identity theft

Type: 
Topical Term
Subfield: 
a
Alias: 
identity theft

Identity theft in the 21st century

Identity theft is sometimes considered a victimless crime, but readers will discover the truth about this damaging kind of crime as they learn about its history and the ways identity thieves work today. Essential facts about the methods identity thieves use including stealing mail and hacking computers are presented through comprehensive main text, comprehensive sidebars, and informative fact boxes.

Online identity and privacy

12 things you need to know
2016
Text and photographs look at twelve things about online identity and privacy.

User ID

2005
Charlene Cummins longs for a better life, and decides to steal the identity of Manhattan resident Vera de Sica, who struggles to stop Charlene's scam and rebuild her own identity.

The girl who was supposed to die

2014
"She doesn't know who she is. She doesn't know where she is, or why. All she knows when she comes to in a ransacked cabin is that there are two men arguing over whether or not to kill her. And that she must run. Follow Cady and Ty (her accidental savior turned companion), as they race against the clock to stay alive"--Provided by publisher.

Be smart about shopping

the critical consumer and civic financial responsibility
2014
Discusses smart shopping and the critical consumer, including basic money choices, prioritizing financial decisions, comparison shopping, making smart purchasing choices, protecting against identity theft, and civic financial responsibility.

Be smart about money

money management and budgeting
2014
Examines money management and budgeting, including saving and spending strategies, making decisions about the best financial products and services, and creating a personal budget.

To rise again at a decent hour

a novel
After noticing that his identity has been stolen and used to create various social media accounts, Paul O'Rourke, a man with a troubled past, begins to wonder if his virtual alter ego is actually a better version of himself.

Online privacy and hacking

2015
Governments, businesses, and individuals all rely on secure online communication and information but increasing news reports about online breaches due to hackers can shake users' confidence in the online world. How hackers operate, what kinds of sites and information are most vulnerable to hacking, are all discussed in this book.

Await your reply

a novel
2009
While Miles pursues elusive letters and clues in a perpetual search for his missing twin, Ryan struggles with the discovery that he is adopted, and Lucy finds her daring escape from her hometown posing unexpectedly dangerous consequences.

I'll Walk Alone

2012
Thirty-two year old Alexandra Moreland is a rising star in the architectural world and lives in Manhattan. But when she is plagued by identity theft, her successful life is turned upside down. Someone has gained access to her bank accounts, credit cards, personal background, and is now impersonating her. Then, with overwhelming circumstantial evidence stacked against her, Alexandra is arrested for the murder of a woman she claims she's never met. Or has she?.

Pages

Subscribe to RSS - identity theft