02642nam 22005294a 450 991083119630332120230828203251.01-119-20191-81-280-34986-797866103498690-471-92812-7(CKB)1000000000354836(EBL)252657(OCoLC)70078535(SSID)ssj0000183289(PQKBManifestationID)12037363(PQKBTitleCode)TC0000183289(PQKBWorkID)10195959(PQKB)11637448(MiAaPQ)EBC252657(EXLCZ)99100000000035483620051102d2006 uy 0engur|n|---|||||txtccrInvestigating identity theft[electronic resource] a guide for businesses, law enforcement, and victims /Judith M. CollinsHoboken, N.J. John Wileyc20061 online resource (271 p.)Description based upon print version of record.0-471-75724-1 Includes bibliographical references (p. 249-250) and index."Real world" cases: solved and unsolved -- Know the crime and understand the criminal -- Computer security for identity fraud investigations -- Configuring the computer and introduction to cyber-searching -- Understand the victim: then prepare for the investigation -- Authenticate, then investigate -- Identity fraud investigation: a case example -- A walk through the World Wide Web -- Tracing IP addresses and URLs across the WWW -- Tracing e-mail addresses -- Searching and seizing: the investigator's role.What will you do when you encounter identity theft within your business?Chances are, you have already lost money to identity theft and business fraud. Look no further than the latest newspaper headlines to know that it is an epidemic problem and an alarming reality from which no business-whether small or large-is immune.Although you can't completely stop identity theft from happening, you can be prepared when it takes place. Investigating Identity Theft: A Guide for Businesses, Law Enforcement, and Victims is your practical guide for fully understanding and investigating identiIdentity theftUnited StatesIdentity theft363.25/963222364.163Collins Judith M1608048MiAaPQMiAaPQMiAaPQBOOK9910831196303321Investigating identity theft3934593UNINA