e99 Online Shopping Mall

Geometry.Net - the online learning center Help  
Home  - Basic S - Securities Fraud (Books)

  Back | 21-40 of 100 | Next 20
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

click price to see details     click image to enlarge     click link to go to the store

$39.25
21. Securities Litigation and Enforcement:
$21.90
22. Network Security for Dummies
 
$250.00
23. Section 16 of the Securities Exchange
 
$5.95
24. Balance sheet becomes breeding
 
$245.00
25. Civil Liabilities: Enforcement
 
$225.00
26. Securities Crimes (Securities
 
$50.41
27. The Social Security Fraud
 
$13.95
28. Advanced Fee Fraud National Security
$15.99
29. The Safety Minute: Living on High
$109.94
30. Securities Lititgation and Enforcement:Cases
$9.95
31. Street Smarts: Linking Professional
 
32. Securities and Commodities Enforcement:
$132.02
33. Litigating Highly Technical, Multi-Party
$24.99
34. Hacking Exposed: Network Security
$9.56
35. Scams & Swindles: Phishing,
$20.99
36. Web Security, Privacy and Commerce,
$24.23
37. Wayward Capitalists: Targets of
$71.20
38. Information Security Policies,
 
$35.98
39. Cryptography: An Introduction
 
40. How to avoid financial fraud

21. Securities Litigation and Enforcement: Cases and Materials (American Casebook Series)
by Donna M. Nagy, Richard W. Painter, Margaret V. Sachs
Hardcover: 981 Pages (2003-03)
list price: US$115.00 -- used & new: US$39.25
(price subject to change: see help)
Asin: 0314259538
Average Customer Review: 4.0 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
The law school casebook focuses on federal securities litigation and enforcement. Important causes of action and issues are addressed as they are likely to arise in actual litigation, thereby maximizing students’ preparation to represent clients in private litigation as well as in SEC and criminal enforcement actions. It includes in depth treatment of the relevant statutory provisions and rules and also class actions, SEC enforcement actions involving market manipulation and insider trading, criminal actions, proxy and tender offer fraud, international securities fraud, and securities arbitration. The casebook is suitable for a variety of two or three credit courses and seminars. ... Read more

Customer Reviews (1)

4-0 out of 5 stars For the lawyer
This text is best read for a lawyer interested in involvement in the field. It is very practicl and helpful. Highly recommended. ... Read more


22. Network Security for Dummies
by Chey Cobb
Paperback: 408 Pages (2002-10-10)
list price: US$29.99 -- used & new: US$21.90
(price subject to change: see help)
Asin: 0764516795
Average Customer Review: 4.0 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
* This hands-on, do-it-yourself guide to securing and auditing a network offers immediate solutions to critical security problems for small- to medium-sized businesses
* Each part of the book begins with basics that can be quickly implemented and then moves on to more complex security mechanisms a company may consider as it grows
* Presents numerous checklists and exercises for performing network security audits
* Includes real-world examples and practical tips for implementing cost-effective security measures
* Companion Web site includes forms and checklists along with links to useful sites and downloads for recommended security tools ... Read more

Customer Reviews (8)

4-0 out of 5 stars Right on time...
At first I was kind of fearful of how long it was going to get to me from the sender, but I by far received the product in a timely manner (5 days)...I will definitely be buying more product from this seller...

3-0 out of 5 stars Basic Book
Some of the explanations don't go into enough detail - but otherwise a good basic book.

5-0 out of 5 stars Comprehensive bbok.
From what I've read this book covers many of the basic concepts and procedures used to secure your wired or wireless network from most attacks. Granted you are still at risk with someone who has the right tools but for the most part this books covers the necessary points about how to secure your network against the basic hacker. Overall a good read.

1-0 out of 5 stars Weak Source of Information
I felt the book was poorly written and lacked weight in places.Although the high level definitions were accurate, the detail was messy and the writing style was poor.The internet could give you better information and detail then buying this book.I gave it one star because at least the author tried to make the subject matter colorful.

5-0 out of 5 stars Real situations explained
This book is a great place to find everything in one place. This is the first book I've ever read that gives you step by step instructions on securing servers. Most of the other books I've read tell you to do it, but they don't tell you how. I especially liked the chapter on wireless networks. My company just installed one and we didn't know that it was open to the public. I've heard that a lot of computer security has to do with basic rules or common sense, but I've never seen it put all in one place and explained so well before. ... Read more


23. Section 16 of the Securities Exchange Act (Securities Law Series)
by Arnold S. Jacobs
 Hardcover: Pages (1989-12)
list price: US$250.00 -- used & new: US$250.00
(price subject to change: see help)
Asin: 0876326491
Canada | United Kingdom | Germany | France | Japan

24. Balance sheet becomes breeding ground for fraud.: An article from: Journal of Accountancy
by Charles R., Jr. Lundelius
 Digital: 2 Pages (2003-05-01)
list price: US$5.95 -- used & new: US$5.95
(price subject to change: see help)
Asin: B0008DGJ4A
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
This digital document is an article from Journal of Accountancy, published by American Institute of CPA's on May 1, 2003. The length of the article is 496 words. The page length shown above is based on a typical 300-word page. The article is delivered in HTML format and is available in your Amazon.com Digital Locker immediately after purchase. You can view it with any web browser.

