Printer Friendly

Telephone Hacker Fraud Security Systems.

A comprehensive look at the growing problem of toll fraud is provided by Telephone Hacker Fraud Security Systems. Starting with the background of toll fraud and continuing through protection methods, product profiles, and market analysis, the book provides the reader with everything he or she should know to curb risks.

The authors offer valuable insights regarding who must pay for toll fraud and who is liable for its occurrence. The book also includes an update on products and services that can help avoid toll fraud problems.

The publication is both well written and organized, making it easy to use and an excellent reference tool. It provides valuable basic information and describes methods that help minimize and control toll fraud.

Reviewer: Joseph T. Dowdy is a special agent for GTE Security Services in Mechanicsville, Virginia. He is a member of the ASIS Standing Committee on Telecommunications Security.
COPYRIGHT 1994 American Society for Industrial Security
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 1994 Gale, Cengage Learning. All rights reserved.

Article Details
Printer friendly Cite/link Email Feedback
Author:Dowdy, Joseph T.
Publication:Security Management
Article Type:Book Review
Date:Jan 1, 1994
Words:146
Previous Article:Practical Data Security.
Next Article:Total Contingency Planning for Disasters: Managing Risk ... Minimizing Loss ... Ensuring Business Continuity.
Topics:


Related Articles
Costly callers: prosecuting voice mail fraud.
Meet and beat the ego-driven systems hacker.
Toll Fraud and Telabuse.
Toll fraud: multimillion-dollar telecomm problem.
Voice Processing System Security: Misuse, Abuse, and Fraud Detection and Prevention.
Who's on the line?
Voice-mail fraud.
Hacker trap.
FBI YET TO BRING CASE AGAINST HACKER TO TRIAL.

Terms of use | Copyright © 2017 Farlex, Inc. | Feedback | For webmasters