Computer Fraud Casebook :The Bytes that Bite

Publication subTitle :The Bytes that Bite

Author: Joseph T. Wells  

Publisher: John Wiley & Sons Inc‎

Publication year: 2009

E-ISBN: 9780470436486

P-ISBN(Hardback):  9780470278147

Subject: D917 犯罪学

Language: ENG

Access to resources Favorite

Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.

Description

This one-of-a-kind collection consists of actual cases written by fraud examiners out in the field. These cases were hand selected from hundreds of submissions and together form a comprehensive picture of the many types of computer fraud how they are investigated, across industries and throughout the world. Topics included are email fraud, on-line auction fraud, security breaches, counterfeiting, and others.

Chapter

Contents

pp.:  1 – 7

Foreword

pp.:  7 – 11

Preface

pp.:  11 – 13

Chapter 3: Pandora’s Box

pp.:  31 – 39

Chapter 4: Mail-Order Fraud

pp.:  39 – 53

Chapter 5: Lancelot Gone Missing

pp.:  53 – 63

Chapter 6: Double Trouble

pp.:  63 – 75

Chapter 7: Unimaginable Wealth

pp.:  75 – 85

Chapter 8: Hacked

pp.:  85 – 93

Chapter 9: Bad Education

pp.:  93 – 103

Chapter 10: If Only His Nose Could Grow

pp.:  103 – 115

Chapter 11: Keeping Up with the Jamesons

pp.:  115 – 123

Chapter 12: Imaginary Satellites

pp.:  123 – 133

Chapter 13: Never Pass Your Password

pp.:  133 – 143

Chapter 14: Why Computers and Meth Don’t Mix

pp.:  143 – 153

Chapter 15: Fishing in Dangerous Waters

pp.:  153 – 161

Chapter 16: The Man Who Told on Himself

pp.:  161 – 173

Chapter 17: Triple Threat

pp.:  173 – 181

Chapter 18: Swiped

pp.:  181 – 191

Chapter 19: Have Computer, Will Video

pp.:  191 – 199

Chapter 20: Server, We Have a Problem

pp.:  199 – 209

Chapter 21: Do It for the Kids

pp.:  209 – 217

Chapter 22: Moving Money

pp.:  217 – 227

Chapter 23: Operation: Overnight Identity Theft

pp.:  227 – 237

Chapter 24: The Karma of Fraud

pp.:  237 – 249

Chapter 25: Secret Shopper

pp.:  249 – 259

Chapter 26: Would You Like a Receipt?

pp.:  259 – 269

Chapter 27: The Coupon Code Crooks

pp.:  269 – 279

Chapter 28: He Fought the Law

pp.:  279 – 287

Chapter 30: French Connections

pp.:  287 – 307

Chapter 31: Irreconcilable Differences

pp.:  307 – 317

Chapter 32: Keeping It In the Family

pp.:  317 – 327

Chapter 33: I Due

pp.:  327 – 337

Chapter 34: What Lies Inside the Trojan Horse

pp.:  337 – 347

Chapter 35: Lost in Transition

pp.:  347 – 357

Chapter 36: Superhero Syndrome

pp.:  357 – 369

Chapter 37: Stealing for the Sale

pp.:  369 – 381

Chapter 38: Do as I Say, Not as I Do

pp.:  381 – 389

Chapter 39: Cinderella: One Glass Slipper Just Wasn’t Enough

pp.:  389 – 401

Chapter 40: Bloggers: Separating the Wheat from the Chaff

pp.:  401 – 407

Chapter 41: The Campus Con

pp.:  407 – 419

Chapter 42: One for You, One for Me: A Tale of Crooked Insurance

pp.:  419 – 431

Index

pp.:  431 – 439

LastPages

pp.:  439 – 443

The users who browse this book also browse


No browse record.