Integrity in mobile phone financial services measures for mitigating risks from money laundering and terrorist financing /
Saved in:
Corporate Authors: | World Bank, ebrary, Inc |
---|---|
Other Authors: | Chatain, Pierre-Laurent, 1961- |
Format: | Electronic eBook |
Language: | English |
Published: |
Washington, D.C. :
World Bank,
c2008.
|
Series: | World Bank working paper ;
no. 146. |
Subjects: | |
Online Access: | An electronic book accessible through the World Wide Web; click to view |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Protecting mobile money against financial crimes global policy challenges and solutions /
by: Chatain, Pierre-Laurent
Published: (2011)
by: Chatain, Pierre-Laurent
Published: (2011)
Essentials of online payment security and fraud prevention
by: Montague, David A., 1967-
Published: (2010)
by: Montague, David A., 1967-
Published: (2010)
Electronic safety and soundness securing finance in a new age /
by: Glaessner, Thomas C.
Published: (2004)
by: Glaessner, Thomas C.
Published: (2004)
The mobile application hacker's handbook /
by: Chell, Dominic
Published: (2015)
by: Chell, Dominic
Published: (2015)
Insider threat protecting the enterprise from sabotage, spying, and theft /
by: Cole, Eric
Published: (2006)
by: Cole, Eric
Published: (2006)
Network and security issues for internet mobile entertainment
Published: (2004)
Published: (2004)
Cyber threat! : how to manage the growing risk of cyber attacks /
by: Ulsch, N. MacDonnell, 1951-
Published: (2014)
by: Ulsch, N. MacDonnell, 1951-
Published: (2014)
Hacking web apps detecting and preventing web application security problems /
by: Shema, Mike
Published: (2012)
by: Shema, Mike
Published: (2012)
Security for mobile networks and platforms
by: Aissi, Selim
Published: (2006)
by: Aissi, Selim
Published: (2006)
Mobile security : how to secure, privatize, and recover your devices : keep your data secure on the go /
by: Speed, Tim
Published: (2013)
by: Speed, Tim
Published: (2013)
Advances in cyber security : technology, operations, and experiences /
Published: (2013)
Published: (2013)
Cyber conflict competing national perspectives /
by: Ventre, Daniel
Published: (2012)
by: Ventre, Daniel
Published: (2012)
Citrix xenmobile mobile device management : gain an insight into the industry's best and most secure : enterprise mobility management solution /
by: Phoenix, Akash
Published: (2014)
by: Phoenix, Akash
Published: (2014)
Risk Analysis and Management for Critical Asset Protection (RAMCAP) standard for risk and resilience management of water and wastewater systems using the ASME-ITI RAMCAP Plus methodology
Published: (2012)
Published: (2012)
Risk-adjusted performance and bank governance structures
by: Bohm, Christoph
Published: (2013)
by: Bohm, Christoph
Published: (2013)
Host integrity monitoring using Osiris and Samhain /
by: Wotring, Brian
Published: (2005)
by: Wotring, Brian
Published: (2005)
The death of the Internet
Published: (2012)
Published: (2012)
Maritime security an introduction /
by: McNicholas, Michael
Published: (2008)
by: McNicholas, Michael
Published: (2008)
Privacy online : OECD guidance on policy and practice.
Published: (2003)
Published: (2003)
Strengthening maritime security through cooperation /
Published: (2015)
Published: (2015)
Container transport security across modes
Published: (2005)
Published: (2005)
La surete du transport intermodal de conteneurs
Published: (2005)
Published: (2005)
Cyber risks for business professionals a management guide /
by: Kendrick, Rupert
Published: (2010)
by: Kendrick, Rupert
Published: (2010)
Network attacks & exploitation : a framework /
by: Monte, Matthew
Published: (2015)
by: Monte, Matthew
Published: (2015)
Security metrics management how to measure the costs and benefits of security /
by: Kovacich, Gerald L.
Published: (2006)
by: Kovacich, Gerald L.
Published: (2006)
Security and emergency planning for water and wastewater utilities
by: States, Stanley
Published: (2010)
by: States, Stanley
Published: (2010)
Wireless communications security : solutions for the internet of things /
by: Penttinen, Jyrki T. J.
Published: (2017)
by: Penttinen, Jyrki T. J.
Published: (2017)
Les apports de la recherche scientifique a la securite neige, glace et avalanche Chamonix, France, 30 mai/3 juin 1995 /
Published: (1995)
Published: (1995)
The dark sides of the Internet : on cyber threats and information warfare /
by: Heickerö, Roland
Published: (2013)
by: Heickerö, Roland
Published: (2013)
Designing network security : a practical guide to creating a secure network infrastructure /
by: Kaeo, Merike
Published: (2004)
by: Kaeo, Merike
Published: (2004)
Hack proofing your e-commerce site the only way to stop a hacker is to think like one /
Published: (2001)
Published: (2001)
Web commerce security design and development /
by: Nahari, Hadi
Published: (2011)
by: Nahari, Hadi
Published: (2011)
Spring Security 3 secure your web applications against malicious intruders with this easy to follow practical guide /
by: Mularien, Peter
Published: (2010)
by: Mularien, Peter
Published: (2010)
Windows forensic analysis DVD toolkit, /
by: Carvey, Harlan A.
Published: (2007)
by: Carvey, Harlan A.
Published: (2007)
The basics of web hacking tools and techniques to attack the Web /
by: Pauli, Joshua J.
Published: (2013)
by: Pauli, Joshua J.
Published: (2013)
Wireless sensor network security
Published: (2008)
Published: (2008)
Similar Items
-
Protecting mobile money against financial crimes global policy challenges and solutions /
by: Chatain, Pierre-Laurent
Published: (2011) -
Essentials of online payment security and fraud prevention
by: Montague, David A., 1967-
Published: (2010) -
Electronic safety and soundness securing finance in a new age /
by: Glaessner, Thomas C.
Published: (2004) -
The mobile application hacker's handbook /
by: Chell, Dominic
Published: (2015) -
Insider threat protecting the enterprise from sabotage, spying, and theft /
by: Cole, Eric
Published: (2006)