How would an engineer who oversees the clean-up of a toxic waste site track down the former owners of the site to find the polluter? Or maybe an attorney needs help finding the assets with which a client's former spouse has absconded. An Introduction to Internet-Based Financial Investigations featur..
First published in 1984, this book examines corporate crime in the pharmaceutical industry and is based on extensive research, including interviews with 131 senior executives of international pharmaceutical companies. It covers topics such as international bribery and corruption, fraud in the testin..
First published in 1984, this book examines corporate crime in the pharmaceutical industry and is based on extensive research, including interviews with 131 senior executives of international pharmaceutical companies. It covers topics such as international bribery and corruption, fraud in the testin..
A radically revised edition of one of the most successful books in its field. It deals comprehensively with both policy issues and methods, and looks in turn at each of the main business functions from the point of view of risk and prevention...
A radically revised edition of one of the most successful books in its field. It deals comprehensively with both policy issues and methods, and looks in turn at each of the main business functions from the point of view of risk and prevention...
Tim Parkman and Gill Peeling's Countering Terrorist Finance - A Training Handbook for Financial Services is a practical, specialist guide to the processes and skills needed to counter money laundering specifically related to terrorist financing. The book includes a CD of training materials to suppor..
Cyber crime is one of the main threats to the digital economy. From insider threats to complex distributed attacks and industrial worms, modern business faces unprecedented challenges. Cyber security and digital intelligence are the necessary responses to this challenge, yet they are understood by o..
Deception at Work tells you how to recognize and deal with lies, in meetings, negotiations, discussions and in writing. It is guaranteed to make you a more effective and confident operator, no matter what job you do. Simply leaving the book on your desk for others to see will improve your chances of..
Detecting and Reducing Supply Chain Fraud is a pragmatic guide to identifying and managing sources of risk. Norman Katz includes chapters explaining each of the main categories of fraud risk: what are they, what is their significance and how are they exploited by the fraudster. He also explores both..
Detecting and Reducing Supply Chain Fraud is a pragmatic guide to identifying and managing sources of risk. Norman Katz includes chapters explaining each of the main categories of fraud risk: what are they, what is their significance and how are they exploited by the fraudster. He also explores both..
Digital Identity Management, based on the work of the annual Digital Identity Forum in London, provides a wide perspective on the subject and explores the current technology available for identity management, its applications within business, and its significance in wider debates about identity, soc..
Digital Identity Management, based on the work of the annual Digital Identity Forum in London, provides a wide perspective on the subject and explores the current technology available for identity management, its applications within business, and its significance in wider debates about identity, soc..