Citation Details
Title: Balance sheet becomes breeding ground for fraud.
Author: Charles R., Jr. Lundelius
Publication: Journal of Accountancy (Refereed)
Date: May 1, 2003
Publisher: American Institute of CPA's
Volume: 195Issue: 5Page: 20(1)

Distributed by Thomson Gale ... Read more


25. Civil Liabilities: Enforcement and Litigation Under the 1933 Act (Securities Law Series)
by J. William Hicks
 Hardcover: Pages (1989-12)
list price: US$245.00 -- used & new: US$245.00
(price subject to change: see help)
Asin: 0876326696
Canada | United Kingdom | Germany | France | Japan

26. Securities Crimes (Securities Law Series, Vol 21)
by Marvin G. Pickholz
 Hardcover: Pages (1993-06)
list price: US$225.00 -- used & new: US$225.00
(price subject to change: see help)
Asin: 0876329717
Canada | United Kingdom | Germany | France | Japan

27. The Social Security Fraud
by Abraham Ellis
 Paperback: 211 Pages (1996-07)
list price: US$7.50 -- used & new: US$50.41
(price subject to change: see help)
Asin: 1572460539
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
Polls show that more young Americans believe in UFOs than believe they will receive Social Security benefits. Even the generous estimates of the government's own statisticians indicate that by the year 2030 the Trust Fund will be bankrupt. Abraham Ellis brilliantly dissects the inherent problems surrounding America's present Social Security system and offers a promising alternative of privatization. However the Author does more than just tackle the Social Security dilemma. He discusses the ramifications of the something-for-nothing philosophy that afflicts modern America and examines the advantages of privatization of the system. ... Read more


28. Advanced Fee Fraud National Security & the Law
by Farida M. Waziri
 Paperback: 152 Pages (2005-11-30)
list price: US$13.95 -- used & new: US$13.95
(price subject to change: see help)
Asin: 9788088090
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
Advance Fee Fraud, National Security and the Law is a compendium of facts and figures on the practice of money-making scams (also known as "419") in Nigeria.These crimes sabotage the economic recovery programmes of the government by creating a situation of national insecurity, which gravely undermines official policies aimed at creating a conducive domestic environment for trade and foreign investment. While not condoning this behavior,the author explains that the climate of monetary devaluation, retrenchment, joblessness, and inflation have created a fertile environment for this criminal activity. ... Read more


29. The Safety Minute: Living on High Alert; How to Take Control of Your Personal Security and Prevent Fraud
by Robert L. Siciliano
Paperback: Pages (2003-05)
list price: US$19.95 -- used & new: US$15.99
(price subject to change: see help)
Asin: 0964812673
Average Customer Review: 4.5 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
10 Types of Personal Security: In a post 9/11 world, become the master of your business and personal security at home or traveling here and abroad. Learn fundamentals of internet safety, prevent identity theft and fraud.

10 Laws of Survival 10 Fundamentals of Self Defense ... Read more

Customer Reviews (3)

5-0 out of 5 stars SAFETY MINUTE:01
This book came in a timely manner and is in even better condition than stated.The book looks as if it is brand new, never been used or even opened.I will most definately do business with this seller again and again.

5-0 out of 5 stars Perfect for everyone
This book was written for men and women who want to understand the fundamentals of personal security. And it does that very well. Understanding body language, awareness and intuition plus the hundreds of tips to avoid and remove oneself from a dangerous situation is the aim and purpose here. Additionally, This book teaches how to phisically, mentally and emotionally respond to a dangerous predator. There are plenty of other books for advanced techniques regarding the use of lethal weaponry that would be a better fit. However this book is a great starting point for most people who simply want to understand what their options are. You dont need to know how to shoot a gun to be safe or how to knife someone to protect yourself. This book cuts through the nonsense of the various "gurus" methods and opinions and teaches in simple terms what you need to know to avoid danger and stay safe.

