Бази даних

Наукова електронна бібліотека - результати пошуку

Mozilla Firefox Для швидкої роботи та реалізації всіх функціональних можливостей пошукової системи використовуйте браузер
"Mozilla Firefox"

Вид пошуку
у знайденому
Сортувати знайдені документи за:
авторомназвоюроком видання
Формат представлення знайдених документів:
повнийстислий
 Знайдено в інших БД:Віртуальна довідка (130)Тематичний інтернет-навігатор (34)Автореферати дисертацій (5386)Реферативна база даних (36963)Книжкові видання та компакт-диски (8158)Журнали та продовжувані видання (288)
Пошуковий запит: (<.>K=ЗАХИСТ$<.>+<.>K=РОСЛИН$<.>)
Загальна кількість знайдених документів : 541
Представлено документи з 1 до 20
...

   Тип видання:   методичний посібник   
1.


Abwehr englischer gangster-methoden "Silent killing" [Electronic resource]. - [S. l. : s. n.]. - 52 S.
Переклад назви: Захист від англійських гангстерських прийомів "Тихе вбивство"

Рубрики:

Географічні рубрики:

  Повний текст доступний у читальних залах НБУВ




Кл.слова:
німецька армія -- рукопашний бій

   Тип видання:   методичний посібник   
2.

Schneier, B.
Applied Cryptography [Electronic resource] : protocols, Algorthms, and Source Code in C / B. Schneier. - 2th. ed.. - New York : John Wiley & Sons, 1996
Переклад назви: Прикладна криптографія

Рубрики:

  Повний текст доступний у читальних залах НБУВ


There are two kinds of cryptography in this world: cryptography that will stop your kid sister from reading your files, and cryptography that will stop major governments from reading your files. This book is about the latter. If I take a letter, lock it in a safe, hide the safe somewhere in New York, then tell you to read the letter, that’s not security. That’s obscurity. On the other hand, if I take a letter and lock it in a safe, and then give you the safe along with the design specifications of the safe and a hundred identical safes with their combinations so that you and the world’s best safecrackers can study the locking mechanism—and you still can’t open the safe and read the letter—that’s security. For many years, this sort of cryptography was the exclusive domain of the military. The United States’ National Security Agency (NSA), and its counterparts in the former Soviet Union, England, France, Israel, and elsewhere, have spent billions of dollars in the very serious game of securing their own communications while trying to break everyone else’s. Private individuals, with far less expertise and budget, have been powerless to protect their own privacy against these governments. During the last 20 years, public academic research in cryptography has exploded. While classical cryptography has been long used by ordinary citizens, computer cryptography was the exclusive domain of the world’s militaries since World War II. Today, state–of–the–art computer cryptography is practiced outside the secured walls of the military agencies. The layperson can now employ security practices that can protect against the most powerful of adversaries—security that may protect against military agencies for years to come. Do average people really need this kind of security? Yes. They may be planning a political campaign, discussing taxes, or having an illicit affair. They may be designing a new product, discussing a marketing strategy, or planning a hostile business takeover. Or they may be living in a country that does not respect the rights of privacy of its citizens. They may be doing something that they feel shouldn’t be illegal, but is. For whatever reason, the data and communications are personal, private, and no one else’s business. This book is being published in a tumultuous time. In 1994, the Clinton administration approved the Escrowed Encryption Standard (including the Clipper chip and Fortezza card) and signed the Digital Telephony bill into law. Both of these initiatives try to ensure the government’s ability to conduct electronic surveillance. Some dangerously Orwellian assumptions are at work here: that the government has the right to listen to private communications, and that there is something wrong with a private citizen trying to keep a secret from the government. Law enforcement has always been able to conduct court–authorized surveillance if possible, but this is the first time that the people have been forced to take active measures to make themselves available for surveillance. These initiatives are not simply government proposals in some obscure area; they are preemptive and unilateral attempts to usurp powers that previously belonged to the people. Clipper and Digital Telephony do not protect privacy; they force individuals to unconditionally trust that the government will respect their privacy. The same law enforcement authorities who illegally tapped Martin Luther King Jr.’s phones can easily tap a phone protected with Clipper. In the recent past, local police authorities have either been charged criminally or sued civilly in numerous jurisdictions—Maryland, Connecticut, Vermont, Georgia, Missouri, and Nevada—for conducting illegal wiretaps. It’s a poor idea to deploy a technology that could some day facilitate a police state. The lesson here is that it is insufficient to protect ourselves with laws; we need to protect ourselves with mathematics. Encryption is too important to be left solely to governments. This book gives you the tools you need to protect your own privacy; cryptography products may be declared illegal, but the information will never be.



