Understanding Computers: Today & Tomorrow, Comprehensive 2007 Update EditionGive your students a classic, well-rounded introduction to computer concepts with a modern twist! Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version. |
From inside the book
Results 1-3 of 69
Page 384
... credit card numbers and Social Security numbers , can be used to commit credit card fraud , identity theft , and other crimes . Recently , there have been numerous examples of personal data stolen via computers , in addition to CardSystems ...
... credit card numbers and Social Security numbers , can be used to commit credit card fraud , identity theft , and other crimes . Recently , there have been numerous examples of personal data stolen via computers , in addition to CardSystems ...
Page 386
... credit card offers and prize promotions , and fraudulent business opportunities and franchises . These offers typically try to sell potential victims nonexist- ent services or worthless information , or they try to convince potential ...
... credit card offers and prize promotions , and fraudulent business opportunities and franchises . These offers typically try to sell potential victims nonexist- ent services or worthless information , or they try to convince potential ...
Page 465
... credit cards and lower transaction fees . Smart cards can also con- tain digital signatures for use with transactions that require one , as well as biometric char- acteristics to be used to authenticate the smart card holder , when ...
... credit cards and lower transaction fees . Smart cards can also con- tain digital signatures for use with transactions that require one , as well as biometric char- acteristics to be used to authenticate the smart card holder , when ...
Other editions - View all
Common terms and phrases
activities addition allow application software Blah browser cameras Chapter Objective communications connect contain create credit card customers database designed desktop PCs discs discussed disk display document e-commerce e-mail messages Edit View Favorites electronic employees encryption example Favorites Tools Help File Edit View flash memory folder format graphics handheld PCs hard drive hardware identity theft images individuals input installed keyboard located malware Microsoft Internet Explorer monitor movie multimedia operating system options organization password phishing printers processing programming language record RFID screen server shown in Figure smart card software program specific spyware storage stored tablet PC Test types typically users View Favorites Tools Web bugs Web-based Wi-Fi Windows wireless XHTML