£50.75

Routledge Information Risk and Security: Preventing and Investigating Workplace Computer Crime

Price data checked 1 day ago

View at Amazon

Price History & Forecast

Last 90 days • 90 data points

Historical
Generating forecast...
£50.75 £44.41 £45.80 £47.18 £48.56 £49.94 £51.33 11 February 2026 05 March 2026 27 March 2026 18 April 2026 11 May 2026

Price Distribution

Price distribution over 90 days • 2 price levels

Days at Price
Current Price
88 days 2 days · current 0 22 44 66 88 £45 £51 Days at Price

Price Analysis

Most common price: £45 (88 days, 97.8%)

Price range: £45 - £51

Price levels: 2 different prices over 90 days

Description

Product Description Information Risk and Security explains the complex and diverse sources of risk for any organization and provides clear guidance and strategies to address these threats before they happen, and to investigate them, if and when they do. Edward Wilding focuses particularly on internal IT risk, workplace crime, and the preservation of evidence, because it is these areas that are generally so mismanaged. There is advice on: ¢ preventing computer fraud, IP theft and systems sabotage ¢ adopting control and security measures that do not hinder business operations but which effectively block criminal access and misuse ¢ securing information - in both electronic and hard copy form ¢ understanding and countering the techniques by which employees are subverted or entrapped into giving access to systems and processes ¢ dealing with catastrophic risk ¢ best-practice for monitoring and securing office and wireless networks ¢ responding to attempted extortion and malicious information leaks ¢ conducting covert operations and forensic investigations ¢ securing evidence where computer misuse occurs and presenting this evidence in court and much more. The author's clear and informative style mixes numerous case studies with practical, down-to-earth and easily implemented advice to help everyone with responsibility for this threat to manage it effectively. This is an essential guide for risk and security managers, computer auditors, investigators, IT managers, line managers and non-technical experts; all those who need to understand the threat to workplace computers and information systems. Review Edward Wilding, a renowned expert in computer forensics, explores, often in excruciating detail, the degree of risk that employees pose to their employer. From IT fraud, espionage, extortion and wireless interception to press leaks, anonymous letters and pornography. Wilding is unrelenting in his determination to catalogue every potential workplace crime and transgression...This book offers a highly valuable exploration of the reasons why businesses continue to suffer damaging security breaches, and the ways in which these can be prevented.' - Information Age 'In this tour de force of a publication, Edward Wilding guides readers through a maze of issues and solutions with clarity and conviction. The book is a 'must read' for every CIO.' - Information Security Specialist Group Magazine 'Many books on risk management and crisis management have similar aims; the prevention and detection of computer misuse. However, whilst many resort to simple checklists and promulgating nightmare scenarios that may never happen, Wilding's approach is more subtle, being grounded in "real life" examples and case studies as well as photographs and illustrations. This is the major strength of this book. The case studies put the advice in context and help the reader to understand the magnitude of the problems. Some of the examples may make the reader wince with guilty recognition... Some of the examples are truly extraordinary...This volume will have a deservedly wide readership well beyond the risk managers, IT Consultants, auditors and Personnel Directors at which it is principally aimed. All those who need to understand the inner workings of information technology, and the risks involved in its use, will find this book invaluable. In particular, litigation lawyers will find it of assistance when considering evidential issues, and for defining exactly what questions to ask when instructing forensic computer experts...Those who actually implement the strategies suggested will undou About the Author Edward Wilding has investigated several hundred cases of computer fraud and misuse in many jurisdictions. His previous book, Computer Evidence: A Forensic Investigations Handbook (Sweet and Maxwell 1996) was one of the first to discuss computer forensic investigations. The author has lectured widely, trained incident response teams, and conducted securi

Product Specifications

Format
paperback
Domain
Amazon UK
Release Date
23 August 2018
Listed Since
27 November 2018

Barcode

No barcode data available

Similar Products You Might Like

Investigation and Prevention of Financial Crime: Knowledge Management, Intelligence Strategy and Executive Leadership
79% match

