlectures to business and professional groups on fraud-related issues and is frequently quoted in the media. He was the 2002 winner of the Innovation in Accounting Education Award presented by the American Accounting Association (AAA), and he was named to Accounting Today magazine's annual list of the "Top 100 Most Influential People" in accounting for nine years in a row.

(HTML tags aren't allowed.)

Inventory Accounting : A Comprehensive Guide (Wiley Best Practices)
Inventory Accounting : A Comprehensive Guide (Wiley Best Practices)
The classical view of inventory data collection is that of employees filling out forms
of various kinds throughout the warehouse and production areas, which are then
forwarded to a central data entry location, where hordes of clerks keypunch the data
into a central computer database. Although this was a reasonably accurate view of...
iPad at Work
iPad at Work

Great ideas and advice on using your iPad as a business tool!

More and more iPad users discover every day that the versatile, portable iPad has countless business uses. From small businesses to high-profile corporations, companies are integrating iPads into their systems and workplaces at a phenomenal rate.

...

Mass Spectrometry: Instrumentation, Interpretation, and Applications
Mass Spectrometry: Instrumentation, Interpretation, and Applications
With contributions from noted experts from Europe and North America, Mass Spectrometry Instrumentation, Interpretation, and Applications serves as a forum to introduce students to the whole world of mass spectrometry and to the many different perspectives that each scientific field brings to its use. The book emphasizes the use of this...

Practical Web Database Design
Practical Web Database Design

Although many web professionals will have incorporated a database into a web site before, they may not have much experience of designing them - this book will teach you all you need to know about designing a database for use with a web site or web application. From first principles to designing a successful web database, this book will show...

Data Structures and Their Algorithms
Data Structures and Their Algorithms

Like all engineering activities, computer programming is both craft and science. Building a bridge or a computer program requires familiarity with the known techniques for the overall design of similar artifacts. And making intelligent choices among the available techniques and designs requires understanding of the mathematical principles...

Internet Security: Cryptographic Principles, Algorithms and Protocols
Internet Security: Cryptographic Principles, Algorithms and Protocols
Cryptography is the key to securing the Internet

If every communication network were to use a secure system based on encryption, then viruses, worms and hackers would have a very hard time. Unfortunately, this scenario does not reflect the reality of the Internet world today. However, with security issues becoming more and more important...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy