Buy kcmt.net ?

Products related to Identity:


  • Cybersecurity and Identity Access Management
    Cybersecurity and Identity Access Management

    This textbook provides a comprehensive, thorough and up-to-date treatment of topics in cyber security, cyber-attacks, ethical hacking, and cyber crimes prevention.It discusses the different third-party attacks and hacking processes which a poses a big issue in terms of data damage or theft.The book then highlights the cyber security protection techniques and overall risk assessments to detect and resolve these issues at the beginning stage to minimize data loss or damage.This book is written in a way that it presents the topics in a simplified holistic and pedagogical manner with end-of chapter exercises and examples to cater to undergraduate students, engineers and scientists who will benefit from this approach.

    Price: 69.99 £ | Shipping*: 0.00 £
  • Identity and Digital Communication : Concepts, Theories, Practices
    Identity and Digital Communication : Concepts, Theories, Practices

    This comprehensive text explores the relationship between identity, subjectivity and digital communication, providing a strong starting point for understanding how fast-changing communication technologies, platforms, applications and practices have an impact on how we perceive ourselves, others, relationships and bodies.Drawing on critical studies of identity, behaviour and representation, Identity and Digital Communication demonstrates how identity is shaped and understood in the context of significant and ongoing shifts in online communication.Chapters cover a range of topics including advances in social networking, the development of deepfake videos, intimacies of everyday communication, the emergence of cultures based on algorithms, the authenticities of TikTok and online communication’s setting as a site for hostility and hate speech.Throughout the text, author Rob Cover shows how the formation and curation of self-identity is increasingly performed and engaged with through digital cultural practices, affirming that these practices must be understood if we are to make sense of identity in the 2020s and beyond.Featuring critical accounts, everyday examples and analysis of key platforms such as TikTok, this textbook is an essential primer for scholars and students in media studies, psychology, cultural studies, sociology, anthropology, computer science, as well as health practitioners, mental health advocates and community members.

    Price: 35.99 £ | Shipping*: 0.00 £
  • Intercultural Communication and Identity
    Intercultural Communication and Identity

    This Element asserts how identity as a construct enables a critical awareness of how speakers position themselves and are positioned by others in intercultural encounters.It discusses how identity vis-à-vis culture has been theorized through social psychological, poststructuralist, and critical lenses, and how identity is discursively constructed and mediated.Rejecting essentialist notions of language and culture, this Element demonstrates how inscriptions of identity such as race, ethnicity, nationality, and class can be used to critically examine the dynamics of situated intercultural encounters and to understand how such interactions can index competing and colluding ideologies.By examining identity research from different parts of the world, it casts a light on how identities are performed in diverse intercultural contexts and discusses research methodologies that have been employed to examine identity in intercultural communication.

    Price: 17.00 £ | Shipping*: 3.99 £
  • Innovation in Information Technology
    Innovation in Information Technology


    Price: 110.00 £ | Shipping*: 0.00 £
  • How dangerous is the digital identity wallet?

    The digital identity wallet can be dangerous if not properly secured. If it falls into the wrong hands, it can lead to identity theft, financial fraud, and other forms of cybercrime. However, with proper security measures such as strong passwords, two-factor authentication, and encryption, the digital identity wallet can be a secure and convenient way to manage and protect personal information. It is important for users to be vigilant and take necessary precautions to protect their digital identity wallet from potential threats.

  • How might a communication diary look like in dissociative identity disorder?

    A communication diary in dissociative identity disorder (DID) might include entries from different alters, each expressing their thoughts, feelings, and experiences. The diary may show shifts in handwriting, tone, and perspective as different alters take control of the writing. It could also include notes about internal communication between alters, such as leaving messages for each other or coordinating actions. The diary may serve as a tool for the individual to track and understand their different identities and their interactions with each other.

  • Are the effects of the media on Erikson's identity development plausible?

    Yes, the effects of the media on Erikson's identity development are plausible. The media plays a significant role in shaping individuals' sense of self and identity by providing them with various images, values, and beliefs to internalize. Exposure to different media representations can influence how individuals perceive themselves and others, impacting their identity formation process. Additionally, the media can also contribute to the exploration of different identities and help individuals navigate the complexities of identity development as they are exposed to diverse perspectives and experiences.

  • What creates identity?

    Identity is created through a combination of factors such as personal experiences, cultural background, social interactions, and self-perception. Our upbringing, beliefs, values, and relationships all play a role in shaping who we are and how we see ourselves. Additionally, external influences such as societal norms, media representation, and historical context can also impact our identity formation. Ultimately, identity is a complex and multifaceted concept that is continuously evolving as we navigate through life.

