Thursday, December 11, 2008

Financial Investigation and Forensic Accounting or The Power of Events

Financial Investigation and Forensic Accounting

Author: George A Manning

Written by an IRS agent with more than twenty years of experience, this book offers a thorough examination of current methods and legal concerns for the detection and prosecution of economic crime. It guides the investigator through the process, from detection to indictment and conviction. It explains the mechanics of gambling, fraud, and money laundering, and then illustrates how prosecutors present the tax codes, offshore banking laws, and the RICO statutes to judges and juries. Each chapter provides a summary along with applicable outlines. This updated edition provides additional focus on locating terrorist funds, related new laws enacted, and computer fraud.

Booknews

Manning, an IRS Revenue Agent with 14 years experience in forensic accounting, uses an interdisciplinary approach, including accounting, law enforcement, and financial know-how, to explain the current methods and legal issues facing the detection and prosecution of economic crimes. This guide focuses on how best to prosecute perpetrators of crimes such as gambling, fraud, and money laundering. It analyzes many of the complex issues which will aid prosecutors in bringing these cases to trial, such as seizures, forfeitures, and warrants; off-shore banking laws and banking information; how to use exhibits forms in prosecution of economic crimes; and how to successfully give testimony. Annotation c. Book News, Inc., Portland, OR (booknews.com)



See also: Illustrated Kitchen Bible or Philadelphia Cream Cheese Collection

The Power of Events: An Introduction to Complex Event Processing in Distributed Enterprise Systems

Author: David C Luckham

Complex Event Processing (CEP) is a defined set of tools and techniques for analyzing and controlling the complex series of interrelated events that drive modern distributed information systems. This emerging technology helps IS and IT professionals understand what is happening within the system, quickly identify and solve problems, and more effectively utilize events for enhanced operation, performance, and security. CEP can be applied to a broad spectrum of information system challenges, including business process automation, schedule and control processes, network monitoring and performance prediction, and intrusion detection.

The Power of Events introduces CEP and shows specifically how this innovative technology can be utilized to enhance the quality of large-scale, distributed enterprise systems. The book describes the challenges faced by today's information systems, explains fundamental CEP concepts, and highlights CEP's role within a complex and evolving contemporary context. After thoroughly introducing the concept, the book moves on to a more detailed, technical explanation of CEP, featuring the Rapide™ event pattern language, reactive event pattern rules, event pattern constraints, and event processing agents. It offers practical advice on building CEP-based solutions that solve real world IS/IT problems.

Readers will learn about such essential topics as:

  • Managing the open electronic enterprise in the "global event cloud"
  • Process architectures and on-the-fly process evolution
  • Events, timing, causality, and aggregation
  • Event patterns and event abstraction hierarchies
  • Causal eventtracking and information gaps
  • Multiple views and hierarchical viewing
  • Dynamic process architectures
  • The Rapide event pattern language
  • Event pattern rules, constraints, and agents
  • Event processing networks (EPNs)
  • Causal models and event pattern maps
  • Implementing event abstraction hierarchies

Several comprehensive case studies illustrate the benefits of CEP, as well as key strategies for applying the technology. Examples include the real-time monitoring of events flowing between the business processes of collaborating enterprises, and a hierarchically organized set of event-driven views of a financial trading system. One of the case studies shows how to apply CEP to network viewing and intrusion detection.

The book concludes with a look at building an infrastructure for CEP, showing how the technology can provide a significant competitive advantage amidst the myriad of event-driven, Internet-based applications now coming onto the market.





No comments: