02675nam 22005414a 450 991014340690332120170809162050.01-119-20191-81-280-34986-797866103498690-471-92812-7(CKB)1000000000354836(EBL)252657(OCoLC)70078535(SSID)ssj0000183289(PQKBManifestationID)12037363(PQKBTitleCode)TC0000183289(PQKBWorkID)10195959(PQKB)11637448(MiAaPQ)EBC252657(EXLCZ)99100000000035483620051102d2006 uy 0engur|n|---|||||txtccrInvestigating identity theft[electronic resource] a guide for businesses, law enforcement, and victims /Judith M. CollinsHoboken, N.J. John Wileyc20061 online resource (271 p.)Description based upon print version of record.0-471-75724-1 Includes bibliographical references (p. 249-250) and index."Real world" cases: solved and unsolved -- Know the crime and understand the criminal -- Computer security for identity fraud investigations -- Configuring the computer and introduction to cyber-searching -- Understand the victim: then prepare for the investigation -- Authenticate, then investigate -- Identity fraud investigation: a case example -- A walk through the World Wide Web -- Tracing IP addresses and URLs across the WWW -- Tracing e-mail addresses -- Searching and seizing: the investigator's role.What will you do when you encounter identity theft within your business?Chances are, you have already lost money to identity theft and business fraud. Look no further than the latest newspaper headlines to know that it is an epidemic problem and an alarming reality from which no business-whether small or large-is immune.Although you can't completely stop identity theft from happening, you can be prepared when it takes place. Investigating Identity Theft: A Guide for Businesses, Law Enforcement, and Victims is your practical guide for fully understanding and investigating identiIdentity theftUnited StatesElectronic books.Identity theft363.25/963222364.163Collins Judith M865712MiAaPQMiAaPQMiAaPQBOOK9910143406903321Investigating identity theft1935439UNINA