Hack proofing your identity in the information age: protect your family on the internet!
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, MA
Syngress
©2002
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Includes index Identity theft : are you at risk? -- Protecting your hard drive -- Keeping your e-mail private -- Self defense on the web -- Connecting to the Internet safely -- Are your kids putting you at risk? -- If you become a victim -- Configuring your browser and firewall Identity-theft is the fastest growing crime in America, affecting approximately 900,000 new victims each year. Protect your assets and personal information online with this comprehensive guide. Hack Proofing Your Identity will provide readers with hands-on instruction for how to secure their personal information on multiple devices. It will include simple measures as well as advanced techniques gleaned from experts in the field who have years of experience with identity theft and fraud. This book will also provide readers with instruction for identifying cyber-crime and the different ways they can report it if it occurs. Hot Topic. Hack Proofing Your Identity will provide readers with both simple and advanced steps they can take to protect themselves from cyber-crime. Expert Advice. This book will present security measures gathered from experts in both the federal government and the private sector to help secure your personal information and assets online. Unique Coverage. Hack Proofing Your Identity will be the only book to include security measure for multiple devices like laptops, PDAs and mobile phones to allow users to protect themselves while taking advantage of the newest ways to access the Internet |
Beschreibung: | 1 Online-Ressource (xvii, 370 pages) |
ISBN: | 0080478085 1931836515 1932266259 9780080478081 9781931836517 9781932266252 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043083723 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2002 |||| o||u| ||||||eng d | ||
020 | |a 0080478085 |9 0-08-047808-5 | ||
020 | |a 1931836515 |9 1-931836-51-5 | ||
020 | |a 1932266259 |9 1-932266-25-9 | ||
020 | |a 9780080478081 |9 978-0-08-047808-1 | ||
020 | |a 9781931836517 |9 978-1-931836-51-7 | ||
020 | |a 9781932266252 |9 978-1-932266-25-2 | ||
035 | |a (OCoLC)51563339 | ||
035 | |a (DE-599)BVBBV043083723 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8 |2 21 | |
100 | 1 | |a Bidwell, Teri |e Verfasser |4 aut | |
245 | 1 | 0 | |a Hack proofing your identity in the information age |b protect your family on the internet! |c Teri Bidwell ; Michael Cross, technical editor ; Ryan Russell, technical reviewer |
264 | 1 | |a Rockland, MA |b Syngress |c ©2002 | |
300 | |a 1 Online-Ressource (xvii, 370 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
500 | |a Identity theft : are you at risk? -- Protecting your hard drive -- Keeping your e-mail private -- Self defense on the web -- Connecting to the Internet safely -- Are your kids putting you at risk? -- If you become a victim -- Configuring your browser and firewall | ||
500 | |a Identity-theft is the fastest growing crime in America, affecting approximately 900,000 new victims each year. Protect your assets and personal information online with this comprehensive guide. Hack Proofing Your Identity will provide readers with hands-on instruction for how to secure their personal information on multiple devices. It will include simple measures as well as advanced techniques gleaned from experts in the field who have years of experience with identity theft and fraud. This book will also provide readers with instruction for identifying cyber-crime and the different ways they can report it if it occurs. Hot Topic. Hack Proofing Your Identity will provide readers with both simple and advanced steps they can take to protect themselves from cyber-crime. Expert Advice. This book will present security measures gathered from experts in both the federal government and the private sector to help secure your personal information and assets online. Unique Coverage. Hack Proofing Your Identity will be the only book to include security measure for multiple devices like laptops, PDAs and mobile phones to allow users to protect themselves while taking advantage of the newest ways to access the Internet | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer crimes |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Identification cards / Forgeries |2 fast | |
650 | 7 | |a Impostors and imposture |2 fast | |
650 | 7 | |a Internet fraud |2 fast | |
650 | 4 | |a Computer security | |
650 | 4 | |a Identification cards |x Forgeries | |
650 | 4 | |a Internet fraud | |
650 | 4 | |a Computer crimes | |
650 | 4 | |a Impostors and imposture | |
700 | 1 | |a Cross, Michael |e Sonstige |4 oth | |
700 | 1 | |a Russell, Ryan |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=75917 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028507915 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=75917 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=75917 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175477928099840 |
---|---|
any_adam_object | |
author | Bidwell, Teri |
author_facet | Bidwell, Teri |
author_role | aut |
author_sort | Bidwell, Teri |
author_variant | t b tb |
building | Verbundindex |
bvnumber | BV043083723 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)51563339 (DE-599)BVBBV043083723 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03799nmm a2200589zc 4500</leader><controlfield tag="001">BV043083723</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2002 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080478085</subfield><subfield code="9">0-08-047808-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1931836515</subfield><subfield code="9">1-931836-51-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1932266259</subfield><subfield code="9">1-932266-25-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080478081</subfield><subfield code="9">978-0-08-047808-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781931836517</subfield><subfield code="9">978-1-931836-51-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781932266252</subfield><subfield code="9">978-1-932266-25-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)51563339</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043083723</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">21</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Bidwell, Teri</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Hack proofing your identity in the information age</subfield><subfield code="b">protect your family on the internet!</subfield><subfield code="c">Teri Bidwell ; Michael Cross, technical editor ; Ryan Russell, technical reviewer</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">©2002</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xvii, 370 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Identity theft : are you at risk? -- Protecting your hard drive -- Keeping your e-mail private -- Self defense on the web -- Connecting to the Internet safely -- Are your kids putting you at risk? -- If you become a victim -- Configuring your browser and firewall</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Identity-theft is the fastest growing crime in America, affecting approximately 900,000 new victims each year. Protect your assets and personal information online with this comprehensive guide. Hack Proofing Your Identity will provide readers with hands-on instruction for how to secure their personal information on multiple devices. It will include simple measures as well as advanced techniques gleaned from experts in the field who have years of experience with identity theft and fraud. This book will also provide readers with instruction for identifying cyber-crime and the different ways they can report it if it occurs. Hot Topic. Hack Proofing Your Identity will provide readers with both simple and advanced steps they can take to protect themselves from cyber-crime. Expert Advice. This book will present security measures gathered from experts in both the federal government and the private sector to help secure your personal information and assets online. Unique Coverage. Hack Proofing Your Identity will be the only book to include security measure for multiple devices like laptops, PDAs and mobile phones to allow users to protect themselves while taking advantage of the newest ways to access the Internet</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Identification cards / Forgeries</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Impostors and imposture</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet fraud</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Identification cards</subfield><subfield code="x">Forgeries</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet fraud</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Impostors and imposture</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cross, Michael</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Russell, Ryan</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=75917</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028507915</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=75917</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=75917</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043083723 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:16:55Z |
institution | BVB |
isbn | 0080478085 1931836515 1932266259 9780080478081 9781931836517 9781932266252 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028507915 |
oclc_num | 51563339 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xvii, 370 pages) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2002 |
publishDateSearch | 2002 |
publishDateSort | 2002 |
publisher | Syngress |
record_format | marc |
spelling | Bidwell, Teri Verfasser aut Hack proofing your identity in the information age protect your family on the internet! Teri Bidwell ; Michael Cross, technical editor ; Ryan Russell, technical reviewer Rockland, MA Syngress ©2002 1 Online-Ressource (xvii, 370 pages) txt rdacontent c rdamedia cr rdacarrier Includes index Identity theft : are you at risk? -- Protecting your hard drive -- Keeping your e-mail private -- Self defense on the web -- Connecting to the Internet safely -- Are your kids putting you at risk? -- If you become a victim -- Configuring your browser and firewall Identity-theft is the fastest growing crime in America, affecting approximately 900,000 new victims each year. Protect your assets and personal information online with this comprehensive guide. Hack Proofing Your Identity will provide readers with hands-on instruction for how to secure their personal information on multiple devices. It will include simple measures as well as advanced techniques gleaned from experts in the field who have years of experience with identity theft and fraud. This book will also provide readers with instruction for identifying cyber-crime and the different ways they can report it if it occurs. Hot Topic. Hack Proofing Your Identity will provide readers with both simple and advanced steps they can take to protect themselves from cyber-crime. Expert Advice. This book will present security measures gathered from experts in both the federal government and the private sector to help secure your personal information and assets online. Unique Coverage. Hack Proofing Your Identity will be the only book to include security measure for multiple devices like laptops, PDAs and mobile phones to allow users to protect themselves while taking advantage of the newest ways to access the Internet COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer crimes fast Computer security fast Identification cards / Forgeries fast Impostors and imposture fast Internet fraud fast Computer security Identification cards Forgeries Internet fraud Computer crimes Impostors and imposture Cross, Michael Sonstige oth Russell, Ryan Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=75917 Aggregator Volltext |
spellingShingle | Bidwell, Teri Hack proofing your identity in the information age protect your family on the internet! COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer crimes fast Computer security fast Identification cards / Forgeries fast Impostors and imposture fast Internet fraud fast Computer security Identification cards Forgeries Internet fraud Computer crimes Impostors and imposture |
title | Hack proofing your identity in the information age protect your family on the internet! |
title_auth | Hack proofing your identity in the information age protect your family on the internet! |
title_exact_search | Hack proofing your identity in the information age protect your family on the internet! |
title_full | Hack proofing your identity in the information age protect your family on the internet! Teri Bidwell ; Michael Cross, technical editor ; Ryan Russell, technical reviewer |
title_fullStr | Hack proofing your identity in the information age protect your family on the internet! Teri Bidwell ; Michael Cross, technical editor ; Ryan Russell, technical reviewer |
title_full_unstemmed | Hack proofing your identity in the information age protect your family on the internet! Teri Bidwell ; Michael Cross, technical editor ; Ryan Russell, technical reviewer |
title_short | Hack proofing your identity in the information age |
title_sort | hack proofing your identity in the information age protect your family on the internet |
title_sub | protect your family on the internet! |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer crimes fast Computer security fast Identification cards / Forgeries fast Impostors and imposture fast Internet fraud fast Computer security Identification cards Forgeries Internet fraud Computer crimes Impostors and imposture |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer crimes Computer security Identification cards / Forgeries Impostors and imposture Internet fraud Identification cards Forgeries |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=75917 |
work_keys_str_mv | AT bidwellteri hackproofingyouridentityintheinformationageprotectyourfamilyontheinternet AT crossmichael hackproofingyouridentityintheinformationageprotectyourfamilyontheinternet AT russellryan hackproofingyouridentityintheinformationageprotectyourfamilyontheinternet |