|
|
|||
|
||||
OverviewFull Product DetailsAuthor: Kenneth BrancikPublisher: Taylor & Francis Ltd Imprint: Auerbach Dimensions: Width: 15.60cm , Height: 3.00cm , Length: 23.40cm Weight: 0.838kg ISBN: 9781420046595ISBN 10: 1420046594 Pages: 504 Publication Date: 06 December 2007 Audience: Professional and scholarly , Professional & Vocational Format: Hardback Publisher's Status: Active Availability: In Print This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of ContentsInsider Computer Fraud. Related Research in Insider Computer Fraud and Information Security Controls. The Insider Threat Strategic Planning Process. Information Technology Architecture and Insider Computer Fraud Prevention. Protection of Web Sites from Insider Abuse and the Information Technology Infrastructure. Web Services Security and Control Considerations for Reducing Transaction Risks. Application Security and Methods for Reducing Insider Computer Fraud. Insider Computer Fraud Taxonomy and the Art of Key Fraud Indicator (KFI) Selection Process. Key Fraud Signature (KFS) Selection Process for Detecting Insider Computer Fraud. Application and System Journaling and the Software Engineering Process. The Role of Neural Networks in the Insider Computer Fraud Framework. Appendices.ReviewsAuthor InformationBrancik, Kenneth Tab Content 6Author Website:Countries AvailableAll regions |