Computer fraud casebook: the bytes that bite
Gespeichert in:
Format: | Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Hoboken, N.J.
Wiley
2009
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Includes index. |
Beschreibung: | XIV, 424 S. |
ISBN: | 9780470278147 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV035333377 | ||
003 | DE-604 | ||
007 | t| | ||
008 | 090225s2009 xxu |||| 00||| eng d | ||
010 | |a 2008032267 | ||
020 | |a 9780470278147 |c cloth |9 978-0-470-27814-7 | ||
035 | |a (OCoLC)698931237 | ||
035 | |a (DE-599)BVBBV035333377 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
050 | 0 | |a HV6773 | |
082 | 0 | |a 363.25/9680973 | |
084 | |a PZ 3700 |0 (DE-625)141172: |2 rvk | ||
245 | 1 | 0 | |a Computer fraud casebook |b the bytes that bite |c ed. by Joseph T. Wells |
264 | 1 | |a Hoboken, N.J. |b Wiley |c 2009 | |
300 | |a XIV, 424 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes index. | ||
650 | 4 | |a Computer crimes | |
650 | 4 | |a Computer crimes |x Investigation | |
650 | 4 | |a Fraud | |
650 | 4 | |a Fraud investigation | |
650 | 0 | 7 | |a Computerkriminalität |0 (DE-588)4010452-7 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computerkriminalität |0 (DE-588)4010452-7 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Wells, Joseph T. |e Sonstige |0 (DE-588)13240687X |4 oth | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017137788&sequence=000004&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-017137788 |
Datensatz im Suchindex
_version_ | 1825766760687599616 |
---|---|
adam_text |
Titel: Computer fraud casebook
Autor: Wells, Joseph T.
Jahr: 2009
Contents
Foreword ix
Preface xi
Chapter 1 Just What the Doctor Ordered 1
George Kyrilis
Chapter 2 Of Botnets and Bagels: Vaccinating the Hospital
against Cybercrime 13
Frank Riccardi and Jennifer Campbell
Chapter 3 Pandora's Box 21
Dr. Vishnu Kanhere
Chapter 4 Mail-Order Fraud 35
Robin Conrad
Chapter 5 Lancelot Gone Missing 45
Carolyn Conn, Paul Price, and Karon Murff
Chapter 6 Double Trouble 57
Stephen P. Weber
Chapter 7 Unimaginable Wealth 67
Sandra Burris
Chapter 8 Hacked 75
Jon Lambiras
vi Contents
Chapter 9 Bad Education 85
Russ Allen
Chapter 10 If Only His Nose Could Grow 97
Barry Davidow
Chapter 11 Keeping Up with the Jamesons 105
Mike Andrews
Chapter 12 Imaginary Satellites 115
George Kyriakodis
Chapter 13 Never Pass Your Password 125
James Martin and Harry Cendrowski
Chapter 14 Why Computers and Meth Don't Mix 135
Stephen R. Menge
Chapter 15 Fishing in Dangerous Waters 143
Voe Dervaes
Chapter 16 The Man Who Told on Himself 155
Alan Greggo and Mike Jessee
Chapter 17 Triple Threat 163
Jean-François Legault
Chapter 18 Swiped 173
Peter Belloli
Chapter 19 Have Computer, Will Video 181
Dominic A. D'Orazio
Chapter 20 Server, We Have a Problem 191
Marty Musters
Contents vii
Chapter 21 Do It for the Kids 199
Michael Ammermon
Chapter 22 Moving Money 209
Neil Harrison
Chapter 23 Operation: Overnight Identity Theft 219
Bruno Pavlicek
Chapter 24 The Karma of Fraud 231
David Clements and Michael Cerny
Chapter 25 Secret Shopper 241
Jay Dawdy
Chapter 26 Would You Like a Receipt? 251
Shirley Quintana
Chapter 27 The Coupon Code Crooks 261
Danny Miller, Michael P. Rose, and Conor Donnelly
Chapter 28 He Fought the Law 269
Clifford Hunter
Chapter 29 Eyes on the Company Secrets 281
Tyson Johnson
Chapter 30 French Connections 289
Michael Nott
Chapter 31 Irreconcilable Differences 299
Jennifer Birtz
Chapter 32 Keeping It In the Family 309
Eric Sumners
viii Contents
Chapter 33 I Due 319
Rebecca Busch
Chapter 34 What Lies Inside the Trojan Horse 329
Johnathan Tal
Chapter 35 Lost in Transition 339
Amy Cron
Chapter 36 Superhero Syndrome 351
Hatitye Zhakata
Chapter 37 Stealing for the Sale 363
William J. Pederson and Timothy M. Strickler
Chapter 38 Do as I Say, Not as I Do 371
Richard Woodford
Chapter 39 Cinderella: One Glass Slipper Just Wasn't Enough 383
Antonio Ivan S. Aguirre
Chapter 40 Bloggers: Separating the Wheat from the Chaff 389
Steven Solieri, Joan Hodowanitz, and Andrew Felo
Chapter 41 The Campus Con 401
Kevin Sisemore
Chapter 42 One for You, One for Me: A Tale of Crooked Insurance 413
Sieve Martin
Index 421 |
any_adam_object | 1 |
author_GND | (DE-588)13240687X |
building | Verbundindex |
bvnumber | BV035333377 |
callnumber-first | H - Social Science |
callnumber-label | HV6773 |
callnumber-raw | HV6773 |
callnumber-search | HV6773 |
callnumber-sort | HV 46773 |
callnumber-subject | HV - Social Pathology, Criminology |
classification_rvk | PZ 3700 |
ctrlnum | (OCoLC)698931237 (DE-599)BVBBV035333377 |
dewey-full | 363.25/9680973 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.25/9680973 |
dewey-search | 363.25/9680973 |
dewey-sort | 3363.25 79680973 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Rechtswissenschaft Soziologie |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zc 4500</leader><controlfield tag="001">BV035333377</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">090225s2009 xxu |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2008032267</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470278147</subfield><subfield code="c">cloth</subfield><subfield code="9">978-0-470-27814-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)698931237</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV035333377</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HV6773</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.25/9680973</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">PZ 3700</subfield><subfield code="0">(DE-625)141172:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Computer fraud casebook</subfield><subfield code="b">the bytes that bite</subfield><subfield code="c">ed. by Joseph T. Wells</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, N.J.</subfield><subfield code="b">Wiley</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIV, 424 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Investigation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Fraud</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Fraud investigation</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wells, Joseph T.</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)13240687X</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017137788&sequence=000004&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-017137788</subfield></datafield></record></collection> |
id | DE-604.BV035333377 |
illustrated | Not Illustrated |
indexdate | 2025-03-05T15:01:07Z |
institution | BVB |
isbn | 9780470278147 |
language | English |
lccn | 2008032267 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-017137788 |
oclc_num | 698931237 |
open_access_boolean | |
physical | XIV, 424 S. |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Wiley |
record_format | marc |
spelling | Computer fraud casebook the bytes that bite ed. by Joseph T. Wells Hoboken, N.J. Wiley 2009 XIV, 424 S. txt rdacontent n rdamedia nc rdacarrier Includes index. Computer crimes Computer crimes Investigation Fraud Fraud investigation Computerkriminalität (DE-588)4010452-7 gnd rswk-swf Computerkriminalität (DE-588)4010452-7 s DE-604 Wells, Joseph T. Sonstige (DE-588)13240687X oth HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017137788&sequence=000004&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Computer fraud casebook the bytes that bite Computer crimes Computer crimes Investigation Fraud Fraud investigation Computerkriminalität (DE-588)4010452-7 gnd |
subject_GND | (DE-588)4010452-7 |
title | Computer fraud casebook the bytes that bite |
title_auth | Computer fraud casebook the bytes that bite |
title_exact_search | Computer fraud casebook the bytes that bite |
title_full | Computer fraud casebook the bytes that bite ed. by Joseph T. Wells |
title_fullStr | Computer fraud casebook the bytes that bite ed. by Joseph T. Wells |
title_full_unstemmed | Computer fraud casebook the bytes that bite ed. by Joseph T. Wells |
title_short | Computer fraud casebook |
title_sort | computer fraud casebook the bytes that bite |
title_sub | the bytes that bite |
topic | Computer crimes Computer crimes Investigation Fraud Fraud investigation Computerkriminalität (DE-588)4010452-7 gnd |
topic_facet | Computer crimes Computer crimes Investigation Fraud Fraud investigation Computerkriminalität |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017137788&sequence=000004&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT wellsjosepht computerfraudcasebookthebytesthatbite |