"In this educational novel, the famous forensic accountant, Lenny Cramer, has joined the accounting faculty at Georgia State University. In addition to his professorial duties, he is conducting an operational audit for the international soft drink company, Coca-Cola. Espionage and fraud place Lenny's life on the line as he uncovers a scheme to steal Coke's secret formula. The story features a variety of settings, from Washington, D.C. to Poland. As an expert in his field, Professor Cramer uses his forensic auditing knowledge to assist the Coca-Cola Company, his students, the U.S. Congress, and the legal system as an expert witness. With his assistant, Slam Duncan, an accounting Ph.D. student, he puts state-of-the-art technology to work to solve audit problems in the real world. Trap Doors and Trojan Horses may be used near the end of an auditing or beginning of a data processing course. It would be ideal for an MBA program that has a light coverage of accounting or used in CPA firms' in-house training programs. This educational novel illustrates the differences between a regular audit and the investigation required by forensic accountants to uncover computer fraud. Every business executive should read it, because just as termites never sleep, fraud never sleeps. And just like termites, fraud can destroy the foundation of an entity. The novel mixes fraud, crime, politics, ethics, computer techniques, expert witnessing, and auditing for a better and easier way to learn accounting. If used as a supplement to an auditing, forensic accounting, fraud examination, or a computer course, this exciting novel provides a painless way to learn auditing principles. The suspenseful story combines computer and auditing concepts in a fashion even a novice can understand and enjoy. With computer fraud losses reaching $300 billion per year, accountants must be familiar with electronic auditing"--
A Critical Handbook of Children's Literature, Ninth Edition, gives future teachers, practicing teachers, librarians, and parents many examples of quality children's literature to guide them in choosing the best books for the classroom, ...
Trap doors and Trojan horses are two examples of intentional malicious vulnerabilities. A trap door is a hidden software or hardware mechanism that permits system protection mechanisms to be circumvented.135 The inventor of the trap ...
Both (a) and (b) 58. A program that performs a useful task while simultaneously allowing destructive acts is a a. worm b. trojan horse c. virus d. macro virus e. None of these 66. What is a trap door in a program? a.
The text discusses what deviant behavior is around the world, including the circumstances, patterns, and sociocultural characteristics of persons involved in deviant acts.
7 Explain the Trojan Horse and Trap doors program threats. 7 Ans: Q.5 For file attributes and file operations, refer Section 11.2.2 and 11.2.3 on Page 183. Both Trojan horse and trap doors are program threats and are discussed below: ...
Trojan horse, Spyware, Trap Door and Logic Bomb. Here we group together those malware that do not exhibit an infection behavior. A Trojan horse is a non-replicating program that hides its malicious intent inside host programs that may ...
G.W. Murphy Indus., Inc., 491 F.2d 923, 929 (5th Cir. 1973). But see Datascope Corp. v. SMEC, Inc., 879 F.2d 820, 824-25 (Fed. Cir. 1989) (doubts about patent owner's ability to supply demand should be resolved against infringer).
Leading Free and Open Source software researchers and analysts consider the status of the open source revolution and its effect on industry and society.
... Trap Doors and Trojan Horses A number of publicly available software packages were written to raise user consciousness about the possibilities for installing back doors into systems . The best known is rootkit , of which there are many ...
The definitive book on UNIX security, this volume covers every aspect of computer security on UNIX machines and the Internet.