|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
OR_ocn820029252 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
121203s2013 nju ob 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d COO
|d DEBSZ
|d OCLCO
|d VT2
|d OCLCQ
|d OCLCF
|d OCLCQ
|d YDX
|d OCLCA
|d CEF
|d WYU
|d BRF
|d INARC
|d OCLCO
|d UKAHL
|d OCLCQ
|d OCLCO
|
020 |
|
|
|a 9780133089516
|
020 |
|
|
|a 0133089517
|
020 |
|
|
|a 013308907X
|
020 |
|
|
|a 9780133089073
|
020 |
|
|
|z 9780133089073
|
029 |
1 |
|
|a AU@
|b 000050347690
|
029 |
1 |
|
|a DEBBG
|b BV040903360
|
029 |
1 |
|
|a DEBSZ
|b 378278444
|
029 |
1 |
|
|a DEBSZ
|b 381394212
|
029 |
1 |
|
|a GBVCP
|b 785444440
|
035 |
|
|
|a (OCoLC)820029252
|
037 |
|
|
|a CL0500000178
|b Safari Books Online
|
043 |
|
|
|a n-us---
|
050 |
|
4 |
|a HV6679
|b .W44 2013
|
082 |
0 |
4 |
|a 332.024
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Weisman, Steve.
|
245 |
1 |
0 |
|a 50 ways to protect your identity in a digital age :
|b new financial threats you need to know and how to avoid them /
|c Steve Weisman.
|
246 |
3 |
0 |
|a New financial threats you need to know and how to avoid them
|
246 |
3 |
|
|a Fifty ways to protect your identity in a digital age
|
250 |
|
|
|a 2nd ed.
|
260 |
|
|
|a Upper Saddle River, N.J. :
|b FT Press,
|c ©2013.
|
300 |
|
|
|a 1 online resource (1 volume)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Identity theft -- Making yourself less vulnerable to identity theft -- Danger on the computer and what to do if you are the victim of identity theft -- Your social security number -- an identity thief's lucky number -- Criminal identity theft, taxes -- and more arresting problems -- Technology, business, and government fight identity theft -- Financial privacy please: The Gramm-Leach-Bliley Act -- Credit reports -- Congress deals with credit reports and identity theft: The Fair and Accurate Credit Transactions Act -- Protecting your privacy -- a key to preventing identity theft -- ID theft -- security software -- The dangers of data breaches -- Identity theft insurance -- worth the price? -- Identity theft after death -- Identity theft and the elderly -- Identity theft from children -- Identity theft risks of smartphones and other mobile devices -- Identity theft threats with credit cards and debit cards -- Medical identity theft -- Identity theft and social media -- Form letters -- Steve's rules.
|
520 |
8 |
|
|a This text will help you learn all you need to know to protect your lives, money, and security. Consider it your first stop in your quest for knowledge and guidance to prevent ID theft. It tells you what to look out for and how to keep credit disasters from happening to you.
|b It is better to stop identity theft from happening in the first place than have to fix or repair the situation afterwards. Steve Weisman reveals the threats of new identity theft attacks based on use of Facebook, iPad, iPhone, Android, cloud apps, iPod, and other new technologies -- and shows you how to protect yourself, or how to fix the damage if you've already been attacked! Discover why ID theft is more dangerous than ever, and discover today's most dangerous new threats -- including attacks targeting medical records, personal finance and online banking sites, the elderly, and military service members. Meet the hackers and organized crime groups who want to steal your identity and money -- and learn how to protect your data and your life! Step by step, Weisman shows how to avoid risks, minimize risks you can't completely avoid, and immediately take the right steps if you're ever victimized. He objectively reviews new products and services that promise to fight identity theft, and previews emerging dangers, such as RFID credit cards. If you use a computer, the Internet, a smartphone, cell phone, tablet, or any other communications device, 50 Ways to Protect Your Identity in a Digital Age isn't just an indispensable wake-up call: it's the world's best resource for protecting yourself!
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Identity theft
|z United States
|x Prevention.
|
650 |
|
0 |
|a Records
|x Access control
|z United States.
|
650 |
|
0 |
|a Privacy, Right of
|z United States.
|
650 |
|
6 |
|a Archives
|x Accès
|x Contrôle
|z États-Unis.
|
650 |
|
7 |
|a Identity theft
|x Prevention
|2 fast
|
650 |
|
7 |
|a Privacy, Right of
|2 fast
|
650 |
|
7 |
|a Records
|x Access control
|2 fast
|
651 |
|
7 |
|a United States
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Weisman, Steve.
|t 50 ways to protect your identity in a digital age.
|b 2nd ed.
|d Upper Saddle River, N.J. : FT Press, ©2013
|z 9780133089073
|w (DLC) 2012028627
|w (OCoLC)794039100
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780133089516/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH41026725
|
938 |
|
|
|a Internet Archive
|b INAR
|n 50waystoprotecty0000weis
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 14855152
|
994 |
|
|
|a 92
|b IZTAP
|