Similar search terms for Identity:


  • Identity Security for Software Development : Building with Identity, Secrets, and Credentials
    Identity Security for Software Development : Building with Identity, Secrets, and Credentials

    Maintaining secrets, credentials, and nonhuman identities in secure ways is an important, though often overlooked, aspect of secure software development.Cloud migration and digital transformation have led to an explosion of nonhuman identities—like automation scripts, cloud native apps, and DevOps tools—that need to be secured across multiple cloud and hybrid environments. DevOps security often addresses vulnerability scanning, but it neglects broader discussions like authentication, authorization, and access control, potentially leaving the door open for breaches.That's where an identity security strategy focused on secrets management can help. In this practical book, authors John Walsh and Uzi Ailon provide conceptual frameworks, technology overviews, and practical code snippets to help DevSecOps engineers, cybersecurity engineers, security managers, and software developers address use cases across CI/CD pipelines, Kubernetes and cloud native, hybrid and multicloud, automation/RPA, IOT/OT, and more.You'll learn:The fundamentals of authentication, authorization, access control, and secrets managementWhat developers need to know about managing secrets and identity to build safer appsWhat nonhuman identities, secrets, and credentials are—and how to secure themHow developers work with their cross-function peers to build safer appsHow identity security fits into modern software development practices

    Price: 47.99 £ | Shipping*: 0.00 £
  • Cornwall, Connectivity and Identity in the Fourteenth Century
    Cornwall, Connectivity and Identity in the Fourteenth Century

    Cornwall, Connectivity and Identity in the Fourteenth Century

    Price: 33.24 € | Shipping*: 0.00 €
  • Identity Protection Roller Stamp Identity Cover Eliminator Messy Code Guard Seal Information pink
    Identity Protection Roller Stamp Identity Cover Eliminator Messy Code Guard Seal Information pink

    Label:Yes 100% brand new and high quality Color: As the picture shows Material: Plastic Size: 4.7x5.6CM, Blade width 9mm Type: Identity Protection Roller Stamp 2-in1 Privacy Protector - Roll the identity protection roller and the dark ink will make all text illegible, perfect for covering private info in a clean way. Easy to operate - The built-in ABS imitation blade knife helps to open the box and package, just poke a hole to scrape the blade can be gently pushed out for use. Substitute for Paper Shredder - A great alternative to shredder, smaller and lighter; just roll gently to hide your private information with wide dark ink. Versatile Use - Effectively hiding any personal info on regular paper and envelopes like bank statements, tax documents, postcards, junk mails. Package Including: 1 x Identity Protection Roller Stamp

    Price: 21.79 € | Shipping*: 0.0 €
  • Learning Digital Identity : Design, Deploy, and Manage Identity Architectures
    Learning Digital Identity : Design, Deploy, and Manage Identity Architectures

    Why is it difficult for so many companies to get digital identity right?If you're still wrestling with even simple identity problems like modern website authentication, this practical book has the answers you need.Author Phil Windley provides conceptual frameworks to help you make sense of all the protocols, standards, and solutions available and includes suggestions for where and when you can apply them. By linking current social login solutions to emerging self-sovereign identity issues, this book explains how digital identity works and gives you a firm grasp on what's coming and how you can take advantage of it to solve your most pressing identity problems.VPs and directors will learn how to more effectively leverage identity across their businesses. This book helps you:Learn why functional online identity is still a difficult problem for most companiesUnderstand the purpose of digital identity and why it's fundamental to your business strategyLearn why "rolling your own" digital identity infrastructure is a bad ideaDifferentiate between core ideas such as authentication and authorizationExplore the properties of centralized, federated, and decentralized identity systemsDetermine the right authorization methods for your specific applicationUnderstand core concepts such as trust, risk, security, and privacyLearn how digital identity and self-sovereign identity can make a difference for you and your organization

    Price: 44.99 £ | Shipping*: 0.00 £
  • What is a specialist in application development for information technology?

    A specialist in application development for information technology is a professional who specializes in designing, creating, and maintaining software applications that meet the specific needs of an organization. They have expertise in programming languages, software development methodologies, and database management. These specialists work closely with clients and stakeholders to understand their requirements and develop customized solutions to improve efficiency, productivity, and overall business operations. They are responsible for ensuring that the applications are user-friendly, secure, and scalable to meet the evolving needs of the organization.

  • What is a specialist in information technology in application development?

    A specialist in information technology in application development is a professional who focuses on creating and maintaining software applications. They have expertise in programming languages, software development methodologies, and application design. Their role involves analyzing user needs, designing application solutions, writing code, testing and debugging applications, and ensuring that they meet the required specifications and standards. These specialists often work closely with other IT professionals and stakeholders to deliver high-quality, user-friendly applications.

  • What is gender identity?

    Gender identity is a deeply-held sense of one's own gender, which may or may not align with the sex assigned at birth. It is a personal understanding of oneself as male, female, a blend of both, or neither. Gender identity is separate from biological sex and can be fluid and diverse, encompassing a wide range of identities beyond the traditional binary of male and female. It is an integral aspect of a person's identity and how they perceive themselves in relation to the world.

  • What is identity politics?

    Identity politics refers to the political activity and movements that are based on the shared experiences and identities of specific social groups, such as race, gender, sexual orientation, or religion. It involves organizing and advocating for the rights and interests of these groups, often in response to systemic discrimination and inequality. Identity politics seeks to address the unique challenges and perspectives of marginalized communities and to promote social justice and equality for all individuals.

* All prices are inclusive of VAT and, if applicable, plus shipping costs. The offer information is based on the details provided by the respective shop and is updated through automated processes. Real-time updates do not occur, so deviations can occur in individual cases.