e99 Online Shopping Mall
Help | |
Home - Basic S - Securities Fraud (Books) |
  | Back | 41-60 of 100 | Next 20 |
click price to see details click image to enlarge click link to go to the store
41. How Personal & Internet Security Works by Preston Gralla | |
Paperback: 288
Pages
(2006-06-10)
list price: US$34.99 -- used & new: US$5.00 (price subject to change: see help) Asin: 0789735539 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description In 2003, fraud and identity theft cost consumers at least $437 million dollars. In 2004, the U.S. Federal Trade Commission received 247,000 consumer complaints in 2004 (up 15% from 2003), from individuals whose identity was stolen, and according to Reuters.com (2/2005), Americans lost $548 million dollars to identity theft and consumer fraud in 2004. Don't allow yourself to become a part of the statistics! How Personal and Internet Security Works illustrates in vivid detail the many dangers faced by those who use the Internet to send or receive email, surf the Web, conduct personal business, use a credit card, or even travel to airports and how those dangers can be solved. You'll also get detailed explanations of Internet privacy issues such as spyware, phishing, identity theft, data mining, biometrics, and security cameras, as well as Homeland Security issues such as airport scanning and terrorist screening. Customer Reviews (1)
The big disappointment |
42. Computer Security - ESORICS 96: 4th European Symposium on Research in Computer Security, Rome, Italy, September 25 - 27, 1996, Proceedings (Lecture Notes in Computer Science) | |
Paperback: 365
Pages
(1996-09-30)
list price: US$82.95 -- used & new: US$65.61 (price subject to change: see help) Asin: 3540617701 Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description |
43. Enterprise Security: IT Security Solutions: Concepts, Practical Experiences, Technologies | |
Hardcover: 264
Pages
(2006-03-13)
list price: US$60.00 -- used & new: US$45.94 (price subject to change: see help) Asin: 389578267X Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Customer Reviews (2)
Security Review
Solid book for infosec consultants |
44. Halting the Hacker: A Practical Guide to Computer Security (2nd Edition) by Donald L. Pipkin | |
Paperback: 384
Pages
(2002-09-05)
list price: US$44.99 -- used & new: US$7.39 (price subject to change: see help) Asin: 0130464163 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Customer Reviews (8)
Hooray for "Halting"
Valuable for anyone needing to know about info security It provides a good overview of core information security issues and concepts. It takes a big-picture approach to information systems security, not bogging down the reader in arcane minutiae. Halting the Hacker delves into more intricate details and includes a CD-ROM with many security tools. Overall, it is valuable for anyone needing to know about information systems security without sacrificing a forest in the process.
Second Edition is First Rate! Real-life stories about hackers and companies who were hacked are sprinkled throughout the book making it an easy read for anyone, not just techies.The tools discussed (and which come with it on the included CD-ROM) makes it a valuable resource for everyone who deals with Unix/Linux systems. Highly recommended!
Good Starting Overview There are actually a very few pages that deal with things like disabling unused services, but that's just 14 pages from a 337 page work, and those are really more illustrative than specific. Instead, this covers the who, the how and the why of hackers, the legal climate, and includes examples of actual incidents. Perhaps a good indication of the target audience is the Glossary, which includes definitions for "back door", "client/server", "Kerberos", "newsgroup" and "Trojan horse". If you are looking for programmer level information, this isn't what you want. On the other hand, this is much more technical and focused than something you might read in Newsweek or your Sunday newspaper. Recommended for business owners and managers who need to understand computer security even though others may actually implement it, or as a base introduction for technical people with no previous exposure.
So-so |
45. Implementing Biometric Security (Wiley Red Books) by John Chirillo, Scott Blaul | |
Paperback: 432
Pages
(2003-05-09)
list price: US$60.00 -- used & new: US$4.96 (price subject to change: see help) Asin: 0764525026 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Customer Reviews (2)
Informative, expert, immensely useful The authors' premise is that biometric systems, relying on fingerprints, retinal scans, speech patterns and facial thermography, are a highly effective solution for the problems of network security and authentication. He then explains how to assess the most effective form of these biometric methods which will meet an organisations' needs, how to implement such systems and understand their overall strengths and weaknesses. Although security is a highly-important issue, the contents are of value to those interested in biometric systems in general - for example, this is a technology of interest to labour-hire organisations. Such companies may place many hundreds of casual employees on remote client worksites and need verifiable means to determine the employee's attendance and hours worked - in short, an unfoolable version of the old "time clock" punch-card system. The authors detail at length the foundational mathematics or principles behind each biometric system covered, and spend equal time describing genuine implementations - using readily available (commercial) hardware and software. Helpful screenshots, tables and diagrams accompany these practical components and give full confidence that the reader can reproduce the results themselves (with the appropriate hardware and software, of course). For software developers, sample source code is also provided showing how the biometric devices can be managed from within Visual Basic programs. Completing the book is a companion Web site with updated source code, articles and case studies. For those who see value in biometric systems within their organisation - whether for secure authentication or other purposes - this book is a welcome and useful reference, replete with expert advice and guidelines. It is definitely a "must read".