Кл.слова:
шифрування -- захист інформації

   Тип видання:   методичний посібник   
3.

Chapman, D. B.
Building Internet firewalls [Electronic resource] / D. B. Chapman, E. D. Zwicky. - Sebastopol : O'Reilly, 1995. - 517 p.
Переклад назви: Побудова інтернет-фаєрволів

Рубрики:

  Повний текст доступний у читальних залах НБУВ


More than a million systems are now connected to the Internet, and something like 15 million people in 100 countries on all seven continents use Internet services. More than 100 million email messages are exchanged each day, along with countless files, documents, and audio and video images. Everyone is jumping on the Internet bandwagon. Once a haven for academicians and scientists, the Net is now reaching large and small businesses, government at all levels, school children, and senior citizens. The commercial world is rushing headlong into doing business on the Internet, barely pausing while technologies and policies catch up with their desire to go online. But, too few of the seekers after Internet wisdom and riches consider whether their businesses will be safe on the Net. What kinds of security risks are posed by the Internet? Some risks have been around since the early days of networking -- password attacks (guessing them or cracking them via password dictionaries and cracking programs), denial of service, and exploiting known security holes. Some risks are newer and even more dangerous -- packet sniffers, IP (Internet Protocol) forgery, and various types of hijacking attacks. Firewalls are a very effective way to protect your system from these Internet security threats. Firewalls in computer networks keep damage on one part of the network (e.g., eavesdropping, a worm program, file damage) from spreading to the rest of the network. Without firewalls, network security problems can rage out of control, dragging more and more systems down. What is a firewall? It's a hardware and/or software solution that restricts access from your internal network to the Internet -- and vice versa. A firewall may also be used to separate two or more parts of your local network (for example, protecting finance from R&D). The firewall is installed at the perimeter of the network, ordinarily where it connects to the Internet. You can think of a firewall as a checkpoint; all traffic, incoming and outgoing, is stopped at this point. Because it is, the firewall can make sure that it is acceptable. "Acceptable" means that whatever is passing through -- email, file transfers, remote logins, NFS mounts, etc. -- conforms to the security policy of the site. Building Internet Firewalls is a practical guide to building firewalls on the Internet. If your site is connected to the Internet, or if you're considering getting connected, you need this book. It describes a variety of firewall approaches and architectures and discusses how you can build packet filtering and proxying solutions at your site. It also contains a full discussion of how to configure Internet services (e.g., FTP, SMTP, Telnet) to work with a firewall. The book also includes a complete list of resources, including the location of many publicly available firewall construction tools. The book is divided into four parts: Part I discusses Internet threats, the benefits of firewalls, overall security strategies, and a summary of Internet services and their security risks. Part II describes possible firewall designs and general terms and concepts, how to protect the bastion host in your firewall configuration, how to build proxying and packet filtering firewalls, and how to configure Internet services to operate with a firewall. Part III describes how to maintain a firewall, develop a security policy, and respond to a security incident. Part IV contains appendic



Кл.слова:
мережа -- захист

   Тип видання:   наукове видання   
4.

Paquet, C.
Business case for network security [Electronic resource] : advocacy, governance, and ROI / C. Paquet, W. Saxe. - Indianapolis : Cisco Press, 2004. - 408 p
Переклад назви: Економічна модель для мережевої безпеки: захист, управління та дохід від інвестицій

Рубрики:

  Повний текст доступний у читальних залах НБУВ


The business case for network security: advocacy, governance, and ROI addresses the needs of networking professionals and business executives who seek to assess their organization’s risksand objectively quantify both costs and cost savings related to network security technology investments. This book covers the latest topics in network attacks and security. It includes a detailed security-minded examination of return on investment (ROI) and associated financial methodologies that yield both objective and subjective data. The book also introduces and explores the concept of return on prevention (ROP) and discusses the greater implications currently facing corporations, including governance and the fundamental importance of security, for senior executives and the board.



Кл.слова:
інвестиція -- кошти -- мережа -- бізнес

   Тип видання:   наукове видання   
5.

Bastien, G.
CCSP Cisco Secure PIX® Firewall advanced exam certification guide [Electronic resource] / G. Bastien, E. Carter, C. Degu. - 2th. ed.. - Indianapolis : Cisco Press, 2004. - 816 p.

Рубрики:

  Повний текст доступний у читальних залах НБУВ


Becoming a CCSP distinguishes you as part of an exclusive group of experts, ready to take on today's most challenging security tasks. Administration of the Cisco PIX Firewall is a difficult and complex task, critical for protecting a network. Whether you are seeking a PIX-focused certification or the full-fledged CCSP certification, learning what you need to know to pass the Cisco Secure PIX Firewall Advanced (CSPFA) exam will qualify you to keep your company's network safe while meeting business needs.



Кл.слова:
адміністрування мереж -- захист мережі

   Тип видання:   наукове видання   
6.

Dubrawsky, I.
CCSP Self-Study CCSP CSI [Electronic resource] : exam Certification Guide / I. Dubrawsky, P. Grey. - 2-е вид.. - Indianapolis : Cisco Press, 2004. - 528 p.
Переклад назви: CCSP самовчитель CCSP CSI: Керівництво сертифікаційного іспиту

Рубрики:

  Повний текст доступний у читальних залах НБУВ


The official self-study test preparation guide for the CCSP CSI exam 642-541 This study guide helps you master all the topics on the CCSP CSI exam, including Classifying and mitigating network attacks Securing designs for small, medium-sized, remote-user, and enterprise networks Understanding the SAFE network modules Using Host IPS and the Cisco Security Agent Identifying security threats Securing a wireless network Applying the SAFE Blueprint to networks utilizing IP telephony Implementing appropriate security products to prevent or counteract vulnerabilities Defining a security policy Using the Cisco Secure product portfolio, including perimeter security, IDS, secure connectivity, security management, and Cisco AVVID Understanding the SAFE architectural overview CCSP CSI Exam Certification Guide, Second Edition, is a best-of-breed Cisco exam study guide that focuses specifically on the objectives for the CSI exam. Inside, you'll find preparation hints and test-taking tips to help you identify areas of weakness and improve both your conceptual and hands-on knowledge of network security. CCSP CSI Exam Certification Guide, Second Edition, presents you with an organized test preparation routine through the use of proven series elements and techniques. "Do I Know This Already?" quizzes open each chapter and allow you to decide how much time you need to spend on each section. Foundation Summary lists and tables make referencing easy and give you a quick refresher whenever you need it. Challenging chapter-ending review questions reinforce key concepts. An entire chapter of scenarios helps you place the exam objectives in real-world situations, thus increasing recall during exam time. New in this edition is coverage of wireless networks, IP telephony, Host Intrusion Prevention System (IPS), and enterprise networks. The companion CD-ROM contains a powerful testing engine that allows you to focus on individual topic areas or take a complete, timed exam. The assessment engine tracks your performance and provides feedback on a module-by-module basis, presenting links to the text for further review and helping you devise a complete study plan. Well-regarded for its level of detail, assessment features, challenging review questions, and hands-on exercises, this book helps you master the concepts and techniques that will enable you to succeed on the exam the first time. CCSP CSI Exam Certification Guide, Second Edition, is part of a recommended study program from Cisco Systems that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www.cisco.com/go/authorizedtraining. Companion CD-ROM The CD-ROM contains more than 200 practice questions for the CCSP CSI exam, including simulation-based questions. CD-ROM test engine powered by www.boson.com. Boson Software is a Cisco Learning Partner.



Кл.слова:
програмне забезпечення -- база даних -- електронний ресурс -- сервер -- захист даних -- CCSP CSI exam

   Тип видання:   наукове видання   
7.

Deal, R. A.
Cisco ASA Configuration [Electronic resource] / R. A. Deal. - New York : McGRAW-HILL, 2009. - 753 p. - (Networking Professional's Library)
Переклад назви: Конфігурація Cisco ASA

Рубрики:

  Повний текст доступний у читальних залах НБУВ


The Cisco ASA product replaces Cisco PIX Firewalls, and Cisco expert Richard Deal updates his bestselling book, Cisco PIX Firewalls, to cover ASA. This book shows you how to configure and maintain a Cisco ASA appliance to control traffic in the corporate network and protect the network from internal and external threats and attacks. Cisco ASA Configuration covers the latest features available in versions 8.0 and 8.1, and includes detailed examples of complex configurations and troubleshooting. Implement and manage this powerful multifunction network adaptive security appliance with help from this expert guide.



