Data breach tips following a data breach.
(eBook)
Published
Denver, Colo. : Colorado Bureau of Investigation Identity Theft & Fraud Unit, [2013].
Physical Desc
1 online resource (2 pages)
Status
Description
Loading Description...
Also in this Series
Checking series information...
More Copies In Prospector
Loading Prospector Copies...
More Details
Format
eBook
Language
English
Notes
Description
Identity Thieves are creative when it comes to obtaining information your business may keep stored in a computer system. Theft of computers, hacking into systems or infecting computers with viruses all put your business at risk. Prevention is the best option.
Citations
APA Citation, 7th Edition (style guide)
(2013). Data breach: tips following a data breach . Colorado Bureau of Investigation Identity Theft & Fraud Unit.
Chicago / Turabian - Author Date Citation, 17th Edition (style guide)2013. Data Breach: Tips Following a Data Breach. Colorado Bureau of Investigation Identity Theft & Fraud Unit.
Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)Data Breach: Tips Following a Data Breach Colorado Bureau of Investigation Identity Theft & Fraud Unit, 2013.
MLA Citation, 9th Edition (style guide)Data Breach: Tips Following a Data Breach Colorado Bureau of Investigation Identity Theft & Fraud Unit, 2013.
Note! Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy. Citation formats are based on standards as of August 2021.
Staff View
Grouped Work ID
ef59842d-0d3e-497f-b649-2cdab6e7674d-eng
Grouping Information
Grouped Work ID | ef59842d-0d3e-497f-b649-2cdab6e7674d-eng |
---|---|
Full title | data breach tips following a data breach |
Author | colorado bureau of investigation |
Grouping Category | book |
Last Update | 2022-06-13 10:33:16AM |
Last Indexed | 2024-05-04 06:15:51AM |
Book Cover Information
Image Source | default |
---|---|
First Loaded | Jun 22, 2022 |
Last Used | May 1, 2024 |
Marc Record
First Detected | Apr 22, 2019 12:00:00 AM |
---|---|
Last File Modification Time | Jul 31, 2021 04:37:24 AM |
MARC Record
LEADER | 01860nam a2200421Ii 4500 | ||
---|---|---|---|
001 | on1098036255 | ||
003 | OCoLC | ||
005 | 20190422103049.0 | ||
006 | m o d s | ||
007 | cr ||||||||||| | ||
008 | 190422s2013 cou o s000 0 eng d | ||
035 | |a (OCoLC)1098036255 | ||
040 | |a DDB|b eng|e rda|c DDB|d UtOrBLW | ||
043 | |a n-us-co | ||
049 | |a DDBA | ||
086 | |a PS5/11.2/B74/2013/INTERNET | ||
086 | |a PS5/11.2/B74/2013/INTERNET|2 codocs | ||
245 | 0 | 0 | |a Data breach|h [electronic resource] :|b tips following a data breach. |
246 | 3 | 0 | |a Tips following a data breach |
264 | 1 | |a Denver, Colo. :|b Colorado Bureau of Investigation Identity Theft & Fraud Unit,|c [2013] | |
300 | |a 1 online resource (2 pages) | ||
336 | |a text|b txt|2 rdacontent | ||
337 | |a computer|b c|2 rdamedia | ||
338 | |a online resource|b cr|2 rdacarrier | ||
347 | |a text file|2 rdaft | ||
520 | |a Identity Thieves are creative when it comes to obtaining information your business may keep stored in a computer system. Theft of computers, hacking into systems or infecting computers with viruses all put your business at risk. Prevention is the best option. | ||
588 | 0 | |a Online resource; title from PDF caption (viewed April 2019) | |
650 | 0 | |a Online identity theft|z Colorado|x Prevention. | |
650 | 0 | |a Credit ratings|z Colorado. | |
650 | 0 | |a Consumer credit|z Colorado. | |
650 | 0 | |a Identification numbers, Personal|z Colorado. | |
710 | 2 | |a Colorado Bureau of Investigation.|b Identity Theft & Fraud Unit. | |
856 | 4 | 0 | |u http://hdl.handle.net/11629/co:29632_ps5112b742013internet.pdf|z Access online |
907 | |a .b10671572|b 10-24-20|c 04-22-19 | ||
945 | |g 1|j 0|l csdig|o -|p $0.00|q -|r -|s j |t 0|u 0|v 0|w 0|x 0|y .i11851831|z 04-22-19 | ||
994 | |a C0|b DDB | ||
998 | |a cs|b 04-22-19|c m|d a |e -|f eng|g cou|h 0|i 0 | ||
998 | |a cs|b 04-22-19|c m|d a |e -|f eng|g cou|h 0|i 1 |