2015 tax filing season and general operations at the Internal Revenue Service : hearing before the Subcommittee on Oversight of the Committee on Ways and Means, U.S. House of Representatives, One Hundred Fourteenth Congress, first session, April 22, 2015
| 2015 tax filing season and general operations at the Internal Revenue Service : hearing before the Subcommittee on Oversight of the Committee on Ways and Means, U.S. House of Representatives, One Hundred Fourteenth Congress, first session, April 22, 2015 |
| Pubbl/distr/stampa | Washington : , : U.S. Government Publishing Office, , 2016 |
| Descrizione fisica | 1 online resource (iii, 125 pages) : illustrations |
| Soggetto topico |
Identity theft - United States - Prevention
Tax returns - United States Taxpayer compliance - United States Tax administration and procedure - United States Identity theft - Prevention Tax administration and procedure Tax returns Taxpayer compliance |
| Soggetto genere / forma |
Legislative hearings.
Rules. |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | 2015 tax filing season and general operations at the Internal Revenue Service |
| Record Nr. | UNINA-9910707745103321 |
| Washington : , : U.S. Government Publishing Office, , 2016 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
2017 tax filing season : hearing before the Subcommittee on Oversight of the Committee on Ways and Means, U.S. House of Representatives, One Hundred Fifteenth Congress, first session, April 26, 2017
| 2017 tax filing season : hearing before the Subcommittee on Oversight of the Committee on Ways and Means, U.S. House of Representatives, One Hundred Fifteenth Congress, first session, April 26, 2017 |
| Pubbl/distr/stampa | Washington : , : U.S. Government Publishing Office, , 2019 |
| Descrizione fisica | 1 online resource (iii, 137 pages) : illustrations |
| Soggetto topico |
Tax administration and procedure - United States
Taxpayer compliance - United States Identity theft - United States - Prevention Fraud - United States - Prevention Fraud - Prevention Identity theft - Prevention Tax administration and procedure Taxpayer compliance |
| Soggetto genere / forma |
Legislative hearings.
Rules. |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | 2017 tax filing season |
| Record Nr. | UNINA-9910711936303321 |
| Washington : , : U.S. Government Publishing Office, , 2019 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Evite el robo de identidad [[electronic resource] ] : defiéndase contra el robo de identidad
| Evite el robo de identidad [[electronic resource] ] : defiéndase contra el robo de identidad |
| Pubbl/distr/stampa | Washington, DC : , : Comisión Federal de Comercio, , [2006] |
| Descrizione fisica | 1 folded sheet (6 pages) : digital, PDF file |
| Soggetto topico | Identity theft - Prevention |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | spa |
| Altri titoli varianti | Evite el robo de identidad |
| Record Nr. | UNINA-9910695452903321 |
| Washington, DC : , : Comisión Federal de Comercio, , [2006] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Getting it right on data security and breach notification legislation in the 114th Congress : hearing before the Subcommittee on Consumer Protection, Product Safety, Insurance, and Data Security of the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Fourteenth Congress, first session, February 5, 2015
| Getting it right on data security and breach notification legislation in the 114th Congress : hearing before the Subcommittee on Consumer Protection, Product Safety, Insurance, and Data Security of the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Fourteenth Congress, first session, February 5, 2015 |
| Pubbl/distr/stampa | Washington : , : U.S. Government Publishing Office, , 2015 |
| Descrizione fisica | 1 online resource (iii, 75 pages) : illustrations |
| Collana | S. hrg. |
| Soggetto topico |
Data protection - Standards - United States
Privacy, Right of - Government policy - United States Electronic records - Law and legislation - United States Identity theft - United States - Prevention Hackers - United States Data protection - Law and legislation - United States Data protection - Law and legislation Data protection - Standards Electronic records - Law and legislation Hackers Identity theft - Prevention Privacy, Right of - Government policy |