3-0 out of 5 stars Mediocre
This particluar title is medicore as far as personal safety & self-defense titles go. The author attempts to cover all of the basis but I believe some sections of the book are lacking. While some of the tips are good they can easily be found in better more comprehensive books on the same subject. Also, the author discusses various personal safety devices & weapons, some he apparently has never tried himself. While I am all for various safety devices such as whistles and alarms, in some cases they don't always get the desired results and anyone carrying such devices should be physically and mentally prepared for this. Also, the author is against the carrying of edged weapons and firearms,. While he stresses mental preparedness and attitude in the book, he automatically assumes that the reader is not smart enough or determined enough to be able to use these tools successfully in a real situation. Honestly, I don't feel any instructor can talk about mental preparation without talking about the potential of having to use lethal force, with and without weapons. If the reader knows absolutely nothing about personal safety, this might be a good starting point but there are many other titles out there that go way beyond this one and would be more highly recommended. ... Read more


30. Securities Lititgation and Enforcement:Cases and Materials (American Casebook Series)
by Donna M. Nagy, Richard W. Painter, Margaret V. Sachs
Hardcover: 1066 Pages (2007-11-15)
list price: US$160.00 -- used & new: US$109.94
(price subject to change: see help)
Asin: 0314176896
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
Designed to suit a variety of two or three credit courses and seminars, the casebook is being used to teach (1) courses in "securities litigation" that examine litigation topics under the Exchange Act and the Securities Act; (2) courses in "securities enforcement" that center on SEC and criminal enforcement, market manipulation, insider trading, and the professional responsibilities of attorneys and accountants; and (3) more specialized courses or seminars that build around the theme of"current topics in securities litigation." ... Read more


31. Street Smarts: Linking Professional Conduct With Shareholder Value in the Securities Industry
by Roy C. Smith, Ingo Walter
Hardcover: 351 Pages (1997-07-01)
list price: US$27.50 -- used & new: US$9.95
(price subject to change: see help)
Asin: 087584653X
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
The authors, with their dozens of years as insiders on Wall Street, cast a revealing eye on corporate and individual conduct in financial institutions and markets. DLC: Securities industry - U.S. ... Read more


32. Securities and Commodities Enforcement: Criminal Prosecutions and Civil Injunctions
by Howard M. Friedman
 Hardcover: 238 Pages (1981-04)
list price: US$39.50
Isbn: 066903617X
Canada | United Kingdom | Germany | France | Japan

33. Litigating Highly Technical, Multi-Party Commercial Disputes: An Inside Look at Defending a Securities Lawsuit (Winning Legal Strategies)
by Thomas S. Kilbane
Paperback: 80 Pages (2005-09)
list price: US$204.95 -- used & new: US$132.02
(price subject to change: see help)
Asin: 1596223014
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
On almost a daily basis, we hear that a new securities class action lawsuit has been filed, or a pending class action has settled or been dismissed.Securities lawsuits, and the companion derivative and ERISA actions that often follow them, involve millions of dollars in damages and can seriously disrupt a business.

In this book, Thomas S. Kilbane, Esq.—a top-ranked and highly decorated litigator with extensive experience defending securities class actions—takes you inside securities class action lawsuits brought under the Securities Exchange Act of 1934.Bringing decades of successful experience to the table, he explores defense strategies that have worked for him and his team of skilled and accomplished litigators, offers valuable insights on working through these multifaceted cases, considers certain global and business implications of securities class actions, and highlights recent trends. Litigating Highly Technical, Multi-Party Commercial Disputes is designed to offer a detailed and thorough, yet readable and straightforward, analysis—one that will benefit lawyers, students, and businesspeople alike.You will walk away from this book much more informed and with a better appreciation of what it takes to defend a securities class action from the inside. ... Read more


34. Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition
by Stuart McClure, Joel Scambray, George Kurtz
Paperback: 720 Pages (2009-01-05)
list price: US$49.99 -- used & new: US$24.99
(price subject to change: see help)
Asin: 0071613749
Average Customer Review: 4.0 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description

The world's bestselling computer security book--fully expanded and updated

"Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company, and your country fight cyber-crime." --From the Foreword by Dave DeWalt, President and CEO, McAfee, Inc.

"For security to be successful in any company, you must ‘think evil' and be attuned to your ‘real risk'...Hacking Expose 6 defines both." --Patrick Heim, CISO, Kaiser Permanente

"The definitive resource to understanding the hacking mindset and the defenses against it." --Vince Rossi, CEO & President, St. Bernard Software

"Identity theft costs billions every year and unless you understand the threat, you will be destined to be a victim of it. Hacking Exposed 6 gives you the tools you need to prevent being a victim." --Bill Loesch, CTO, Guard ID Systems

"This book is current, comprehensive, thoughtful, backed by experience, and appropriately free of vendor-bias-prized features for any security practitioner in need of information." --Kip Boyle, CISO, PEMCO Mutual Insurance Company

"The Hacking Exposed series has become the definitive reference for security professionals from the moment it was first released, and the 6th edition maintains its place on my bookshelf," --Jeff Moss, Founder of the popular Black Hat Security Conference

Meet the formidable demands of security in today's hyperconnected world with expert guidance from the world-renowned Hacking Exposed team. Following the time-tested "attack-countermeasure" philosophy, this 10th anniversary edition has been fully overhauled to cover the latest insidious weapons in the hacker's extensive arsenal.

