Search Results - "identity theft"

Refine Results
  1. 1

    Financial Identity Theft Context, Challenges and Countermeasures / by van der Meulen, Nicole S.

    Published 2011
    Get full text
    Electronic eBook
  2. 2

    Identity theft handbook detection, prevention, and security / by Biegelman, Martin T.

    Published 2009
    Subjects: “…Identity theft United States.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  3. 3

    Financial Identity Theft Context, Challenges and Countermeasures / by van der Meulen, Nicole S.

    Published 2011
    Get full text
    Electronic eBook
  4. 4

    Identity theft handbook detection, prevention, and security / by Biegelman, Martin T.

    Published 2009
    Subjects: “…Identity theft United States.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  5. 5

    Identity theft in today's world by McNally, Megan M.

    Published 2012
    Table of Contents: “…The identity equation -- The identity theft equation -- The universal script -- A matter of perspective -- The life and times of IDT -- Around the beginning -- Somewhere in the middle -- Just below the surface -- The end for now -- Don't be a victim -- Don't panic.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  6. 6

    Identity theft in today's world by McNally, Megan M.

    Published 2012
    Table of Contents: “…The identity equation -- The identity theft equation -- The universal script -- A matter of perspective -- The life and times of IDT -- Around the beginning -- Somewhere in the middle -- Just below the surface -- The end for now -- Don't be a victim -- Don't panic.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  7. 7
  8. 8
  9. 9

    Preventing identity theft in your business how to protect your business, customers, and employees / by Collins, Judith M.

    Published 2005
    Table of Contents: “…What is an "identity"? -- Identity theft: effects on victims -- Identity crime is entrenched -- Identity crimes are escalating -- Legal requirements for business -- Caveat lector. let the reader beware -- Your business identities -- Tighten your business borders -- Securing the people front: the security job analysis -- The people front: recruitment for security -- The people front: personnel selection for security -- The people front: select for motivation -- The people front: select for integrity and security -- The people front: select for interpersonal skills -- Socialization, company culture, and the realistic job preview -- The security orientation program: socializing newcomers to the honest company culture -- The people front: appraisal and feedback for performance and security -- The process front: secure business information processes -- The property front: the e-business web site -- The customer security program -- E-commerce "best practices" for customers -- The legislative process -- HIPAA: security for health care companies.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  10. 10

    Preventing identity theft in your business how to protect your business, customers, and employees / by Collins, Judith M.

    Published 2005
    Table of Contents: “…What is an "identity"? -- Identity theft: effects on victims -- Identity crime is entrenched -- Identity crimes are escalating -- Legal requirements for business -- Caveat lector. let the reader beware -- Your business identities -- Tighten your business borders -- Securing the people front: the security job analysis -- The people front: recruitment for security -- The people front: personnel selection for security -- The people front: select for motivation -- The people front: select for integrity and security -- The people front: select for interpersonal skills -- Socialization, company culture, and the realistic job preview -- The security orientation program: socializing newcomers to the honest company culture -- The people front: appraisal and feedback for performance and security -- The process front: secure business information processes -- The property front: the e-business web site -- The customer security program -- E-commerce "best practices" for customers -- The legislative process -- HIPAA: security for health care companies.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  11. 11

    Phishing exposed by James, Lance

    Published 2005
    Subjects: “…Identity theft.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  12. 12

    Personal identifiable information and data breaches

    Published 2009
    Subjects: “…Identity theft United States Prevention.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  13. 13

    Personal identifiable information and data breaches

    Published 2009
    Subjects: “…Identity theft United States Prevention.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  14. 14

    Phishing exposed by James, Lance

    Published 2005
    Subjects: “…Identity theft.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  15. 15

    Identity thieves motives and methods / by Copes, Heith

    Published 2012
    Subjects: “…Identity theft United States.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  16. 16

    Identity thieves motives and methods / by Copes, Heith

    Published 2012
    Subjects: “…Identity theft United States.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  17. 17
  18. 18
  19. 19

    Stealing the network how to own an identity /

    Published 2005
    Subjects:
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  20. 20

    Stealing the network how to own an identity /

    Published 2005
    Subjects:
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook