Friday, September 30, 2011

The Truth About Identity Theft

The Truth About Identity TheftPraise for The Truth About Identity Theft

“This book will open your eyes, scare you smart, and make you think twice. Identity theft can happen to you and this book is a must read. Jim Stickley tells you why and how you need to protect yourself.”

Matt Lauer, Anchor, TODAY Show

"Nowadays, identity theft is an all-too-common occurrence that puts more than just your finances in jeopardy. Fortunately, Jim Stickley's easy-to-understand advice can teach you how to spot and stay ahead of security threats. In short, this book is a must read."

Wes Millar, Senior Vice President of CUNA Strategic Services

"In an age when identity theft will affect everyone sooner or later, this book is simply a must-read. Jim Stickley teaches you to spot the danger signs and offers smart solutions for everything from banking security and online shopping scams to medical identity theft. Whether it's you, your parents', or your kids' identities, everyone has something to protect. This book tells you what you need to know."

Jim Bell, Executive Producer, TODAY Show

"Jim Stickley shares his amazing experiences as a professional hacker in the most entertaining manner. He’s a great storyteller and captures your attention with his experiences, which will make you want to upscale your efforts protect your firm’s data and your own ID. Jim’s stories are fascinating. Most of us can’t imagine how simple it is for him to succeed as a conman in situations we think are safe. The trade secrets of hackers he shares with us are mind boggling! You won’t let your guard down after learning what Jim has actually done to get companies and individuals' private information. He’s the updated version of 'To Catch a Thief'[el]but he’s a good guy!"

Nancy E. Sheppard, President & CEO of Western Independent Bankers (A Trade Association of 350 Banks)

"If you’re not worried about identity theft, you should be[el]and Stickley tells you exactly why. His engaging writing style, coupled with real-life stories about identity theft and concrete actions to help you prevent identity theft are exactly what’s needed to make people take notice of this growing crime. I’ll recommend this book again and again!"

Jerri L. Ledford, About.com Guide to Identity Theft

Everything you must know to protect yourself and your business from identity thieves!

• The truth about real-world identity theft attacks

• The truth about how easy it is for thieves to make off with your identity

• The truth about stopping identity thieves in their tracks

Jim Stickley has stolen credit cards, hacked Social Security numbers, robbed banks, and created fake ATMs. He has broken into armed government facilities and has stolen from teenagers. He is an identity thief, but he is no criminal. Fortunately for all victims involved, Jim was hired to perform these attacks by corporations testing their security, news agencies investigating security concerns, and other media outlets interested in knowing just how easy it is to commit identity theft. His job is to find security flaws before the real criminals find them. This book has been designed to give you the insight that most people only experience after becoming victims of identity theft. Each Truth walks you through a different type of attack, explaining the complete process in a very simple and straight-forward way. Like a magician actually revealing what happens behind the curtain, Jim takes you through the attacks to reveal how people at home, work, and on the road become victims. Prepare yourself. What you read here might be disturbing, but you will never be truly safe from identity thieves until you learn to think like one.

Price: $18.99


Click here to buy from Amazon

Thursday, September 29, 2011

The Identity Theft Protection Guide: *Safeguard Your Family *Protect Your Privacy *Recover a Stolen Identity

The Identity Theft Protection Guide: *Safeguard Your Family *Protect Your Privacy *Recover a Stolen Identity
PROTECTION PREVENTION REPAIR

Identity theft is the fastest-growing category of crime in the United States today, and dealing with privacy and identity issues has become an essential part of life in our modern society. Each chapter in The Identity Theft Protection Guide contains a self-quiz to identify personal areas of concern, information to help you "take action," and more.

This book shows you how to:
* Minimize the risk of identity theft
* React if your identity is stolen
* Obtain and repair credit and insurance reports, and more
* Deal with direct marketers, junk mailers, and telephone solicitors
* Stop surveillance from GPS devices and cell-phone cameras
* Keep your kids safe online
* And much more!

These valuable survival skills can no longer be considered optional--they are essential for life in today's society. The Identity Theft Protection Guide is the most complete, authoritative, and easy-to-use resource on this crucial topic.

