Investigating identity theft [[electronic resource] ] : a guide for businesses, law enforcement, and victims / / Judith M. Collins |
Autore | Collins Judith M |
Pubbl/distr/stampa | Hoboken, N.J., : John Wiley, c2006 |
Descrizione fisica | 1 online resource (271 p.) |
Disciplina |
363.25/963222
364.163 |
Soggetto topico | Identity theft - United States |
Soggetto genere / forma | Electronic books. |
ISBN |
1-119-20191-8
1-280-34986-7 9786610349869 0-471-92812-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | "Real world" cases: solved and unsolved -- Know the crime and understand the criminal -- Computer security for identity fraud investigations -- Configuring the computer and introduction to cyber-searching -- Understand the victim: then prepare for the investigation -- Authenticate, then investigate -- Identity fraud investigation: a case example -- A walk through the World Wide Web -- Tracing IP addresses and URLs across the WWW -- Tracing e-mail addresses -- Searching and seizing: the investigator's role. |
Record Nr. | UNINA-9910143406903321 |
Collins Judith M | ||
Hoboken, N.J., : John Wiley, c2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Investigating identity theft [[electronic resource] ] : a guide for businesses, law enforcement, and victims / / Judith M. Collins |
Autore | Collins Judith M |
Pubbl/distr/stampa | Hoboken, N.J., : John Wiley, c2006 |
Descrizione fisica | 1 online resource (271 p.) |
Disciplina |
363.25/963222
364.163 |
Soggetto topico | Identity theft - United States |
ISBN |
1-119-20191-8
1-280-34986-7 9786610349869 0-471-92812-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | "Real world" cases: solved and unsolved -- Know the crime and understand the criminal -- Computer security for identity fraud investigations -- Configuring the computer and introduction to cyber-searching -- Understand the victim: then prepare for the investigation -- Authenticate, then investigate -- Identity fraud investigation: a case example -- A walk through the World Wide Web -- Tracing IP addresses and URLs across the WWW -- Tracing e-mail addresses -- Searching and seizing: the investigator's role. |
Record Nr. | UNINA-9910831196303321 |
Collins Judith M | ||
Hoboken, N.J., : John Wiley, c2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Investigating identity theft [[electronic resource] ] : a guide for businesses, law enforcement, and victims / / Judith M. Collins |
Autore | Collins Judith M |
Pubbl/distr/stampa | Hoboken, N.J., : John Wiley, c2006 |
Descrizione fisica | 1 online resource (271 p.) |
Disciplina |
363.25/963222
364.163 |
Soggetto topico | Identity theft - United States |
ISBN |
1-119-20191-8
1-280-34986-7 9786610349869 0-471-92812-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | "Real world" cases: solved and unsolved -- Know the crime and understand the criminal -- Computer security for identity fraud investigations -- Configuring the computer and introduction to cyber-searching -- Understand the victim: then prepare for the investigation -- Authenticate, then investigate -- Identity fraud investigation: a case example -- A walk through the World Wide Web -- Tracing IP addresses and URLs across the WWW -- Tracing e-mail addresses -- Searching and seizing: the investigator's role. |
Record Nr. | UNINA-9910878099603321 |
Collins Judith M | ||
Hoboken, N.J., : John Wiley, c2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Preventing identity theft in your business [[electronic resource] ] : how to protect your business, customers, and employees / / Judith M. Collins |
Autore | Collins Judith M |
Edizione | [1st edition] |
Pubbl/distr/stampa | Hoboken, N.J., : Wiley, c2005 |
Descrizione fisica | 1 online resource (257 p.) |
Disciplina | 658.4/72 |
Soggetto topico | Identity theft - United States - Prevention |
Soggetto genere / forma | Electronic books. |
ISBN |
1-280-25503-X
9786610255030 0-471-72132-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | What is an "identity"? -- Identity theft: effects on victims -- Identity crime is entrenched -- Identity crimes are escalating -- Legal requirements for business -- Caveat lector. let the reader beware -- Your business identities -- Tighten your business borders -- Securing the people front: the security job analysis -- The people front: recruitment for security -- The people front: personnel selection for security -- The people front: select for motivation -- The people front: select for integrity and security -- The people front: select for interpersonal skills -- Socialization, company culture, and the realistic job preview -- The security orientation program: socializing newcomers to the honest company culture -- The people front: appraisal and feedback for performance and security -- The process front: secure business information processes -- The property front: the e-business web site -- The customer security program -- E-commerce "best practices" for customers -- The legislative process -- HIPAA: security for health care companies. |
Record Nr. | UNINA-9910449899103321 |
Collins Judith M | ||
Hoboken, N.J., : Wiley, c2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Preventing identity theft in your business [[electronic resource] ] : how to protect your business, customers, and employees / / Judith M. Collins |
Autore | Collins Judith M |
Edizione | [1st edition] |
Pubbl/distr/stampa | Hoboken, N.J., : Wiley, c2005 |
Descrizione fisica | 1 online resource (257 p.) |
Disciplina | 658.4/72 |
Soggetto topico | Identity theft - United States - Prevention |
ISBN |
1-119-37318-2
1-280-25503-X 9786610255030 0-471-72132-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | What is an "identity"? -- Identity theft: effects on victims -- Identity crime is entrenched -- Identity crimes are escalating -- Legal requirements for business -- Caveat lector. let the reader beware -- Your business identities -- Tighten your business borders -- Securing the people front: the security job analysis -- The people front: recruitment for security -- The people front: personnel selection for security -- The people front: select for motivation -- The people front: select for integrity and security -- The people front: select for interpersonal skills -- Socialization, company culture, and the realistic job preview -- The security orientation program: socializing newcomers to the honest company culture -- The people front: appraisal and feedback for performance and security -- The process front: secure business information processes -- The property front: the e-business web site -- The customer security program -- E-commerce "best practices" for customers -- The legislative process -- HIPAA: security for health care companies. |
Record Nr. | UNINA-9910783517203321 |
Collins Judith M | ||
Hoboken, N.J., : Wiley, c2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Preventing identity theft in your business : how to protect your business, customers, and employees / / Judith M. Collins |
Autore | Collins Judith M |
Edizione | [1st edition] |
Pubbl/distr/stampa | Hoboken, N.J., : Wiley, c2005 |
Descrizione fisica | 1 online resource (257 p.) |
Disciplina | 658.4/72 |
Soggetto topico | Identity theft - United States - Prevention |
ISBN |
1-119-37318-2
1-280-25503-X 9786610255030 0-471-72132-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | What is an "identity"? -- Identity theft: effects on victims -- Identity crime is entrenched -- Identity crimes are escalating -- Legal requirements for business -- Caveat lector. let the reader beware -- Your business identities -- Tighten your business borders -- Securing the people front: the security job analysis -- The people front: recruitment for security -- The people front: personnel selection for security -- The people front: select for motivation -- The people front: select for integrity and security -- The people front: select for interpersonal skills -- Socialization, company culture, and the realistic job preview -- The security orientation program: socializing newcomers to the honest company culture -- The people front: appraisal and feedback for performance and security -- The process front: secure business information processes -- The property front: the e-business web site -- The customer security program -- E-commerce "best practices" for customers -- The legislative process -- HIPAA: security for health care companies. |
Record Nr. | UNINA-9910811798003321 |
Collins Judith M | ||
Hoboken, N.J., : Wiley, c2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|