You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
In this pioneering monograph based upon extensive primary research, Gottschalk and Hamerton explore and evaluate the developing global field of internal investigations within complex organizations. Applying an offender-based perspective, the authors explore the central role of convenience in seeking to inform, improve and develop policy and practice. A comparative interdisciplinary work, with extensive coverage of European, North American, African and Asian paradigms, The Internal Review of Corporate Deviancepresents empirical fieldwork supplemented by the detailed analysis of a large number of internal reviews produced on completion of internal investigations. The aggregate research gathere...
The need to professionally and successfully conduct computer forensic investigations of incidents and crimes has never been greater. This has caused an increased requirement for information about the creation and management of computer forensic laboratories and the investigations themselves. This includes a great need for information on how to cost-effectively establish and manage a computer forensics laboratory. This book meets that need: a clearly written, non-technical book on the topic of computer forensics with emphasis on the establishment and management of a computer forensics laboratory and its subsequent support to successfully conducting computer-related crime investigations. - Provides guidance on creating and managing a computer forensics lab - Covers the regulatory and legislative environment in the US and Europe - Meets the needs of IT professionals and law enforcement as well as consultants
This book is designed for managers and entrepreneurs, who are considering improving the economics and flexibility of their IT solutions and infrastructures. The book is also for readers who wish to learn more about the Cloud, but do not want to become specialists.This book discusses the technical, legal, fiscal, economic, organisational and environmental aspects of Cloud services. If you are looking for practical advice on vendor selection and certification, as well as real world Cloud project case studies, this is the book to consult.It is the result of a highly cooperative project conducted by six master editors, and 50 authors from 11 countries. The people involved were lawyers, tax consu...
This 25th edition of Research on Professional Responsibility and Ethics in Accounting explores many aspects across professional responsibility and ethics in accounting, including balancing values vs profits, whistleblowing, earnings management, ethical financial reporting, and moral identity.
As documented in a number of case studies (from Telia Telecom in Sweden to Wirecard in Germany) in this book, recidivism seems to be of a substantial magnitude in corporate crime. Corporations tend to repeat white-collar offenses such as financial crime and environmental crime in various forms as long as they find it convenient. A minor fine from time to time and dismissal of some executives as scapegoats do not prevent corporations from committing and concealing new offenses as long as there is a convenient financial motive, a convenient organizational opportunity, and a convenient willingness for deviant behavior. Businesses and their executives tend to be recidivists who get away with light punishment in most jurisdictions. The relevant audiences for this book include law students, business students, sociology students, and criminology students. Fraud examiners, defense attorneys, compliance officers, police investigators, as well as prosecutors can find the structural model of convenience to be an ideal template in preparing corporate crime case narratives.
Annotation The first book completely devoted to this important part of security in a Windows environment.
If you thought hacking was just about mischief-makers hunched over computers in the basement, think again. As seasoned author Wallace Wang explains, hacking can also mean questioning the status quo, looking for your own truths and never accepting at face value anything authorities say or do. The completely revised fourth edition of this offbeat, non-technical book examines what hackers do, how they do it, and how you can protect yourself. Written in the same informative, irreverent, and entertaining style that made the first three editions hugely successful, Steal This Computer Book 4.0 will expand your mind and raise your eyebrows. New chapters discuss the hacker mentality, social engineeri...
'The financial investigation of the decade... Money Men instantly enters the canon of great financial crime books' Bradley Hope, author of The Billion Dollar Whale 'A rip-roaring ride into the underworld of the global economy' Tom Burgis, author of Kleptopia 'Required reading' The Economist 'A cross between the Enron scandal and Rosemary's Baby' John Lanchester, London Review of Books 'Reads like a crime drama' New Statesman 'The culmination of years of careful investigative work... Gripping' Evening Standard 'A thrilling, head-spinning book' Irish Times 'A rollercoaster read that reveals everything that's wrong with our financial system' Catherine Belton Now adapted as the Netflix documenta...
Wie kaum jemand versteht sich der vielfach preisgekrönte ZEIT-Autor Christoph Dieckmann auf die Kunst der literarischen Reportage-Erzählung. Er nimmt den Leser mit auf eine lebenspralle Exkursion durch Ost und West, von Wittenberg nach Bayreuth, von Halberstadt nach Helgoland und weiter, bis Amerika. Ob er sich an Marion Gräfin Dönhoff und Klaus Renft erinnert, Inge Viett und Jan Philipp Reemtsma begegnet, John Fogerty und Wolfgang Lötzsch trifft - Dieckmann erzählt Gegenwart mit Wurzeln. Er redet mit Uwe Tellkamp und Martin Walser, er besucht die Lebensorte von Wilhelm Busch und die des Sterbens von Rosa Luxemburg. Sein Erinnern ist geprägt durch die Mahnung der "Kindheitsmuster" von Christa Wolf: "Das Vergangene ist nicht tot, es ist nicht einmal vergangen. Wir trennen es von uns ab und stellen uns fremd." Dieses Geschichtsbuch aus Geschichten lässt spüren, wie wir wurden, was wir sind. Christoph Dieckmanns "Deutschlandreise" ist ein Dokument der deutschen Einheit fernab aller Jubiläums-Prosa und Parolen
Unternehmen und Behörden schützen ihre IT-Systeme mit umfangreichen Sicherheitsmaßnahmen. Trotzdem werden diese Systeme immer wieder für kriminelle Zwecke missbraucht bzw. von böswilligen Hackern angegriffen. Nach solchen Vorfällen will man erfahren, wie es dazu kam, wie folgenreich der Einbruch ist, wer der Übeltäter war und wie man ihn zur Verantwortung ziehen kann. Dafür bedient man sich der Computer-Forensik. Ähnlich der klassischen Strafverfolgung stehen auch für den Computer-Forensiker folgende Informationen im Vordergrund: Wer, Was, Wo, Wann, Womit, Wie und Weshalb. Dieses Buch gibt einen Überblick darüber, wie man bei der computerforensischen Arbeit vorgeht - sowohl im "...