81
by Miller, Michael
Published 2008
Que
...Is It Safe? PROTECTING YOUR COMPUTER, YOUR BUSINESS, AND YOURSELF ONLINE IDENTITY THEFT. DATA THEFT...

83
by Parker, Carey
Published 2020
Apress
... identity theft Protect yourself from viruses and scams Maximize your smartphone security and privacy...

84
Published 2010
Springer Berlin Heidelberg
... of privacy, identity theft, and other security threats. Our real and virtual worlds are becoming increasingly...

85
by Conti, Greg
Published 2009
Addison-Wesley

86
Published 2009
Vieweg+Teubner Verlag
Table of Contents: ... environment -- Identity Theft in Electronic Financial Transactions The experience of the Central Bank of Spain...

87
Published 2004
Springer Berlin Heidelberg
Table of Contents: ... Security -- Prevent Online Identity Theft – Using Network Smart Cards for Secure Online Transactions...

88
by Garfinkel, Simson
Published 2002
O'Reilly

89
Published 2018
Wiley
Table of Contents: ...; Identity Theft; Chapter 2 Filing status; Marital Status; Single; Married Filing Jointly; Filing a Joint...

90
by Shimonski, Robert
Published 2015
Syngress
..., identity theft, social engineering, sniffing, and more. Real-world examples are examined using key concepts...

91
Published 2009
Springer Berlin Heidelberg
Table of Contents: ... Privacy-Aware Advertising -- The Step Method – Battling Identity Theft Using E-Retailers’ Websites...

92
by Messier, Ric
Published 2019
McGraw-Hill
Table of Contents: ... -- Types of Security Threats -- Social Engineering -- Malware -- Identity Theft -- Mobile Device Threats...

93
by Banks, Michael
Published 2008
Apress
Table of Contents: ... -- Masquerades and identity theft -- Privacy fears and threats -- Encryption -- Compromising corporate secrets...

94
by Cherry, Denny
Published 2014
Syngress
... revelations of NSA data mining and the constant threat of identity theft from criminals mean your privacy...

95
by Bayuk, Jennifer L.
Published 2024
John Wiley & Sons, Inc.
Table of Contents: ... Networks 33 -- 2.2.1 Example: Identity Theft 34 -- 2.2.2 Zero-Day Threats 35 -- 2.3 Threat Vectors 37...

96
Published 2020
Springer International Publishing
Table of Contents: ... -- Online identity theft on consumer purchase intention: A mediating role of online security and privacy...

97
Published 2007
Springer US
Table of Contents: ... for Transparently, Digitally Signing E-Learning Content -- Human-Computer Interaction II -- Identity Theft...

98
Published 2005
Springer Berlin Heidelberg
Table of Contents: ... Novel Conference Key Distribution System with Re-keying Protocol -- Multi-modal Techniques for Identity...

99
by Ruan, Xiaoyu
Published 2014
Apress, Distributed to the Book trade worldwide by Springer
Table of Contents: ...: the Robust, Convenient, and Cost-Effective Way to Deter Identity Theft -- One-Time Password -- HOTP -- TOTP...

100
Published 2023
Springer Nature Switzerland
Table of Contents: ... algorithm to curb identity theft -- Academic Performance Prediction using Machine learning algorithms...