Computer fraud

Results: 842



#Item
211Detection of Undesirable Insider Behavior Joseph A. Calandrino1? , Steven J. McKinney2? , and Frederick T. Sheldon3 1 Princeton University, Princeton, NJ 08544, USA [removed]

Detection of Undesirable Insider Behavior Joseph A. Calandrino1? , Steven J. McKinney2? , and Frederick T. Sheldon3 1 Princeton University, Princeton, NJ 08544, USA [removed]

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2007-05-11 08:59:10
212ARBUTUS  Arbutus Audit Analytics Arbutus Audit Analytics provides auditors, business analysts, and fraud investigators with the very best in data analysis technology.

ARBUTUS Arbutus Audit Analytics Arbutus Audit Analytics provides auditors, business analysts, and fraud investigators with the very best in data analysis technology.

Add to Reading List

Source URL: www.arbutussoftware.com

Language: English - Date: 2014-10-06 16:45:24
213Copyright: Gunter Ollmann       

Copyright: Gunter Ollmann       

Add to Reading List

Source URL: www.technicalinfo.net

Language: English - Date: 2009-04-27 21:11:04
214Online Fraud your Guide to Prevention, Detection, and Recovery Educate yourself about online fraud, the steps you can take to help guard against it, and what you can do if you fall victim to it.

Online Fraud your Guide to Prevention, Detection, and Recovery Educate yourself about online fraud, the steps you can take to help guard against it, and what you can do if you fall victim to it.

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2012-10-29 17:23:58
215Table of Contents  Figures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv Sidebars . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xix Acknowledgments . . . . . . . . . . . . .

Table of Contents Figures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv Sidebars . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xix Acknowledgments . . . . . . . . . . . . .

Add to Reading List

Source URL: books.infotoday.com

Language: English - Date: 2011-11-30 22:44:50
216Computer Crime: Crisis or Beat-Up?

Computer Crime: Crisis or Beat-Up?

Add to Reading List

Source URL: anzsoc.org

Language: English - Date: 2009-04-20 00:51:55
217security_shield_white_trans_4c

security_shield_white_trans_4c

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-02-17 17:56:52
218The Journal of Systems and Software–175 www.elsevier.com/locate/jss Automated discovery of concise predictive rules for intrusion detection Guy Helmer, Johnny S.K. Wong *, Vasant Honavar, Les Miller

The Journal of Systems and Software–175 www.elsevier.com/locate/jss Automated discovery of concise predictive rules for intrusion detection Guy Helmer, Johnny S.K. Wong *, Vasant Honavar, Les Miller

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2005-02-05 20:56:16
219Great Tips  Watch out for Toll Fraud People like free things, especially free international telephone calls. What could be more fun than making free calls at the expense of others? Watch out for attacks by fraudsters int

Great Tips Watch out for Toll Fraud People like free things, especially free international telephone calls. What could be more fun than making free calls at the expense of others? Watch out for attacks by fraudsters int

Add to Reading List

Source URL: www.wharftt.com

Language: English - Date: 2013-09-03 23:02:03
220Investigative skills for the 1990s and beyond

Investigative skills for the 1990s and beyond

Add to Reading List

Source URL: aic.gov.au

Language: English - Date: 2009-05-25 16:54:07