<a target="_blank" href="http://www.amazon.com/s/ref=nb_sb_noss/184-1475344-8555167?url=search-alias%3Daps&field-keywords=Fraud#/ref=nb_sb_noss?url=search-alias%3Daps&field-keywords=security+Fraud&rh=i%3Aaps%2Ck%3Asecurity+Fraud">http://www.amazon.com/s/ref=nb_sb_noss/184-1475344-8555167?url=search-alias%3Daps&field-keywords=Fraud#/ref=nb_sb_noss?url=search-alias%3Daps&field-keywords=security+Fraud&rh=i%3Aaps%2Ck%3Asecurity+Fraud</a>
<a target="_blank" href="http://books.google.com.hk/books?id=-UT8QMXywl8C&printsec=frontcover&hl=zh-CN&source=gbs_ge_summary_r&cad=0#v=onepage&q&f=false">http://books.google.com.hk/books?id=-UT8QMXywl8C&printsec=frontcover&hl=zh-CN&source=gbs_ge_summary_r&cad=0#v=onepage&q&f=false</a>
<a target="_blank" href="http://www.amazon.com/Detecting-Accounting-Fraud-Analysis-Ethics/dp/0133078604/ref=sr_1_9?ie=UTF8&qid=1391408245&sr=8-9&keywords=Fraud">http://www.amazon.com/Detecting-Accounting-Fraud-Analysis-Ethics/dp/0133078604/ref=sr_1_9?ie=UTF8&qid=1391408245&sr=8-9&keywords=Fraud</a>
<a target="_blank" href="http://www.amazon.com/s/ref=nb_sb_noss/184-1475344-8555167?url=search-alias%3Daps&field-keywords=Fraud#/ref=sr_nr_n_14?rh=n%3A283155%2Cn%3A5%2Ck%3AFraud&keywords=Fraud&ie=UTF8&qid=1391408323&rnid=1000">http://www.amazon.com/s/ref=nb_sb_noss/184-1475344-8555167?url=search-alias%3Daps&field-keywords=Fraud#/ref=sr_nr_n_14?rh=n%3A283155%2Cn%3A5%2Ck%3AFraud&keywords=Fraud&ie=UTF8&qid=1391408323&rnid=1000</a>
<a target="_blank" href="http://www.amazon.com/Identity-Theft-Fraud-Evaluating-Management/dp/0776607774/ref=sr_1_27?s=books&ie=UTF8&qid=1391663607&sr=1-27&keywords=Fraud">http://www.amazon.com/Identity-Theft-Fraud-Evaluating-Management/dp/0776607774/ref=sr_1_27?s=books&ie=UTF8&qid=1391663607&sr=1-27&keywords=Fraud</a>