New and updated material:

  • New chapter on hacking hardware, including lock bumping, access card cloning, RFID hacks, USB U3 exploits, and Bluetooth device hijacking
  • Updated Windows attacks and countermeasures, including new Vista and Server 2008 vulnerabilities and Metasploit exploits
  • The latest UNIX Trojan and rootkit techniques and dangling pointer and input validation exploits
  • New wireless and RFID security tools, including multilayered encryption and gateways
  • All-new tracerouting and eavesdropping techniques used to target network hardware and Cisco devices
  • Updated DoS, man-in-the-middle, DNS poisoning, and buffer overflow coverage
  • VPN and VoIP exploits, including Google and TFTP tricks, SIP flooding, and IPsec hacking
  • Fully updated chapters on hacking the Internet user, web hacking, and securing code
... Read more

Customer Reviews (8)

4-0 out of 5 stars Very good book- very minor issues
I very much like the hacking exposed series.It provides solid coverage of many topics ranging from scanning and enumeration to privilege escalation.If you are looking for an introduction to the hacking world this is it.

My complaint is that each new edition does not have nearly enough differences with previous editions.Frankly if you have version 5, you can skip six. I have learned to buy about every 2nd or 3rd edition.

3-0 out of 5 stars Hacking Exposed 6
First off I can't say that the Hacking Exposed series wasn't a big part of my infosec education over the years. I read the first edition when I was in my first year of college in 1999. It was a very taboo book at the time and presented many new tools to me and opened up a new passion. With that said I find little value in the 6th edition of the book it's much the same as the first one with updated information.

This book is best read by people that know very little about how attacks work and want to discover how the average low level attacker goes about doing things. This book is not bad at all but it really just doesn't add anything to my arsenal or provide me with any new information that is valuable to me.

If you want a book that can give you a very entry level understanding of how attacks might take place and need a book to teach you the very basic's of how to become a script kiddy or how they operate then this book is a good choice.

I mean no disrespect by this but it is my opinion that true hacking or pen-testing does not and can not follow the old methodologies that are outlined in this book.

There is simply not an A to B route that is to be followed in hacking/pen-testing and tossing attacks from tool after tool at systems isn't the right way to go about testing.

In my opinion this book is the best choice for someone with a new interest in the subject and knows very little about security testing and defense. This is a good place to start to learn the very basic's of offensive infosec and to pick up some entry level knowledge on how to defend against it.

If you are looking for an introduction or a bridge to entry level certification such as certified ethical hacker or certified penetration tester this would be a good choice to pick up before you start your studies to fill in the gaps.

Overall this is a great book just take it for what it is. It is not a book on how to hack. It is an introduction to hacking and some of the common tactics that are used. If you're not defending against these then you're doing a poor job.

To be fair to the author and the series this book was a pioneer in the industry at the time it was introduced there was little information on the subject to be found in this type of structure. In our infosec crazed world of today so many books follow this exact format that reading it becomes dry and very boring.

Overall great series pioneers of information security books but a new approach is needed and maybe that is present in the hacking exposed series but I can not comment on that because I have only read scattered editions of the original title.


2-0 out of 5 stars 6Th Edition, why?
My first exposure with hacking series was back in 2002 the 2nd edition, in the Foreword of the 2nd edition they summed up the expectation and identified the who should read this book "...But if a computer network has a security vulnerability and no one knows about it, is it insecure?".
In writing this review I like to bring to attention the fact that I am not sure who is the intended audience anymore.
I have seen this book on every network engineer's and self proclaimed security guru's book shelf, many of the one's I have seen were not even used once.
So my question is why do people keep on buying this book, is it the title? The marketing? Or is it a cult think? I was given the 6th edition as a gift. I read most of it out of curiosity, and after a while I realized that this book does not have a true audience.

This book is not written for;
.-The hacker since many of the hacking techniques are either irrelevant or old and most hackers know a better way.
.-The criminal. See previous note.
.-An auditor. If it was, it would have specific processes on how to conduct and audit.
.-Management, they don't care how hping2 works.
.-Those who are concerned about wireless security. There is a "hacking exposed for wireless" book for them.

If we take away the fat, this book has about 200 pages of useful information, most of which can be found using the authors favoritesearch engine Google
why did I give it a 2 star instead of just 1, I did like the entire 10th Chapter, this section has very relevant information, and it has a purpose, it introduces the concept of governance and use of standards such as ISO17799 which is actually ISO27001:2005 and NIST Publications 800-64 and 800-27. It explains the SDLC although the author calls it SDL combining the Life with Cycle. So if this is your First Hacking Exposed book, buy it with caution, but if you already have one, don't "upgrade".
Best Fishes and thank you for reading.


3-0 out of 5 stars Too Basic
A basic overview of attacks. This book lacks sample code but I suppose it would be OK for someone that just wanted to lightly touch upon different cyber attacks worked. In all honesty, I'd stick to wikipedia.

