Premium
Data mining: How hackers steal sensitive electronic information
Author(s) -
Smith Gordon
Publication year - 2009
Publication title -
journal of corporate accounting and finance
Language(s) - English
Resource type - Journals
eISSN - 1097-0053
pISSN - 1044-8136
DOI - 10.1002/jcaf.20496
Subject(s) - hacker , computer security , audit , computer science , internet privacy , information security , business , accounting
You may want to rethink your electronic auditing procedures—and others—after you read this article. Computer security expert Gordon Smith reveals how hackers can easily penetrate your safeguards. © 2008 Canaudit Inc.