The con : how scams work, why you're vulnerable, and how to protect yourself / James Munton and Jelita McLeod.

Item request has been placed! ×
Item request cannot be made. ×
  Processing Request
Share on Goodreads
  • Additional Information
    • Publication Information:
      1st pbk. ed.
    • Notes:
      GENR.
      BUSI.
      FUND: 11001-474002-71404-40006 (14-SOUTHBK3)
      Includes index.
    • ISBN:
      9781442207325 (pbk.)
      1442207329 (pbk.)
    • Accession Number:
      ocn858686355
      858686355
    • Accession Number:
      lcc.ocn858686355
  • Citations
    • ABNT:
      MUNTON, J.; MCLEOD, J. The con : how scams work, why you’re vulnerable, and how to protect yourself. [s. l.]: Rowman & Littlefield, 2013. ISBN 9781442207325. Disponível em: http://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=cat05560a&AN=lcc.ocn858686355&custid=s6224580. Acesso em: 24 jan. 2020.
    • AMA:
      Munton J, McLeod J. The Con : How Scams Work, Why You’re Vulnerable, and How to Protect Yourself. Rowman & Littlefield; 2013. http://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=cat05560a&AN=lcc.ocn858686355&custid=s6224580. Accessed January 24, 2020.
    • APA:
      Munton, J., & McLeod, J. (2013). The con : how scams work, why you’re vulnerable, and how to protect yourself. Rowman & Littlefield. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=cat05560a&AN=lcc.ocn858686355&custid=s6224580
    • Chicago/Turabian: Author-Date:
      Munton, James, and Jelita McLeod. 2013. The Con : How Scams Work, Why You’re Vulnerable, and How to Protect Yourself. Rowman & Littlefield. http://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=cat05560a&AN=lcc.ocn858686355&custid=s6224580.
    • Harvard:
      Munton, J. and McLeod, J. (2013) The con : how scams work, why you’re vulnerable, and how to protect yourself. Rowman & Littlefield. Available at: http://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=cat05560a&AN=lcc.ocn858686355&custid=s6224580 (Accessed: 24 January 2020).
    • Harvard: Australian:
      Munton, J & McLeod, J 2013, The con : how scams work, why you’re vulnerable, and how to protect yourself, Rowman & Littlefield, viewed 24 January 2020, .
    • MLA:
      Munton, James, and Jelita McLeod. The Con : How Scams Work, Why You’re Vulnerable, and How to Protect Yourself. Rowman & Littlefield, 2013. EBSCOhost, search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=cat05560a&AN=lcc.ocn858686355&custid=s6224580.
    • Chicago/Turabian: Humanities:
      Munton, James, and Jelita McLeod. The Con : How Scams Work, Why You’re Vulnerable, and How to Protect Yourself. Rowman & Littlefield, 2013. http://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=cat05560a&AN=lcc.ocn858686355&custid=s6224580.
    • Vancouver/ICMJE:
      Munton J, McLeod J. The con : how scams work, why you’re vulnerable, and how to protect yourself [Internet]. Rowman & Littlefield; 2013 [cited 2020 Jan 24]. Available from: http://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=cat05560a&AN=lcc.ocn858686355&custid=s6224580

Reviews

Booklist Reviews 2011 July #1

The popular cultural depiction of a con shows an ingenious bit of skulduggery pulled off by a charming schemer or schemers. Think The Sting and Ocean's Eleven, Twelve, and Thirteen. But the prevalence of cons—40 times more common than car theft and burglary—and the range of their perpetrators, from family members to global Internet scammers, demand more vigilance than do other crimes. Magician and expert on deception Munton, abetted by writer McLeod, goes behind the scenes to present stories of ordinary con victims to dissect how scams are perpetrated and the elements and tactics of typical cons. The authors go on to detail seven categories of con, from foreign lottery and sweepstakes scams to reshipping schemes to fraudulent home repair. From telemarketing tricks to crimeware, they describe how scammers use technology to gain access to potential victims. They also detail how to protect against the cons, identify possible setups, and reduce the likelihood of falling into conning traps. Finally, they advise readers on recovering from identity theft. Completely fascinating and insightful. Copyright 2011 Booklist Reviews.