Identity Theft

Identity Theft

3.5 (2 ratings by Goodreads)
By (author) 

List price: US$29.99

Currently unavailable

Add to wishlist

AbeBooks may have this title (opens in new window).

Try AbeBooks


This book covers identity theft prevention and counter-measures for individuals, companies and ISPs.
show more

Product details

  • Paperback | 512 pages
  • 179.3 x 238.8 x 35.1mm | 984.3g
  • Prentice Hall
  • Upper Saddle River, United States
  • English
  • 0130082759
  • 9780130082756

Table of contents

Foreword. Introduction. Acknowledgments. I. IDENTITY THEFT FUNDAMENTALS. 1. Identity Theft Defined. What Is Identity Theft? How Identity Theft Is Done. Where There's Help. Getting Serious About Identity Theft. An Age of Betrayal.2. Minimizing Your Risk of Identity Theft. Guarding Against Identity Theft to Minimize Your Risk. Basic Security Precautions. Identifying Documents. End Notes. 3. Detecting, Reporting, and Recovering From Identity Theft. Detecting Your Misappropriated Identity. Reporting ID Theft. Recovering From Identity Theft. When All Else Fails, Sue! Endnotes.II. IDENTITY THEFT PROTECTION ON THE INTERNET. 4. Identity Theft on the Internet. Understanding Internet Identity Theft. Types of Associated Internet Identity Theft Crimes. Role of Privacy And Security Policies. Government Action and Public Policy. Endnotes.5. Prevention Methods for Internet Site Operators. Inadequate Protection. Identity Theft Is Easy. Battening Down The Hatches. Not Just ISPs. Online Identity Theft and Fraud Prevention. ID Theft and Fraud Protection Plan for E-Business. Preparing Your Site for Any Holiday. Insurance and E-Commerce: Cyberliabilities. International Addresses and AVSs. The Future Benefits. Endnotes.6. Protecting the Identity Information of Customers. The Internet Itself. Consumer and Corporate Identity Theft Protection Implementation and Deployment. Identity-Theft-Related Risks and Threats. Web Site Identity Theft Provisions. Web Identity Theft Protection Verification. Endnotes.7. Internet Site Operator Testing and Performance of Identity Theft Protection Techniques. Identity Theft Protection Principles. Design and Testing Techniques. Identity Theft and Your Web Site. Endnotes.III. IDENTITY PROTECTION FOR CORPORATIONS. 8. Protecting the Identity Information of Customers and Employees. Identity Theft Crimes. Identity Theft Offenders. Which Customers Are at Risk? Internal and External Identity Theft Offenders. Identity Theft Information Protection Measures. Planning for Identity Theft Liability. Endnotes.9. Guidelines for Protecting the Identity and Confidentiality of Personal Information When Working Outside the Corporate Office. Other Sensitive Information. Identity Theft Legislation. Removing Records From the Office. Paper Records. Electronic Records. Laptop and Home Computers. Wireless Technology. Telephones and Voice Mail. Email, Faxes, and Photocopies. Conversations Outside the Office. Reporting Requirements.10. Management of Ongoing Identity Theft Prevention and Protection Techniques. Management of Electronic Records. Neural Networks. Postfraud. Processing Internet Charges. Rerouting Shipments. Internet Privacy Policies. Endnotes.IV. IDENTITY THEFT FUTURE SOLUTIONS AND TECHNOLOGIES. 11. Biometrics. How Biometric Systems Work. Types of Biometrics. Privacy-Enhanced Biometrics-Based Authentication. Biometrics and DNA at Work: Are They Cost Prohibitive for Identity Theft Protection? Benefits. Some Final Thoughts. Endnotes.12. Digital Signatures: Smart, Optical, and Other Advanced Cards. Three Levels of Security. A Few Kinks to Work out. Smart, Optical, and Other Advanced Cards. Using Smart Cards to Secure E-Business Applications. Using Biometrics in Smart Card Information and Operations. Optical Memory Cards. The National ID Card: Is Big Brother Watching? Endnotes.13. Encryption. What Is Email Encryption and How Does It Work? Symmetric Key Encryption. Asymmetric Encryption. Digital Signatures. Types of Email Encryption Products. Next Steps. Endnotes.14. E-Commerce Security. The Vulnerability of Open Networks. Inadequate Privacy Laws, Policies, and Technologies. Privacy Solutions. E-Commerce Fraud Detection Solutions. Endnote.15. Data Mining. Information Storage. What Is Data Mining? Examples of Data Mining. The Implications of Data Mining in the Context of Fair. Information Practices. Consumers and Businesses: Choices to Consider. Endnote.16. Summary, Conclusions, and Recommendations. Summary. Recommendations. Final Words. Endnotes.APPENDICES. Appendix A. Identity Theft Federal Laws Listing. Identity Theft and Assumption Deterrence Act. Credit Laws.Appendix B. Identity Theft State Laws Listing. Appendix C. Identity Theft Reports, Testimony, and Comments Listing. Reports. Testimony. Comments.Appendix D. Identity Theft Cases and Scams Listing. Cases. Scams.Appendix E. Identity Theft Affidavit. Appendix F. Glossary. Index.
show more

About John R. Vacca

JOHN R. VACCA is an information technology consultant and internationally known author of 35 books and over 430 articles, many of them focused on the Internet and security issues. He served as computer security official for NASA's Freedom Space Station program and the International Space Station Program, from 1988 until his early retirement from NASA in 1995, and as security consultant for the MGM movie AntiTrust. Vacca's recent Prentice Hall PTR books include Essential Guide to Storage Area Networks and The Cabling Handbook, 2nd Edition.
show more

Rating details

2 ratings
3.5 out of 5 stars
5 0% (0)
4 50% (1)
3 50% (1)
2 0% (0)
1 0% (0)
Book ratings by Goodreads
Goodreads is the world's largest site for readers with over 50 million reviews. We're featuring millions of their reader ratings on our book pages to help you find your new favourite book. Close X