Hack proofing your identity in the information age :: protect your family on the internet! /
Identity-theft is the fastest growing crime in America, affecting approximately 900,000 new victims each year. Protect your assets and personal information online with this comprehensive guide. Hack Proofing Your Identity will provide readers with hands-on instruction for how to secure their persona...
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | , |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, MA :
Syngress,
©2002.
|
Schlagworte: | |
Online-Zugang: | Volltext Volltext |
Zusammenfassung: | Identity-theft is the fastest growing crime in America, affecting approximately 900,000 new victims each year. Protect your assets and personal information online with this comprehensive guide. Hack Proofing Your Identity will provide readers with hands-on instruction for how to secure their personal information on multiple devices. It will include simple measures as well as advanced techniques gleaned from experts in the field who have years of experience with identity theft and fraud. This book will also provide readers with instruction for identifying cyber-crime and the different ways they can report it if it occurs. Hot Topic. Hack Proofing Your Identity will provide readers with both simple and advanced steps they can take to protect themselves from cyber-crime. Expert Advice. This book will present security measures gathered from experts in both the federal government and the private sector to help secure your personal information and assets online. Unique Coverage. Hack Proofing Your Identity will be the only book to include security measure for multiple devices like laptops, PDAs and mobile phones to allow users to protect themselves while taking advantage of the newest ways to access the Internet. |
Beschreibung: | Includes index. |
Beschreibung: | 1 online resource (xvii, 370 pages) : illustrations |
ISBN: | 1932266259 9781932266252 9780080478081 0080478085 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocm51563339 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 030203s2002 maua o 001 0 eng d | ||
040 | |a N$T |b eng |e pn |c N$T |d OCLCQ |d YDXCP |d OCLCG |d OCLCQ |d TUU |d OCLCQ |d TNF |d OPELS |d OKU |d NRU |d E7B |d EBLCP |d OCLCO |d OCLCQ |d TEFOD |d OCLCF |d NRJ |d UKDOC |d OCLCQ |d NLGGC |d OCLCQ |d DEBSZ |d TEFOD |d OCLCQ |d AGLDB |d PIFBR |d MERUC |d OCLCQ |d WY@ |d OCLCA |d ROC |d MNS |d LUE |d RCC |d STF |d D6H |d VTS |d OCLCQ |d TOF |d OCLCQ |d BRX |d LEAUB |d M8D |d UMK |d OCLCQ |d K6U |d ZGM |d INARC |d OCLCQ |d AJS |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d SXB |d OCLCQ |d OCLCO | ||
019 | |a 162129949 |a 191034958 |a 648302437 |a 856957981 |a 869015872 |a 890421928 |a 961645221 |a 962651831 |a 991903954 |a 1020535682 |a 1035706585 |a 1071830549 |a 1108907560 |a 1129138937 |a 1149213714 | ||
020 | |a 1932266259 |q (electronic bk.) | ||
020 | |a 9781932266252 |q (electronic bk.) | ||
020 | |a 9780080478081 |q (electronic bk.) | ||
020 | |a 0080478085 |q (electronic bk.) | ||
020 | |z 9781931836517 | ||
020 | |z 1931836515 | ||
028 | 3 | 2 | |a 36515 |b Syngress |
035 | |a (OCoLC)51563339 |z (OCoLC)162129949 |z (OCoLC)191034958 |z (OCoLC)648302437 |z (OCoLC)856957981 |z (OCoLC)869015872 |z (OCoLC)890421928 |z (OCoLC)961645221 |z (OCoLC)962651831 |z (OCoLC)991903954 |z (OCoLC)1020535682 |z (OCoLC)1035706585 |z (OCoLC)1071830549 |z (OCoLC)1108907560 |z (OCoLC)1129138937 |z (OCoLC)1149213714 | ||
037 | |a 101091:101124 |b Elsevier Science & Technology |n http://www.sciencedirect.com | ||
037 | |a 36143747-B21D-45AF-97A5-154224C33B42 |b OverDrive, Inc. |n http://www.overdrive.com | ||
050 | 4 | |a QA76.9.A25 |b B534 2002eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 21 | |
049 | |a MAIN | ||
100 | 1 | |a Bidwell, Teri. |1 https://id.oclc.org/worldcat/entity/E39PCjGWX7dc9VY3qYR68hCKbb |0 http://id.loc.gov/authorities/names/no2003044797 | |
245 | 1 | 0 | |a Hack proofing your identity in the information age : |b protect your family on the internet! / |c Teri Bidwell ; Michael Cross, technical editor ; Ryan Russell, technical reviewer. |
260 | |a Rockland, MA : |b Syngress, |c ©2002. | ||
300 | |a 1 online resource (xvii, 370 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
500 | |a Includes index. | ||
588 | 0 | |a Print version record. | |
505 | 0 | |a Identity theft : are you at risk? -- Protecting your hard drive -- Keeping your e-mail private -- Self defense on the web -- Connecting to the Internet safely -- Are your kids putting you at risk? -- If you become a victim -- Configuring your browser and firewall. | |
520 | |a Identity-theft is the fastest growing crime in America, affecting approximately 900,000 new victims each year. Protect your assets and personal information online with this comprehensive guide. Hack Proofing Your Identity will provide readers with hands-on instruction for how to secure their personal information on multiple devices. It will include simple measures as well as advanced techniques gleaned from experts in the field who have years of experience with identity theft and fraud. This book will also provide readers with instruction for identifying cyber-crime and the different ways they can report it if it occurs. Hot Topic. Hack Proofing Your Identity will provide readers with both simple and advanced steps they can take to protect themselves from cyber-crime. Expert Advice. This book will present security measures gathered from experts in both the federal government and the private sector to help secure your personal information and assets online. Unique Coverage. Hack Proofing Your Identity will be the only book to include security measure for multiple devices like laptops, PDAs and mobile phones to allow users to protect themselves while taking advantage of the newest ways to access the Internet. | ||
650 | 0 | |a Computer security. | |
650 | 0 | |a Identification cards |x Forgeries. |0 http://id.loc.gov/authorities/subjects/sh85064145 | |
650 | 0 | |a Internet fraud. |0 http://id.loc.gov/authorities/subjects/sh98004235 | |
650 | 0 | |a Computer crimes. |0 http://id.loc.gov/authorities/subjects/sh85029492 | |
650 | 0 | |a Impostors and imposture. |0 http://id.loc.gov/authorities/subjects/sh85064657 | |
650 | 2 | |a Computer Security |0 https://id.nlm.nih.gov/mesh/D016494 | |
650 | 6 | |a Sécurité informatique. | |
650 | 6 | |a Cartes d'identité |x Faux. | |
650 | 6 | |a Fraude informatique. | |
650 | 6 | |a Criminalité informatique. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer crimes |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Identification cards |x Forgeries |2 fast | |
650 | 7 | |a Impostors and imposture |2 fast | |
650 | 7 | |a Internet fraud |2 fast | |
700 | 1 | |a Cross, Michael, |d 1965- |1 https://id.oclc.org/worldcat/entity/E39PCjGqwX3dPpCgkwyqBKMGjK |0 http://id.loc.gov/authorities/names/no2007080218 | |
700 | 1 | |a Russell, Ryan, |d 1969- |1 https://id.oclc.org/worldcat/entity/E39PCjJjwWCCkbpY9ftWrfRCpK |0 http://id.loc.gov/authorities/names/nb2002037870 | |
776 | 0 | 8 | |i Print version: |a Bidwell, Teri. |t Hack proofing your identity in the information age. |d Rockland, MA : Syngress, ©2002 |z 1931836515 |w (OCoLC)50154283 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=75917 |3 Volltext |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9781931836517 |3 Volltext |
938 | |a 123Library |b 123L |n 34032 | ||
938 | |a ProQuest Ebook Central |b EBLB |n EBL294157 | ||
938 | |a EBSCOhost |b EBSC |n 75917 | ||
938 | |a Internet Archive |b INAR |n hackproofingyour0000bidw | ||
938 | |a YBP Library Services |b YANK |n 2613257 | ||
938 | |a YBP Library Services |b YANK |n 2361859 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocm51563339 |
---|---|
_version_ | 1816881604898848768 |
adam_text | |
any_adam_object | |
author | Bidwell, Teri |
author2 | Cross, Michael, 1965- Russell, Ryan, 1969- |
author2_role | |
author2_variant | m c mc r r rr |
author_GND | http://id.loc.gov/authorities/names/no2003044797 http://id.loc.gov/authorities/names/no2007080218 http://id.loc.gov/authorities/names/nb2002037870 |
author_facet | Bidwell, Teri Cross, Michael, 1965- Russell, Ryan, 1969- |
author_role | |
author_sort | Bidwell, Teri |
author_variant | t b tb |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 B534 2002eb |
callnumber-search | QA76.9.A25 B534 2002eb |
callnumber-sort | QA 276.9 A25 B534 42002EB |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Identity theft : are you at risk? -- Protecting your hard drive -- Keeping your e-mail private -- Self defense on the web -- Connecting to the Internet safely -- Are your kids putting you at risk? -- If you become a victim -- Configuring your browser and firewall. |
ctrlnum | (OCoLC)51563339 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05911cam a2200805 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocm51563339 </controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">030203s2002 maua o 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCG</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">TUU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">TNF</subfield><subfield code="d">OPELS</subfield><subfield code="d">OKU</subfield><subfield code="d">NRU</subfield><subfield code="d">E7B</subfield><subfield code="d">EBLCP</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">TEFOD</subfield><subfield code="d">OCLCF</subfield><subfield code="d">NRJ</subfield><subfield code="d">UKDOC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">NLGGC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">TEFOD</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AGLDB</subfield><subfield code="d">PIFBR</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WY@</subfield><subfield code="d">OCLCA</subfield><subfield code="d">ROC</subfield><subfield code="d">MNS</subfield><subfield code="d">LUE</subfield><subfield code="d">RCC</subfield><subfield code="d">STF</subfield><subfield code="d">D6H</subfield><subfield code="d">VTS</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">TOF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">BRX</subfield><subfield code="d">LEAUB</subfield><subfield code="d">M8D</subfield><subfield code="d">UMK</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">K6U</subfield><subfield code="d">ZGM</subfield><subfield code="d">INARC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AJS</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">SXB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">162129949</subfield><subfield code="a">191034958</subfield><subfield code="a">648302437</subfield><subfield code="a">856957981</subfield><subfield code="a">869015872</subfield><subfield code="a">890421928</subfield><subfield code="a">961645221</subfield><subfield code="a">962651831</subfield><subfield code="a">991903954</subfield><subfield code="a">1020535682</subfield><subfield code="a">1035706585</subfield><subfield code="a">1071830549</subfield><subfield code="a">1108907560</subfield><subfield code="a">1129138937</subfield><subfield code="a">1149213714</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1932266259</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781932266252</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080478081</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080478085</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781931836517</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1931836515</subfield></datafield><datafield tag="028" ind1="3" ind2="2"><subfield code="a">36515</subfield><subfield code="b">Syngress</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)51563339</subfield><subfield code="z">(OCoLC)162129949</subfield><subfield code="z">(OCoLC)191034958</subfield><subfield code="z">(OCoLC)648302437</subfield><subfield code="z">(OCoLC)856957981</subfield><subfield code="z">(OCoLC)869015872</subfield><subfield code="z">(OCoLC)890421928</subfield><subfield code="z">(OCoLC)961645221</subfield><subfield code="z">(OCoLC)962651831</subfield><subfield code="z">(OCoLC)991903954</subfield><subfield code="z">(OCoLC)1020535682</subfield><subfield code="z">(OCoLC)1035706585</subfield><subfield code="z">(OCoLC)1071830549</subfield><subfield code="z">(OCoLC)1108907560</subfield><subfield code="z">(OCoLC)1129138937</subfield><subfield code="z">(OCoLC)1149213714</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">101091:101124</subfield><subfield code="b">Elsevier Science & Technology</subfield><subfield code="n">http://www.sciencedirect.com</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">36143747-B21D-45AF-97A5-154224C33B42</subfield><subfield code="b">OverDrive, Inc.</subfield><subfield code="n">http://www.overdrive.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">B534 2002eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">21</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Bidwell, Teri.</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjGWX7dc9VY3qYR68hCKbb</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2003044797</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Hack proofing your identity in the information age :</subfield><subfield code="b">protect your family on the internet! /</subfield><subfield code="c">Teri Bidwell ; Michael Cross, technical editor ; Ryan Russell, technical reviewer.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Rockland, MA :</subfield><subfield code="b">Syngress,</subfield><subfield code="c">©2002.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xvii, 370 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Identity theft : are you at risk? -- Protecting your hard drive -- Keeping your e-mail private -- Self defense on the web -- Connecting to the Internet safely -- Are your kids putting you at risk? -- If you become a victim -- Configuring your browser and firewall.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Identity-theft is the fastest growing crime in America, affecting approximately 900,000 new victims each year. Protect your assets and personal information online with this comprehensive guide. Hack Proofing Your Identity will provide readers with hands-on instruction for how to secure their personal information on multiple devices. It will include simple measures as well as advanced techniques gleaned from experts in the field who have years of experience with identity theft and fraud. This book will also provide readers with instruction for identifying cyber-crime and the different ways they can report it if it occurs. Hot Topic. Hack Proofing Your Identity will provide readers with both simple and advanced steps they can take to protect themselves from cyber-crime. Expert Advice. This book will present security measures gathered from experts in both the federal government and the private sector to help secure your personal information and assets online. Unique Coverage. Hack Proofing Your Identity will be the only book to include security measure for multiple devices like laptops, PDAs and mobile phones to allow users to protect themselves while taking advantage of the newest ways to access the Internet.