Your search returned 7 results.

1.
Global challenges for identity policies / Edgar A. Whitley and Gus Hosein.

by Whitley, Edgar A | Hosein, Ian.

Series: Technology, work and globalizationMaterial type: Text Text; Format: print ; Literary form: Not fiction Publication details: Hampshire : Palgrave Macmillan, 2010Availability: Items available for loan: Main LibraryCall number: HV 6675 WHI (1).

2.
Preventing Identity Theft in Your Business : How to Protect Your Business, Customers, and Employees.

by Collins, Judith M.

Edition: 1st ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Hoboken : John Wiley & Sons, Incorporated, 2005Copyright date: ©2005Online access: Click to View Availability: No items available :

3.
How to Own an Identity : How to Own an Identity.

by Russell, Ryan | Eller, Riley | Beale, Jay | Riley, Peter A | Hurley, Chris | Parker, Tom | Hatch, Brian | Mullen, Timothy.

Series: Stealing the NetworkEdition: 1st ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Kidlington : William Andrew, 2005Copyright date: ©2005Online access: Click to View Availability: No items available :

4.
Phishing Exposed.

by James, Lance | Jevans, Dave.

Edition: 1st ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Kidlington : William Andrew, 2005Copyright date: ©2006Online access: Click to View Availability: No items available :

5.
Identity Theft in Today's World.

by McNally, Megan M.

Series: Global Crime and Justice SerMaterial type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Westport : ABC-CLIO, LLC, 2011Copyright date: ©2012Online access: Click to View Availability: No items available :

6.
Identity Thieves : Motives and Methods.

by Copes, Heith | Vieraitis, Lynne M.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Lebanon : Northeastern University Press, 2012Copyright date: ©2012Online access: Click to View Availability: No items available :

7.
Phishing Dark Waters : The Offensive and Defensive Sides of Malicious Emails.

by Hadnagy, Christopher | Fincher, Michele | Dreeke, Robin.

Edition: 1st ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Somerset : John Wiley & Sons, Incorporated, 2015Copyright date: ©2015Online access: Click to View Availability: No items available :

Powered by Koha