Biometric Puzzles Revealed |
46. Internet Fraud Casebook: The World Wide Web of Deceit | |
Hardcover: 386
Pages
(2010-07-26)
list price: US$70.00 -- used & new: US$45.91 (price subject to change: see help) Asin: 0470643633 Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Internet Fraud Casebook: The World Wide Web of Deceit is a one-of-a-kind collection of actual cases written by the fraud examiners who investigated them. These stories were hand-selected from hundreds of submissions and together form a comprehensive, enlightening and entertaining picture of the many types of Internet fraud in varied industries throughout the world. This book reveals the dangers of Internet fraud and the measures that can be taken to prevent it from happening in the first place. |
47. The fraud prevention jackpot. (security measures at casinos): An article from: Security Management by Anthony J. Luizzo, Frank A. Luizzo, George van Nostrand, Philip F. Luizzo | |
Digital: 14
Pages
(1996-08-01)
list price: US$5.95 -- used & new: US$5.95 (price subject to change: see help) Asin: B00096M8YG Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description |
48. E-Commerce Security: Weak Links, Best Defenses by Anup K. Ghosh | |
Paperback: 304
Pages
(1998-01-21)
list price: US$34.99 -- used & new: US$2.99 (price subject to change: see help) Asin: 0471192236 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description To that end, Ghosh discusses real-lifesecurity failures, how they occurred, and how recurrences can beprevented. He then takes a systematic look at the areas of risk. Onechapter deals with potential problems in active Web content, such asJava applets, ActiveX controls, and push technology. He examines dataprotocols to secure transactions with the warning that the data can bevulnerable before and after the secure transmission. The weaknesses ofserver hardware and software come under scrutiny as well. Ghosh callsfor greater attention to security as software is being developed andlooks at what advances are likely to be coming down theroad. --Elizabeth Lewis Customer Reviews (4)
well organized and well written Highly recommended for beginners because it is very easy to understand and a brilliant introduction to e-commerce security issues. Also highly recommended for experienced users, as it provides a good overview in a concise manner.
great overview of the security issues for internet commerce
An overall
Good coverage of Web-related e-commerce security issues Chapter one is ageneral introduction to the factors involved, looking at some recent"attacks" of various types, and then reviewing the client,transport, server, and operating system components to be examined in theremainder of the book.Client (generally browser) flaws are coveredthoroughly in chapter two.The breadth of coverage even includes mentionof topics such as the concern for privacy considerations with cookies. Active content is the major concern, with an excellent discussion ofActiveX (entitled "ActiveX [In]security"), a reasonably detailedreview of the Java security model, and a look at JavaScript. Unfortunately, very little of this touches directly on e-commerce as such,except insofar as insecure client technology is going to make e-commerce aharder sell to the general public.While covering the transport oftransaction information, in chapter three, Ghosh makes an interestingdistinction between stored account systems (where you want to secure thetransmission of identification data) and stored value systems (where thedata, once transmitted, is useless to an eavesdropper).Many booksconcentrate on either channel security or electronic cash systems, so thiscomparison is instructive. A server involves multiple programs, and mayinvolve multiple machines. Server security can quickly become complex, andthis is quite evident in chapter four.While a great deal of useful andthought-provoking information is presented, the complicated nature of theundertaking works against this chapter.Not all topics are dealt withthoroughly, or as well as the previous material was.Oddly, one issue notcovered in depth is the firewall, which is handled very well in chapterfive, with operating system problems.Ghosh sets up a classificationscheme for OS attacks, illustrated by specific weaknesses in Windows NT andUNIX. The book ends in chapter six with a call for certification ofsoftware, greater attention to security in all forms of software, and,interestingly, for greater use of component software.(From the jacketmaterial, it appears that Ghosh is currently involved in the promotion ofcomponent software systems.) Each chapter ends with a set of references. Unlike all too many books with bibliographies stuff with obscure citationsfrom esoteric journals, the bulk of the material listed is available on theInternet.A separate section lists Web sites used in the text. Thevarious issues dealt with in the book are explained clearly, and generallypresent counsel on the best practices for secure online commerce. A compactbut comprehensive guide to the current state of electronic transactionsecurity. ... Read more |
49. Geeks On Call Security and Privacy: 5-Minute Fixes by Geeks On Call | |
Paperback: 216
Pages
(2005-12-19)
list price: US$14.99 -- used & new: US$0.01 (price subject to change: see help) Asin: 0471774553 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Customer Reviews (1)
