Computer Fraud Casebook. The Bytes that Bite

  • ID: 2242981
  • Book
  • 440 Pages
  • John Wiley and Sons Ltd
1 of 4

Praise for COMPUTER FRAUD Casebook

The Bytes that Bite

"This is an excellent resource for practitioners and academics alike who wantto learn from an inside look at real–world computer fraud investigations."

– James Bierstaker, Villanova School of Business

"Well′s collection of case studies is an easy read and appropriate for both anti–fraud professionals and business executives charged with the responsibility of fraud prevention within their organizations." Bruce A. Dean, JD, CFE, CPP, Regent Emeritus and former chairman, Board of Regents, ACFE

"Mr. Wells has done it again! Like a computer program, he consistently uses his inherent abilities to filter complex fraud schemes, as written by those who found them, into simple truths complete with prevention and detection techniques. As the world becomes more digital by the day, anyone seriously interested in fighting fraud will need to equip themselves with the appropriate tools, and the Computer Fraud Casebook provides a perfect road map for this journey."
Richard B. Lanza, CFE, CPA, PMP, President, Cash Recovery Partners, LLC

"Mr. Wells′ latest is a must for anyone who wants to learn how to fight crime in the digital age. Fraud examiners and investigators who don′t develop their skills in this field will soon be left behind!"
Walt W. Manning, Director, AlixPartners, LLP

42 real–life case studies reveal the underbelly of computer fraud

Today′s businesses are completely reliant on technology.The bad part about computers is that they enhance fraudsters′ abilities to carry out their costly and nefarious schemes. The good part is the very computers used to carry out these crimes can also help solve them. Spanning e–mail fraud, online auction fraud, security breaches, counterfeiting, and much more, Joseph Wells′ Computer Fraud Casebook is packed with forty–two real case studies, written by the ACFE members who investigated them. Outlining how each fraud was engineered, how it was investigated, and how the perpetrators were brought to justice, Computer Fraud Casebook empowers readers with the knowledge and skills to detect and prevent cyber fraud.

READ MORE
Note: Product cover images may vary from those shown
2 of 4
Preface.

Chapter 1. Just What the Doctor Ordered (George Kyrilis).

Chapter 2. Of Botnets and Bagels: Vaccinating the Hospital against Cybercrime (Frank Riccardi and Jennifer Campbell).

Chapter 3. Pandora′s Box (Dr. Vishnu Kanhere).

Chapter 4. Mail Order Fraud (Robin Conrad).

Chapter 5. Lancelot Gone Missing (Carolyn Conn, Paul Price, and Karon Murff).

Chapter 6. The Invoice Doctor (Bill Long).

Chapter 7. Unimaginable Wealth (Sandra Burris).

Chapter 8. Hacked (Jon Lambiras).

Chapter 9. Bad Education (Russ Allen).

Chapter 10. If Only His Nose Could Grow (Barry Davidow).

Chapter 11. Keeping Up with the Jamesons (Mike Andrews).

Chapter 12. Imaginary Satellites (George Kyriakodis).

Chapter 13. Never Pass Your Password (James Martin and Harry Cendrowski).

Chapter 14. Why Computers and Meth Don′t Mix (Stephen R. Menge).

Chapter 15. Fishing in Dangerous Waters (Joe Dervaes).

Chapter 16. The Man Who Told on Himself (Alan Greggo).

Chapter 17. Triple Threat (Jean–Francois Legault).

Chapter 18. Swiped (Peter Belloli).

Chapter 19. Have Computer, Will Video (Dominic A. D′Orazio).

Chapter 20. Server, We Have a Problem (Marty Musters).

Chapter 21. Do It for the Kids (Michael Ammermon).

Chapter 22. Moving Money (Neil Harrison).

Chapter 23. Operation Overnight Identity Theft (Bruno Pavlicek).

Chapter 24. The Karma of Fraud (David Clements and Michael Cerny).

Chapter 25. Secret Shopper (Jay Dawdy).

Chapter 26. Would You Like a Receipt? (Shirley Quintana).

Chapter 27.The Coupon Code Crooks (Danny Miller, Michael Rose, and Conor Donnelly).

Chapter 28. He Fought the Law (Clifford Hunter).

Chapter 29. Eyes on the Company Secrets (Tyson Johnson).

Chapter 30. French Connections (Michael Nott).

Chapter 31. Irreconcilable Differences (Jennifer Birtz).

Chapter 32. Keeping It In the Family (Eric Sumners).

Chapter 33. I Due (Rebecca Busch).

Chapter 34. What Lies Inside the Trojan Horse (Johnathan Tal).

Chapter 35. Lost in Transition (Amy Cron).

Chapter 36. Super Hero Syndrome (Hatitye Zhakata).

Chapter 37. Stealing for the Sale (William J. Pederson, Timothy M. Strickler).

Chapter 38. Double Trouble (Stephen P. Weber).

Chapter 39. Do As I Say, Not as I Do (Richard Woodford).

Chapter 40. Cinderella: One Glass Slipper Just Wasn′t Enough (Antonio Ivan S. Aguirre).

Chapter 41. Bloggers: Separating the Wheat from the Chaff (Steven Solieri, Joan Hodowanitz, and Andrew Felo).

Chapter 42. The Campus Con (Kevin Sisemore).

Chapter 43. One for You, One for Me: A Tale of Crooked Insurance (Steve Martin).

Note: Product cover images may vary from those shown
3 of 4

Loading
LOADING...

4 of 4
Joseph T. Wells
Note: Product cover images may vary from those shown
5 of 4
Note: Product cover images may vary from those shown
Adroll
adroll