Identity thieves motives and methods /
Na minha lista:
Autor principal: | Copes, Heith |
---|---|
Autor Corporativo: | ebrary, Inc |
Outros Autores: | Vieraitis, Lynne M. |
Formato: | Recurso Eletrônico livro eletrônico |
Idioma: | inglês |
Publicado em: |
Boston :
Northeastern University Press,
c2012.
|
Assuntos: | |
Acesso em linha: | An electronic book accessible through the World Wide Web; click to view |
Tags: |
Adicionar Tag
Sem tags, seja o primeiro a adicionar uma tag!
|
Registros relacionados
Identity theft handbook detection, prevention, and security /
por: Biegelman, Martin T.
Publicado em: (2009)
por: Biegelman, Martin T.
Publicado em: (2009)
Preventing identity theft in your business how to protect your business, customers, and employees /
por: Collins, Judith M.
Publicado em: (2005)
por: Collins, Judith M.
Publicado em: (2005)
Phishing exposed
por: James, Lance
Publicado em: (2005)
por: James, Lance
Publicado em: (2005)
Identity theft in today's world
por: McNally, Megan M.
Publicado em: (2012)
por: McNally, Megan M.
Publicado em: (2012)
Personal identifiable information and data breaches
Publicado em: (2009)
Publicado em: (2009)
Countering fraud for competitive advantage the professional approach to reducing the last great hidden cost /
por: Button, Mark
Publicado em: (2013)
por: Button, Mark
Publicado em: (2013)
Online identity theft
Publicado em: (2009)
Publicado em: (2009)
Financial crimes fraud, theft and embezzlement /
Publicado em: (2011)
Publicado em: (2011)
Fraud smart
por: Pickett, K. H. Spencer
Publicado em: (2011)
por: Pickett, K. H. Spencer
Publicado em: (2011)
Phishing dark waters : the offensive and defensive sides of malicious e-mails /
por: Hadnagy, Christopher, et al.
Publicado em: (2015)
por: Hadnagy, Christopher, et al.
Publicado em: (2015)
Opportunity, environmental characteristics and crime an analysis of auto theft patterns /
por: Levy, Marissa Potchak, 1978-
Publicado em: (2009)
por: Levy, Marissa Potchak, 1978-
Publicado em: (2009)
Stealing cars : technology and society from the Model T to the Gran Torino /
por: Heitmann, John Alfred, et al.
Publicado em: (2014)
por: Heitmann, John Alfred, et al.
Publicado em: (2014)
Anti-fraud risk and control workbook
por: Goldmann, Peter, 1953-
Publicado em: (2009)
por: Goldmann, Peter, 1953-
Publicado em: (2009)
License plate readers for law enforcement : opportunities and obstacles /
por: Gierlack, Keith
Publicado em: (2014)
por: Gierlack, Keith
Publicado em: (2014)
Fraud analytics : strategies and methods for detection and prevention /
por: Spann, Delena D., 1967-
Publicado em: (2014)
por: Spann, Delena D., 1967-
Publicado em: (2014)
The moonstone and the woman in white /
por: Collins, Wilkie
Publicado em: (1937)
por: Collins, Wilkie
Publicado em: (1937)
Faces of fraud cases and lessons from a life of fighting fraudsters /
por: Biegelman, Martin T.
Publicado em: (2013)
por: Biegelman, Martin T.
Publicado em: (2013)
The accredited counter fraud specialist handbook /
por: Tunley, Martin
Publicado em: (2015)
por: Tunley, Martin
Publicado em: (2015)
Backdating of stock options
Publicado em: (2010)
Publicado em: (2010)
Healthcare fraud auditing and detection guide /
por: Busch, Rebecca S.
Publicado em: (2008)
por: Busch, Rebecca S.