| Soggetto genere / forma | Legislative hearings. |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | Getting It Right on Data Security and Breach Notification Legislation in the 114th Congress |
| Record Nr. | UNINA-9910708156703321 |
| Washington : , : U.S. Government Publishing Office, , 2015 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
H.R. 2221, the Data Accountability and Protection Act, and H.R. 1319, the Informed P2P User Act [[electronic resource] ] : hearing before the Subcommittee on Commerce, Trade, and Consumer Protection of the Committee on Energy and Commerce, House of Representatives, One Hundred Eleventh Congress, first session, May 5, 2009
| H.R. 2221, the Data Accountability and Protection Act, and H.R. 1319, the Informed P2P User Act [[electronic resource] ] : hearing before the Subcommittee on Commerce, Trade, and Consumer Protection of the Committee on Energy and Commerce, House of Representatives, One Hundred Eleventh Congress, first session, May 5, 2009 |
| Pubbl/distr/stampa | Washington : , : U.S. G.P.O., , 2012 |
| Descrizione fisica | 1 online resource (v, 170 pages) |
| Soggetto topico |
Data protection - Law and legislation - United States
Identity theft - United States - Prevention Peer-to-peer architecture (Computer networks) - Law and legislation - United States Computer security - Law and legislation - United States Computer security - Law and legislation Data protection - Law and legislation Identity theft - Prevention Peer-to-peer architecture (Computer networks) - Law and legislation |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | H.R. 2221, the Data Accountability and Protection Act, and H.R. 1319, the Informed P2P User Act |
| Record Nr. | UNINA-9910701812103321 |
| Washington : , : U.S. G.P.O., , 2012 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Hablemos sobre el robo de identidad [[electronic resource] ] : una guía
| Hablemos sobre el robo de identidad [[electronic resource] ] : una guía |
| Pubbl/distr/stampa | [Washington, D.C.] : , : [Federal Trade Commission], , [2006?] |
| Descrizione fisica | 52 pages : digital, PDF file |
| Soggetto topico | Identity theft - Prevention |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | spa |
| Altri titoli varianti | Hablemos sobre el robo de identidad |
| Record Nr. | UNINA-9910696169303321 |
| [Washington, D.C.] : , : [Federal Trade Commission], , [2006?] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Identity theft in today's world [[electronic resource] /] / Megan McNally
| Identity theft in today's world [[electronic resource] /] / Megan McNally |
| Autore | McNally Megan M |
| Pubbl/distr/stampa | Santa Barbara, Calif., : Praeger, c2012 |
| Descrizione fisica | 1 online resource (229 p.) |
| Disciplina | 364.16/33 |
| Collana | Global crime and justice |
| Soggetto topico |
Identity theft
Identity theft - Prevention |
| Soggetto genere / forma | Electronic books. |
| ISBN |
1-283-36457-3
9786613364579 0-313-37589-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | The identity equation -- The identity theft equation -- The universal script -- A matter of perspective -- The life and times of IDT -- Around the beginning -- Somewhere in the middle -- Just below the surface -- The end for now -- Don't be a victim -- Don't panic. |
| Record Nr. | UNINA-9910458032303321 |
McNally Megan M
|
||
| Santa Barbara, Calif., : Praeger, c2012 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Identity theft: a recovery plan / / Federal Trade Commission
| Identity theft: a recovery plan / / Federal Trade Commission |
| Pubbl/distr/stampa | [Washington, D.C.] : , : Federal Trade Commission, , 2016 |
| Descrizione fisica | 1 online resource (30 pages) |
| Soggetto topico |
Identity theft - United States - Prevention
Identity theft - Economic aspects Victims of crimes - Services for - United States Identity theft - Prevention Fraud - Economic aspects |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | Identity theft |
| Record Nr. | UNINA-9910707738703321 |
| [Washington, D.C.] : , : Federal Trade Commission, , 2016 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Medical identity theft & Medicare fraud [[electronic resource]]
| Medical identity theft & Medicare fraud [[electronic resource]] |