5-0 out of 5 stars Great Book
this is a very accurate and very informative book (and even though im 16, its still easy XD) i read it and started loving it, all this stuff is very good and useful cuase of it my computer is more secure now ... Read more


35. Scams & Swindles: Phishing, Spoofing, ID Theft, Nigerian Advance Schemes Investment Frauds: How to Recognize And Avoid Rip-Offs In The Internet Age
by Silver Lake Publishing
Paperback: 276 Pages (2006-05-30)
list price: US$11.95 -- used & new: US$9.56
(price subject to change: see help)
Asin: 1563437864
Average Customer Review: 4.5 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
Phishing. Spoofing. Spyware. Swoop and squat. Malicious spam. Chain letters. Ponzi schemes. ID theft. The Internet Era has created a whole class of frauds and schemes that separate people from their money. It's also given new life to older cons and scams. This book organizes various rip-offs by type and severity. Then it explains how each type of scam works -- and how an ordinary person can recognize it before getting taken in. Drawing on interviews with law enforcement experts, victims and even crooks, this book gives readers a state-of-the-art primer on financial crimes and the sleazy dealings that fall slightly short of illegal. It also uses real-life case studies of frauds, to show how they start and how they end -- all in a plain-English style that everyone can enjoy. And this book does more than just tell stories; it gives readers questions, checklists, worksheets and other tools to make sure they're not being scammed -- or to take the right actions if they have been. ... Read more

Customer Reviews (5)

4-0 out of 5 stars This book is a must read for anyone interested in their internet security.
I think this book really should be a must read for anyone who in online.Internet security is a big problem, and as truly unpleasant as spam is, as malware is, as viruses are... they are NOTHING in comparison to identity theft and to internet cons that drain bank accounts.

According to the first chapter there are ten million americans scammed and swindled every year.That number is staggering to me.To put it into perspective... there are 120 countries on the earth that have less people in their borders than the number of people swindled in America every year.Portugal. Sweden.Switzerland.The Domincan Republic.Chad.Finland and Norway combined.There are more people swindled in America than even live in the countries that I just named.That is insane.

Here are the things I liked about this book and why I think it should be read:

1.It is an easy to read writing style.Not too techy.Not too legalese.
2.It tells about real life stories.Not just hypothetical scenarios.Lots of actual cases of scams and swindles.
3.It gets the information and advice and perspective from not just the law enforcement involved, but from the victims and from the actual con artists.
4.It breaks the scams down step by step, including the variations, and shows how to know when you are being scammed.

Internet security is so important in this day and age of identity theft, internet cons, and hacking of personal information.There is only so much that software can do to protect us.Frankly, we have to be knowledgeable and protect ourselves.

5-0 out of 5 stars Identity theft explained and how to prevent it!
This small sized book identifies and explains the identity theft spectrum and how it occurs.It tells how we are taken in by con men and women and how to prevent it.In some cases, we are even shown how to bring to justice these heartless criminals.

5-0 out of 5 stars A basic primer packed with insights any Internet user should be aware of
Scams & Swindles: How To Recognize And Avoid Internet Era Rip-Offs is a basic primer packed with insights any Internet user should be aware of. From Nigerian schemes and money laundering to phishing, id theft and investment frauds, Scams & Swindles covers method, purpose, and how to avoid becoming a victim. Mortgage fraud, spam and spyware receive insights too all with an eye to Internet dangers.

4-0 out of 5 stars no technical answer to phishing
The book is a hallmark of our current Internet experiences. The editors go through the various scams circulating on the Web. Like the Nigerian 419. Or the Russian/East European mail order brides. Or the fake prescription drugs. An amazing compendium of the darknet. Some readers may be scared off the net. But more likely, you will gain some protection simply by being aware of the book's advice.

One chapter is devoted to phishing. Where an email purports to be from a bank, and breathlessly urges you to log in to your account, to ascertain some important detail. Or the email might say it is from eBay or Paypal, with similar urgencies. The chapter is instructive for many readers. But please note that the editors do not offer anything in the way of a technical antiphishing solution. Their methods involve manual effort on your part. Alas, there will always be gullible or inexperienced users to fall prey to phishers.

5-0 out of 5 stars An excellent and pragmatic book-advice that should not go unheeded
There is a well-known wise saying, Caveat Emptor, which is the Latin for Buyer Beware.In other words, when purchasing goods or services it is essential that the buyer take all precautions in examining the item or services they are purchasing.

The editors of the Silver Lake Publishers have produced an excellent and pragmatic book, Scams & Swindles: How to Recognize and Avoid Internet Era Rip-Offs that focuses on many of the common con tricks and scams that deceive individuals and consumers, particularly if we are involved in some way or another with the Internet-be it email or otherwise.
It is noteworthy to mention that although some of these scams seem to be relatively new, their modus operandi dates back hundreds of years in that they are based on the con artist's imagination and the victim's gullibility.

