Identity Theft
暫譯: 身份盜竊
John R. Vacca
- 出版商: Prentice Hall
- 出版日期: 2002-09-12
- 定價: $1,050
- 售價: 5.0 折 $525
- 語言: 英文
- 頁數: 512
- 裝訂: Paperback
- ISBN: 0130082759
- ISBN-13: 9780130082756
-
相關分類:
Penetration-test
立即出貨(限量) (庫存=3)
買這商品的人也買了...
-
SQL Server 2000 設計實務$650$553 -
ASP.NET 網頁製作教本─從基本語法學起$600$510 -
實戰 Pro/ENGINEER 工程圖$680$578 -
Thinking in Java 中文版 (Thinking in Java, 2/e)$920$727 -
Java 2 500 個應用技巧大全集$560$437 -
C++ Builder 6 完全攻略$690$587 -
作業系統概念 (Operating System Concepts, 6/e Windows XP Update)$780$741 -
Software Requirements: Practical Techniques for Gathering and Managing Requirements Throughout the Product Development Cycle, 2/e (Paperback)$1,590$1,511 -
執行力 EXECUTION$350$298 -
ASP.NET 程式設計徹底研究$590$466 -
Red Hat Linux 9 架站實務$620$527 -
深入淺出 JBuilder 程式設計實作(JBuilder 9.0/8.0/7.0 適用) (Charlie Calvert's Learn Jbuilder)$720$562 -
Practical Java Programming Language Guide 中文版 (Practical Java Programming Language Guide)$560$442 -
Internet & World Wide Web How to Program, 3/e$1,200$1,176 -
人月神話:軟體專案管理之道 (20 週年紀念版)(The Mythical Man-Month: Essays on Software Engineering, Anniversary Edition, 2/e)$480$379 -
CCNA 認證教戰手冊 Exam 640-801 (CCNA Cisco Certified Network Associate Study Guide, 4/e)$780$663 -
密碼學與網路安全-原理與實務 (Cryptography and Network Security: Principles and Practices, 3/e)$680$537 -
最新 Linux 指令語法辭典$450$351 -
Reporting Service 實戰演練$690$587 -
Linux 程式設計教學手冊$780$616 -
Flash ActionScript 2.0 RIA 應用程式開發$760$646 -
RFID 技術與應用$480$408 -
最新 Java 2 程式語言$650$553 -
PowerPoint 2003 中文版實務$460$363 -
Ajax 實戰手冊 (Ajax in Action)$680$537
相關主題
商品描述
- Protect yourself against the fastest growing crime in America
- Practical solutions for businesses, organizations, and individuals
- Planning, designing, testing, and deploying effective anti-ID theft systems
- Identifying, investigating, and recovering from identity theft
- Biometrics and other emerging technological solutions
Protect yourself against the fastest growing crime in America: identity theft!
This year, nearly one million people will become victims of the fastest growing crime in America: identity theft. Now, there's a complete guide to preventing it, detecting it, and recovering from it. Written for technology professionals, security specialists, law enforcement professionals, and technology-aware laypeople, Identity Theft covers every facet of the problem—and every countermeasure. It's an indispensable resource—whether you want to protect yourself, your customers, or your citizens.
- Practical solutions for individuals, corporations, non-profit institutions, and Internet Service Providers
- Multifaceted responses that involve businesses, consumers, and public policy
- How to analyze risks to your system on an end-to-end basis
- How to plan, design, test, and deploy effective anti-ID theft policies, systems, and technologies
- Emerging anti-ID theft planning and development technologies and solutions
- Extensive case studies and hands-on examples, as well as the latest field and trial experiments
- Identifying, investigating, and recovering from identity theft
From simple personal steps you can take right now, to state-of-the-art biometrics and encryption solutions, John R. Vacca covers everything you need to know to fight identity theft—and win.
Table of
Contents
Foreword.
Introduction.
Acknowledgments.
I. IDENTITY THEFT FUNDAMENTALS.
1. Identity Theft Defined.
2. Minimizing Your Risk of Identity Theft.
Guarding Against Identity Theft to Minimize Your Risk. Basic Security
Precautions. Identifying Documents. End Notes.
