Fraud auditing and forensic accounting
"Completely revised and updated, Fraud Auditing and Forensic Accounting, Fourth Edition reveals how to develop an investigative eye toward both internal and external fraud and provides crucial information on how to deal with it when discovered. With new chapters on the physiological aspects of...
Saved in:
| Main Author: | Singleton, Tommie |
|---|---|
| Other Authors: | Singleton, Aaron J. 1980- |
| Format: | Book |
| Language: | English |
| Published: |
Hoboken, N.J.
Wiley
c2010
|
| Edition: | 4th ed. |
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Forensic accounting and fraud investigation for non-experts
by: Silverstone, Howard
Published: (2007)
by: Silverstone, Howard
Published: (2007)
Financial investigation and forensic accounting
by: Manning, George A.
Published: (2011)
by: Manning, George A.
Published: (2011)
Essentials of forensic accounting
by: Crain, Michael A. (Michael Alan), et al.
Published: (2019)
by: Crain, Michael A. (Michael Alan), et al.
Published: (2019)
Network forensics tracking hackers through cyberspace
by: Davidoff, Sherri
Published: (2012)
by: Davidoff, Sherri
Published: (2012)
Terrorism and organized hate crime intelligence gathering, analysis, and investigations
by: Ronczkowski
Published: (2007)
by: Ronczkowski
Published: (2007)
An introduction to corporate and white-collar crime
by: DiMarino, Frank J., et al.
Published: (2019)
by: DiMarino, Frank J., et al.
Published: (2019)
Anatomy of a fraud investigation from detection to prosecution
by: Pedneault, Stephen 1966-
Published: (2010)
by: Pedneault, Stephen 1966-
Published: (2010)
Hacking exposed computer forensics
by: Philipp, Aaron
Published: (2010)
by: Philipp, Aaron
Published: (2010)
Guide to computer forensics and investigations
Published: (2008)
Published: (2008)
Real digital forensics computer security and incident response
by: Jones (Keith John)
Published: (2005)
by: Jones (Keith John)
Published: (2005)
Internet forensics
by: Jones, Robert
Published: (2006)
by: Jones, Robert
Published: (2006)
Corporate fraud
by: Comer
Published: (1998)
by: Comer
Published: (1998)
Cyber crime investigations Bridging the gaps between security professionals,law enforcement and prosecutors
by: Reyes
Published: (2007)
by: Reyes
Published: (2007)
Alternate data storage forensics cAmber Schroader, Tyler Cohen
by: Schroader, Amber
by: Schroader, Amber
White-collar crime the essentials
by: Payne, Brian K.
Published: (2017)
by: Payne, Brian K.
Published: (2017)
Forensic accounting
by: Hopwood, William S.
Published: (2008)
by: Hopwood, William S.
Published: (2008)
Kleptokrasi persekongkolan birokrat-korporat sebagai pola white-collar crime di Indonesia
by: Mustofa, Muhammad 1951-
Published: (2010)
by: Mustofa, Muhammad 1951-
Published: (2010)
Network intrusion analysis methodologies, tools, and techniques for incident analysis and response
Published: (2013)
Published: (2013)
Forensic accounting and fraud examination
by: Hopwood, William S., et al.
Published: (2012)
by: Hopwood, William S., et al.
Published: (2012)
Bombings
by: Stewart
Published: (2006)
by: Stewart
Published: (2006)
Dissecting the hack the forb1dd3n network
Published: (2010)
Published: (2010)
Digital Forensics and Cyber Crime Investigation : Recent Advances and Future Directions /
Published: (2025)
Published: (2025)
Terrorism and organized hate crime intelligence gathering, analysis, and investigations
by: Ronczkowski, Michael
Published: (2018)
by: Ronczkowski, Michael
Published: (2018)
Terrorism and organized hate crime intelligence gathering, analysis, and investigations
by: Ronczkowski, Michael
Published: (2018)
by: Ronczkowski, Michael
Published: (2018)
Introduction to corporate crime investigation & prosecution
by: Subramaniam, A.
Published: (2007)
by: Subramaniam, A.
Published: (2007)
Computer forensics infoSec Pro guide
by: Cowen, David
Published: (2013)
by: Cowen, David
Published: (2013)
Guide to computer forensics and investigations
Published: (2004)
Published: (2004)
Handbook of frauds, scams, and swindles failures of ethics in leadership
Published: (2009)
Published: (2009)
Introducing forensic and criminal investigation
by: Monckton-Smith, Jane, et al.
Published: (2013)
by: Monckton-Smith, Jane, et al.
Published: (2013)
Forensic laboratory management applying business principles
by: Dale, Mark, et al.
Published: (2015)
by: Dale, Mark, et al.
Published: (2015)
Computer forensics and digital investigation with Encase Forensic v7
by: Widup, Suzanne
Published: (2014)
by: Widup, Suzanne
Published: (2014)
Handbook of digital forensics and investigation
by: Casey, Eoghan
Published: (2010)
by: Casey, Eoghan
Published: (2010)
The basics of digital forensics the primer for getting started in digital forensics
by: Sammons, John
Published: (2012)
by: Sammons, John
Published: (2012)
Forensic criminology
by: Petherick, Wayne, et al.
Published: (2010)
by: Petherick, Wayne, et al.
Published: (2010)
Forensic criminology
by: Williams, Andy
Published: (2015)
by: Williams, Andy
Published: (2015)
Digital forensics basics a practical guide using Windows OS
by: Hassan, Nihad A.
Published: (2019)
by: Hassan, Nihad A.
Published: (2019)
Learn computer forensics a beginner's guide to searching, analyzing, and securing digital evidence
by: Oettinger, William
Published: (2020)
by: Oettinger, William
Published: (2020)
A hands-on introduction to forensic science cracking the case
by: Okuda, Mark M., et al.
Published: (2015)
by: Okuda, Mark M., et al.
Published: (2015)
Digital forensics with Kali Linux perform data acquisition, data recovery, network forensics, and malware analysis with Kali Linux 2019.x
by: Parasram, Shiva V. N.
Published: (2020)
by: Parasram, Shiva V. N.
Published: (2020)
White collar deviance
by: Simon lhDavid R
by: Simon lhDavid R
Similar Items
-
Forensic accounting and fraud investigation for non-experts
by: Silverstone, Howard
Published: (2007) -
Financial investigation and forensic accounting
by: Manning, George A.
Published: (2011) -
Essentials of forensic accounting
by: Crain, Michael A. (Michael Alan), et al.
Published: (2019) -
Network forensics tracking hackers through cyberspace
by: Davidoff, Sherri
Published: (2012) -
Terrorism and organized hate crime intelligence gathering, analysis, and investigations
by: Ronczkowski
Published: (2007)


