1
by van der Meulen, Nicole S.
Published 2011
T.M.C. Asser Press
...When identity theft first emerged as a problem of public policy in the United States, during...

2
by Camp, L. Jean
Published 2007
Springer US
Table of Contents: ... -- Identity Theft -- Who Owns You? -- Defeating the Greatest Masquerade -- Secrecy, Privacy, Identity...

3
Published 2009
OECD Publishing
Table of Contents: ...The Scope of Online Identity Theft -- OECD Policy Guidance on Online Identity Theft -- Executive...

4
by Warren, Carolyn
Published 2010
Pearson Education Pub. as FTPress Delivers
Subjects: ...Identity theft / United States / Prevention...

5
by Weisman, Steve
Published 2014
Pearson Education
Table of Contents: ...Identity theft -- Making yourself less vulnerable to identity theft -- Danger on your computer...

6
by Weisman, Steve
Published 2011
FTPress Delivers
Subjects: ...Identity theft / Prevention...

7
by Stickley, Jim
Published 2009
FT Press
Table of Contents: ...: The truth about no-tech identity theft -- Part IV: The truth about just how long identity thieves will go...

8
by Camp, L. Jean, Johnson, M. Eric
Published 2012
Springer New York
Table of Contents: ... -- Identity Theft -- Defeating the Greatest Masquerade -- Secrecy, Privacy, Identity -- Security and Privacy...

9
by Collins, Judith M.
Published 2005
John Wiley
Table of Contents: ...What is an "identity"? -- Identity theft: effects on victims -- Identity crime is entrenched...

10
by Sileo, John
Published 2010
Wiley
Subjects: ...Identity theft / Prevention...

11
by Weisman, Steve
Published 2005
Pearson/Prentice Hall
Table of Contents: ...Identity theft -- Making yourself less vulnerable to identity theft -- Danger on the computer...

12
by Haber, Morey J.
Published 2020
Apress L.P.
Subjects: ...Identity theft / fast...

13
by Preukschat, Alexander, Reed, Drummond
Published 2021
Manning
Subjects: ...Identity theft / Prevention...

14
by Weisman, Steve
Published 2013
FT Press
Table of Contents: ...Identity theft -- Making yourself less vulnerable to identity theft -- Danger on the computer...

15
by Goschenneck, Alexander
Published 2014
Dpunkt.verlag
Subjects: ...Online identity theft / http://id.loc.gov/authorities/subjects/sh2011000734...

16
by Haber, Morey J., Rolls, Darran
Published 2024
Apress
Subjects: ...Identity theft / http://id.loc.gov/authorities/subjects/sh2004003368...

17
by Tynan, Dan
Published 2005
O'Reilly
Table of Contents: ..., ma'am -- Junking junk mail -- Flag mag nags -- Pick your mail -- Identity theft -- Foil mailbox...

18
by Alder, Raven
Published 2005
Syngress
Subjects: ...Identity theft / Fiction...

19
by Bertocci, Vittorio
Published 2008
Addison-Wesley
Subjects: ...Identity theft / Prevention / blmlsh...

20
by Becker, Daniel
Published 2018
transcript Verlag
Subjects: ...Identity Theft...