Publicado em: (2008)
The responsible conduct of research in the health sciences report of a study /
Publicado em: (1989)
Publicado em: (1989)
Phantom billing, fake prescriptions, and the high cost of medicine health care fraud and what to do about it /
por: Leap, Terry L., 1948-
Publicado em: (2011)
por: Leap, Terry L., 1948-
Publicado em: (2011)
Internal control/anti-fraud program for the small private business : a guide for companies not subject to the Sarbanes-Oxley Act /
por: Dawson, Steve, 1962-
Publicado em: (2015)
por: Dawson, Steve, 1962-
Publicado em: (2015)
Phantom Billing, Fake Prescriptions, and the High Cost of Medicine : Health Care Fraud and What to Do about It /
por: Leap, Terry L., 1948-
Publicado em: (2011)
por: Leap, Terry L., 1948-
Publicado em: (2011)
The hedge fund fraud casebook
por: Johnson, Bruce, 1947 Feb. 4-
Publicado em: (2010)
por: Johnson, Bruce, 1947 Feb. 4-
Publicado em: (2010)
Beggars and thieves lives of urban street criminals /
por: Fleisher, Mark S.
Publicado em: (1995)
por: Fleisher, Mark S.
Publicado em: (1995)
Corporate fraud handbook prevention and detection /
por: Wells, Joseph T.
Publicado em: (2011)
por: Wells, Joseph T.
Publicado em: (2011)
Corporate fraud handbook prevention and detection /
por: Wells, Joseph T.
Publicado em: (2013)
por: Wells, Joseph T.
Publicado em: (2013)
Cultural property crime : an overview and analysis on contemporary perspectives and trends /
Publicado em: (2015)
Publicado em: (2015)
Thirteen ways to steal a bicycle theft law in the information age /
por: Green, Stuart P.
Publicado em: (2012)
por: Green, Stuart P.
Publicado em: (2012)
Mass marketing and consumer fraud background, issues and data /
Publicado em: (2010)
Publicado em: (2010)
A.B.C.'s of behavioral forensics : applying psychology to financial fraud prevention and detection /
por: Ramamoorti, Sridhar
Publicado em: (2013)
por: Ramamoorti, Sridhar
Publicado em: (2013)
The lure the true story of how the Department of Justice brought down two of the world's most dangerous cyber criminals /
por: Schroeder, Steve
Publicado em: (2012)
por: Schroeder, Steve
Publicado em: (2012)
Detecting fraud in organizations techniques, tools, and resources /
por: Petrucelli, Joseph R., 1960-
Publicado em: (2012)
por: Petrucelli, Joseph R., 1960-
Publicado em: (2012)
Financial fraud prevention and detection governance and effective practices /
por: Young, Michael R.
Publicado em: (2014)
por: Young, Michael R.
Publicado em: (2014)
Forensic accounting and fraud investigation for non-experts
por: Silverstone, Howard
Publicado em: (2012)
por: Silverstone, Howard
Publicado em: (2012)
Benford's law applications for forensic accounting, auditing, and fraud detection /
por: Nigrini, Mark J. (Mark John)
Publicado em: (2012)
por: Nigrini, Mark J. (Mark John)
Publicado em: (2012)
Investigating corporate fraud
por: Comer, Michael J.
Publicado em: (2003)
por: Comer, Michael J.
Publicado em: (2003)
Essentials of corporate fraud
por: Coenen, Tracy, 1972-
Publicado em: (2008)
por: Coenen, Tracy, 1972-
Publicado em: (2008)
An exploration of the factors influencing fraudulent activities in stock brokerage firms and investment banks in Kenya /
por: Malinda, Anne Nthenya
Publicado em: (2010)
por: Malinda, Anne Nthenya
Publicado em: (2010)
Registros relacionados
-
Identity theft handbook detection, prevention, and security /
por: Biegelman, Martin T.
Publicado em: (2009) -
Preventing identity theft in your business how to protect your business, customers, and employees /
por: Collins, Judith M.
Publicado em: (2005) -
Phishing exposed
por: James, Lance
Publicado em: (2005) -
Identity theft in today's world
por: McNally, Megan M.
Publicado em: (2012) -
Personal identifiable information and data breaches
Publicado em: (2009)