Product Type
Condition
Binding
Collectible Attributes
Seller Location
Seller Rating
Published by Prentice Hall, 1979
ISBN 10: 0131647725ISBN 13: 9780131647725
Seller: HPB-Red, Dallas, TX, U.S.A.
Book
paperback. Condition: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority!.
Published by Prentice-Hall, 1979
ISBN 10: 0131647725ISBN 13: 9780131647725
Seller: Bingo Books 2, Vancouver, WA, U.S.A.
Book First Edition
Hardcover. Condition: Near Fine. 1st Edition. hardback book in near fine condition.
Published by Prentice Hall, 1979
ISBN 10: 0131647725ISBN 13: 9780131647725
Seller: Kloof Booksellers & Scientia Verlag, Amsterdam, Netherlands
Book
Condition: very good. Englewood Cliffs : Prentice-Hall, 1971. Hardcover. xvi,509 pp. Library stamps. Very good clean copy. Condition : very good copy. ISBN 9780131647725. Keywords : RECHT,
Published by Prentice Hall, INC., New Jersey, 1979
ISBN 10: 0131647725ISBN 13: 9780131647725
Seller: J J Basset Books, bassettbooks, bookfarm.co.uk, Peter Tavy, United Kingdom
Book First Edition
Brown Leather. Condition: Near Fine (NEAR BRAND NEW). No Jacket. Graphs. (illustrator). This is a First Edition. .Please e-mail for further details. Size: 8vo - over 7¾" - 9¾". Not Signed or Inscribed. Hardback Ex Library.
Published by Englewood Cliffs, N.J. : Prentice-Hall, 1979, 1979
ISBN 10: 0131647725ISBN 13: 9780131647725
Seller: Joseph Valles - Books, Stockbridge, GA, U.S.A.
Book
Hardcover. Condition: Fine. No Jacket. xv, 509 p. : ill. ; 25 cm. ; ISBN: 0131647725; 9780131647725; National Library: 013-16477; GB7-93673 LCCN: 78-13730 ; LC: HV6773; KF9365; Dewey: 364.1/63 ; OCLC: 4136017 ; textured brown and black cloth with gold lettering ; no dustjacket ; ex-lib, stamps, label, date due pocket ; Contents : Understanding the problem -- how it happens -- Computer fraud theory and its practical application -- Prevention, detection and deterrents -- Ethical business conduct -- Personnel practices and procedures -- Administrative and internal controls -- Computer security and controls -- Communications and data base systems safeguards -- EDP Internal audit functions and techniques -- Common computer fraud manipulations and countermeasures -- Loss recovery, legal and investigative considerations -- Fidelity bonding and crime insurance -- Legal aspects of computer fraud -- Investigative procedures for computer fraud -- Implementing your loss control program -- A multidisciplilnary prevention program -- Estimating the costs and benefits of countermeasures -- Successfully implementing your approach -- Bibliography, an annotated selection of recent books -- Good control practices for funds disbursement and receipt applications -- Application contol evaluation table -- Application control characteristics -- Advanced systems control evaluation table -- Computer abuse control evaluation table -- Systems development control evaluation table -- Information processing facility control evaluation table -- Sources of software aids for systems development and operations control -- Attributes of fifteen audit software packages -- Illustrative procedures manual section covering irregularities, reporting, investigation, and restitution -- Illustrative form for confessions -- Sample guide to sources of personal information for investigators -- Characteristics of bank checks and other sources of financial information for investigators ; although this book dates back to the beginnings of the internet, the essential structure of the approach underlies current methodology, is systematic and thorough ; the detailed list of investigative techniques for mining personal information bear study, as well as the details of printed bank check transaction data ; FINE. Book.
Published by Prentice Hall, 1979
ISBN 10: 0131647725ISBN 13: 9780131647725
Seller: dsmbooks, Liverpool, United Kingdom
Book
paperback. Condition: Good. Good. book.