Investigation and Prevention of Financial Crime: Knowledge Management, Intelligence Strategy and Executive Leadership

Routledge

£119.80 11 May 2026
Corporate Fraud: Case Studies in Detection and Prevention
79% match

Corporate Fraud: Case Studies in Detection and Prevention

Wiley

£68.25 10 May 2026
Information Security: Principles and Practice
79% match

Information Security: Principles and Practice

Wiley

£57.56 04 May 2026
Information Security Planning: A Practical Approach
79% match

Information Security Planning: A Practical Approach

Springer

£43.02 04 May 2026
Fraud: The Counter Fraud Practitioner's Handbook
79% match

Fraud: The Counter Fraud Practitioner's Handbook

Routledge

£40.99 11 May 2026
Network Auditing: A Control Assessment Approach
78% match

Network Auditing: A Control Assessment Approach

Wiley

£63.95 04 May 2026
Security of e-Systems and Computer Networks
78% match

Security of e-Systems and Computer Networks

Cambridge University Press

£57.78 04 May 2026
Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft
78% match

Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft

Wiley

£87.98 04 May 2026
Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard
77% match

Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard

CRC Press

£86.11 04 May 2026
Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation
76% match

Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation

Springer

£73.10 11 May 2026
Cyberterrorism: The Legal and Enforcement Issues
76% match

Cyberterrorism: The Legal and Enforcement Issues

Scientific Publishing

£55.24 04 May 2026
Reducing Project Risk
76% match

Reducing Project Risk

Routledge

£140.35 04 May 2026
The Complete Company Policies: Documents and Guidance
76% match

The Complete Company Policies: Documents and Guidance

Routledge

£41.58 11 May 2026
Fundamentals of Secure System Modelling
76% match

Fundamentals of Secure System Modelling

Springer

£50.87 04 May 2026
Foundations of Cybersecurity, 2nd Edition: A Straightforward Introduction
76% match

Foundations of Cybersecurity, 2nd Edition: A Straightforward Introduction

No Starch Press

£49.67 11 May 2026
Information Management
76% match

Information Management

Prentice Hall

£42.99 10 May 2026
The New Technology of Financial Crime: New Crime Commission Technology, New Victims, New Offenders, and New Strategies for Prevention and Control
76% match

The New Technology of Financial Crime: New Crime Commission Technology, New Victims, New Offenders, and New Strategies for Prevention and Control

Routledge

£41.58 11 May 2026
International Security Management: New Solutions to Complexity (Advanced Sciences and Technologies for Security Applications)
76% match

International Security Management: New Solutions to Complexity (Advanced Sciences and Technologies for Security Applications)

Springer

£131.55 04 May 2026
Emerging Technological Risk: Underpinning the Risk of Technology Innovation
76% match

Emerging Technological Risk: Underpinning the Risk of Technology Innovation

Springer

£76.38 11 May 2026
Cybersecurity Threats, Malware Trends, and Strategies: Discover risk mitigation strategies for modern threats to your organization
75% match

Cybersecurity Threats, Malware Trends, and Strategies: Discover risk mitigation strategies for modern threats to your organization

Packt Publishing

£41.04 04 May 2026
Risk Management for Engineering Projects: Procedures, Methods and Tools
75% match

Risk Management for Engineering Projects: Procedures, Methods and Tools

Springer

£65.94 11 May 2026
Frauds and Financial Crimes: Trends, Strategic Responses, and Implementation Issues in England and Wales
75% match

Frauds and Financial Crimes: Trends, Strategic Responses, and Implementation Issues in England and Wales

Routledge

£43.67 11 May 2026
Risk Analysis: Socio-technical and Industrial Systems (Systems Engineering)
75% match

Risk Analysis: Socio-technical and Industrial Systems (Systems Engineering)

Wiley

£119.00 04 May 2026
Rhetoric of InSecurity: The Language of Danger, Fear and Safety in National and International Contexts (Law, Language and Communication)
75% match

Rhetoric of InSecurity: The Language of Danger, Fear and Safety in National and International Contexts (Law, Language and Communication)

Routledge

£41.58 11 May 2026