Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: "identity theft"
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Showing
81
-
100
of
103
Search:
'"identity theft"'
,
query time: 0.13s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
81
Is it safe? : protecting your computer, your business, and yourself online
by
Miller, Michael
Published 2008
Que
“
...Is It Safe? PROTECTING YOUR COMPUTER, YOUR BUSINESS, AND YOURSELF ONLINE
IDENTITY
THEFT
. DATA THEFT...
”
Call Number:
QA76.9.A25
Read Now
82
Identity Attack Vectors : Strategically Designing and Implementing Identity Security, Second Edition
by
Haber, Morey J.
,
Rolls, Darran
Published 2024
Apress
Read Now
83
Firewalls don't stop dragons : a step-by-step guide to computer security for non-techies
by
Parker, Carey
Published 2020
Apress
“
...
identity
theft
Protect yourself from viruses and scams Maximize your smartphone security and privacy...
”
Call Number:
QA76.9.A25
Read Now
84
Communications and Multimedia Security : 11th IFIP TC 6/TC 11 International Conference, CMS 2010, Linz, Austria, May 31 - June 2, 2010, Proceedings
Published 2010
Springer Berlin Heidelberg
“
... of privacy,
identity
theft
, and other security threats. Our real and virtual worlds are becoming increasingly...
”
Read Now
85
Googling security : how much does Google know about you?
by
Conti, Greg
Published 2009
Addison-Wesley
Call Number:
QA76.9.A25
Read Now
86
ISSE 2008 Securing Electronic Business Processes : Highlights of the Information Security Solutions Europe 2008 Conference
Published 2009
Vieweg+Teubner Verlag
Table of Contents:
“
... environment --
Identity
Theft
in Electronic Financial Transactions The experience of the Central Bank of Spain...
”
Read Now
87
Information Security : 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings
Published 2004
Springer Berlin Heidelberg
Table of Contents:
“
... Security -- Prevent Online
Identity
Theft
– Using Network Smart Cards for Secure Online Transactions...
”
Read Now
88
Web security, privacy and commerce
by
Garfinkel, Simson
Published 2002
O'Reilly
Call Number:
TK5105.59
Read Now
89
The EY tax guide 2018
Published 2018
Wiley
Table of Contents:
“
...;
Identity
Theft
; Chapter 2 Filing status; Marital Status; Single; Married Filing Jointly; Filing a Joint...
”
Call Number:
KF6369.85
Read Now
90
Cyber reconnaissance surveillance and defense
by
Shimonski, Robert
Published 2015
Syngress
“
...,
identity
theft
, social engineering, sniffing, and more. Real-world examples are examined using key concepts...
”
Call Number:
TK7882.E2
Read Now
91
Software Services for e-Business and e-Society : 9th IFIP WG 6.1 Conference on e-Business, e-Services and e-Society, I3E 2009, Nancy, France, September 23-25, 2009, Proceedings
Published 2009
Springer Berlin Heidelberg
Table of Contents:
“
... Privacy-Aware Advertising -- The Step Method – Battling
Identity
Theft
Using E-Retailers’ Websites...
”
Read Now
92
GSEC, GIAC security essentials certification : exam guide
by
Messier, Ric
Published 2019
McGraw-Hill
Table of Contents:
“
... -- Types of Security Threats -- Social Engineering -- Malware --
Identity
Theft
-- Mobile Device Threats...
”
Call Number:
QA76.3
Read Now
93
On the Way to the Web : The Secret History of the Internet and Its Founders
by
Banks, Michael
Published 2008
Apress
Table of Contents:
“
... -- Masquerades and
identity
theft
-- Privacy fears and threats -- Encryption -- Compromising corporate secrets...
”
Read Now
94
The basics of digital privacy : simple tools to protect your personal information and your identity online
by
Cherry, Denny
Published 2014
Syngress
“
... revelations of NSA data mining and the constant threat of
identity
theft
from criminals mean your privacy...
”
Call Number:
QA76.9.A25
Read Now
95
Stepping through cybersecurity risk management : a systems thinking approach
by
Bayuk, Jennifer L.
Published 2024
John Wiley & Sons, Inc.
Table of Contents:
“
... Networks 33 -- 2.2.1 Example:
Identity
Theft
34 -- 2.2.2 Zero-Day Threats 35 -- 2.3 Threat Vectors 37...
”
Call Number:
QA76.9.A25
Read Now
96
Responsible Design, Implementation and Use of Information and Communication Technology : 19th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2020, Skukuza, S...
Published 2020
Springer International Publishing
Table of Contents:
“
... -- Online
identity
theft
on consumer purchase intention: A mediating role of online security and privacy...
”
Read Now
97
New Approaches for Security, Privacy and Trust in Complex Environments : Proceedings of the IFIP TC 11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007...
Published 2007
Springer US
Table of Contents:
“
... for Transparently, Digitally Signing E-Learning Content -- Human-Computer Interaction II --
Identity
Theft
...
”
Read Now
98
Web and Communication Technologies and Internet-Related Social Issues - HSI 2005 : 3rd International Conference on Human-Society@Internet, Tokyo, Japan, July 27-29, 2005, Proceedin...
Published 2005
Springer Berlin Heidelberg
Table of Contents:
“
... Novel Conference Key Distribution System with Re-keying Protocol -- Multi-modal Techniques for
Identity
...
