Locking the Cookie Jar: How to Protect Against Embezzlement, Identity Theft, and Hackers

Locking the Cookie Jar: How to Protect Against Embezzlement, Identity Theft, and Hackers

Paperback

$17.96 $19.95 Save 10% Current price is $17.96, Original price is $19.95. You Save 10%.
Use Express Shipping for guaranteed delivery by December 24 
Qualifying orders placed by 11:59 a.m. ET on Dec. 21 can still be sent to Manhattan, NY addresses. Details

Product Details

ISBN-13: 9781942836506
Publisher: Advanced Development Concepts, LLC
Publication date: 08/29/2017
Pages: 138
Product dimensions: 6.00(w) x 9.00(h) x 0.30(d)

Table of Contents

Chapter and Section

Dedication

Acknowledgments

Author’s Forward

Table of Contents

Locking the Cookie Jar (Introduction)

1) Embezzlement Schemes

• Cash Embezzlement Schemes

• Negotiable Document Embezzlement Schemes

• Account Credit Embezzlement Schemes

• Physical Item Embezzlement Schemes

• Computer-based Embezzlement Schemes

• Summary of Effective Deterrents to Embezzlement

2) Hacking the Hacker’s Mind

• Hacker by Definition

• The Majority of Bottom Feeders

• What Kind of Damage Can a Hacker Impose?

• Your Email is a Goldmine to a Skilled Hacker

3) How Hackers Obtain Your Password

• Watch Someone Type It In

• Videotape the Keystrokes

• Back Door Access

• Within Three Feet of Your Keyboard

• Guessing Your Password

• Determining Your Password Through Research

• Use of a Hacking Program with a Hacker’s Dictionary

• Brute Force Hacking Programs

• Most People Use the Same Password for Everything

• Simply Open the File and Look

• Want to Find Out if You’ve Been Compromised?

4) How to Create a Hacker-proof Password

• Characteristics of a Hacker-proof Password

• Build a Master Phrase

• Convert Your Master Phrase into a Master Key

• Convert Your Master Key into a Variable

• Create a Pseudo Password Using the Variable

• Mix and Match for Even Better Security

5) Identity Theft

• Secure Your Social

• Stealing Your Benefits

• Loaning the Coat Off Your Back

• Don’t be the Low Hanging Fruit

6) Other Security Techniques

• Hardware and Software Deterrents

• PINs

• Transposed Digits

• How to Report Possible Cyber Crimes and Stolen Identity

Customer Reviews

Most Helpful Customer Reviews

See All Customer Reviews