offers no technical answer to phishing |
50. Hack Attacks Testing: How to Conduct Your Own Security Audit by John Chirillo | |
Paperback: 576
Pages
(2002-11-06)
list price: US$50.00 -- used & new: US$5.00 (price subject to change: see help) Asin: 0471229466 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description Customer Reviews (5)
Way outdated
I Learned Absolutely Nothing From This Book
Excellent starting place for security evaluation training
Good Beginner Guide to Vulnerability Assessments
How to conduct 1/7th of your security audit The title suggests I will learn how to conduct my own security audit, There is a description of what a security audit should include in the The book says a security audit consists of seven phases: The dial-up audit, furthermore, seems to have been lost. The only place My personal reaction is of course to retitle the book: "How to The book goes on to describe how to set up a multi-boot system to use Nor is there anything about why Windows 2000 Server is used for the domain, as well as being part of it. Part II is about using security analysis tools on windows. Again it starts The main chapters of Part II describe the capabilities of Cerberus The last product (TigerSuite 4.0) can hardly be compared with the other Part III does the same, but for Linux, Solaris and Mac OS X. The different chapters The reason hping2 is included seems to be Part IV is titled "Vulnerability Assessment" and contains one single In addition to the odd lacunas in the table of contents that already have been "The objective of this book is to fill a gap found in most books on Most readers will hopefully be able to figure out what the intended meaning is. Those 'virtual simulations' (whatever they may be) are found on the CD: The two stars are mainly for the information on the vulnerability scanners. I would recommend the book "Hack I.T. -- security through penetration testing" |
51. Reducing the incidence of fraudulent financial reporting: The role of the Securities and Exchange Commission (Research report / School of Accounting, University of Southern California) by Karen Vandermause Pincus | |
Unknown Binding: 130
Pages
(1988)
Asin: B00071IZMC Canada | United Kingdom | Germany | France | Japan | |
52. The Bank Employee's Fraud and Security Handbook: Everything You Need to Know to Detect and Prevent Loss by Joan German-Grapes | |
Paperback: 354
Pages
(1993-09-01)
list price: US$18.95 -- used & new: US$38.95 (price subject to change: see help) Asin: 1557383480 Canada | United Kingdom | Germany | France | Japan | |
53. You Can't Cheat an Honest Man: How Ponzi Schemes and Pyramid Frauds Work... (Personal Security Collection) by James Walsh | |
Kindle Edition:
Pages
(2009-05-26)
list price: US$9.95 Asin: B002BA4O2C Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description |
54. Time Is Right For Claim--Made Settlements In Securities Fraud Class Actions. (D & Q Settlement Alternative).(Brief Article): An article from: National ... & Casualty-Risk & Benefits Management by Joseph P. Monteleone | |
Digital: 5
Pages
(2001-12-03)
list price: US$5.95 -- used & new: US$5.95 (price subject to change: see help) Asin: B0008IIDGC Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description |
55. Green building representations and the emerging potential for securities fraud liability.(FOCUS ON GREEN BUILDING): An article from: Real Estate Issues by Brian D. Anderson | |
Digital: 14
Pages
(2008-09-22)
list price: US$9.95 -- used & new: US$9.95 (price subject to change: see help) Asin: B001QLH3NE Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description |
56. Supplemental Security Income Fraud And Abuse: Hearing Before The Committee On Ways And Means, U.s. House Of Representatives | |
Paperback: 60
Pages
(1999-08)
list price: US$20.00 -- used & new: US$20.00 (price subject to change: see help) Asin: 0756715326 Canada | United Kingdom | Germany | France | Japan | |
57. Card fraud: discover the possibilities. (credit card)(includes related article): An article from: Security Management by Barry Masuda | |
Digital: 12
Pages
(1992-12-01)
list price: US$5.95 -- used & new: US$5.95 (price subject to change: see help) Asin: B00092NLVE Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description |
58. E-Business Fraud Fighters Unite.(Brief Article): An article from: Security Management by Peter Piazza | |
Digital: 3
Pages
(2001-05-01)
list price: US$5.95 -- used & new: US$5.95 (price subject to change: see help) Asin: B0008HY9UM Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description |
59. Guarding against cults. (cults involved in financial fraud): An article from: Security Management by Larry Kahaner | |
Digital: 9
Pages
(1991-03-01)
list price: US$5.95 -- used & new: US$5.95 (price subject to change: see help) Asin: B00092B332 Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description |
60. 401(k) Suits follow securities fraud litigation. (Specialty Market Report).: An article from: National Underwriter Property & Casualty-Risk & Benefits Management by Joseph P. Monteleene | |
Digital: 4
Pages
(2002-02-25)
list price: US$5.95 -- used & new: US$5.95 (price subject to change: see help) Asin: B0008EVNI6 Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Product Description |
  | Back | 41-60 of 100 | Next 20 |