Identity theft handbook : detection, prevention, and security /

"With rich, real-world content cut from today's headlines as well as the personal experiences of the author, this timely book provides a thorough understanding of identity theft, from its birth in credit card and student loan fraud through its current worldwide reach. Identity Theft Handbo...

Full description

Saved in:
Bibliographic Details
Main Authors: Biegelman, Martin T. (Author)
Corporate Authors: Wiley InterScience (Online service)
Published: Wiley,
Publisher Address: Hoboken, N.J. :
Publication Dates: 2009.
Literature type: eBook
Language: English
Subjects:
Online Access: http://onlinelibrary.wiley.com/book/10.1002/9781119203162
Summary: "With rich, real-world content cut from today's headlines as well as the personal experiences of the author, this timely book provides a thorough understanding of identity theft, from its birth in credit card and student loan fraud through its current worldwide reach. Identity Theft Handbook is filled with coverage of cutting edge research, trends, the role of technology, prevention strategies, and the future growth and challenges of this crime."--Jacket.
Carrier Form: 1 online resource (xxiv, 349 pages)
Bibliography: Includes bibliographical references and index.
ISBN: 9780470444764
0470444762
9780470444771
0470444770
9781119203162
1119203163
Index Number: HV6679
CLC: D771.288
Contents: 1. The Identity Theft Explosion -- 2. Game of the Name: How it All Began -- 3. How Identity Theft Occurs -- 4. Student Loan Fraud and the Theft of Identity -- 5. Nigerian Criminal Enterprises -- 6. Methamphetamine, the Mails, and Check Washing -- 7. The Violent Side of Identity Theft -- 8. Medical Identity Theft -- 9. Fake IDS -- 10. Legislation and Criminal Statutes -- 11. Law Enforcement Efforts -- 12. Teens and Young Adults as Victims and Perpetrators -- 13. Victims and Victimization -- 14. The San Diego Experience -- 15. The Rich, the Famous, and the Dead Get no Peace -- 16. Identity Theft Goes Global -- 17. Privacy and Data Breaches -- 18. Identity Theft Research -- 19. The Center for Identity Management and Information Protection -- 20. Preventing Identity Theft: 21 Rules you Must Use -- 21. Future of Identity Theft -- App. Designing an Effective Identity Theft Red Flags Rule Compliance Program.