Computer fraud

Results: 842



#Item
151Crime / Computer crimes / Law / Abacus - Australian Mutuals / Romance scam / Social engineering / Ethics / Fraud

1 Margaret St Sydney NSW 2000 GPO Box 4720 Sydney NSW 2001

Add to Reading List

Source URL: www.customerownedbanking.asn.au

Language: English - Date: 2014-03-21 06:31:31
152Risk / Ethics / Fraud / Information technology audit / Deception / Computer-aided audit tools / Internal control / Internal audit / Identity theft / Auditing / Crimes / Accountancy

Fraud risk management Report to Parliament 9 : Queensland Audit Office Location

Add to Reading List

Source URL: www.qao.qld.gov.au

Language: English - Date: 2013-03-26 22:08:48
153Computer-aided audit tools / Accounts payable / Risk / Data mining / Business / Data Analysis Techniques for Fraud Detection / Information technology audit / Fraud / Accountancy

Fighting Fraud with Data Mining & Analysis Leonard W. Vona DecemberFraud Auditing, Inc.

Add to Reading List

Source URL: www.audimation.com

Language: English - Date: 2013-03-08 11:08:17
154Ethics / Crimes / Auditing / Information technology audit / Deception / Computer-aided audit tools / Accounts payable / Certified Fraud Examiner / Chargeback / Fraud / Accountancy / Business

W H I T E P A P E R An Active Fight against Fraud Integrating People, Process & Data Analysis Technology

Add to Reading List

Source URL: www.audimation.com

Language: English - Date: 2013-03-13 16:30:45
155Confidence tricks / Computing / Email / Computer crimes / Social engineering / Phishing / Email fraud / Internet fraud / Spam / Spamming / Cybercrime / Internet

Class 3_Identify Tricks and Scams Online_FINAL

Add to Reading List

Source URL: www.ikeepsafe.org

Language: English - Date: 2013-06-22 12:04:48
156Electronic voting / Electoral systems / Computer memory / Sociology / Government / Voting machine / Voter-verified paper audit trail / Voting system / Ballot / Politics / Elections / Election fraud

Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage -orHow to Store Ballots on a Voting Machine (Extended Abstract) David Molnar UC Berkeley

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
157Software licenses / Foreign exchange companies / Credit card / American Express / End-user license agreement / Financial services / Electronic commerce / Economy of New York City / Credit card fraud / Payment systems / Credit cards / Computer law

NCSS Statistical Software Order Form

Add to Reading List

Source URL: ncss.wpengine.netdna-cdn.com

Language: English - Date: 2015-01-06 15:58:37
158Information sensitivity / Ethics / National security / Intellectual property law / Espionage / WikiLeaks / Computer Fraud and Abuse Act / Trade secret / Computer fraud / Security / Information technology audit / World Wide Web

10 NORTH PEARL STREET* 4th FLOOR* ALBANY, NY 12207* * FAX

Add to Reading List

Source URL: pmcdeadline2.files.wordpress.com

Language: English - Date: 2015-04-17 20:44:54
159Telephony / Fraud / SMiShing / Deception / Ethics / Vishing / Spamming / Phishing / Text messaging / Social engineering / Computer crimes / Crime

PhishLabs_Logo_CMYK_notag.eps

Add to Reading List

Source URL: info.phishlabs.com

Language: English - Date: 2013-12-16 08:54:26
160Electronic commerce / Data security / National security / Identity theft / Payment Card Industry Data Security Standard / Information security / Credit card fraud / Credit card / Data breach / Security / Computer security / Credit cards

-ugustBy Mickey Murphy Information security. Identity theft. Black hat hackers. This all sounds like three-alarm lingo from some old DC comic book: “Immediately sign over all

Add to Reading List

Source URL: www.thinklikeaspy.com

Language: English - Date: 2010-08-13 15:55:11
UPDATE