DRIVE-THRU / CURBSIDE PICKUP

Passwords are now required to access your account. To create a password, select "Reset my Password" from the Login screen (email address required). For further assistance, please visit the Library Account Passwords FAQ page for instructions or call the library at 970-243-4442.

50 ways to protect your identity in a digital age: new financial threats you need to know and how to avoid them
(Book)

Book Cover
Average Rating
Published:
Upper Saddle River, N.J. : FT Press, [2013].
Format:
Book
Edition:
2nd ed.
Physical Desc:
xix, 296 pages ; 23 cm
Status:
Description

Protect Yourself from Today's Dangerous New Forms of Identity Theft! Prevent new ID attacks via Facebook, smartphones, iPads, Wi-Fi, and the cloudOffers today's best techniques for fixing damage after you've been attackedObjectively reviews products that claim to help you prevent identity theft Identity theft is more dangerous than ever! The bad guys are smarter, more sophisticated, more organized--and as we live more of our lives online, we're exposing far more personal information to them. Now, identity theft expert Steve Weisman reveals today's worst new threats and helps you systematically reduce your vulnerabilities. Weisman shows how social media, mobile devices, and the cloud have created major new dangers and how groups ranging from local hackers to foreign organized crime syndicates are exploiting them. He offers indispensable new guidance for avoiding risks, minimizing risks that can't be completely avoided, and quickly halting the damage after an attack. Packed with checklists, sample letters, and other practical tools, this is today's one indispensable guide to protecting what matters most: your identity!

Also in This Series
Copies
Location
Call Number
Status
Last Check-In
Bemis Lower Level
332.024 WEISMAN
On Shelf
Aug 11, 2013
SSCL Bud Adult Nonfiction
332.024 WEI
On Shelf
Jul 14, 2014
More Like This
More Copies In Prospector
Loading Prospector Copies...
More Details
Language:
English
ISBN:
9780133089073

Notes

General Note
Includes index.
Description
Protect Yourself from Today's Dangerous New Forms of Identity Theft! Prevent new ID attacks via Facebook, smartphones, iPads, Wi-Fi, and the cloudOffers today's best techniques for fixing damage after you've been attackedObjectively reviews products that claim to help you prevent identity theft Identity theft is more dangerous than ever! The bad guys are smarter, more sophisticated, more organized--and as we live more of our lives online, we're exposing far more personal information to them. Now, identity theft expert Steve Weisman reveals today's worst new threats and helps you systematically reduce your vulnerabilities. Weisman shows how social media, mobile devices, and the cloud have created major new dangers and how groups ranging from local hackers to foreign organized crime syndicates are exploiting them. He offers indispensable new guidance for avoiding risks, minimizing risks that can't be completely avoided, and quickly halting the damage after an attack. Packed with checklists, sample letters, and other practical tools, this is today's one indispensable guide to protecting what matters most: your identity!
Reviews from GoodReads
Loading GoodReads Reviews.
Tagging
Tags:

No Tags, Be the first to tag this record!


Citations
APA Citation (style guide)

Weisman, S. (2013). 50 ways to protect your identity in a digital age: new financial threats you need to know and how to avoid them. 2nd ed. Upper Saddle River, N.J., FT Press.

Chicago / Turabian - Author Date Citation (style guide)

Weisman, Steve. 2013. 50 Ways to Protect Your Identity in a Digital Age: New Financial Threats You Need to Know and How to Avoid Them. Upper Saddle River, N.J., FT Press.

Chicago / Turabian - Humanities Citation (style guide)

Weisman, Steve, 50 Ways to Protect Your Identity in a Digital Age: New Financial Threats You Need to Know and How to Avoid Them. Upper Saddle River, N.J., FT Press, 2013.

MLA Citation (style guide)

Weisman, Steve. 50 Ways to Protect Your Identity in a Digital Age: New Financial Threats You Need to Know and How to Avoid Them. 2nd ed. Upper Saddle River, N.J., FT Press, 2013.