”
Read Now
99
Platform embedded security technology revealed : safeguarding the future of computing with Intel Embedded Security and Management Engine
by
Ruan, Xiaoyu
Published 2014
Apress, Distributed to the Book trade worldwide by Springer
Table of Contents:
“
...: the Robust, Convenient, and Cost-Effective Way to Deter
Identity
Theft
-- One-Time Password -- HOTP -- TOTP...
”
Call Number:
QA76.9.A25
Read Now
100
Proceedings of ICACTCE'23 — The International Conference on Advances in Communication Technology and Computer Engineering : New Artificial Intelligence and the Internet of Things B...
Published 2023
Springer Nature Switzerland
Table of Contents:
“
... algorithm to curb
identity
theft
-- Academic Performance Prediction using Machine learning algorithms...
”
1
2
3
4
5
6
Back
Narrow Search
Year of Publication
From:
To:
Classification
005 - Computer programming, programs & data
47
331 - Labor economics
19
364 - Criminology
19
500 - Natural sciences & mathematics
14
658 - General management
9
006 - Special computer methods
7
more ...
330 - Economics
6
004 - Data processing & computer science
5
332 - Financial economics
5
363 - Other social problems & services
4
381 - Commerce
4
384 - Communications; telecommunication
4
620 - Engineering & allied operations
4
302 - Social interaction
3
343 - Military, tax, trade & industrial law
3
374 - Adult education
3
003 - Systems
2
338 - Production
2
340 - Law
2
700 - The arts; fine & decorative arts
2
000 - Computer science, information & general works
1
011 - Bibliographies
1
025 - Library operations
1
100 - Philosophy & psychology
1
140 - Specific philosophical schools
1
300 - Social sciences
1
303 - Social processes
1
306 - Culture & institutions
1
320 - Political science
1
323 - Civil & political rights
1
327 - International relations
1
341 - Law of nations
1
380 - Commerce, communications & transportation
1
600 - Technology
1
613 - Personal health & safety
1
621 - Applied physics
1
745 - Decorative arts
1
800 - Literature & rhetoric
1
900 - History & geography
1
see all ...
less ...
Language
English
102
German
1
Collection
O'Reilly
56
Springer eBooks 2005-
35
Directory of Open Access Books
3
Elsevier ScienceDirect eBooks
2
Springer Book Archives -2004
2
Cambridge Books Online
1
more ...
Edward Elgar eBook Archive
1
JSTOR Open Access Books
1
OAPEN
1
OECD Books and Papers
1
see all ...
less ...
Author
Weisman, Steve
5
Haber, Morey J.
4
Rolls, Darran
4
Parker, Carey
3
Bowker, Art
2
Camp, L. Jean
2
more ...
Cherry, Denny
2
Coffin, David
2
LaRock, Thomas
2
Salomon, David
2
Shipley, Todd G.
2
Weston, Liz Pulliam
2
Abraham, Ajith
1
Adari, Suman Kalyan
1
Alder, Raven
1
Alla, Sridhar
1
Allen, Christopher
1
Andrews, Gillian "Gus"
1
Appleman, Dan
1
Aspinall, David
1
Baker, Caleb
1
Banks, Michael
1
Bayuk, Jennifer
1
Bayuk, Jennifer L.
1
Becker, Daniel
1
Bernabe, Jorge Bernal
1
Bernier, Kristyn
1
Berson, Alex
1
Bertocci, Vittorio
1
Blue, Violet
1
Bodmer, Sean
1
Boulouard, Zakaria
1
Bradley, Tony
1
Branigan, Steven
1
Brooks, Charles J.
1
Bunker, Guy
1
Burton, James D.
1
Camenisch, Jan
1
Camp, Olivier
1
Canals, Gérôme
1
Carvey, Harlan A.
1
Chuvakin, Anton
1
Collins, Judith M.
1
Conti, Greg
1
Crosier, Stephen
1
Davis, Michael
1
Davis, Yvette
1
De Decker, Bart
1
De Hert, Paul
1
Donovan, Felicia
1
Dubov, Lawrence
1
Eliav-Feldon, Miriam
1
Elisan, Christopher C.
1
Eloff, Jan
1
Eloff, Mariki
1
Ely, Adam
1
Ernst & Young
1
Eve, Martin Paul
1
Fischer, Annalisa
1
Fischer-Hübner, Simone
1
Fraser-King, Gareth
1
Furnell, Steven
1
Gal, Cecilia S.
1
Garfinkel, Simson
1
Gilbert, Tavia
1
Godart, Claude
1
Goldfarb, Shane
1
Goschenneck, Alexander
1
Gralla, Preston
1
Greenstein, Shane
1
Gronau, Norbert
1
Groothuis, Marga M.
1
Gupta, Sunil
1
Gutwirth, Serge
1
Hansen, Marit
1
Harris, Shon
1
Hattingh, Marié
1
Hewage, Chaminda
1
Ichii, Shingo
1
Ioannidis, Christos
1
Iwendi, Celestine
1
Jahankhani, Hamid
1
James, Lance
1
Johnson, M. Eric
1
Kantor, Paul B.
1
Kapoor, Monit
1
Kirwan, Grainne
1
Kryvinska, Natalia
1
Kumar, Basant
1
Labuschagne, Les
1
LeMasters, Aaron
1
Ledford, Jerri L.
1
Leenes, Ronald
1
Lesk, Michael E.
1
Letschert, Rianne
1
Ling, Tok Wang
1
Loiseau, Hugo
1
Long, Johnny
1
Matthee, Machdel
1
Messier, Ric
1
see all ...
less ...
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?page=5&lookfor=%22identity+theft%22&type=AllFields
Send by Email
×
Loading...