Search Results - "identity theft"

Refine Results
  1. 21

    Salvation through slavery Chiricahua Apaches and priests on the Spanish colonial frontier / by Stockel, H. Henrietta, 1938-

    Published 2008
    Table of Contents: “…The Chiricahua Apaches -- Missions and missionaries -- Tubac, Tumacácori, Janos, and Cuba -- Salvation through slavery -- Identity theft and enslavement.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  2. 22

    Salvation through slavery Chiricahua Apaches and priests on the Spanish colonial frontier / by Stockel, H. Henrietta, 1938-

    Published 2008
    Table of Contents: “…The Chiricahua Apaches -- Missions and missionaries -- Tubac, Tumacácori, Janos, and Cuba -- Salvation through slavery -- Identity theft and enslavement.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  3. 23

    Computer forensics an essential guide for accountants, lawyers, and managers / by Sheetz, Michael

    Published 2007
    Table of Contents: “…-- Output -- Conclusion -- Preservation and collection of digital evidence -- Introduction -- Rules of evidence -- Preservation -- Collection -- Conclusion -- Analysis of digital evidence -- Introduction -- Forensic analysis -- Conclusion -- Reporting and rendering the opinion -- Introduction -- Preparing the report -- Presentation -- The trial process -- Conclusion -- Computer attacks -- Hackers and phreakz oh my -- The hacker: unauthorized use and trespassing -- Wireless hacking -- Malware -- Attacks from the inside -- Conclusion -- Computers as tools for evil -- Introduction -- Computers and crime -- Identity theft -- Concealment -- Auction fraud and retail cons -- Counterfeiting and forgery -- Prostitution -- Securities fraud -- Conclusion -- Computer tools and the forensic examination -- Introduction -- Assuming control of the case -- Understand the case -- Evaluate the evidence -- Examining the ?…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  4. 24

    Computer forensics an essential guide for accountants, lawyers, and managers / by Sheetz, Michael

    Published 2007
    Table of Contents: “…-- Output -- Conclusion -- Preservation and collection of digital evidence -- Introduction -- Rules of evidence -- Preservation -- Collection -- Conclusion -- Analysis of digital evidence -- Introduction -- Forensic analysis -- Conclusion -- Reporting and rendering the opinion -- Introduction -- Preparing the report -- Presentation -- The trial process -- Conclusion -- Computer attacks -- Hackers and phreakz oh my -- The hacker: unauthorized use and trespassing -- Wireless hacking -- Malware -- Attacks from the inside -- Conclusion -- Computers as tools for evil -- Introduction -- Computers and crime -- Identity theft -- Concealment -- Auction fraud and retail cons -- Counterfeiting and forgery -- Prostitution -- Securities fraud -- Conclusion -- Computer tools and the forensic examination -- Introduction -- Assuming control of the case -- Understand the case -- Evaluate the evidence -- Examining the ?…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook