000 | 01887cam a22003374a 4500 | ||
---|---|---|---|
001 | 14163957 | ||
005 | 20131008125532.0 | ||
007 | Hard bound | ||
008 | 051102s2006 njua b 001 0 eng | ||
010 | _a 2005031926 | ||
020 | _a9780471757245 | ||
035 | _a(OCoLC)ocm62281947 | ||
040 |
_aDLC _cDLC _dBAKER _dC#P _dIXA _dDLC |
||
042 | _apcc | ||
043 | _an-us--- | ||
082 | 0 | 0 |
_a363.25963222 _222 _bCO-I |
100 | 1 | _aCollins, Judith M | |
245 | 1 | 0 |
_aInvestigating identity theft _ba guide for businesses, law enforcement, and victims |
260 |
_aNew Jersey _bJohn Wiley & Sons _c2006 |
||
300 |
_axiv,252p. _c24 cm. |
||
504 | _aIncludes bibliographical references (p. 249-250) and index. | ||
505 | 0 | _a"Real world" cases: solved and unsolved -- Know the crime and understand the criminal -- Computer security for identity fraud investigations -- Configuring the computer and introduction to cyber-searching -- Understand the victim: then prepare for the investigation -- Authenticate, then investigate -- Identity fraud investigation: a case example -- A walk through the World Wide Web -- Tracing IP addresses and URLs across the WWW -- Tracing e-mail addresses -- Searching and seizing: the investigator's role. | |
650 | 0 |
_aIdentity theft _zUnited States. |
|
856 | 4 | 1 |
_3Table of contents only _uhttp://www.loc.gov/catdir/toc/ecip063/2005031926.html |
856 | 4 | 2 |
_3Publisher description _uhttp://www.loc.gov/catdir/enhancements/fy0662/2005031926-d.html |
856 | 4 | 2 |
_3Contributor biographical information _uhttp://www.loc.gov/catdir/enhancements/fy0740/2005031926-b.html |
906 |
_a7 _bcbc _corignew _d1 _eecip _f20 _gy-gencatlg |
||
942 |
_2ddc _cBK |
||
999 |
_c5870 _d5870 |