z-logo
Premium
Data mining: How hackers steal sensitive electronic information
Author(s) -
Smith Gordon
Publication year - 2009
Publication title -
journal of corporate accounting and finance
Language(s) - English
Resource type - Journals
eISSN - 1097-0053
pISSN - 1044-8136
DOI - 10.1002/jcaf.20496
Subject(s) - hacker , computer security , audit , computer science , internet privacy , information security , business , accounting
You may want to rethink your electronic auditing procedures—and others—after you read this article. Computer security expert Gordon Smith reveals how hackers can easily penetrate your safeguards. © 2008 Canaudit Inc.

This content is not available in your region!

Continue researching here.

Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom