Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Fraud Exposed: What You Don't Know Could Cost Your Company Millions
Fraud Exposed: What You Don't Know Could Cost Your Company Millions
The $600 billion gorilla in the room

"Dr. Joe Koletar has provided an effective road map to the problem of occupational fraud, in both the public and private sectors, in America. Such frauds affect every American worker, shareholder, and taxpayer. His insights and ideas are an important contribution to the effort to fight this growing...

Elements of Computer Security (Undergraduate Topics in Computer Science)
Elements of Computer Security (Undergraduate Topics in Computer Science)

As our society grows ever more reliant on computers, so it also becomes more vulnerable to computer crime. Cyber attacks have been plaguing computer users since the 1980s, and computer security experts are predicting that smart telephones and other mobile devices will also become the targets of cyber security threats in the future.

...

Computer Crime: A Crimefighter's Handbook (Computer Security)
Computer Crime: A Crimefighter's Handbook (Computer Security)

Terrorist attacks on computer centers, electronic fraud on international funds transfer networks, viruses and worms in our software, corporate espionage on business networks, and crackers breaking into systems on the Internet...Computer criminals are becoming ever more technically sophisticated, and it's an increasing challenge to keep up...

King Zeno: A Novel
King Zeno: A Novel

A New York Times Book Review Editors' Choice and a Paris Review Staff Pick

A January Pick by Salon, Town and Country, Southern Living, and LA Magazine

New Orleans, 1918. The birth of jazz, the Spanish flu, an ax murderer on the loose. The lives of a...

The Encyclopedia Of International Organized Crime (Facts on File Crime Library)
The Encyclopedia Of International Organized Crime (Facts on File Crime Library)
As a reporter, columnist, and author who has written extensively about organized crime for more than three decades, my primary beat has been what is referred to by the Federal Bureau of Investigation (FBI) as “traditional organized crime.” In official court documents, the FBI identifies the organization as La Cosa Nostra (LCN). Most...
Montreal's Irish Mafia: The True Story of the Infamous West End Gang
Montreal's Irish Mafia: The True Story of the Infamous West End Gang

Their names resonate with organized crime in Montreal: the Matticks, MacAllisters, Johnstons and Griffins, and Peter Dunie Ryan. They are the Irish equivalent of the infamous Rizzuto and Cotroni families, and the "Mom" Bouchers and Walter Stadnicks of the Hells Angels. Award-winning producer, journalist and author D’Arcy...

Virtualization Security (EC-Council Disaster Recovery Professional)
Virtualization Security (EC-Council Disaster Recovery Professional)

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

JFK and the Unspeakable: Why He Died and Why It Matters
JFK and the Unspeakable: Why He Died and Why It Matters
BRAND NEW HARDBACKWe can know the essential truth of President John F. Kennedy's assassination. That truth can set us free.

Thanks to the pioneer investigators into President Kennedy's murder, the truth-telling of many witnesses, and a recent flood of documents through the JFK Records Act, the truth is available. Not only can the
...
Anti-Money Laundering in a Nutshell: Awareness and Compliance for Financial Personnel and Business Managers
Anti-Money Laundering in a Nutshell: Awareness and Compliance for Financial Personnel and Business Managers

Anti–Money Laundering in a Nutshellis a concise, accessible, and practical guide to compliance with anti–money laundering law for financial professionals, corporate investigators, business managers, and all personnel of financial institutions who are required, under penalty of hefty fines, to get anti–money...

Penetration Testing: Procedures & Methodologies
Penetration Testing: Procedures & Methodologies

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Cyber Crime Investigator's Field Guide
Cyber Crime Investigator's Field Guide
Long gone are the days when a computer took up an entire room. Now we have computers at home, laptops that travel just about anywhere, and data networks that allow us to transmit information from virtually any location in a timely and efficient manner. What have these advancements brought us? Another arena for criminal activity. If someone wants to...
Phobias (Diseases and Disorders)
Phobias (Diseases and Disorders)
Human beings have a love/hate relationship with fear. Medals are given to valiant warriors who charge fearlessly into combat, while those who sneak around whimpering in their battle helmets are labeled cowards and in some cultures are even put to death for what is considered a war-time crime. As a whole, people generally find fear to be...
unlimited object storage image
Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy