41
by Sullivan, Clare
Published 2011
University of Adelaide Press
... to privacy in the context of a national identity scheme, and defines identity theft and its consequences...

42
Published 2022
Springer International Publishing
Table of Contents: ... Intelligence Agency: A Threat Intelligence Approach to Mitigate Identity Theft -- Key Agreement...

43
by Eve, Martin Paul
Published 2016
Bloomsbury Academic
... ten-character combination, but does a bank know that? Or an email provider? What's an 'identity theft...

44
by Shoniregun, Charles A., Crosier, Stephen
Published 2008
Springer US
... they offer. With the need to combat the problems related to identity theft and other security issues, society...

45
by Wade, Todd
Published 2022
BCS, The Chartered Institute for IT

46
by Davis, Michael, Elisan, Christopher C., Bodmer, Sean, LeMasters, Aaron
Published 2017
McGraw-Hill Education
Table of Contents: ...-ups -- Search Engine Redirection -- Data Theft -- Click Fraud -- Identity Theft -- Keylogging...

47
by Shavers, Brett
Published 2013
Syngress
Table of Contents: ...; Crime specific-identity theft; Other alleged crimes; Questions for Victims; Computer crime victim...

48
by Coffin, David
Published 2011
Apress
... against data loss, identity theft, SQL injection, and address spoofing Provides techniques for encryption...

49
by Walker, Andy
Published 2005
Que
... everytime you go online. Then, you'll learn about other threats, such as identity theft, phishing, and other...

50
by Schneier, Bruce
Published 2008
Wiley Pub.
... computer security expert's insights into a wide range of security issues, including the risk of identity...

51
by Nystrom, Marty
Published 2007
O'Reilly
... are an attractive path to identity theft...

52
by van der Sloot, Bart
Published 2024
Bloomsbury Academic
.... The book also conceptualises their negative uses for fraud, deception, exploitation, identity-theft...

53
by Harris, Shon
Published 2009
Pearson Certification
... Works . Identity Theft . Buffer Overflow . Hardware Security . Personal Firewall About the Shon Harris...

54
by Andrews, Gillian "Gus"
Published 2020
HighBridge
...Feeling overwhelmed by an avalanche of online content? Anxious about identity theft? Unsettled...

55
by Gralla, Preston
Published 2006
Que Pub.
Table of Contents: ... you -- How Identity Theft works -- Credit card security -- The Dangers of Data Mining -- The Dangers...

56
Published 2010
Humana
... cyber bank robbery, identity theft, and corporate spying. With little consensus as yet...

57
Published 2010
Springer US
... program committee composed of leading researchers. Topics covered include identity theft, modeling...

58
by Shipley, Todd G.
Published 2014
Syngress
... includes attacks against computer data and systems, identity theft, distribution of child pornography...

59
by Shipley, Todd G.
Published 2014
Syngress
... includes attacks against computer data and systems, identity theft, distribution of child pornography...

60
Published 2017
Springer International Publishing
.... The suggested methods may find potential applications in the prevention of patient identity theft and health...