購物比價 | 找書網 | 找車網 |
FindBook |
有 1 項符合
Twelve and a Half Steps to Avoid Identity Theft的圖書 |
Twelve and a Half Steps to Avoid Identity Theft 作者:Ronald J. Leach 出版社:AfterMath 出版日期:2012-10-29 語言:英文 |
圖書館借閱 |
國家圖書館 | 全國圖書書目資訊網 | 國立公共資訊圖書館 | 電子書服務平台 | MetaCat 跨館整合查詢 |
臺北市立圖書館 | 新北市立圖書館 | 基隆市公共圖書館 | 桃園市立圖書館 | 新竹縣公共圖書館 |
苗栗縣立圖書館 | 臺中市立圖書館 | 彰化縣公共圖書館 | 南投縣文化局 | 雲林縣公共圖書館 |
嘉義縣圖書館 | 臺南市立圖書館 | 高雄市立圖書館 | 屏東縣公共圖書館 | 宜蘭縣公共圖書館 |
花蓮縣文化局 | 臺東縣文化處 |
|
Ronald J. Leach's lectures on identity theft have been attended by more than 1,200 people. Many more have heard him on closed-circuit television. This experience, and his long experience as a professor of computer science make him uniquely qualified to write this book.
Do you know how to protect your vital identity information when you use computers for your banking, credit card transactions, and everyday purchases? What about when you are using email, web surfing, texting, or social networking? You’ll learn about these in Twelve and a Half Steps to Avoid Identity Theft.
What do all these companies, organizations, and people have in common?
The sad answer is that all of them have suffered well-publicized recent successful attacks from identity thieves. Many of these attacks involved thieves obtaining access to confidential financial information from thousands, and in some cases, millions, of customers.
How can you protect yourselves from this crime? In this book we describe 12 1/2 suggestions that can strongly reduce, or even eliminate, the likelihood of you being an identity theft victim. Why 12 1/2 steps? Because twelve of the steps are ones that you can begin to take right away, and the other will require you to do some additional work reading up on this vital topic.
Here are the twelve and a half simple steps to help avoid identity theft:
12 ½. Get more information
This short, easy-to-understand book, intended for the general, non-specialist reader, will tell you what to do and what to avoid when going to a bank, pharmacy, or doctor; shopping in person; traveling; or using any kind of electronic commerce. You’ll learn about the most common security weaknesses of modern banking and e-commerce software and when to avoid using certain software systems, the tell-tale signs of potentially insecure transmission of your data, and how to avoid the dangerous practice of “Pameiob.” You'll learn how you have to protect yourself from the kinds of identity theft that can occur even if YOU never do any online shopping.
This book is a brief, easy-to-understand guide that is dedicated to keeping your assets and identity safe while navigating this dangerous world. The book is based on the author's experiences as a long-term identity theft consultant and lecturer and computer scientist.
Want more detailed information on identity theft? Then “Identity Theft in the Cyber Age” is the book for you.
|