Books on the topic 'FRAUD AND DATA BREACHES'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'FRAUD AND DATA BREACHES.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Y, Chow Stephen, Anthony Barbara B, and Massachusetts Continuing Legal Education, Inc. (1982- ), eds. Preventing & handling data security breaches. MCLE, 2009.
Find full textY, Chow Stephen, Anthony Barbara B, and Massachusetts Continuing Legal Education, Inc. (1982- ), eds. Preventing & handling data security breaches. MCLE, 2009.
Find full textFoster, Peter C., Sara E. Cable, Kathleen M. Porter, and Walter C. Boyd. Fundamentals of data security law & breaches. MCLE New England, 2014.
Find full textWong, Rebecca. Data Security Breaches and Privacy in Europe. Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-5586-7.
Full textRita, Tehan, ed. Data security breaches: Context and incident summaries. Nova Science Publishers, 2008.
Find full textVona, Leonard W. Fraud Data Analytics Methodology. John Wiley & Sons, Inc., 2017. http://dx.doi.org/10.1002/9781119270331.
Full textKrausz, Michael. Managing Information Security Breaches: Studies from Real Life. IT Governance Pub., 2010.
Find full textBower, George Spencer. The law relating to actionable non-disclosure and other breaches of duty in relations of confidence, influence and advantage. 2nd ed. Butterworths, 1990.
Find full textParham, Martin A. Mass marketing and consumer fraud: Background, issues, and data. Nova Science Publishers, 2009.
Find full textParham, Martin A. Mass marketing and consumer fraud: Background, issues, and data. Nova Science Publishers, 2009.
Find full textRussell, Shumway, ed. Incident response: A strategic guide to handling system and network security breaches. New Riders, 2002.
Find full textMcNamee, David. Telecommunications: Detecting and deterring fraud. Institute of Internal Auditors, 1993.
Find full textWestphal, Christopher R. Data mining for intelligence, fraud & criminal detection: Advanced analytics & information sharing technologies. CRC Press, 2008.
Find full textCoderre, David G. Computer Aided Fraud Prevention and Detection. John Wiley & Sons, Ltd., 2009.
Find full textLanza, Richard B. Proactively detecting occupational fraud using computer audit reports. Institute of Internal Auditors Research Foundation, 2004.
Find full textDiekmann, Andreas, ed. Methodological Artefacts, Data Manipulation and Fraud in Economics and Social Science. De Gruyter, 2011. http://dx.doi.org/10.1515/9783110508420.
Full textWolff, Josephine. Cyberinsurance Policy: Rethinking Risk in an Age of Ransomware, Computer Fraud, Data Breaches, and Cyberattacks. MIT Press, 2022.
Find full textDavidoff, Sherri. Data Breaches: Crisis and Opportunity. Pearson Education, Limited, 2019.
Find full textDavidoff, Sherri. Data Breaches: Crisis and Opportunity. Pearson Education, Limited, 2021.
Find full textPersonal identifiable information and data breaches. Nova Science Publishers, 2009.
Find full textHardy, Marianna. Target Store Data Breaches: Examination and Insight. Nova Science Publishers, Incorporated, 2014.
Find full textCommittee on Energy and Commerce, United States House of Representatives, and United States United States Congress. Securing Consumers' Data: Options Following Security Breaches. Independently Published, 2019.
Find full textWong, Rebecca. Data Security Breaches and Privacy in Europe. Springer London, Limited, 2013.
Find full textRajole, Vikas. Causes of Data Breaches and Preventive Measures. Data Loss Prevention. GRIN Verlag GmbH, 2013.
Find full textLloyd, Ian J. Information Technology Law. Oxford University Press, 2017. http://dx.doi.org/10.1093/he/9780198787556.001.0001.
Full textInformation Security: Cyberattacks, Data Breaches and Security Controls. Nova Science Publishers, Incorporated, 2019.
Find full textScholz, Paul. Information Security: Cyberattacks, Data Breaches and Security Controls. Nova Science Publishers, Incorporated, 2019.
Find full textGee, Sunder. Fraud and Fraud Detection: A Data Analytics Approach. Wiley & Sons, Incorporated, John, 2014.
Find full textGee, Sunder. Fraud and Fraud Detection: A Data Analytics Approach. Wiley & Sons, Incorporated, John, 2014.
Find full textGee, Sunder. Fraud and Fraud Detection: A Data Analytics Approach. Wiley & Sons, Limited, John, 2014.
Find full textIrvine, Mariel. Practical Guide to Enforcing Data Protection Rights and Compensation for Data Breaches. Law Brief Publishing, 2023.
Find full textData Security Breaches: Notification Laws, Legislation and Identity Theft. Nova Science Pub Inc, 2012.
Find full textCommittee on Financial Services, United States House of Representatives, and United States United States Congress. Assessing Data Security: Preventing Breaches and Protecting Sensitive Information. Independently Published, 2020.
Find full textData Security Breaches and Privacy in Europe Springerbriefs in Cybersecurity. Springer London Ltd, 2013.
Find full textWolff, Josephine. Cyberinsurance Policy. The MIT Press, 2022. http://dx.doi.org/10.7551/mitpress/13665.001.0001.
Full textBell, Alexis C. Data Analysis For Corporate Fraud Risk: Ratio Red Flags For Fraud. CreateSpace Independent Publishing Platform, 2012.
Find full textShepherdson, Kevin, William Hioe, and Lyn Boxall. 99 Privacy Breaches to Beware Of: Practical Data Protection Tips from Real-Life Experiences. Marshall Cavendish International (Asia) Private Limited, 2019.
Find full textFowler, Kevvie. Data Breach Preparation and Response: Breaches Are Certain, Impact Is Not. Elsevier Science & Technology Books, 2016.
Find full textData Breach Preparation and Response: Breaches Are Certain, Impact Is Not. Elsevier Science & Technology Books, 2016.
Find full textAmanfi, Michael. Avoiding Cloud Computing Data Breaches: A Case Study Research on Strategies. Independently Published, 2019.
Find full textAvoiding Cloud Computing Data Breaches: A Case Study Research on Strategies. Independently Published, 2019.
Find full textVona, Leonard W. Fraud Data Analytics Methodology: The Fraud Scenario Approach to Uncovering Fraud in Core Business Systems. Wiley & Sons, Limited, John, 2016.
Find full textVona, Leonard W. Fraud Data Analytics Methodology: The Fraud Scenario Approach to Uncovering Fraud in Core Business Systems. Wiley & Sons, Incorporated, John, 2016.
Find full textVona, Leonard W. Fraud Data Analytics Methodology: The Fraud Scenario Approach to Uncovering Fraud in Core Business Systems. Wiley & Sons, Incorporated, John, 2016.
Find full textVona, Leonard W. Fraud Data Analytics Methodology: The Fraud Scenario Approach to Uncovering Fraud in Core Business Systems. Wiley & Sons, Limited, John, 2017.
Find full textAhmed, Rohan. Data Mining Techniques in Financial Fraud Detection. GRIN Verlag GmbH, 2018.
Find full textWietholter, Leah. Data Sleuth: Using Data in Forensic Accounting Engagements and Fraud Investigations. Wiley & Sons, Incorporated, John, 2022.
Find full text