Search Results for Fraud. - Narrowed by: 2008 SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dFraud.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092008$0025092008$0026ic$003dtrue$0026te$003dILS$0026ps$003d300?dt=list 2024-12-23T23:15:06Z Essentials of corporate fraud ent://SD_ILS/0/SD_ILS:303164 2024-12-23T23:15:06Z 2024-12-23T23:15:06Z Author&#160;Coenen, Tracy, 1972-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118386156">An electronic book accessible through the World Wide Web; click for information</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=24342">http://www.books24x7.com/marc.asp?bookid=24342</a> Ebook Library <a href="http://public.eblib.com/EBLPublic/PublicView.do?ptiID=331643">http://public.eblib.com/EBLPublic/PublicView.do?ptiID=331643</a> MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=121762&ref=toc">http://www.myilibrary.com?id=121762&ref=toc</a> <a href="http://swb.eblib.com/patron/FullRecord.aspx?p=331643">http://swb.eblib.com/patron/FullRecord.aspx?p=331643</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Insider computer fraud an in-depth framework for detecting and defending against insider IT attacks ent://SD_ILS/0/SD_ILS:291349 2024-12-23T23:15:06Z 2024-12-23T23:15:06Z Author&#160;Brancik, Kenneth C.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420046601">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data mining for intelligence, fraud &amp; criminal detection advanced analytics &amp; information sharing technologies ent://SD_ILS/0/SD_ILS:286916 2024-12-23T23:15:06Z 2024-12-23T23:15:06Z Author&#160;Westphal, Christopher R. (Christopher Ralph), 1965-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420067248">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The woman in white ent://SD_ILS/0/SD_ILS:114642 2024-12-23T23:15:06Z 2024-12-23T23:15:06Z Author&#160;Collins, Wilkie.&#160;Sutherland, John.<br/>Preferred Shelf Number&#160;PR4494 .W5 1996<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Siber su&ccedil;larin cezaland&#305;r&#305;lmas&#305; ve T&uuml;rkiye'de durum ent://SD_ILS/0/SD_ILS:135278 2024-12-23T23:15:06Z 2024-12-23T23:15:06Z Author&#160;Erg&uuml;n, &#304;smail.<br/>Preferred Shelf Number&#160;HV6773.3.T9 E738 2008<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Yeni T&uuml;rk ceza kanununda sahtecilik, malvarl&#305;&#287;&#305;, bili&#351;im su&ccedil;lar&#305; ile ekonomi ve ticaret alan&#305;nda su&ccedil;lar ent://SD_ILS/0/SD_ILS:135603 2024-12-23T23:15:06Z 2024-12-23T23:15:06Z Author&#160;Meran, Necati.<br/>Preferred Shelf Number&#160;KKX4048 .M47 2008<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/> A culture of corruption : everyday deception and popular discontent in Nigeria ent://SD_ILS/0/SD_ILS:375468 2024-12-23T23:15:06Z 2024-12-23T23:15:06Z Author&#160;Smith, Daniel Jordan, 1961-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.jstor.org/stable/10.2307/j.ctt7sdkn">http://www.jstor.org/stable/10.2307/j.ctt7sdkn</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>