Identity Theft
John R. Vacca
- 出版商: Prentice Hall
- 出版日期: 2002-09-12
- 定價: $1,050
- 售價: 5.0 折 $525
- 語言: 英文
- 頁數: 512
- 裝訂: Paperback
- ISBN: 0130082759
- ISBN-13: 9780130082756
-
相關分類:
資訊安全
立即出貨(限量) (庫存=3)
買這商品的人也買了...
-
$650$553 -
$600$510 -
$680$537 -
$920$727 -
$560$437 -
$690$587 -
$780$741 -
$1,670$1,587 -
$350$298 -
$590$466 -
$620$527 -
$720$562 -
$560$442 -
$1,140Internet & World Wide Web How to Program, 3/e
-
$480$379 -
$780$663 -
$680$537 -
$450$351 -
$690$587 -
$780$616 -
$760$684 -
$480$408 -
$650$553 -
$460$363 -
$680$537
相關主題
商品描述
- Protect yourself against the fastest growing crime in America
- Practical solutions for businesses, organizations, and individuals
- Planning, designing, testing, and deploying effective anti-ID theft systems
- Identifying, investigating, and recovering from identity theft
- Biometrics and other emerging technological solutions
Protect yourself against the fastest growing crime in America: identity theft!
This year, nearly one million people will become victims of the fastest growing crime in America: identity theft. Now, there's a complete guide to preventing it, detecting it, and recovering from it. Written for technology professionals, security specialists, law enforcement professionals, and technology-aware laypeople, Identity Theft covers every facet of the problem—and every countermeasure. It's an indispensable resource—whether you want to protect yourself, your customers, or your citizens.
- Practical solutions for individuals, corporations, non-profit institutions, and Internet Service Providers
- Multifaceted responses that involve businesses, consumers, and public policy
- How to analyze risks to your system on an end-to-end basis
- How to plan, design, test, and deploy effective anti-ID theft policies, systems, and technologies
- Emerging anti-ID theft planning and development technologies and solutions
- Extensive case studies and hands-on examples, as well as the latest field and trial experiments
- Identifying, investigating, and recovering from identity theft
From simple personal steps you can take right now, to state-of-the-art biometrics and encryption solutions, John R. Vacca covers everything you need to know to fight identity theft—and win.
Table of
Contents
Foreword.
Introduction.
Acknowledgments.
I. IDENTITY THEFT FUNDAMENTALS.
1. Identity Theft Defined.
2. Minimizing Your Risk of Identity Theft.
Guarding Against Identity Theft to Minimize Your Risk. Basic Security
Precautions. Identifying Documents. End Notes.
3. Detecting, Reporting, and
Recovering From Identity Theft.
II. IDENTITY THEFT PROTECTION ON THE INTERNET.
4. Identity Theft on the Internet.
5. Prevention Methods for Internet
Site Operators.
6. Protecting the Identity Information of Customers.
7.
Internet Site Operator Testing and Performance of Identity Theft Protection
Techniques.
III. IDENTITY PROTECTION FOR CORPORATIONS.
8. Protecting the Identity Information of Customers and Employees.
9.
Guidelines for Protecting the Identity and Confidentiality of Personal
Information When Working Outside the Corporate Office.
10. Management of
Ongoing Identity Theft Prevention and Protection Techniques.
IV. IDENTITY THEFT FUTURE SOLUTIONS AND TECHNOLOGIES.
11. Biometrics.
12. Digital Signatures: Smart, Optical, and Other
Advanced Cards.
13. Encryption.
14. E-Commerce Security.
15. Data
Mining.
16. Summary, Conclusions, and Recommendations.
APPENDICES.
Appendix A. Identity Theft Federal Laws Listing.
Appendix B. Identity
Theft State Laws Listing.
Appendix C. Identity Theft Reports, Testimony, and
Comments Listing.
Appendix D. Identity Theft Cases and Scams Listing.
Appendix E. Identity Theft Affidavit.
Appendix F. Glossary.
Index
商品描述(中文翻譯)
摘要
- 在美國,身份盜竊是增長最快的犯罪行為,本書提供了保護自己的方法。
- 針對企業、組織和個人的實用解決方案。
- 計劃、設計、測試和部署有效的反身份盜竊系統。
- 識別、調查和復原身份盜竊。
- 生物識別和其他新興技術解決方案。
保護自己免受美國增長最快的犯罪行為:身份盜竊!
今年,將有近100萬人成為美國增長最快的犯罪行為:身份盜竊的受害者。現在,有一本完整的指南,可以預防、檢測和復原身份盜竊。本書針對技術專業人士、安全專家、執法人員和對技術敏感的一般人,涵蓋了問題的各個方面和對策。無論您是想保護自己、您的客戶還是您的公民,這都是一個不可或缺的資源。
- 適用於個人、公司、非營利機構和互聯網服務提供商的實用解決方案。
- 涉及企業、消費者和公共政策的多方面回應。
- 如何從端到端分析系統風險。
- 計劃、設計、測試和部署有效的反身份盜竊政策、系統和技術。
- 新興的反身份盜竊規劃和開發技術和解決方案。
- 大量案例研究和實際示例,以及最新的現場和試驗實驗。
- 識別、調查和復原身份盜竊。
從您現在可以採取的簡單個人步驟到最先進的生物識別和加密解決方案,John R. Vacca涵蓋了您需要了解的一切,以打擊身份盜竊並取得勝利。
目錄
- 前言
- 簡介
- 致謝
第一部分:身份盜竊基礎知識
1. 定義身份盜竊
2. 減少身份盜竊風險
3. 檢測、報告和復原身份盜竊
第二部分:互聯網上的身份盜竊保護
4. 互聯網上的身份盜竊
5. 網站運營商的預防方法
6. 保護客戶的身份信息
7. 網站運營商的身份盜竊保護技術測試和性能
第三部分:企業的身份盜竊保護
8. 保護客戶和員工的身份信息
9. 在企業辦公室外工作時保護個人信息的指南
10. 持續身份盜竊預防和保護技術的管理
第四部分:身份盜竊未來解決方案和技術
11. 生物識別
12. 數字簽名:智能、光學和其他高級卡片
13. 加密
14. 電子商務安全
15. 數據挖掘
16. 總結、結論和建議
附錄
- 附錄A:聯邦身份盜竊法律列表
- 附錄B:州身份盜竊法律列表
- 附錄C:身份盜竊報告、證詞和評論列表
- 附錄D:身份盜竊案例和詐騙列表
- 附錄E:身份盜竊宣誓書
- 附錄F:詞彙表
- 索引