000 01887cam a22003374a 4500
001 14163957
005 20131008125532.0
007 Hard bound
008 051102s2006 njua b 001 0 eng
010 _a 2005031926
020 _a9780471757245
035 _a(OCoLC)ocm62281947
040 _aDLC
_cDLC
_dBAKER
_dC#P
_dIXA
_dDLC
042 _apcc
043 _an-us---
082 0 0 _a363.25963222
_222
_bCO-I
100 1 _aCollins, Judith M
245 1 0 _aInvestigating identity theft
_ba guide for businesses, law enforcement, and victims
260 _aNew Jersey
_bJohn Wiley & Sons
_c2006
300 _axiv,252p.
_c24 cm.
504 _aIncludes bibliographical references (p. 249-250) and index.
505 0 _a"Real world" cases: solved and unsolved -- Know the crime and understand the criminal -- Computer security for identity fraud investigations -- Configuring the computer and introduction to cyber-searching -- Understand the victim: then prepare for the investigation -- Authenticate, then investigate -- Identity fraud investigation: a case example -- A walk through the World Wide Web -- Tracing IP addresses and URLs across the WWW -- Tracing e-mail addresses -- Searching and seizing: the investigator's role.
650 0 _aIdentity theft
_zUnited States.
856 4 1 _3Table of contents only
_uhttp://www.loc.gov/catdir/toc/ecip063/2005031926.html
856 4 2 _3Publisher description
_uhttp://www.loc.gov/catdir/enhancements/fy0662/2005031926-d.html
856 4 2 _3Contributor biographical information
_uhttp://www.loc.gov/catdir/enhancements/fy0740/2005031926-b.html
906 _a7
_bcbc
_corignew
_d1
_eecip
_f20
_gy-gencatlg
942 _2ddc
_cBK
999 _c5870
_d5870