Búsqueda

Definitive guide to next-generation fraud prevention : fraud prevention techniques for the mobile age

<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd">
  <record>
    <leader>00000cam a22000004b 4500</leader>
    <controlfield tag="001">MAP20190002257</controlfield>
    <controlfield tag="003">MAP</controlfield>
    <controlfield tag="005">20220911191524.0</controlfield>
    <controlfield tag="008">190123s2018    usa||||       ||| ||eng d</controlfield>
    <datafield tag="020" ind1=" " ind2=" ">
      <subfield code="a">978-0-9990354-4-3</subfield>
    </datafield>
    <datafield tag="040" ind1=" " ind2=" ">
      <subfield code="a">MAP</subfield>
      <subfield code="b">spa</subfield>
      <subfield code="d">MAP</subfield>
    </datafield>
    <datafield tag="084" ind1=" " ind2=" ">
      <subfield code="a">86</subfield>
    </datafield>
    <datafield tag="100" ind1="1" ind2=" ">
      <subfield code="0">MAPA20190000871</subfield>
      <subfield code="a">Bedell, Crystal</subfield>
    </datafield>
    <datafield tag="245" ind1="1" ind2="0">
      <subfield code="a">Definitive guide to next-generation fraud prevention</subfield>
      <subfield code="b">: fraud prevention techniques for the mobile age</subfield>
      <subfield code="c">Crystal Bedell, Eddie Glenn</subfield>
    </datafield>
    <datafield tag="260" ind1=" " ind2=" ">
      <subfield code="a">Annapolis</subfield>
      <subfield code="b">CyberEdge Group</subfield>
      <subfield code="c">2018</subfield>
    </datafield>
    <datafield tag="300" ind1=" " ind2=" ">
      <subfield code="a">52 p.</subfield>
    </datafield>
    <datafield tag="520" ind1=" " ind2=" ">
      <subfield code="a">Foreword -- Introduction -- Chapter 1: Introducing fraud in the mobile age -- Chapter 2: Understanding the enemy -- Chapter 3: Analyzing current fraud prevention techniques -- Chapter 4: Introducing next-generation fraud prevention -- Chapter 5: Exploring device intelligence -- Chapter 6: Leveraging human insight and machine learning -- Chapter 7: Harnessing the power of next-generation device intelligence -- Chapter 8: 10 buying criteria for next-gen fraud prevention</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080607036</subfield>
      <subfield code="a">Lucha contra el fraude</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080541064</subfield>
      <subfield code="a">Fraude</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20140023066</subfield>
      <subfield code="a">Ciberataques</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20140022700</subfield>
      <subfield code="a">Ciberseguridad</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080586546</subfield>
      <subfield code="a">Nuevas tecnologías</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20170005476</subfield>
      <subfield code="a">Machine learning</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080585631</subfield>
      <subfield code="a">Guías de seguridad</subfield>
    </datafield>
    <datafield tag="700" ind1="1" ind2=" ">
      <subfield code="0">MAPA20190000888</subfield>
      <subfield code="a">Glenn, Eddie</subfield>
    </datafield>
    <datafield tag="710" ind1="2" ind2=" ">
      <subfield code="0">MAPA20190000895</subfield>
      <subfield code="a">CyberEdge Group</subfield>
    </datafield>
  </record>
</collection>