The book takes a very realistic look at Internet scams and lays bare important details pertaining to such frauds as eBay auctions, the Nigerian emails emanating from some fake high government official requesting the use of your bank account to transfer funds, scams that involve investment, business and banking, fake charities, sweetheart and Russian bride swindles, drugs and pharmaceuticals rip-offs.
The authors also include weighty specifics as to how Internet hackers operate and commit their crimes, as well as something that is becoming more common today- phishing. This basically is when you receive emails from a financial institution that cleverly resembles one you are presently dealing with and you are requested to provide some very personal information. A further variation of the same theme is that it may originate from a site that appears to be Ebay requesting your pin number and some other important data.Internet criminals have become even more sophisticated in their implementation of phishing, wherein an email, instant message or other Internet communication is sent to you in someone else's name. As the authors point out, it really boils down to a form of identity theft.

Other topics examined and that we are often subjected to in our daily use of the Internet are the nasty and very often annoying practices of spam and spyware. Spam today is not only restricted to pornography, it also involves get-rich-quick schemes or a miracle drugs. In fact, as the authors point out, a study by a British computer security firm, Clearswift Ltd, discovered in 2004 that finance spams topped the list of the most popular with 39%, whereas pornography was at the bottom of the list, 4.8%.

The authors have obviously done their research and they have completed an impressive job in putting together all of the information in a clear, upbeat and conversation style that present readers with valuable insights into the world of Internet crime.

The message is unmistakable, think twice before clicking something within the body of an email or giving out information to anyone and always bear in mind caveat emptor. Moreover, the authors' elaborate suggestions that appear throughout the book as to how to prevent problems should not go unheeded.

Norm Goldman, Editor Bookpleasures ... Read more


36. Web Security, Privacy and Commerce, 2nd Edition
by Simson Garfinkel
Paperback: 800 Pages (2002-01-15)
list price: US$44.95 -- used & new: US$20.99
(price subject to change: see help)
Asin: 0596000456
Average Customer Review: 4.0 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
Since the first edition of Web Security, Privacy, & Commerce,web use has exploded, and so have the threats to our security andprivacy--from credit card fraud to marketing spam to web site defacementsto attacks that shut down popular web sites. Nearly double the amount of information, this completely updated volumeexplains the techniques you can use to protect your privacy, organization,system, and network. Topics include:

    Web technology--Cryptography, the Secure Sockets Layer(SSL), the Public Key Infrastructure (PKI), passwords, digital signatures,and biometrics.User privacy and security--Cookies, log files, identitytheft, spam, web logs, and web bugs, as well as hostile mobile code in plug-ins,ActiveX controls, Java applets, and JavaScript, Flash, and Shockwave programs. Web server security for administrators and contentproviders--CGI, PHP, and SSL certificates, intellectual property, P3P andprivacy policies, digital payments, client-side signatures, code signing,pornography filtering, and PICS.
... Read more

Customer Reviews (7)

3-0 out of 5 stars Just a big discussion.
I think this is another one of those big books that tries to cover too many topics. It's really just a general discussion about web security, rather than a handbook of any kind. There is a lot of boring history, storytelling, etc.

I do think there were a handful of solid rules-of-thumb and practical wisdom, and I'm glad that I read this book, but it could have been condensed dramatically.

I believe most people who are going to actually deploy some kind of web service would probably get all the same info, plus much more practical detail, by reading books on the particular software they plan to use (e.g. Apache, Sendmail, Unix, etc).

5-0 out of 5 stars How Much Do You Really Know About Web Security?
Ever since the birth of the World Wide Web, we have been inundated with books purporting to have all things "Internet", buying into the hype surrounding the explosion of the web. What these books failed to do was educate people about the lack security and privacy inherent on the Internet, That is why I was wanted to read "Web Security, Privacy and Commerce: 2nd Edition" (734 pages (I do not count an index in the page count), O'Reilly Media, 2002, ISBN 0-596-00045-6). Written by Simon Garfinkel, with Gene Spafford, I read more and more with pleasure and anticipation. This was confirmed with a simple line that has often been lost on the masses: the Internet was built for communication and sharing, not for business and the protection of data at each end of the connection. Unfortunately, the explosive growth of the Web did not allow for this issue to be fully addressed or for reliable tools to be built quickly enough.

Now other reviews I have read on here blast the book for being too generic and not what they expected from O'Reilly. But that is what I find to be a breath of fresh air: a wide-ranging important topic that does not get bogged-down in techno-speak, something which might normally turn readers away from technical books.

