The con : how scams work, why you're vulnerable, and how to protect yourself / James Munton and Jelita McLeod.

Item request has been placed! ×
Item request cannot be made. ×
loading   Processing Request
  • Additional Information
    • Publication Information:
      1st pbk. ed.
    • Notes:
      GENR.
      BUSI.
      FUND: 11001-474002-71404-40006 (14-SOUTHBK3)
      Includes index.
    • ISBN:
      9781442207325 (pbk.)
      1442207329 (pbk.)
    • Accession Number:
      ocn858686355
      858686355
    • Accession Number:
      lcc.ocn858686355
  • Citations
    • ABNT:
      MUNTON, J.; MCLEOD, J. The con : how scams work, why you’re vulnerable, and how to protect yourself. 1st pbk. ed. [s. l.]: Rowman & Littlefield, 2013. ISBN 9781442207325. Disponível em: http://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=cat05560a&AN=lcc.ocn858686355&custid=s6224580. Acesso em: 22 set. 2020.
    • AMA:
      Munton J, McLeod J. The Con : How Scams Work, Why You’re Vulnerable, and How to Protect Yourself. 1st pbk. ed. Rowman & Littlefield; 2013. Accessed September 22, 2020. http://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=cat05560a&AN=lcc.ocn858686355&custid=s6224580
    • APA:
      Munton, J., & McLeod, J. (2013). The con : how scams work, why you’re vulnerable, and how to protect yourself (1st pbk. ed.). Rowman & Littlefield.
    • Chicago/Turabian: Author-Date:
      Munton, James, and Jelita McLeod. 2013. The Con : How Scams Work, Why You’re Vulnerable, and How to Protect Yourself. 1st pbk. ed. Rowman & Littlefield. http://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=cat05560a&AN=lcc.ocn858686355&custid=s6224580.
    • Harvard:
      Munton, J. and McLeod, J. (2013) The con : how scams work, why you’re vulnerable, and how to protect yourself. 1st pbk. ed. Rowman & Littlefield. Available at: http://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=cat05560a&AN=lcc.ocn858686355&custid=s6224580 (Accessed: 22 September 2020).
    • Harvard: Australian:
      Munton, J & McLeod, J 2013, The con : how scams work, why you’re vulnerable, and how to protect yourself, 1st pbk. ed., Rowman & Littlefield, viewed 22 September 2020, .
    • MLA:
      Munton, James, and Jelita McLeod. The Con : How Scams Work, Why You’re Vulnerable, and How to Protect Yourself. 1st pbk. ed., Rowman & Littlefield, 2013. EBSCOhost, search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=cat05560a&AN=lcc.ocn858686355&custid=s6224580.
    • Chicago/Turabian: Humanities:
      Munton, James, and Jelita McLeod. The Con : How Scams Work, Why You’re Vulnerable, and How to Protect Yourself. 1st pbk. ed. Rowman & Littlefield, 2013. http://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=cat05560a&AN=lcc.ocn858686355&custid=s6224580.
    • Vancouver/ICMJE:
      Munton J, McLeod J. The con : how scams work, why you’re vulnerable, and how to protect yourself [Internet]. 1st pbk. ed. Rowman & Littlefield; 2013 [cited 2020 Sep 22]. Available from: http://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=cat05560a&AN=lcc.ocn858686355&custid=s6224580

Reviews

Booklist Reviews 2011 July #1

The popular cultural depiction of a con shows an ingenious bit of skulduggery pulled off by a charming schemer or schemers. Think The Sting and Ocean's Eleven, Twelve, and Thirteen. But the prevalence of cons—40 times more common than car theft and burglary—and the range of their perpetrators, from family members to global Internet scammers, demand more vigilance than do other crimes. Magician and expert on deception Munton, abetted by writer McLeod, goes behind the scenes to present stories of ordinary con victims to dissect how scams are perpetrated and the elements and tactics of typical cons. The authors go on to detail seven categories of con, from foreign lottery and sweepstakes scams to reshipping schemes to fraudulent home repair. From telemarketing tricks to crimeware, they describe how scammers use technology to gain access to potential victims. They also detail how to protect against the cons, identify possible setups, and reduce the likelihood of falling into conning traps. Finally, they advise readers on recovering from identity theft. Completely fascinating and insightful. Copyright 2011 Booklist Reviews.