Search Results - "identity theft"
Suggested Topics within your search.
Suggested Topics within your search.
- Identity theft 16
- Prevention 8
- Computer crimes 4
- Phishing 4
- Cancer 2
- Chiricahua Indians 2
- Christianity and culture 2
- Computer hackers 2
- Computer security 2
- Computers 2
- Crimes against 2
- Criminal Law 2
- Fraud 2
- History 2
- Indian slaves 2
- Indians, Treatment of 2
- Internet fraud 2
- Investigation 2
- Law 2
- Law and legislation 2
- Legal Aspects of Computing 2
- Missions 2
- Officials and employees 2
- Patients 2
- Protection 2
- Psychological aspects 2
- Psychology 2
- Technological innovations 2
- e-Commerce/e-business 2
-
21
Salvation through slavery Chiricahua Apaches and priests on the Spanish colonial frontier /
Published 2008Table of Contents: “…The Chiricahua Apaches -- Missions and missionaries -- Tubac, Tumacácori, Janos, and Cuba -- Salvation through slavery -- Identity theft and enslavement.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
22
Salvation through slavery Chiricahua Apaches and priests on the Spanish colonial frontier /
Published 2008Table of Contents: “…The Chiricahua Apaches -- Missions and missionaries -- Tubac, Tumacácori, Janos, and Cuba -- Salvation through slavery -- Identity theft and enslavement.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
23
Computer forensics an essential guide for accountants, lawyers, and managers /
Published 2007Table of Contents: “…-- Output -- Conclusion -- Preservation and collection of digital evidence -- Introduction -- Rules of evidence -- Preservation -- Collection -- Conclusion -- Analysis of digital evidence -- Introduction -- Forensic analysis -- Conclusion -- Reporting and rendering the opinion -- Introduction -- Preparing the report -- Presentation -- The trial process -- Conclusion -- Computer attacks -- Hackers and phreakz oh my -- The hacker: unauthorized use and trespassing -- Wireless hacking -- Malware -- Attacks from the inside -- Conclusion -- Computers as tools for evil -- Introduction -- Computers and crime -- Identity theft -- Concealment -- Auction fraud and retail cons -- Counterfeiting and forgery -- Prostitution -- Securities fraud -- Conclusion -- Computer tools and the forensic examination -- Introduction -- Assuming control of the case -- Understand the case -- Evaluate the evidence -- Examining the ?…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
24
Computer forensics an essential guide for accountants, lawyers, and managers /
Published 2007Table of Contents: “…-- Output -- Conclusion -- Preservation and collection of digital evidence -- Introduction -- Rules of evidence -- Preservation -- Collection -- Conclusion -- Analysis of digital evidence -- Introduction -- Forensic analysis -- Conclusion -- Reporting and rendering the opinion -- Introduction -- Preparing the report -- Presentation -- The trial process -- Conclusion -- Computer attacks -- Hackers and phreakz oh my -- The hacker: unauthorized use and trespassing -- Wireless hacking -- Malware -- Attacks from the inside -- Conclusion -- Computers as tools for evil -- Introduction -- Computers and crime -- Identity theft -- Concealment -- Auction fraud and retail cons -- Counterfeiting and forgery -- Prostitution -- Securities fraud -- Conclusion -- Computer tools and the forensic examination -- Introduction -- Assuming control of the case -- Understand the case -- Evaluate the evidence -- Examining the ?…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook