Hack proofing your identity in the information age: protect your family on the internet!
Identity-theft is the fastest growing crime in America, affecting approximately 900,000 new victims each year. Protect your assets and personal information online with this comprehensive guide. Hack Proofing Your Identity will provide readers with hands-on instruction for how to secure their persona...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, MA
Syngress
© 2002
|
Schlagworte: | |
Online-Zugang: | FLA01 Volltext |
Zusammenfassung: | Identity-theft is the fastest growing crime in America, affecting approximately 900,000 new victims each year. Protect your assets and personal information online with this comprehensive guide. Hack Proofing Your Identity will provide readers with hands-on instruction for how to secure their personal information on multiple devices. It will include simple measures as well as advanced techniques gleaned from experts in the field who have years of experience with identity theft and fraud. This book will also provide readers with instruction for identifying cyber-crime and the different ways they can report it if it occurs. Hot Topic. Hack Proofing Your Identity will provide readers with both simple and advanced steps they can take to protect themselves from cyber-crime. Expert Advice. This book will present security measures gathered from experts in both the federal government and the private sector to help secure your personal information and assets online. Unique Coverage. Hack Proofing Your Identity will be the only book to include security measure for multiple devices like laptops, PDAs and mobile phones to allow users to protect themselves while taking advantage of the newest ways to access the Internet |
Beschreibung: | Includes index |
Beschreibung: | 1 online resource (xvii, 370 pages) illustrations |
ISBN: | 1932266259 9781932266252 9780080478081 0080478085 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046123288 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190827s2002 |||| o||u| ||||||eng d | ||
020 | |a 1932266259 |9 1-932266-25-9 | ||
020 | |a 9781932266252 |9 978-1-932266-25-2 | ||
020 | |a 9780080478081 |9 978-0-08-047808-1 | ||
020 | |a 0080478085 |9 0-08-047808-5 | ||
035 | |a (ZDB-33-ESD)ocm51563339 | ||
035 | |a (OCoLC)51563339 | ||
035 | |a (DE-599)BVBBV046123288 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 21 | |
100 | 1 | |a Bidwell, Teri |e Verfasser |4 aut | |
245 | 1 | 0 | |a Hack proofing your identity in the information age |b protect your family on the internet! |c Teri Bidwell ; Michael Cross, technical editor ; Ryan Russell, technical reviewer |
264 | 1 | |a Rockland, MA |b Syngress |c © 2002 | |
300 | |a 1 online resource (xvii, 370 pages) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
520 | |a Identity-theft is the fastest growing crime in America, affecting approximately 900,000 new victims each year. Protect your assets and personal information online with this comprehensive guide. Hack Proofing Your Identity will provide readers with hands-on instruction for how to secure their personal information on multiple devices. It will include simple measures as well as advanced techniques gleaned from experts in the field who have years of experience with identity theft and fraud. This book will also provide readers with instruction for identifying cyber-crime and the different ways they can report it if it occurs. Hot Topic. Hack Proofing Your Identity will provide readers with both simple and advanced steps they can take to protect themselves from cyber-crime. Expert Advice. This book will present security measures gathered from experts in both the federal government and the private sector to help secure your personal information and assets online. Unique Coverage. Hack Proofing Your Identity will be the only book to include security measure for multiple devices like laptops, PDAs and mobile phones to allow users to protect themselves while taking advantage of the newest ways to access the Internet | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer crimes |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Identification cards / Forgeries |2 fast | |
650 | 7 | |a Impostors and imposture |2 fast | |
650 | 7 | |a Internet fraud |2 fast | |
650 | 4 | |a Electronic books | |
650 | 4 | |a Computer security | |
650 | 4 | |a Identification cards |x Forgeries | |
650 | 4 | |a Internet fraud | |
650 | 4 | |a Computer crimes | |
650 | 4 | |a Impostors and imposture | |
700 | 1 | |a Cross, Michael |d 1965- |e Sonstige |4 oth | |
700 | 1 | |a Russell, Ryan |d 1969- |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1931836515 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781931836517 |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781931836517 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031503741 | ||
966 | e | |u http://www.sciencedirect.com/science/book/9781931836517 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180440013078528 |
---|---|
any_adam_object | |
author | Bidwell, Teri |
author_facet | Bidwell, Teri |
author_role | aut |
author_sort | Bidwell, Teri |
author_variant | t b tb |
building | Verbundindex |
bvnumber | BV046123288 |
collection | ZDB-33-ESD |
ctrlnum | (ZDB-33-ESD)ocm51563339 (OCoLC)51563339 (DE-599)BVBBV046123288 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03424nmm a2200577zc 4500</leader><controlfield tag="001">BV046123288</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2002 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1932266259</subfield><subfield code="9">1-932266-25-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781932266252</subfield><subfield code="9">978-1-932266-25-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080478081</subfield><subfield code="9">978-0-08-047808-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080478085</subfield><subfield code="9">0-08-047808-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocm51563339</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)51563339</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046123288</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">21</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Bidwell, Teri</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Hack proofing your identity in the information age</subfield><subfield code="b">protect your family on the internet!</subfield><subfield code="c">Teri Bidwell ; Michael Cross, technical editor ; Ryan Russell, technical reviewer</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">© 2002</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xvii, 370 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Identity-theft is the fastest growing crime in America, affecting approximately 900,000 new victims each year. Protect your assets and personal information online with this comprehensive guide. Hack Proofing Your Identity will provide readers with hands-on instruction for how to secure their personal information on multiple devices. It will include simple measures as well as advanced techniques gleaned from experts in the field who have years of experience with identity theft and fraud. This book will also provide readers with instruction for identifying cyber-crime and the different ways they can report it if it occurs. Hot Topic. Hack Proofing Your Identity will provide readers with both simple and advanced steps they can take to protect themselves from cyber-crime. Expert Advice. This book will present security measures gathered from experts in both the federal government and the private sector to help secure your personal information and assets online. Unique Coverage. Hack Proofing Your Identity will be the only book to include security measure for multiple devices like laptops, PDAs and mobile phones to allow users to protect themselves while taking advantage of the newest ways to access the Internet</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Identification cards / Forgeries</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Impostors and imposture</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet fraud</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic books</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Identification cards</subfield><subfield code="x">Forgeries</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet fraud</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Impostors and imposture</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cross, Michael</subfield><subfield code="d">1965-</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Russell, Ryan</subfield><subfield code="d">1969-</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1931836515</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781931836517</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781931836517</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031503741</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781931836517</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046123288 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:35:47Z |
institution | BVB |
isbn | 1932266259 9781932266252 9780080478081 0080478085 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031503741 |
oclc_num | 51563339 |
open_access_boolean | |
physical | 1 online resource (xvii, 370 pages) illustrations |
psigel | ZDB-33-ESD ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2002 |
publishDateSearch | 2002 |
publishDateSort | 2002 |
publisher | Syngress |
record_format | marc |
spelling | Bidwell, Teri Verfasser aut Hack proofing your identity in the information age protect your family on the internet! Teri Bidwell ; Michael Cross, technical editor ; Ryan Russell, technical reviewer Rockland, MA Syngress © 2002 1 online resource (xvii, 370 pages) illustrations txt rdacontent c rdamedia cr rdacarrier Includes index Identity-theft is the fastest growing crime in America, affecting approximately 900,000 new victims each year. Protect your assets and personal information online with this comprehensive guide. Hack Proofing Your Identity will provide readers with hands-on instruction for how to secure their personal information on multiple devices. It will include simple measures as well as advanced techniques gleaned from experts in the field who have years of experience with identity theft and fraud. This book will also provide readers with instruction for identifying cyber-crime and the different ways they can report it if it occurs. Hot Topic. Hack Proofing Your Identity will provide readers with both simple and advanced steps they can take to protect themselves from cyber-crime. Expert Advice. This book will present security measures gathered from experts in both the federal government and the private sector to help secure your personal information and assets online. Unique Coverage. Hack Proofing Your Identity will be the only book to include security measure for multiple devices like laptops, PDAs and mobile phones to allow users to protect themselves while taking advantage of the newest ways to access the Internet COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer crimes fast Computer security fast Identification cards / Forgeries fast Impostors and imposture fast Internet fraud fast Electronic books Computer security Identification cards Forgeries Internet fraud Computer crimes Impostors and imposture Cross, Michael 1965- Sonstige oth Russell, Ryan 1969- Sonstige oth Erscheint auch als Druck-Ausgabe 1931836515 Erscheint auch als Druck-Ausgabe 9781931836517 http://www.sciencedirect.com/science/book/9781931836517 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Bidwell, Teri Hack proofing your identity in the information age protect your family on the internet! COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer crimes fast Computer security fast Identification cards / Forgeries fast Impostors and imposture fast Internet fraud fast Electronic books Computer security Identification cards Forgeries Internet fraud Computer crimes Impostors and imposture |
title | Hack proofing your identity in the information age protect your family on the internet! |
title_auth | Hack proofing your identity in the information age protect your family on the internet! |
title_exact_search | Hack proofing your identity in the information age protect your family on the internet! |
title_full | Hack proofing your identity in the information age protect your family on the internet! Teri Bidwell ; Michael Cross, technical editor ; Ryan Russell, technical reviewer |
title_fullStr | Hack proofing your identity in the information age protect your family on the internet! Teri Bidwell ; Michael Cross, technical editor ; Ryan Russell, technical reviewer |
title_full_unstemmed | Hack proofing your identity in the information age protect your family on the internet! Teri Bidwell ; Michael Cross, technical editor ; Ryan Russell, technical reviewer |
title_short | Hack proofing your identity in the information age |
title_sort | hack proofing your identity in the information age protect your family on the internet |
title_sub | protect your family on the internet! |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer crimes fast Computer security fast Identification cards / Forgeries fast Impostors and imposture fast Internet fraud fast Electronic books Computer security Identification cards Forgeries Internet fraud Computer crimes Impostors and imposture |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer crimes Computer security Identification cards / Forgeries Impostors and imposture Internet fraud Electronic books Identification cards Forgeries |
url | http://www.sciencedirect.com/science/book/9781931836517 |
work_keys_str_mv | AT bidwellteri hackproofingyouridentityintheinformationageprotectyourfamilyontheinternet AT crossmichael hackproofingyouridentityintheinformationageprotectyourfamilyontheinternet AT russellryan hackproofingyouridentityintheinformationageprotectyourfamilyontheinternet |