Search Results - "identity theft"
Suggested Topics within your search.
Suggested Topics within your search.
- Identity theft 16
- Prevention 8
- Computer crimes 4
- Phishing 4
- Cancer 2
- Chiricahua Indians 2
- Christianity and culture 2
- Computer hackers 2
- Computer security 2
- Computers 2
- Crimes against 2
- Criminal Law 2
- Fraud 2
- History 2
- Indian slaves 2
- Indians, Treatment of 2
- Internet fraud 2
- Investigation 2
- Law 2
- Law and legislation 2
- Legal Aspects of Computing 2
- Missions 2
- Officials and employees 2
- Patients 2
- Protection 2
- Psychological aspects 2
- Psychology 2
- Technological innovations 2
- e-Commerce/e-business 2
-
1
Financial Identity Theft Context, Challenges and Countermeasures /
Published 2011Get full text
Electronic eBook -
2
Identity theft handbook detection, prevention, and security /
Published 2009Subjects: “…Identity theft United States.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
3
Financial Identity Theft Context, Challenges and Countermeasures /
Published 2011Get full text
Electronic eBook -
4
Identity theft handbook detection, prevention, and security /
Published 2009Subjects: “…Identity theft United States.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
5
Identity theft in today's world
Published 2012Table of Contents: “…The identity equation -- The identity theft equation -- The universal script -- A matter of perspective -- The life and times of IDT -- Around the beginning -- Somewhere in the middle -- Just below the surface -- The end for now -- Don't be a victim -- Don't panic.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
6
Identity theft in today's world
Published 2012Table of Contents: “…The identity equation -- The identity theft equation -- The universal script -- A matter of perspective -- The life and times of IDT -- Around the beginning -- Somewhere in the middle -- Just below the surface -- The end for now -- Don't be a victim -- Don't panic.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
7
Phishing dark waters : the offensive and defensive sides of malicious e-mails /
Published 2015Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
8
Phishing dark waters : the offensive and defensive sides of malicious e-mails /
Published 2015Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
9
Preventing identity theft in your business how to protect your business, customers, and employees /
Published 2005Table of Contents: “…What is an "identity"? -- Identity theft: effects on victims -- Identity crime is entrenched -- Identity crimes are escalating -- Legal requirements for business -- Caveat lector. let the reader beware -- Your business identities -- Tighten your business borders -- Securing the people front: the security job analysis -- The people front: recruitment for security -- The people front: personnel selection for security -- The people front: select for motivation -- The people front: select for integrity and security -- The people front: select for interpersonal skills -- Socialization, company culture, and the realistic job preview -- The security orientation program: socializing newcomers to the honest company culture -- The people front: appraisal and feedback for performance and security -- The process front: secure business information processes -- The property front: the e-business web site -- The customer security program -- E-commerce "best practices" for customers -- The legislative process -- HIPAA: security for health care companies.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
10
Preventing identity theft in your business how to protect your business, customers, and employees /
Published 2005Table of Contents: “…What is an "identity"? -- Identity theft: effects on victims -- Identity crime is entrenched -- Identity crimes are escalating -- Legal requirements for business -- Caveat lector. let the reader beware -- Your business identities -- Tighten your business borders -- Securing the people front: the security job analysis -- The people front: recruitment for security -- The people front: personnel selection for security -- The people front: select for motivation -- The people front: select for integrity and security -- The people front: select for interpersonal skills -- Socialization, company culture, and the realistic job preview -- The security orientation program: socializing newcomers to the honest company culture -- The people front: appraisal and feedback for performance and security -- The process front: secure business information processes -- The property front: the e-business web site -- The customer security program -- E-commerce "best practices" for customers -- The legislative process -- HIPAA: security for health care companies.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
11
Phishing exposed
Published 2005Subjects: “…Identity theft.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
12
Personal identifiable information and data breaches
Published 2009Subjects: “…Identity theft United States Prevention.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
13
Personal identifiable information and data breaches
Published 2009Subjects: “…Identity theft United States Prevention.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
14
Phishing exposed
Published 2005Subjects: “…Identity theft.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
15
Identity thieves motives and methods /
Published 2012Subjects: “…Identity theft United States.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
16
Identity thieves motives and methods /
Published 2012Subjects: “…Identity theft United States.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
17
Robbery and redemption cancer as identity theft /
Published 2012An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
18
Robbery and redemption cancer as identity theft /
Published 2012An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
19
Stealing the network how to own an identity /
Published 2005Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
20
Stealing the network how to own an identity /
Published 2005Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook