Identity theft is sometimes considered a victimless crime, but readers will discover the truth about this damaging kind of crime as they learn about its history and the ways identity thieves work today. Essential facts about the methods identity thieves use including stealing mail and hacking computers are presented through comprehensive main text, comprehensive sidebars, and informative fact boxes.
hid | mid | miid | nid | wid | location_code | location | barcode | callnum | dewey | created | updated |
---|---|---|---|---|---|---|---|---|---|---|---|
1250367 | 4925559 | 2312 | 605001 | 801998 | HFHS | 264 | HFHS640112 | 364.1 MAC | 364.1 | 1581465224 | 1736518457 |
1590436 | 5214928 | 2350 | 605001 | 801998 | WTHS | 494 | WTHS117046 | 364.16 MAC | 364.16 | 1581465224 | 1736518457 |
1692705 | 5306693 | 2246 | 605001 | 801998 | WCHS | 508 | 93000135 | 364.16 MAC | 364.16 | 1582575937 | 1709307855 |
2838761 | 6321373 | 2390 | 605001 | 801998 | HOS | 269 | HOS0047860 | 322 Mac | 322 | 1637782573 | 1736800991 |
2966621 | 6438432 | 2406 | 605001 | 801998 | NEH | 343 | NWS0053793 | 364.16 MAC | 364.16 | 1637782573 | 1736800991 |