| Pubbl/distr/stampa | [Washington, DC] : , : U.S. Dept. of Health and Health Services, Office of Inspector General, , [2010?] |
| Descrizione fisica | 1 online resource 2 unnumbered pages : color illustrations |
| Soggetto topico |
Medicare fraud - Prevention
Identity theft - Prevention |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910700176503321 |
| [Washington, DC] : , : U.S. Dept. of Health and Health Services, Office of Inspector General, , [2010?] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Phishing and countermeasures [[electronic resource] ] : understanding the increasing problem of electronic identity theft / / edited by Markus Jakobsson, Steven Myers
| Phishing and countermeasures [[electronic resource] ] : understanding the increasing problem of electronic identity theft / / edited by Markus Jakobsson, Steven Myers |
| Pubbl/distr/stampa | Hoboken, N.J., : Wiley-Interscience, c2007 |
| Descrizione fisica | 1 online resource (730 p.) |
| Disciplina |
005.9
364.163 |
| Altri autori (Persone) |
JakobssonMarkus
MyersSteven <1975-> |
| Soggetto topico |
Phishing
Identity theft - Prevention Computer security |
| Soggetto genere / forma | Electronic books. |
| ISBN |
1-280-82196-5
9786610821969 0-470-08610-6 0-470-08609-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Phishing and Countermeasures; CONTENTS; Preface; Acknowledgements; 1 Introduction to Phishing; 1.1 What is Phishing?; 1.2 A Brief History of Phishing; 1.3 The Costs to Society of Phishing; 1.4 A Typical Phishing Attack; 1.4.1 Phishing Example: America's Credit Unions; 1.4.2 Phishing Example: PayPal; 1.4.3 Making the Lure Convincing; 1.4.4 Setting The Hook; 1.4.5 Making the Hook Convincing; 1.4.6 The Catch; 1.4.7 Take-Down and Related Technologies; 1.5 Evolution of Phishing; 1.6 Case Study: Phishing on Froogle; 1.7 Protecting Users from Phishing; References
2 Phishing Attacks: Information Flow and Chokepoints2.1 Types of Phishing Attacks; 2.1.1 Deceptive Phishing; 2.1.2 Malware-Based Phishing; 2.1.3 DNS-Based Phishing ("Pharming"); 2.1.4 Content-Injection Phishing; 2.1.5 Man-in-the-Middle Phishing; 2.1.6 Search Engine Phishing; 2.2 Technology, Chokepoints, and Countermeasures; 2.2.1 Step 0: Preventing a Phishing Attack Before It Begins; 2.2.2 Step 1 : Preventing Delivery of Phishing Payload; 2.2.3 Step 2: Preventing or Disrupting a User Action; 2.2.4 Steps 2 and 4: Prevent Navigation and Data Compromise 2.2.5 Step 3: Preventing Transmission of the Prompt2.2.6 Step 4: Preventing Transmission of Confidential Information; 2.2.7 Steps 4 and 6: Preventing Data Entry and Rendering It Useless; 2.2.8 Step 5: Tracing Transmission of Compromised Credentials; 2.2.9 Step 6: Interfering with the Use of Compromised Information; 2.2.10 Step 7: Interfering with the Financial Benefit; References; 3 Spoofing and Countermeasures; 3.1 Email Spoofing; 3.1.1 Filtering; 3.1.2 Whitelisting and Greylisting; 3.1.3 Anti-spam Proposals; 3.1.4 User Education; 3.2 IP Spoofing; 3.2.1 IP Traceback 3.2.2 IP Spoofing Prevention3.2.3 Intradomain Spoofing; 3.3 Homograph Attacks Using Unicode; 3.3.1 Homograph Attacks; 3.3.2 Similar Unicode String Generation; 3.3.3 Methodology of Homograph Attack Detection; 3.4 Simulated Browser Attack; 3.4.1 Using the Illusion; 3.4.2 Web Spoofing; 3.4.3 SSL and Web Spoofing; 3.4.4 Ensnaring the User; 3.4.5 SpoofGuard Versus the Simulated Browser Attack; 3.5 Case Study: Warning the User About Active Web Spoofing; References; 4 Pharming and Client Side Attacks; 4.1 Malware; 4.1.1 Viruses and Worms; 4.1.2 Spyware; 4.1.3 Adware; 4.1.4 Browser Hijackers 4.1.5 Keyloggers4.1.6 Trojan Horses; 4.1.7 Rootkits; 4.1.8 Session Hijackers; 4.2 Malware Defense Strategies; 4.2.1 Defense Against Worms and Viruses; 4.2.2 Defense Against Spyware and Keyloggers; 4.2.3 Defense Against Rootkits; 4.3 Pharming; 4.3.1 Overview of DNS; 4.3.2 Role of DNS in Pharming; 4.3.3 Defense Against Pharming; 4.4 Case Study: Pharming with Appliances; 4.4.1 A Different Phishing Strategy; 4.4.2 The Spoof: A Home Pharming Appliance; 4.4.3 Sustainability of Distribution in the Online Marketplace; 4.4.4 Countermeasures; 4.5 Case Study: Race-Pharming; 4.5.1 Technical Description 4.5.2 Detection and Countermeasures |
| Record Nr. | UNINA-9910143417103321 |
| Hoboken, N.J., : Wiley-Interscience, c2007 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||