Кл.слова:
продукт -- захист мережі -- пристрій

   Тип видання:   науково-популярне видання   
Категорія: Біологічні науки   
8.


Communication in plants [Electronic resource] : neuronal aspects of plant life / ed. F. Baluska, S. Mancuso, D. Volkmann. - Berlin : Springer, 2006. - 468 p
Переклад назви: Зв'язок в рослинах: нейронні аспекти життя рослин

  Повний текст доступний у читальних залах НБУВ


Plant neurobiology is a newly emerging field of plant sciences. It covers signalling and communication at all levels of biological organization – from molecules up to ecological communities. In this book, plants are presented as intelligent and social organisms with complex forms of communication and information processing. Authors from diverse backgrounds such as molecular and cellular biology, electrophysiology, as well as ecology treat the most important aspects of plant communication, including the plant immune system, abilities of plants to recognize self, signal transduction, receptors, plant neurotransmitters and plant neurophysiology. Further, plants are able to recognize the identity of herbivores and organize the defence responses accordingly. The similarities in animal and plant neuronal/immune systems are discussed too. All these hidden aspects of plant life and behaviour will stimulate further intense investigations in order to understand the communicative plants in their whole complexity.



Кл.слова:
рослина -- біологія -- ботаніка

   Тип видання:   навчальний посібник   
9.

Thompson, Kenneth.
Compost [Electronic resource] : the natural way to make food for your garden / Kenneth Thompson. - London : Dorling Kindersley, 2007. - 196 p
Переклад назви: Компост: природний спосіб зробити їжу для вашого саду

Рубрики:

  Повний текст доступний у читальних залах НБУВ


The most practical book that all gardeners have been waiting for, this fun and informative guide shows how to make the best compost using ingredients that are easily found around the house.



Кл.слова:
рослинництво -- добриво -- садівництво

   Тип видання:   науково-популярне видання   
10.

Smaldone, William.
Confronting Hitler [Electronic resource] : german social democrats in defense of the Weimar republic, 1929-1933 / William Smaldone. - Lanham : Lexington Books, 2009. - 335 p
Переклад назви: Протистояння Гітлера: німецькі соціал-демократи на захисті Веймарської республіки, 1929-1933

Рубрики:

Географічні рубрики:

  Повний текст доступний у читальних залах НБУВ


Confronting Hitler examines the lives of ten socialist leaders in their fight against Nazism. It reveals the aspects of these people's lives that most decisively shaped their views and actions during the Weimar Republic's final crisis, and it compares the German socialist experience of 1933 with those of other democratic socialist movements in the twentieth century.



Кл.слова:
Веймарська республіка -- нацизм -- політологія

   Тип видання:   наукове видання   
Категорія: Біологічні науки   
11.

Savich, V. P.
Cryptogamic plants of the USSR [Electronic resource] / V. P. Savich. - Jerusalem : Israel Program for Scientific Translations, 1970
Переклад назви: Спорові рослини СРСР

Рубрики:

Географічні рубрики:

  Повний текст доступний у читальних залах НБУВ

Vol. IV : Fungi. - 518 p.


This book describes 180 species of rust fungi of the family Melampso- raceae. Among them is a considerable number of species which cause harm in agriculture and forestry. The book can serve as a reference source for the identification of rust fungi and for measures to combat them.



Кл.слова:
рослина -- гриб

   Тип видання:   методичний посібник   
12.

Cobb, С.
Cryptography For Dummies [Electronic resource] / С. Cobb. - Indianapolis : John Wiley & Sons, 2004. - 336 p.
Переклад назви: Криптографія для чайників

Рубрики:

  Повний текст доступний у читальних залах НБУВ


This guide to keeping your data safe offers the latest security techniques and advice on choosing and using cryptography products. It covers terminology, specific encryption technologies, pros and cons of different implementations, and more.



Кл.слова:
інформація -- захист

   Тип видання:   підручник   
13.

Gupta, A.
Defend I.T.: security by example [Electronic resource] / A. Gupta, S. Laliberte. - Boston : Addison Wesley, 2004. - 384 p.
Переклад назви: Захист ІТ: безпека за зразком

Рубрики:

  Повний текст доступний у читальних залах НБУВ


Defend I.T.: Security by Example draws on detailed war stories to identify what was done right and what was done wrong in actual computer-security attacks, giving you the opportunity to benefit from real experiences. Approaches to securing systems and networks vary widely from industry to industry and organization to organization. By examining a variety of real-life incidents companies are too embarrassed to publicly share, the authors explain what could have been done differently to avoid the losses incurred--whether creating a different process for incident response or having better security countermeasures in place to begin with.