Price: $14.99


Click here to buy from Amazon

Yoggie Security Systems 101-FG-00003 SOHO Small Office Security Appliance

Yoggie Security Systems 101-FG-00003 SOHO Small Office Security ApplianceYoggie Gatekeeper SOHO US New - Yoggie Gatekeeper SOHO offers corporate-grade security for your small office - home office network. Protect up to five computers with 13 built-in security packages packed inside a small palm-size Linux-based security server. This means you will not need to purchase or manage additional security software for your PC s. Just plug the Yoggie Gatekeeper SOHO into your Internet router and your computers are completely safe.

Price: $249.00


Click here to buy from Amazon

Understanding Windows CardSpace: An Introduction to the Concepts and Challenges of Digital Identities

Understanding Windows CardSpace: An Introduction to the Concepts and Challenges of Digital Identities

Windows CardSpace empowers organizations to prevent identity theft and systematically address a broad spectrum of security and privacy challenges. Understanding Windows CardSpaceis the first insider’s guide to Windows CardSpace and the broader topic of identity management for technical and business professionals. Drawing on the authors’ unparalleled experience earned by working with the CardSpace product team and by implementing state-of-the-art CardSpace-based systems at leading enterprises, it offers unprecedented insight into the realities of identity management: from planning and design through deployment.

Part I introduces the fundamental concepts of user-centered identity management, explains the context in which Windows CardSpace operates, and reviews the problems CardSpace aims to solve. Next, the authors walk through CardSpace from a technical standpoint, describing its technologies, elements, artifacts, operations and development practices, and usage scenarios. Finally, they carefully review the design and business considerations associated with architecting solutions based on CardSpace or any other user-centered identity management

system. Coverage includes

  • The limitations of current approaches to authentication and identity management
  • Detailed information on advanced Web services
  • The Identity Metasystem, the laws of identity, and the ideal authentication system
  • Windows CardSpace: What it is, how it works, and how developers and managers can use it in their organizations
  • CardSpace technology: user experience, Information Cards, private desktops, and integration with .NET 3.5 and Windows Vista
  • CardSpace implementation: from HTML integration through federation, Web services integration, and beyond
  • Adding personal card support to a website: a detailed, scenario-based explanation
  • Choosing or becoming an identity provider: opportunities, business impacts, operational issues, and pitfalls to avoid
  • Using CardSpace to leverage trust relationships and overcome phishing

Whether you’re a developer, security specialist, or business decision-maker, this book will answer your most crucial questions about identity management, so you can protect everything that matters: your people, your assets, your partners, and your customers.

Foreword xv

Preface xviii

Part I Setting the Context

Chapter 1: The Problem 3

The Advent of Profitable Digital Crime 4

Passwords: Ascent and Decline 29

The Babel of Cryptography 36

The Babel of Web User Interfaces 79

Summary 84

Chapter 2: Hints Toward a Solution 87

A World Without a Center 89

The Seven Laws of Identity 92

The Identity Metasystem 110

Trust 115

WS-* Web Services Specifications: The Reification of the Identity Metasystem 136

Presenting Windows CardSpace 161

Summary 164

Part II THE TECHNOLOGY

Chapter 3: Windows CardSpace 169

CardSpace Walkthroughs 169

Is CardSpace Just for Websites? 175

System Requirements 176

What CardSpace Provides 177

A Deeper Look at Information Cards 184

Features of the CardSpace UI 204

Common CardSpace Management Tasks 210

User Experience Changes in .NET Framework 3.5 218

Summary 221

Chapter 4: CardSpace Implementation 223

Using CardSpace in the Browser 224

Federation with CardSpace 248

CardSpace and Windows Communication Foundation 252

CardSpace Without Web Services 262

Summary 268

Chapter 5: Guidance for a Relying Party 269

Deciding to Be a Relying Party 270

Putting CardSpace to Work 274

Privacy and Liability 299

Summary 302

Part III PRACTICAL CONSIDERATIONS

Chapter 6: Identity Consumers 305

Common Misconceptions about Becoming an Identity Provider 306

Criteria for Selecting an Identity Provider 309

Relying on an IP 315

Migration Issues 320

Summary 321

Chapter 7: Identity Providers 323

Uncovering the Rationale for Becoming an Identity Provider 324

What Does an Identity Provider Have to Offer? 334

Walking a Mile in the User’s Shoes 338

An Organization’s Identity 341

Summary 342

Index 343

Price: $49.99


Click here to buy from Amazon

Wednesday, September 28, 2011

TX Systems MyKey Mobile Password Key (S220206)

