Home > Tags: identity (Total 74 Records)
I am: Remix Your Web Identity
Computer Science By:Paolo Sordi 2015-02-01 00:00:00
I Am: Remix Your Web Identity explores methods of designing and developing a personal website with RSS feeds that aggregate blog posts along with posts on social networks, such as Flickr, YouTube, Goodreads, Last.fm, and Delicious, in order to regain control and ownership (as well as authorship) of Computer Science
Getting It On Online: Cyberspace, Gay Male Sexuality, and Embodied Identity (Haworth Gay & Lesbian Studies)
Internet By:John Edward Campbell 2004-05-11 00:00:00
Learn how gay men use Internet technologies to connect with others sharing their erotic desires and to forge affirming communities online! Getting It On Online: Cyberspace, Gay Male Sexuality, and Embodied Identity examines the online embodied experiences of gay men. At once scholarly and sensual, Internet
Tags: study online identity cyberspace embodied male sexuality gay haworth lesbian
Identity and Play in Interactive Digital Media: Ergodic Ontogeny (Routledge Advances in Game Studies)
Game Development By:Sara M. Cole 2017-03-02 00:00:00
Recent shifts in new literacy studies have expanded definitions of text, reading/viewing, and literacy itself. The inclusion of non-traditional media forms is essential, as texts beyond written words, images, or movement across a screen are becoming ever more prominent in media studies. Included in Game Development
Tags: study game digital interactive identity play media routledge ergodic ontogeny
Preventing Identity Theft For Dummies
Telecommunications By:Michael J. Arata Jr. 2004-00-00 00:00:00
Twenty-seven million Americans have been victims of identity theft in the last five years and the total cost of identity theft approaches $48 billion per year (total costs to businesses are $43 billion and the direct cost to consumers is $5 billion) These staggering statistics have prompted security Telecommunications
Tags: dummies identity preventing theft
Phishing: Cutting the Identity Theft Line
Computer Science By:Rachael Lininger, Russell Dean Vines 2005-00-00 00:00:00
"Phishing" is the hot new identity theft scam. An unsuspecting victim receives an e-mail that seems to come from a bank or other financial institution, and it contains a link to a Web site where s/he is asked to provide account details. The site looks legitimate, and 3 to 5 percent of people who rec Computer Science
CISSP Exam Prep Questions: Domain 5 Identity and Access Management
Certification By:Richard Anderson 2017-06-30 00:00:00
Practice questions for Domain 5 (Identity and Access Management) of the Certified Information Systems Security Professional (CISSP) exam. Prep. Pass. Protect. Thats the purpose of this eBook. This is not a study guide rather, this is meant to augment your other preparation material. These questio Certification
MCSA 70-742 Cert Guide: Identity with Windows Server 2016
Algorithms By:Benjamin Finkel 2017-06-15 00:00:00
MCSA 70-742 Cert Guide is a best-of-breed exam study guide. Leading technology trainer and exam development consultant Benjamin Finkel shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is pre Algorithms
MCSA 70-742 Cert Guide: Identity with Windows Server 2016 (Certification Guide)
Windows By:Benjamin Finkel 2017-06-14 00:00:00
This is the eBook version of the print title. Note that the eBook does not provide access to the practice test software that accompanies the print book. Learn, prepare, and practice for MCSA 70-742 exam success with this Cert Guide from Pearson IT Certification, a leader in IT certification. Master Windows
Access and Identity Management for Libraries: Controlling Access to Online Information (Facet Publications (All Titles as Published))
Computer Science By:Masha Garibyan 2013-08-01 00:00:00
With the rapid increase in the use of electronic resources in libraries, managing access to online information is an area many librarians struggle with. This practical book is the first to explain the principles behind access management, the available technologies and how they work. identity management, rapid increase, area many librarians, electronic resources, available technologies
Tags: information online management access control identity libraries publications titles facet published
Cyber Self-Defense: Expert Advice to Avoid Online Predators, Identity Theft, and Cyberbullying
Security By:Alexis Moore 2014-10-07 00:00:00
According to the U.S .Department of Justice, more than six million people are stalked each year in the United States alone. Dont become one of them! International cybercrime expert Alexis Moore can help protect you from the spurned lovers, angry neighbors, and jealous coworkers who use the Internet avoid online predators, cybercrime expert alexis, identity theft, threatening online behaviors, potentially vulnerable relationship
Tags: online expert cyber identity avoid advice theft predators cyberbullying