Кл.слова:
комп'ютерна безпека

   Тип видання:   науково-популярне видання   
Категорія: Біологічні науки   
14.

Bukhtitarova, Ludmila.
Diatoms of Ukraine [Electronic resource] : inland waters / Ludmila Bukhtitarova. - Kyiv : National academy of sciences of Ukraine, 1999. - 133 p
Переклад назви: Діатомові водорості України: внутрішні води

  Повний текст доступний у читальних залах НБУВ




Кл.слова:
альгологія -- водойма -- рослина

   Тип видання:   науково-популярне видання   
Категорія: Біологічні науки   
15.
 


Kallas, John.
Edible wild plants [Electronic resource] : wild foods from dirt to plate / John Kallas. - Layton : Gibbs Smith, 2010. - 410 p
Переклад назви: Їстівні дикорослі рослини: дикі продукти від бруду до готової страви

Рубрики:

  Повний текст доступний у читальних залах НБУВ


Edible Wild Plants provides what you really need to know to have your own wild food adventures. Whether a beginner or advanced wild food aficionado, gardener, chef, botanist, nutritionist, scientist, or a dieter with special needs, this book is for you. Author John Kallas gives you unprecedented details, maps, simple explanations, and multiple close-up photographs of every plant covered at every important stage of growth. You learn that a plant is not only edible but when, why, and how it is. He can turn you into a successful, well-fed, and happy forager anywhere in North America.



Кл.слова:
ботаніка -- дієтологія -- кулінарія

   Тип видання:   енциклопедія   
Категорія: Соціологія   
16.


Encyclopedia of homelessness [Electronic resource] : in 2 vol. / ed. D. Levinson. - Thousand Oaks : Sage Publications, 2004. - 908 p.
Переклад назви: Енциклопедія безпритульності

Рубрики:

  Повний текст доступний у читальних залах НБУВ


There is nothing new about homelessness. There have been homeless people for some 10,000 years—from the time when humans built their first permanent homes in the first towns of the Fertile Crescent. The historical record, novels and poems, and sacred texts tell us the stories of beggars, wandering ascetics, penniless friars, displaced peasants, lost soldiers, street youths, vagrants, new arrivals in the city, and displaced workers. Homelessness has changed over the years. In the United States, during the late nineteenth century, it was hoboes and tramps who drew the attention of the public, the police, and then the social reformers of the Progressive Era. From the 1920s through the Great Depression, attention shifted to the skid rows, home to transient workers and retired single men. The decline of skid rows in the 1970s was followed by a new era of homelessness with many formerly institutionalized people—who had untreated or poorly treated emotional disorders—winding up on the streets of America. In the 1980s, the nature of homelessness changed again. Growing economic inequality, racism, a permanent decrease in the number of well-paid unskilled jobs, and a lack of affordable housing combined to make several million people—many of them African-American women and their children—homeless on America’s streets, in shelters, in motels, and in substandard and temporary apartments. This pattern continues in 2004. Homelessness is not just a U.S. problem, although when viewed cross-culturally, it becomes a more complex issue. In many developed nations, homeless families, many of them immigrants, are the major issue. In the developing nations of Asia, Africa, and Latin America, the homeless are often women and their children, youths, and migrants from rural areas who have come to cities looking for work and opportunity. The emergence of many cities in developing nations as major regional or global commercial centers has made the problem even worse, by increasing the appeal of cities as employment centers to the rural poor while at the same time providing less and less affordable housing and support services for immigrants. The goal of the Encyclopedia of Homelessness is to summarize our knowledge of homelessness. This includes describing the patterns of homelessness in the past, focusing on the recent and current situation in the United States, and sampling homelessness around the world. Entries cover causes; history; legal issues, advocacy, and policy; legislation and programs; lifestyle and health problems; organizations; research; services and service settings; size and perceptions; subpopulations and lifestyles; and world issues and perspectives. Descriptive articles cover homelessness today in eight major American cities and more than thirty cities and nations around the world. These entries allow for quick and easy comparisons.



Кл.слова:
безхатченко -- волоцюга -- вуличне життя -- соціальний захист

   Тип видання:   енциклопедія   
17.


Endangered Species [Electronic resource] : encyclopedia : in 3 vol. / S. Benson, R. Nagel.. - Farmington Hills : Gale, 2004
Переклад назви: Види під загрозою зникнення

Рубрики:

  Повний текст доступний у читальних залах НБУВ

Vol. 1 : Mammals. - 320 p.