TX Systems MyKey Mobile Password Key (S220206)The new TX Systems S220206 CHIPDRIVE MyKey Computer Lock and Password Manager was especially developed for notebook users to automatically and easily protect their privacy and sensitive data. Sensitive information - for example passwords and personal information - are stored on a smart card in plug-in format (ID-000). Insert the handy CHIPDRIVE MyKey™-Stick with the included CHIPDRIVE Masterkey 24k in any USB slot, enter your PIN - and you immediately have access to your data. Remove the stick from the USB slot again - and your sensitive data is promptly protected. It has never been easier, faster or more secure in protecting sensitive data and information, and fill out internet forms! Your data and information are reliably protected while the exasperating password memorizing is eliminated. Information and passwords are stored on the TX Systems S220206 CHIPDRIVE MyKey Computer Lock and Password Manager. Simply insert the TX Systems S220206 CHIPDRI

Price: $29.99


Click here to buy from Amazon

The Art of the Steal: How to Protect Yourself and Your Business from Fraud, America's #1 Crime

The Art of the Steal: How to Protect Yourself and Your Business from Fraud, America's #1 CrimeAuthor Frank W. Abagnale knows something about fraud--he once committed it for a living. "Through my various hustles, I passed something like $2.5 million worth of checks, a blizzard of paper that I scattered in earnest throughout all fifty states and twenty-six countries, all before I was legally allowed to drink," he writes. "I was proficient enough at cashing fraudulent checks that I earned the distinction of becoming one of the most hunted criminals by the FBI." Abagnale was ultimately caught, and he served prison sentences in France, Sweden, and the United States. In the 25 years since his release, Abagnale (who also wrote Catch Me If You Can) has become a leading consultant on fraud prevention.

"I'm still a con artist. I'm just putting down a positive con these days, as opposed to the negative con I used in the past," he explains. "I've applied the same relentless attention to working on stopping fraud that I once applied to perpetrating fraud." His expertise comes in handy: businesses lose an estimated $400 billion each year to fraud. The stories Abagnale tells in The Art of the Steal provide fascinating glimpses of a criminal underworld. He describes "shoulder surfers" who rip off bank customers at ATMs by videotaping their fingers as they enter PIN numbers, retrieving receipts from wastebaskets, and then creating fake credit cards--all rather inexpensively. Whole sections of the book almost read like a how-to manual for aspiring thieves, though Abagnale has other motives. Throughout, he offers sensible advice on how to foil the con artists. Much of this is common sense (cut up credit cards when they expire), but some of his suggestions aren't so obvious. He warns readers not to write checks to the "IRS," for instance: "Envelopes to the IRS are common targets because of where they're going." Instead, checks should be made out to the "Internal Revenue Service," because criminals can turn the "I" of "IRS" into an "M," and turn a tax payment into a gift for "MRS." Smith. The chapter on the emerging problem of identity theft--with its tips on how to keep Social Security numbers private--is especially helpful. In all, The Art of the Steal is captivating and useful. --John Miller

Price: $15.00


Click here to buy from Amazon

Tuesday, September 27, 2011

Secure printing? But of course! With security concerns on every side as we're bombarded daily by news of viruses, phishing attempts and other digital dangers, ... African Review of Business and Technology

This digital document is an article from African Review of Business and Technology, published by Thomson Gale on March 1, 2006. The length of the article is 821 words. The page length shown above is based on a typical 300-word page. The article is delivered in HTML format and is available in your Amazon.com Digital Locker immediately after purchase. You can view it with any web browser.

Citation Details
Title: Secure printing? But of course! With security concerns on every side as we're bombarded daily by news of viruses, phishing attempts and other digital dangers, it's all too easy to forget that however safe data is within a computer, it becomes vulnerable when it's printed out. Karen Young reports.(Information Technology)
Author: Karen Young
Publication: African Review of Business and Technology (Magazine/Journal)
Date: March 1, 2006
Publisher: Thomson Gale
Volume: 42 Issue: 2 Page: 28(1)

Distributed by Thomson Gale

Price: $5.95


Click here to buy from Amazon