The truth about identity theft / Jim Stickley.

Examines the techniques used to steal personal information, discussing such methods as using Internet files, email, ATM scams, credit card offers, telephone solicitation, burglary, and trash scanning, and outlining what the average person can do to minimize the risk of identity theft.

Saved in:
Bibliographic Details
Online Access: Full Text (via O'Reilly/Safari)
Main Author: Stickley, Jim
Other title:Identity theft
Format: eBook
Language:English
Published: Upper Saddle River, N.J. : FT Press, ©2009.
Series:Truth about (FT Press)
Subjects:

MARC

LEADER 00000cam a2200000 a 4500
001 b10275059
006 m o d
007 cr |||||||||||
008 090730s2009 nju o 000 0 eng d
005 20240829143949.3
010 |a  2008300363 
019 |a 608567440  |a 1036961768  |a 1044250644  |a 1056380337  |a 1153004182 
020 |a 9780768686296 
020 |a 0768686296 
020 |z 9780789737939  |q (pbk.) 
020 |z 0789737930  |q (pbk.) 
029 1 |a CHBIS  |b 006148962 
029 1 |a CHVBK  |b 171329430 
029 1 |a DEBSZ  |b 355430290 
035 |a (OCoLC)safo428740755 
035 |a (OCoLC)428740755  |z (OCoLC)608567440  |z (OCoLC)1036961768  |z (OCoLC)1044250644  |z (OCoLC)1056380337  |z (OCoLC)1153004182 
037 |a safo9780768686296 
040 |a UMI  |b eng  |e pn  |c UMI  |d OCLCQ  |d CEF  |d OCLCQ  |d DEBSZ  |d C6I  |d OCLCO  |d OCLCQ  |d OCLCE  |d OCLCQ  |d OCLCF  |d IDEBK  |d OCLCQ  |d YDX  |d OCLCA  |d OCLCQ  |d INARC  |d WYU  |d UAB  |d OCLCO  |d OCLCQ  |d VT2  |d OCLCL 
042 |a dlr 
049 |a GWRE 
050 4 |a HV6675  |b .S85 2009 
100 1 |a Stickley, Jim. 
245 1 4 |a The truth about identity theft /  |c Jim Stickley. 
246 3 0 |a Identity theft 
260 |a Upper Saddle River, N.J. :  |b FT Press,  |c ©2009. 
300 |a 1 online resource (x, 191 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a volume  |b nc  |2 rdacarrier 
490 1 |a The truth about 
588 0 |a Print version record. 
505 0 |a Part I: The truth about phishing and vishing -- Part II: The truth about trash -- Part III: The truth about no-tech identity theft -- Part IV: The truth about just how long identity thieves will go -- Part V: The truth about identity theft in plain sight -- Part VI: The truth about online cons -- Part VII: The truth about security at work -- Part VIII: The truth about identity theft from real victims -- Part IX: The truth about putting a stop to identity theft. 
520 |a Examines the techniques used to steal personal information, discussing such methods as using Internet files, email, ATM scams, credit card offers, telephone solicitation, burglary, and trash scanning, and outlining what the average person can do to minimize the risk of identity theft. 
650 0 |a Identity theft. 
650 0 |a Identity theft  |x Prevention. 
650 7 |a Identity theft.  |2 fast  |0 (OCoLC)fst01201137 
650 7 |a Identity theft  |x Prevention.  |2 fast  |0 (OCoLC)fst01905798 
758 |i has work:  |a The Truth About Identity Theft (Work)  |1 https://id.oclc.org/worldcat/entity/E39PCXMBwwkC3fGfyRCR4QhHyd  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 1 |z 0789737930  |z 9780789737939 
830 0 |a Truth about (FT Press) 
856 4 0 |u https://go.oreilly.com/UniOfColoradoBoulder/library/view/~/9780768686296/?ar  |z Full Text (via O'Reilly/Safari) 
915 |a - 
956 |a O'Reilly-Safari eBooks 
956 |b O'Reilly Online Learning: Academic/Public Library Edition 
994 |a 92  |b COD 
998 |b Subsequent record output 
999 f f |i d6af4c70-f5f6-535d-90d3-a6ec31af6695  |s 53520146-83c8-58c6-ade3-be98a92ce6fd 
952 f f |p Can circulate  |a University of Colorado Boulder  |b Online  |c Online  |d Online  |e HV6675 .S85 2009  |h Library of Congress classification  |i web  |n 1