Preventing identity theft in your business how to protect your business, customers, and employees /
Збережено в:
| Автор: | |
|---|---|
| Співавтор: | |
| Формат: | Електронний ресурс eКнига |
| Мова: | Англійська |
| Опубліковано: |
Hoboken, N.J. :
Wiley,
c2005.
|
| Предмети: | |
| Онлайн доступ: | An electronic book accessible through the World Wide Web; click to view |
| Теги: |
Додати тег
Немає тегів, Будьте першим, хто поставить тег для цього запису!
|
MARC
| LEADER | 00000nam a22000004a 4500 | ||
|---|---|---|---|
| 001 | 0000082844 | ||
| 005 | 20171002054147.0 | ||
| 006 | m u | ||
| 007 | cr cn||||||||| | ||
| 008 | 040921s2005 nju sb 001 0 eng | ||
| 010 | |z 2004022093 | ||
| 020 | |z 047169469X (cloth) | ||
| 035 | |a (CaPaEBR)ebr10114184 | ||
| 035 | |a (OCoLC)559961860 | ||
| 040 | |a CaPaEBR |c CaPaEBR | ||
| 043 | |a n-us--- | ||
| 050 | 1 | 4 | |a HV6679 |b .C653 2005eb |
| 082 | 0 | 4 | |a 658.4/72 |2 22 |
| 100 | 1 | |a Collins, Judith M. | |
| 245 | 1 | 0 | |a Preventing identity theft in your business |h [electronic resource] : |b how to protect your business, customers, and employees / |c Judith M. Collins. |
| 260 | |a Hoboken, N.J. : |b Wiley, |c c2005. | ||
| 300 | |a x, 245 p. | ||
| 504 | |a Includes bibliographical references and index. | ||
| 505 | 0 | |a What is an "identity"? -- Identity theft: effects on victims -- Identity crime is entrenched -- Identity crimes are escalating -- Legal requirements for business -- Caveat lector. let the reader beware -- Your business identities -- Tighten your business borders -- Securing the people front: the security job analysis -- The people front: recruitment for security -- The people front: personnel selection for security -- The people front: select for motivation -- The people front: select for integrity and security -- The people front: select for interpersonal skills -- Socialization, company culture, and the realistic job preview -- The security orientation program: socializing newcomers to the honest company culture -- The people front: appraisal and feedback for performance and security -- The process front: secure business information processes -- The property front: the e-business web site -- The customer security program -- E-commerce "best practices" for customers -- The legislative process -- HIPAA: security for health care companies. | |
| 533 | |a Electronic reproduction. |b Palo Alto, Calif. : |c ebrary, |d 2013. |n Available via World Wide Web. |n Access may be limited to ebrary affiliated libraries. | ||
| 650 | 0 | |a Identity theft |z United States |x Prevention. | |
| 655 | 7 | |a Electronic books. |2 local | |
| 710 | 2 | |a ebrary, Inc. | |
| 856 | 4 | 0 | |u http://site.ebrary.com/lib/daystar/Doc?id=10114184 |z An electronic book accessible through the World Wide Web; click to view |
| 908 | |a 170314 | ||
| 942 | 0 | 0 | |c EB |
| 999 | |c 72002 |d 72002 | ||