Preventing identity theft in your business (Record no. 78102)

MARC details
000 -LEADER
fixed length control field 02270nam a22003134a 4500
001 - CONTROL NUMBER
control field ebr10114184
003 - CONTROL NUMBER IDENTIFIER
control field CaPaEBR
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m u
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cn|||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 040921s2005 nju sb 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
Canceled/invalid LC control number 2004022093
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 047169469X (cloth)
040 ## - CATALOGING SOURCE
Original cataloging agency CaPaEBR
Transcribing agency CaPaEBR
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)559961860
043 ## - GEOGRAPHIC AREA CODE
Geographic area code n-us---
050 14 - LIBRARY OF CONGRESS CALL NUMBER
Classification number HV6679
Item number .C653 2005eb
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 658.4/72
Edition number 22
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Collins, Judith M.
245 10 - TITLE STATEMENT
Title Preventing identity theft in your business
Medium [electronic resource] :
Remainder of title how to protect your business, customers, and employees /
Statement of responsibility, etc. Judith M. Collins.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc. Hoboken, N.J. :
Name of publisher, distributor, etc. Wiley,
Date of publication, distribution, etc. c2005.
300 ## - PHYSICAL DESCRIPTION
Extent x, 245 p.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note What is an "identity"? -- Identity theft: effects on victims -- Identity crime is entrenched -- Identity crimes are escalating -- Legal requirements for business -- Caveat lector. let the reader beware -- Your business identities -- Tighten your business borders -- Securing the people front: the security job analysis -- The people front: recruitment for security -- The people front: personnel selection for security -- The people front: select for motivation -- The people front: select for integrity and security -- The people front: select for interpersonal skills -- Socialization, company culture, and the realistic job preview -- The security orientation program: socializing newcomers to the honest company culture -- The people front: appraisal and feedback for performance and security -- The process front: secure business information processes -- The property front: the e-business web site -- The customer security program -- E-commerce "best practices" for customers -- The legislative process -- HIPAA: security for health care companies.
533 ## - REPRODUCTION NOTE
Type of reproduction Electronic reproduction.
Place of reproduction Palo Alto, Calif. :
Agency responsible for reproduction ebrary,
Date of reproduction 2013.
Note about reproduction Available via World Wide Web.
-- Access may be limited to ebrary affiliated libraries.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Identity theft
Geographic subdivision United States
General subdivision Prevention.
655 #7 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
Source of term local
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element ebrary, Inc.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="http://site.ebrary.com/lib/welingkar/Doc?id=10114184">http://site.ebrary.com/lib/welingkar/Doc?id=10114184</a>
Public note An electronic book accessible through the World Wide Web; click to view
Holdings
Withdrawn status Lost status Damaged status Not for loan Home library Current library Date acquired Total Checkouts Full call number Date last seen Price effective from Koha item type
        Main Library Main Library 10/08/2015   658.4/72 10/08/2015 10/08/2015 E-Books

Powered by Koha