Vol. 2 : Arachnids, Birds, Crustaceans, Insects and Molluscs. - 320 p.

Vol. 3 : Amphibians, Fish, Plants and Reptiles. - 300 p.


Including the addition of 40 new species, this 2nd edition is completely updated to reflect the changes in endangered and threatened status. Color photographs and maps provide students with many species threatened by extinction, including amphibians, birds, crustaceans, fish, insects, mammals, mollusks, reptiles and more. Each of the 240 entries gives a species description, location, reason for endangerment and measures being taken to protect it.



Кл.слова:
тварина -- рослина -- охорона довкілля -- екологія

   Тип видання:   наукове видання   
Категорія: Біологічні науки   
18.

Takhtajan, A.
Evolutionary trends in flowering plants [Electronic resource] / A. Takhtajan. - New York : Publishing Columbia University Press, 1991. - 241 p
Переклад назви: Еволюційні тенденції у квіткових рослин

Рубрики:

  Повний текст доступний у читальних залах НБУВ


Explores the evolutionary trends in each major flowering plant part-vegetative organs, flowers and inflorescences, fruits, and seeds. Examines microsporangia, microspores, and pollen grains as well as megasporangia, mega-spores, and the ovule, and covers evolutionary trends in pollination, fertilization, and triple fusion.



Кл.слова:
еволюція -- квіткова рослина

   Тип видання:   наукове видання   
19.

Eekelaar, J.
Family Law Advocacy [Electronic resource] : how Barristers help the Victims of Family Failure / J. Eekelaar, M. Maclean. - Portland : Hart Publishing, 2009. - 132 p.
Переклад назви: Захист сімейного права: як адвокати допомогають жертвам сімейних відмов

Рубрики:

Географічні рубрики:

  Повний текст доступний у читальних залах НБУВ


The role of the law in settling family disputes has been a matter of particular debate over the past 25 years. In keeping with the general public perception, the media has been largely critical about the role of lawyers in family law matters, sustaining a general lack of confidence in the legal profession, and a more specific feeling that, in family matters, lawyers aggravate conflict or even represent a female conspiracy. The climate in which family lawyers practice in England and Wales is a harsh one. The authors of this path-breaking study felt it was time to find out more about the contributions of barristers in family law cases in the UK. Much of the study is comprised of an in-depth examination of the day-to-day activity of members of the UK Family Law Bar through observation of individual barristers as they performed their role in the context of a court hearing. In answering questions, such as whether the family justice system is excessively adversarial, whether family barristers earn too much from human unhappiness, or indeed whether those working in the front line of child protection earn enough, the authors reach some surprising conclusions. "The barrister is both mentor and guide for the client" is how they begin their conclusion; "we hope that we have shown that society should value their contribution better" is how they finish.



Кл.слова:
сімейне право

   Тип видання:   наукове видання   
20.

Alt, B. L.
Fleecing grandma and grandpa [Electronic resource] : protecting Against Scams, Cons, and Frauds / B. L. Alt, S. K. Wells. - Westport : Praeger Publishers, 2004. - 167 p.
Переклад назви: Оббираючи бабусь і дідусів: захист від шахрайства

Рубрики:

Географічні рубрики:

  Повний текст доступний у читальних залах НБУВ


Falling for a scam or con is humiliating for anyone, and can have terrible consequences. But for the elderly, being the victim of fraud can be disastrous, and they are the most common and vulnerable targets of everyday scams, cons, and frauds. From identity theft to gambling scams, from power of attorney issues to pyramid schemes, there is no dearth of creativity in the ways some criminals will relieve the elderly from their money and their homes. Here, Alt and Wells describe the most common scams, offer the stories of actual victims, and detail ways to protect yourself and your family from becoming easy targets. What makes the elderly such easy marks for con artists? How can they avoid the common traps? Knowing about them is one place to start, and this book helps readers to understand and identify the most common scams perpetrated against the elderly. Because such cons are so hard to prosecute, it is important to know the methods criminals employ to separate innocents from their hard-earned money. This lively, vivid account of one of the most insidious forms of crime will help families and individuals protect themselves and their loved ones from the machinations of those who view them as easy marks.



Кл.слова:
соціологія -- шахрайство
...
 

Всі права захищені © Національна бібліотека України імені В. І. Вернадського