From the outset, Garfinkel and Spafford tell you that their goal is to cover the fundamentals of web security and not to be a primer for "computer security, operating systems, or the World Wide Web". Do they succeed in their goal? Absolutely! Starting with web technology, they address security, web architecture, cryptography (what it is and what it isn't), SSL and digital identification. They then move onto privacy and security for users in very simple, direct, tell it like it is style. How many people know what "Joes" are and the fact that anyone could look at their users and find at least one? How often have you read that using a 16 character password is counterproductive and that if chosen correctly, an 8 character password should be more than adequate? When is the last time you had an author break down cookies line by line for you to truly understand them? Have you ever tried to find out what the code inside a worm is and does?

As they weave their story, they then cover Web Server Security and offer a very compelling argument for using a Mac with OS 7, 8 or 9 for a server (I won't give away the reason why here or tell you that Rosebud is a sled). For the programmer, this section offers a street-smart view of coding vulnerabilities and ways to minimize them. In addition, they cover physical security, as well as host security, for servers. Want to really understand SSL and certificates and want to know why Netscape 4 was a bad example of certificate planning? I had never thought about it until reading their discussion of the topic.

They finish up with coverage of security for content providers. What is very, very good here is that they cover privacy policies, filtering, censorship and intellectual property. They help you truly understand what fair use is and what it really means.

The only negative I had was too short a discussion on Social Engineering. However, given the fact that this was published in 2002 and phishing scams had not really taken off raising awareness of the issue, I am giving them a mulligan for this.

The ideal audience for this book is people who need to have a broad understanding without nitty-gritty detail that they will get lost in.How good a reference do I find this book to be? Well for starters, I wished I had it at my side when preparing for the Certified Information Systems Auditor (CISA) Exam offered by the Information Systems Audit and Control Association (ISACA). It puts their review materials to shame (have to be honest about that). This book will be part of my permanent library and will be required reading for any information systems auditors doing work for my company. I will also be using this book as a source text for training provided to companies, developers, and administrators.

The Business Control Caddy Scorecard: Double-Eagle on a Par 5.

Christopher Byrne, IBM CAAD/CASA
The Business Controls Caddy (tm)
http://www.controlscaddy.com/
http://www.thecayugagroup.com/

3-0 out of 5 stars Good book
Good read, but primarily as an introductory primer. General info and comprehensive, with good discussion and resources. But to really get into the nuts and bolts of this subject, you will need to find other books. Somewhat esoteric at times and frustrating.

5-0 out of 5 stars Great Material
Web Security, Privacy and Commerce
by Simson Garfinkel, Gene Spafford was a gift to me for my birthday when getting ready to pass my "Master Site Designer," test it turned out to be great pre test material which helped me pass my test.

Thanks for a great book I look forward to more by the authors.

2-0 out of 5 stars In a word, disappointing.
Apart from paid reviewers I can't see anyone with any actual knowledge of security rating this book 5 stars. It is not as clear and concise as it should be, and the technical knowledge is freely available at securityfocus.com and other sites. A better job could have been done with security and privacy policies.

More effort should have been put forth in providing common sense (implementable) solutions or best practices instead of re-hashing material that other books have already done a better job presenting.

I normally enjoy O'reilly books but like the first edition, this book is a disappointment. ... Read more


37. Wayward Capitalists: Targets of the Securities and Exchange Commission (Yale Studies on White-Collar Crime Serie)
by Susan P. Shapiro
Paperback: 229 Pages (1987-09-10)
list price: US$27.00 -- used & new: US$24.23
(price subject to change: see help)
Asin: 0300039336
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
""Wayward Capitalists is a rich description of financial crime and enforcement that may be useful as background material to a more rigorous study of the organization of administrative agencies.""-Mark J. Moran, American Political Science Review ... Read more


38. Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management
by Thomas R. Peltier
Paperback: 312 Pages (2001-12-20)
list price: US$84.95 -- used & new: US$71.20
(price subject to change: see help)
Asin: 0849311373
Average Customer Review: 4.0 out of 5 stars
Canada | United Kingdom | Germany | France | Japan
Editorial Review

Product Description
By definition, information security exists to protect your organization's valuable information resources. But too often information security efforts are viewed as thwarting business objectives. An effective information security program preserves your information assets and helps you meet business objectives. Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management provides the tools you need to select, develop, and apply a security program that will be seen not as a nuisance but as a means to meeting your organization's goals.Divided into three major sections, the book covers: writing policies, writing procedures, and writing standards. Each section begins with a definition of terminology and concepts and a presentation of document structures. You can apply each section separately as needed, or you can use the entire text as a whole to form a comprehensive set of documents. The book contains checklists, sample policies, procedures, standards, guidelines, and a synopsis of British Standard 7799 and ISO 17799.Peltier provides you with the tools you need to develop policies, procedures, and standards. He demonstrates the importance of a clear, concise, and well-written security program. His examination of recommended industry best practices illustrates how they can be customized to fit any organization's needs. Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management helps you create and implement information security procedures that will improve every aspect of your enterprise's activities. ... Read more

Customer Reviews (5)

5-0 out of 5 stars This book is truly a treasure of knowledge.
Information security policies and all of in this book. This is a great advice for business to start, continue, follow on their journey. Thomas has captured the essence of what the business of all levels want to know when it comes to developing IT policies and systems. This book is must read for all of business executive.