Note! Citation formats are based on standards as of July 2022. Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy.
Staff View
Grouped Work ID:
0f14e550-4888-5ecd-eced-43833edb0a20
Go To GroupedWork

Record Information

Last Sierra Extract TimeFeb 17, 2024 03:02:21 PM
Last File Modification TimeFeb 17, 2024 03:02:46 PM
Last Grouped Work Modification TimeFeb 17, 2024 03:02:28 PM

MARC Record

LEADER03748pam a2200541 a 4500
001794039100
003OCoLC
00520121026131738.0
008120803t20132013nju      f    001 0 eng  
010 |a 2012028627
020 |a 9780133089073|q paperback|q alkaline paper
035 |a (OCoLC)794039100
040 |a DLC|b eng|c DLC|d GCmBT
042 |a pcc
043 |a n-us---
049 |a HEVA
05000|a HV6679|b .W44 2013
08200|a 332.024|2 23
092 |a 332.024|b WEI
1001 |a Weisman, Steve.|0 https://id.loc.gov/authorities/names/n2003114079
24510|a 50 ways to protect your identity in a digital age :|b new financial threats you need to know and how to avoid them /|c Steve Weisman.
2463 |a Fifty ways to protect your identity in a digital age
250 |a 2nd ed.
264 1|a Upper Saddle River, N.J. :|b FT Press,|c [2013]
264 4|c ©2013
300 |a xix, 296 pages ;|c 23 cm
336 |a text|b txt|2 rdacontent
337 |a unmediated|b n|2 rdamedia
338 |a volume|b nc|2 rdacarrier
500 |a Includes index.
520 |a Protect Yourself from Today's Dangerous New Forms of Identity Theft! Prevent new ID attacks via Facebook, smartphones, iPads, Wi-Fi, and the cloudOffers today's best techniques for fixing damage after you've been attackedObjectively reviews products that claim to help you prevent identity theft Identity theft is more dangerous than ever! The bad guys are smarter, more sophisticated, more organized--and as we live more of our lives online, we're exposing far more personal information to them. Now, identity theft expert Steve Weisman reveals today's worst new threats and helps you systematically reduce your vulnerabilities. Weisman shows how social media, mobile devices, and the cloud have created major new dangers and how groups ranging from local hackers to foreign organized crime syndicates are exploiting them. He offers indispensable new guidance for avoiding risks, minimizing risks that can't be completely avoided, and quickly halting the damage after an attack. Packed with checklists, sample letters, and other practical tools, this is today's one indispensable guide to protecting what matters most: your identity!
650 0|a Identity theft|z United States|x Prevention|0 https://id.loc.gov/authorities/subjects/sh2008104242|v Handbooks, manuals, etc.|0 https://id.loc.gov/authorities/subjects/sh99001300
650 0|a Consumer credit|z United States|v Handbooks, manuals, etc.|0 https://id.loc.gov/authorities/subjects/sh2009121668
650 0|a Credit ratings|z United States|0 https://id.loc.gov/authorities/subjects/sh85033871|v Handbooks, manuals, etc.|0 https://id.loc.gov/authorities/subjects/sh99001300
650 0|a Privacy, Right of|z United States|0 https://id.loc.gov/authorities/subjects/sh2008108965|v Handbooks, manuals, etc.|0 https://id.loc.gov/authorities/subjects/sh99001300
650 0|a Records|x Access control|z United States|v Handbooks, manuals, etc.|0 https://id.loc.gov/authorities/subjects/sh2007009052
655 7|a Handbooks and manuals.|2 lcgft|0 https://id.loc.gov/authorities/genreForms/gf2014026109
907 |a .b36229854
948 |a MARCIVE Comp, in 2022.12
948 |a MARCIVE August, 2017
948 |a MARCIVE extract Aug, 5 2017
989 |1 .i74070095|b 1240058180069|d ssbnf|g -|m |h 1|x 0|t 0|i 2|j 7|k 121106|n 07-14-2014 21:03|o -|a 332.024|r WEI
989 |1 .i123560408|b 31813004502257|d below|g -|m |h 3|x 0|t 0|i 0|j 300|k 190216|n 08-11-2013 10:00|o -|a 332.024 WEISMAN
995 |a Loaded with m2btab.ltiac in 2022.12
995 |a Loaded with m2btab.ltiac in 2017.08
995 |a Loaded with m2btab.ing in 2017.03
995 |a Initial Bemis load m2btab.test019 in 2019.02
998 |e -|f eng|a be|a ss|a ssb