Data breach tips following a data breach.
(eBook)

Book Cover
Average Rating
Published
Denver, Colo. : Colorado Bureau of Investigation Identity Theft & Fraud Unit, [2013].
Physical Desc
1 online resource (2 pages)
Status

Description

Loading Description...

Also in this Series

Checking series information...

More Like This

Loading more titles like this title...

More Copies In Prospector

Loading Prospector Copies...

More Details

Format
eBook
Language
English

Notes

Description
Identity Thieves are creative when it comes to obtaining information your business may keep stored in a computer system. Theft of computers, hacking into systems or infecting computers with viruses all put your business at risk. Prevention is the best option.

Citations

APA Citation, 7th Edition (style guide)

(2013). Data breach: tips following a data breach . Colorado Bureau of Investigation Identity Theft & Fraud Unit.

Chicago / Turabian - Author Date Citation, 17th Edition (style guide)

2013. Data Breach: Tips Following a Data Breach. Colorado Bureau of Investigation Identity Theft & Fraud Unit.

Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)

Data Breach: Tips Following a Data Breach Colorado Bureau of Investigation Identity Theft & Fraud Unit, 2013.

MLA Citation, 9th Edition (style guide)

Data Breach: Tips Following a Data Breach Colorado Bureau of Investigation Identity Theft & Fraud Unit, 2013.

Note! Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy. Citation formats are based on standards as of August 2021.

Staff View

Grouped Work ID
ef59842d-0d3e-497f-b649-2cdab6e7674d-eng
Go To Grouped Work

Grouping Information

Grouped Work IDef59842d-0d3e-497f-b649-2cdab6e7674d-eng
Full titledata breach tips following a data breach
Authorcolorado bureau of investigation
Grouping Categorybook
Last Update2022-06-13 10:33:16AM
Last Indexed2024-05-04 06:15:51AM

Book Cover Information

Image Sourcedefault
First LoadedJun 22, 2022
Last UsedMay 1, 2024

Marc Record

First DetectedApr 22, 2019 12:00:00 AM
Last File Modification TimeJul 31, 2021 04:37:24 AM

MARC Record

LEADER01860nam a2200421Ii 4500
001on1098036255
003OCoLC
00520190422103049.0
006m     o  d s      
007cr |||||||||||
008190422s2013    cou     o    s000 0 eng d
035 |a (OCoLC)1098036255
040 |a DDB|b eng|e rda|c DDB|d UtOrBLW
043 |a n-us-co
049 |a DDBA
086 |a PS5/11.2/B74/2013/INTERNET
086 |a PS5/11.2/B74/2013/INTERNET|2 codocs
24500|a Data breach|h [electronic resource] :|b tips following a data breach.
24630|a Tips following a data breach
264 1|a Denver, Colo. :|b Colorado Bureau of Investigation Identity Theft & Fraud Unit,|c [2013]
300 |a 1 online resource (2 pages)
336 |a text|b txt|2 rdacontent
337 |a computer|b c|2 rdamedia
338 |a online resource|b cr|2 rdacarrier
347 |a text file|2 rdaft
520 |a Identity Thieves are creative when it comes to obtaining information your business may keep stored in a computer system. Theft of computers, hacking into systems or infecting computers with viruses all put your business at risk. Prevention is the best option.
5880 |a Online resource; title from PDF caption (viewed April 2019)
650 0|a Online identity theft|z Colorado|x Prevention.
650 0|a Credit ratings|z Colorado.
650 0|a Consumer credit|z Colorado.
650 0|a Identification numbers, Personal|z Colorado.
7102 |a Colorado Bureau of Investigation.|b Identity Theft & Fraud Unit.
85640|u http://hdl.handle.net/11629/co:29632_ps5112b742013internet.pdf|z Access online
907 |a .b10671572|b 10-24-20|c 04-22-19
945 |g 1|j 0|l csdig|o -|p $0.00|q -|r -|s j |t 0|u 0|v 0|w 0|x 0|y .i11851831|z 04-22-19
994 |a C0|b DDB
998 |a cs|b 04-22-19|c m|d a |e -|f eng|g cou|h 0|i 0
998 |a cs|b 04-22-19|c m|d a |e -|f eng|g cou|h 0|i 1