3. Detecting, Reporting, and
Recovering From Identity Theft.
II. IDENTITY THEFT PROTECTION ON THE INTERNET.
4. Identity Theft on the Internet.
5. Prevention Methods for Internet
Site Operators.
6. Protecting the Identity Information of Customers.
7.
Internet Site Operator Testing and Performance of Identity Theft Protection
Techniques.
III. IDENTITY PROTECTION FOR CORPORATIONS.
8. Protecting the Identity Information of Customers and Employees.
9.
Guidelines for Protecting the Identity and Confidentiality of Personal
Information When Working Outside the Corporate Office.
10. Management of
Ongoing Identity Theft Prevention and Protection Techniques.
IV. IDENTITY THEFT FUTURE SOLUTIONS AND TECHNOLOGIES.
11. Biometrics.
12. Digital Signatures: Smart, Optical, and Other
Advanced Cards.
13. Encryption.
14. E-Commerce Security.
15. Data
Mining.
16. Summary, Conclusions, and Recommendations.
APPENDICES.
Appendix A. Identity Theft Federal Laws Listing.
Appendix B. Identity
Theft State Laws Listing.
Appendix C. Identity Theft Reports, Testimony, and
Comments Listing.
Appendix D. Identity Theft Cases and Scams Listing.
Appendix E. Identity Theft Affidavit.
Appendix F. Glossary.
Index
商品描述(中文翻譯)
摘要
- 保護自己免受美國增長最快的犯罪:身份盜竊
- 為企業、組織和個人提供實用解決方案
- 計劃、設計、測試和部署有效的反身份盜竊系統
- 識別、調查和從身份盜竊中恢復
- 生物識別技術及其他新興技術解決方案
保護自己免受美國增長最快的犯罪:身份盜竊!
今年,將近一百萬人將成為美國增長最快的犯罪:身份盜竊的受害者。現在,有一本完整的指南來預防、檢測和從中恢復。這本書是為技術專業人士、安全專家、執法專業人士和具技術意識的普通人撰寫的,涵蓋了問題的每個方面——以及每一項對策。這是一本不可或缺的資源——無論您想保護自己、您的客戶還是您的公民。
- 為個人、企業、非營利機構和網際網路服務提供商提供實用解決方案
- 涉及企業、消費者和公共政策的多面向回應
- 如何從端到端分析系統的風險
- 如何計劃、設計、測試和部署有效的反身份盜竊政策、系統和技術
- 新興的反身份盜竊計劃和開發技術及解決方案
- 廣泛的案例研究和實作範例,以及最新的現場和試驗實驗
- 識別、調查和從身份盜竊中恢復
從您現在可以採取的簡單個人步驟,到最先進的生物識別和加密解決方案,John R. Vacca 涵蓋了您需要知道的所有內容,以對抗身份盜竊——並獲勝。
目錄
前言。
介紹。
致謝。
I. 身份盜竊基礎知識。
1. 身份盜竊的定義。
2. 最小化身份盜竊的風險。防範身份盜竊以最小化風險。基本安全預防措施。識別文件。附註。
3. 檢測、報告和從身份盜竊中恢復。
II. 網際網路上的身份盜竊保護。
4. 網際網路上的身份盜竊。
5. 網站運營商的預防方法。
6. 保護客戶的身份信息。
7. 網站運營商測試和身份盜竊保護技術的性能。
III. 企業的身份保護。
8. 保護客戶和員工的身份信息。
9. 在公司辦公室外工作時保護個人信息的身份和保密性指導方針。
10. 持續身份盜竊預防和保護技術的管理。
IV. 身份盜竊的未來解決方案和技術。
11. 生物識別技術。
12. 數位簽名:智慧卡、光學卡和其他先進卡片。
13. 加密技術。
14. 電子商務安全。
15. 數據挖掘。
16. 總結、結論和建議。
附錄。
附錄 A. 身份盜竊聯邦法律清單。
附錄 B. 身份盜竊州法律清單。
附錄 C. 身份盜竊報告、證詞和評論清單。
附錄 D. 身份盜竊案例和詐騙清單。
附錄 E. 身份盜竊宣誓書。
附錄 F. 詞彙表。
索引