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Identification cards</subfield><subfield code="x">Forgeries.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85064145</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet fraud.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh98004235</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85029492</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Impostors and imposture.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85064657</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D016494</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Cartes d'identité</subfield><subfield code="x">Faux.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Fraude informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Criminalité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Identification cards</subfield><subfield code="x">Forgeries</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Impostors and imposture</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet fraud</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cross, Michael,</subfield><subfield code="d">1965-</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjGqwX3dPpCgkwyqBKMGjK</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2007080218</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Russell, Ryan,</subfield><subfield code="d">1969-</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjJjwWCCkbpY9ftWrfRCpK</subfield><subfield code="0">http://id.loc.gov/authorities/names/nb2002037870</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Bidwell, Teri.</subfield><subfield code="t">Hack proofing your identity in the information age.</subfield><subfield code="d">Rockland, MA : Syngress, ©2002</subfield><subfield code="z">1931836515</subfield><subfield code="w">(OCoLC)50154283</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=75917</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9781931836517</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">123Library</subfield><subfield code="b">123L</subfield><subfield code="n">34032</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL294157</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">75917</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Internet Archive</subfield><subfield code="b">INAR</subfield><subfield code="n">hackproofingyour0000bidw</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2613257</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2361859</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocm51563339 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:15:22Z |
institution | BVB |
isbn | 1932266259 9781932266252 9780080478081 0080478085 |
language | English |
oclc_num | 51563339 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xvii, 370 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2002 |
publishDateSearch | 2002 |
publishDateSort | 2002 |
publisher | Syngress, |
record_format | marc |
spelling | Bidwell, Teri. https://id.oclc.org/worldcat/entity/E39PCjGWX7dc9VY3qYR68hCKbb http://id.loc.gov/authorities/names/no2003044797 Hack proofing your identity in the information age : protect your family on the internet! / Teri Bidwell ; Michael Cross, technical editor ; Ryan Russell, technical reviewer. Rockland, MA : Syngress, ©2002. 1 online resource (xvii, 370 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier Includes index. Print version record. Identity theft : are you at risk? -- Protecting your hard drive -- Keeping your e-mail private -- Self defense on the web -- Connecting to the Internet safely -- Are your kids putting you at risk? -- If you become a victim -- Configuring your browser and firewall. Identity-theft is the fastest growing crime in America, affecting approximately 900,000 new victims each year. Protect your assets and personal information online with this comprehensive guide. Hack Proofing Your Identity will provide readers with hands-on instruction for how to secure their personal information on multiple devices. It will include simple measures as well as advanced techniques gleaned from experts in the field who have years of experience with identity theft and fraud. This book will also provide readers with instruction for identifying cyber-crime and the different ways they can report it if it occurs. Hot Topic. Hack Proofing Your Identity will provide readers with both simple and advanced steps they can take to protect themselves from cyber-crime. Expert Advice. This book will present security measures gathered from experts in both the federal government and the private sector to help secure your personal information and assets online. Unique Coverage. Hack Proofing Your Identity will be the only book to include security measure for multiple devices like laptops, PDAs and mobile phones to allow users to protect themselves while taking advantage of the newest ways to access the Internet. Computer security. Identification cards Forgeries. http://id.loc.gov/authorities/subjects/sh85064145 Internet fraud. http://id.loc.gov/authorities/subjects/sh98004235 Computer crimes. http://id.loc.gov/authorities/subjects/sh85029492 Impostors and imposture. http://id.loc.gov/authorities/subjects/sh85064657 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Cartes d'identité Faux. Fraude informatique. Criminalité informatique. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer crimes fast Computer security fast Identification cards Forgeries fast Impostors and imposture fast Internet fraud fast Cross, Michael, 1965- https://id.oclc.org/worldcat/entity/E39PCjGqwX3dPpCgkwyqBKMGjK http://id.loc.gov/authorities/names/no2007080218 Russell, Ryan, 1969- https://id.oclc.org/worldcat/entity/E39PCjJjwWCCkbpY9ftWrfRCpK http://id.loc.gov/authorities/names/nb2002037870 Print version: Bidwell, Teri. Hack proofing your identity in the information age. Rockland, MA : Syngress, ©2002 1931836515 (OCoLC)50154283 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=75917 Volltext FWS01 ZDB-4-EBA FWS_PDA_EBA https://www.sciencedirect.com/science/book/9781931836517 Volltext |
spellingShingle | Bidwell, Teri Hack proofing your identity in the information age : protect your family on the internet! / Identity theft : are you at risk? -- Protecting your hard drive -- Keeping your e-mail private -- Self defense on the web -- Connecting to the Internet safely -- Are your kids putting you at risk? -- If you become a victim -- Configuring your browser and firewall. Computer security. Identification cards Forgeries. http://id.loc.gov/authorities/subjects/sh85064145 Internet fraud. http://id.loc.gov/authorities/subjects/sh98004235 Computer crimes. http://id.loc.gov/authorities/subjects/sh85029492 Impostors and imposture. http://id.loc.gov/authorities/subjects/sh85064657 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Cartes d'identité Faux. Fraude informatique. Criminalité informatique. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer crimes fast Computer security fast Identification cards Forgeries fast Impostors and imposture fast Internet fraud fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh85064145 http://id.loc.gov/authorities/subjects/sh98004235 http://id.loc.gov/authorities/subjects/sh85029492 http://id.loc.gov/authorities/subjects/sh85064657 https://id.nlm.nih.gov/mesh/D016494 |
title | Hack proofing your identity in the information age : protect your family on the internet! / |
title_auth | Hack proofing your identity in the information age : protect your family on the internet! / |
title_exact_search | Hack proofing your identity in the information age : protect your family on the internet! / |
title_full | Hack proofing your identity in the information age : protect your family on the internet! / Teri Bidwell ; Michael Cross, technical editor ; Ryan Russell, technical reviewer. |
title_fullStr | Hack proofing your identity in the information age : protect your family on the internet! / Teri Bidwell ; Michael Cross, technical editor ; Ryan Russell, technical reviewer. |
title_full_unstemmed | Hack proofing your identity in the information age : protect your family on the internet! / Teri Bidwell ; Michael Cross, technical editor ; Ryan Russell, technical reviewer. |
title_short | Hack proofing your identity in the information age : |
title_sort | hack proofing your identity in the information age protect your family on the internet |
title_sub | protect your family on the internet! / |
topic | Computer security. Identification cards Forgeries. http://id.loc.gov/authorities/subjects/sh85064145 Internet fraud. http://id.loc.gov/authorities/subjects/sh98004235 Computer crimes. http://id.loc.gov/authorities/subjects/sh85029492 Impostors and imposture. http://id.loc.gov/authorities/subjects/sh85064657 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Cartes d'identité Faux. Fraude informatique. Criminalité informatique. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer crimes fast Computer security fast Identification cards Forgeries fast Impostors and imposture fast Internet fraud fast |
topic_facet | Computer security. Identification cards Forgeries. Internet fraud. Computer crimes. Impostors and imposture. Computer Security Sécurité informatique. Cartes d'identité Faux. Fraude informatique. Criminalité informatique. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Computer crimes Computer security Identification cards Forgeries Impostors and imposture Internet fraud |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=75917 https://www.sciencedirect.com/science/book/9781931836517 |
work_keys_str_mv | AT bidwellteri hackproofingyouridentityintheinformationageprotectyourfamilyontheinternet AT crossmichael hackproofingyouridentityintheinformationageprotectyourfamilyontheinternet AT russellryan hackproofingyouridentityintheinformationageprotectyourfamilyontheinternet |