3-0 out of 5 stars Good, but should have been edited
I just started developing InfoSec policies for my company, and was having a hard time getting started.The Web is filled with sample documents and articles for specific documents, but I needed a resource that assumed I was starting from scratch and would help me build up a good library of content to satisfy our auditors.

So I was a little excited to stumble across this book.It lays a good foundation for what's needed in a security policy library, and steps through the development of the major document types: policies, procedures, standards, and guidelines. It's filled with lots of samples, checklists, templates, and other starting points for everything I was looking for.

One glaring problem, though, which by itself drops the rating 1-2 stars:there is an embarrasingly high number of grammar, syntax, and occassionally even semantic, mistakes.Even though these kind of problems are one of my biggest pet peeves, I might overlook them ... except the author makes multiple statements about proofreading your work before submitting to management!! It seems pretty clear that the book was rushed to publication without a serious round of review (I wonder if I put more editorial time into this review than they did into the book...).Even though the book was written for techno-types, there is no excuse for such egregious errors.

Overall, though, this is a decent resource to help with infosec policy development.Just make sure it's not the only book you use.If they would issue an update, this would become a valuable addition to your library.However, the edition I purchased in Feb 2005 was released in 2002, so I wouldn't expect any updates soon.

5-0 out of 5 stars Really good
Really good for anyone doing infosec policy dev.

this will save you a ton of time.

4-0 out of 5 stars Excellent practical guidebook
This is the best book I've seen (so far!) about writing infosec policies and associated materials.Tom Peltier refers directly to the ISO 17799 structure and gives helpful advice on what to include under the ten sections.More than that, he guides the reader through the *process* of writing and implementing policies, even including a brief chapter on my own specialism, security awareness, and suggestions on writing style.

My main quibble with the book is its inconsistency in the level of detail e.g. 41 of the 191 main text pages are devoted to information classification.There are perhaps too many lists and tables for my liking, but these may be useful as reminders of things to include.

Overall, the book is helpful if you are about to write infosec policies and want to avoid some of the more common pitfalls.

4-0 out of 5 stars Good book for Infosec Management
If you want to find out the relation between Policies, Procedures and Standards buy this book. Although the flow of text is somewhat discontinuous but the author clearly explains the underlying concepts. The examples are very illustrative and have a real world feel. The author has been on the frontlines (clearly evident throughout the text) and this distinguishes the book from rest in the pack. Very few books talk about ISO 17799 and BS7799 in detail. This book goes beyond just reproducing the standard and explains the positioning of such guidelines. The tables and checklists found in the appendices alone are worth many times the cost of the book. ... Read more


39. Cryptography: An Introduction to Computer Security (Advances in Computer Science Series)
by Jennifer Seberry, Josef Pieprzyk
 Hardcover: 689 Pages (1989-09)
list price: US$66.00 -- used & new: US$35.98
(price subject to change: see help)
Asin: 0131949861
Average Customer Review: 2.0 out of 5 stars
Canada | United Kingdom | Germany | France | Japan

Customer Reviews (1)

2-0 out of 5 stars A book mismatched to its subject
Cryptography is a fascinating and important subject; so is computer security. But as all of us know who have suffered from breaches of computer security, cryptography, although a useful tool, is only one small aspect of computer security. This book is quite a nice book on cryptography, although not the best; I recommend Bruce Schneier's book and Alan Konheim's book as better texts on cryptography for anyone seriously interested in cryptography. However, the relationship of this book to the subject of computer security is sort of like that of a book on padlocks to the care and protection of racehorses.

Unfortunately, there is no book I know of that gives adequate treatment even to the role of cryptography in computer security, let alone to the entire subject of computer security, so we learn the hard way, from our mistakes. The only book I know that places this topic in proper perspective is "Cryptography's Role In Securing The Information Society" created in 1996 by the Computer Science and Technology Board of the National Research Council, and published by the National Academy Press. This latter book is kind of interminably boring, and it raises far more questions than it answers, but it's the best we've got; it's well balanced, and was prepared by a group of hard-bitten scientists and engineers with lots of practical experience (plenty of it bad.) So if you want to know how cryptography relates to computer security (maybe), read this latter book, not Seberry and Pieprzyck. ... Read more


40. How to avoid financial fraud
by C. Edgar Murray
 Unknown Binding: 60 Pages (2001)

Asin: B0006S45KW
Canada | United Kingdom | Germany | France | Japan

  Back | 21-40 of 100 | Next 20
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

Prices listed on this site are subject to change without notice.
Questions on ordering or shipping? click here for help.

site stats