Anatomy of a fraud investigation : (Record no. 41407)

MARC details
000 -LEADER
fixed length control field 03918cam a2200349 a 4500
001 - CONTROL NUMBER
control field 15887844
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20210415113825.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 090831s2010 nju b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2009035916
015 ## - NATIONAL BIBLIOGRAPHY NUMBER
National bibliography number GBA9A6121
Source bnb
016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER
Record control number 015408566
Source Uk
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780470560471 (cloth)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0470560479 (cloth)
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)ocn429026999
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Transcribing agency DLC
Modifying agency YDX
-- BTCTA
-- UKM
-- YDXCP
-- CDX
-- BWX
-- SNK
-- DLC
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number HV6691
Item number .P43 2010
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 363.25/963
Edition number 22
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Pedneault, Stephen,
Dates associated with a name 1966-
245 10 - TITLE STATEMENT
Title Anatomy of a fraud investigation :
Remainder of title from detection to prosecution /
Statement of responsibility, etc. Stephen Pedneault.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Hoboken, N.J. :
Name of publisher, distributor, etc. John Wiley & Sons,
Date of publication, distribution, etc. c2010.
300 ## - PHYSICAL DESCRIPTION
Extent xiv, 194 p. ;
Dimensions 24 cm.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note First indications (they're doing what?) -- The importance of planning (maximizing desired outcomes) -- Collecting the evidence (a.k.a. "the raid") -- Reviewing the evidence (the day after) -- Electronic evidence considerations (computers, files, and communications) -- Interviewing (responding to tears) -- Importance of documentation (keeping track of things) -- Further investigative measures (obtaining more evidence) -- Tracking down leads (the plot thickens) -- Drawing conclusions (what does it all show?) -- Confronting the suspect ("I didn't do anything wrong") -- Documenting the investigation (your written report) -- Working towards a resolution ("I don't want to go to prison") -- Case closed! -- Epilogue: Do you want to know the outcome?
520 1# - SUMMARY, ETC.
Summary, etc. "Most fraud cases, especially thefts and embezzlements, never make it into the public eye. Those that do grab the media's attention merely report the end result of weeks, months, and even years of investigative procedures. For experienced and inexperienced fraud professionals alike, there is little available to keep abreast of the latest fraud tactics." "Providing unparalleled insights into what takes place during a fraud investigation, Anatomy of a Fraud Investigation is a valuable resource for you, whether you are a fraud investigator, auditor, or if you simply suspect fraud may be occurring in your organization and aren't sure what to do. This is a fascinating, insider look at a fraud investigation, designed to help you better understand fraud detection, investigation, and prevention-from the inside out." "Written by a seasoned investigator with over twenty-two years of experience conducting fraud investigations, this unique book articulates the investigative thought process through an authentic case, from the first tip to the forensic accountant that fraud is suspected, to the final judgment in court. No detail is too small here, with consideration given to sometimes-overlooked details, including: How does a case come to light in the first place? Who are the individuals behind the scene putting the case together, sifting through ledgers, cancelled checks, and other records that comprise a mountain of evidence? Who handles all the information, and where is evidence stored? Who are the witnesses, and how can you know if the suspect acted alone or with the assistance of an accomplice? If computer forensics is involved, how can you extract the most evidence from the suspects' computers?".
520 8# - SUMMARY, ETC.
Summary, etc. "Unpacking the finer points that make fraud investigative work interesting and challenging, Anatomy of a Fraud Investigation breaks down the "juicy details" of a fraud investigation from beginning to end, with a you-are-there analysis of the steps and measures involved in each stage of an actual fraud investigation."--BOOK JACKET.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Fraud.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Fraud investigation.
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c orignew
d 1
e ecip
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
    Library of Congress Classification     University of Eastern Africa, Baraton Main Campus Library Main Stack 15.04.2021   HV6691.P43 2010 79743 17.10.2024 15.04.2021 Books
    Library of Congress Classification     University of Eastern Africa, Baraton Main Campus Library Main Stack 15.04.2021   HV6691.P43 2010 74780 15.04.2021 15.04.2021 Books