Buy xbtc.eu ?

Products related to Identity:


  • Digital Natives: Blockchain, NFT, Cryptocurrency
    Digital Natives: Blockchain, NFT, Cryptocurrency

    In the first book of our Digital Native collection, navigate the fascinating world of emerging technologies like blockchain, cryptocurrencies and NFTs!In this introductory book, we break down complex terms through beautiful illustrations in a virtual world called Metaverse.

    Price: 18.99 £ | Shipping*: 3.99 £
  • Cryptocurrency Trading & ICO Investment Diploma – Advanced Strategies John Academy Code
    Cryptocurrency Trading & ICO Investment Diploma – Advanced Strategies John Academy Code

    With our Cryptocurrency Trading and ICO Investment Diploma, you may lay the groundwork for a successful career in digital finance. This course is designed for beginners and prospective investors. People who want to master the fundamentals of cryptocurrency trading and Initial Coin Offerings (ICOs). No previous experience? Not a problem! This course will take you from basic concepts to advanced tactics for successful crypto investments. Features: Interactive Learning: Engage in hands-on exerci...

    Price: 8.65 € | Shipping*: 0.00 GBP €
  • Blockchain and Cryptocurrency
    Blockchain and Cryptocurrency

    Blockchain is a system of recording information in a way that makes it difficult or impossible to change, hack, or cheat the system and this is done using Cryptography.A Cryptocurrency is a digital money that operates on the Blockchain technology.This book is intended to provide a detailed analysis of the effect of Blockchain and Cryptocurrency in the current market.It is designed with the focus to facilitate the students in understanding the working behind the raging technology.Blockchain and Cryptocurrency are vastly discussed nowadays in all research domains to bring decentralization.This book gives easy access to the complex terminologies revolving around the technology.Since this is a new course assigned in the curriculum, therefore special care is taken in drafting the units.The chapters have been written with reference to the past understanding of the students of cryptography and merging those concepts with the Blockchain technology. The emphasis is laid on fundamental ideas and ease of understanding with suitable diagrammatic representation and real world examples.This book is self-contained and requires no comparison and analysis with other conceptual data.It can also be used by scholars who are beginners in the Blockchain technology and wish to dive deeper in its technological aspects.Numerous multiple choice questions at the back of each chapter are given to test the objective understanding of the concepts.Salient Features:Standard and precise definitions and tips. Popular blockchain consensus protocols, their strengths, weaknesses and application scenarios through analysis and comparison. Several blockchain examples essential for engineering students. Hints and explanations are given in the solution of every problem. Imperative real examples

    Price: 29.95 £ | Shipping*: 0.00 £
  • Learning Digital Identity : Design, Deploy, and Manage Identity Architectures
    Learning Digital Identity : Design, Deploy, and Manage Identity Architectures

    Why is it difficult for so many companies to get digital identity right?If you're still wrestling with even simple identity problems like modern website authentication, this practical book has the answers you need.Author Phil Windley provides conceptual frameworks to help you make sense of all the protocols, standards, and solutions available and includes suggestions for where and when you can apply them. By linking current social login solutions to emerging self-sovereign identity issues, this book explains how digital identity works and gives you a firm grasp on what's coming and how you can take advantage of it to solve your most pressing identity problems.VPs and directors will learn how to more effectively leverage identity across their businesses. This book helps you:Learn why functional online identity is still a difficult problem for most companiesUnderstand the purpose of digital identity and why it's fundamental to your business strategyLearn why "rolling your own" digital identity infrastructure is a bad ideaDifferentiate between core ideas such as authentication and authorizationExplore the properties of centralized, federated, and decentralized identity systemsDetermine the right authorization methods for your specific applicationUnderstand core concepts such as trust, risk, security, and privacyLearn how digital identity and self-sovereign identity can make a difference for you and your organization

    Price: 44.99 £ | Shipping*: 0.00 £
  • How dangerous is the digital identity wallet?

    The digital identity wallet can be dangerous if not properly secured. If it falls into the wrong hands, it can lead to identity theft, financial fraud, and other forms of cybercrime. However, with proper security measures such as strong passwords, two-factor authentication, and encryption, the digital identity wallet can be a secure and convenient way to manage and protect personal information. It is important for users to be vigilant and take necessary precautions to protect their digital identity wallet from potential threats.

  • What is the course for cryptocurrency trading?

    The course for cryptocurrency trading typically covers topics such as understanding blockchain technology, analyzing market trends, technical analysis, risk management, and trading strategies. It also includes practical exercises and simulations to help students gain hands-on experience in trading cryptocurrencies. Additionally, the course may cover the regulatory environment and legal considerations related to cryptocurrency trading. Overall, the course aims to provide students with the knowledge and skills needed to effectively trade cryptocurrencies in the market.

  • What creates identity?

    Identity is created through a combination of factors such as personal experiences, cultural background, social interactions, and self-perception. Our upbringing, beliefs, values, and relationships all play a role in shaping who we are and how we see ourselves. Additionally, external influences such as societal norms, media representation, and historical context can also impact our identity formation. Ultimately, identity is a complex and multifaceted concept that is continuously evolving as we navigate through life.

  • What is gender identity?

    Gender identity is a deeply-held sense of one's own gender, which may or may not align with the sex assigned at birth. It is a personal understanding of oneself as male, female, a blend of both, or neither. Gender identity is separate from biological sex and can be fluid and diverse, encompassing a wide range of identities beyond the traditional binary of male and female. It is an integral aspect of a person's identity and how they perceive themselves in relation to the world.

Similar search terms for Identity:


  • Cryptocurrency Compliance and Operations : Digital Assets, Blockchain and DeFi
    Cryptocurrency Compliance and Operations : Digital Assets, Blockchain and DeFi

    Cryptocurrencies and digital assets are increasingly garnering interest from institutional investors.This is on top of the already strong support in place for cryptocurrencies such as Bitcoin from the retail investor.With this rapid growth has come a series of complex operational and regulatory compliance challenges.These challenges have become further exacerbated by the increasing pace of technological advances in areas such as decentralized finance (DeFi) tokenization, blockchain and distributed ledger technology (DLT) essential to the crypto and digital asset markets.This book will be the first book to provide current and practical guidance on the operational and compliance foundations of crypto investing and asset management. The book will include:· Step-by-step analysis of the modern operational mechanics behind cryptocurrency investment operations· Detailed guidance and example documentation on the procedures launching a crypto fund· Explanation of the operational procedures and compliance requirements for crytpo asset managers· Detailed analysis of crypto anti-money laundering compliance, regulations and laws for cryptocurrencies· Up-to-date analysis of recent crypto case studies, frauds and regulatory enforcement actions· Review of the digital asset landscape including non-fungible tokens (NFTs) and asset tokenization· Current examples of real-world crypto operations policies and compliance manuals· Analysis of the emerging trends in crypto operations and compliance in areas including blockchain, DeFi,crypto lending, yield farming, crypto mining and dAppsCryptocurrency Compliance and Operations will be an invaluable up-to-date resource for investors, fund managers, and their operations and compliance personnel as well as service providers on the implementation and management of best practice operations.?

    Price: 74.99 £ | Shipping*: 0.00 £
  • Blockchain and Artificial Intelligence-Based Solution to Enhance the Privacy in Digital Identity and IoT
    Blockchain and Artificial Intelligence-Based Solution to Enhance the Privacy in Digital Identity and IoT

    The chapters in this book explore the main domains that represent considerable risks for the respect of privacy, such as education, health, finance or social media. Through its place in the massive data production industry, the Internet of Things participates in the development of artificial intelligence and is increasingly attracting the attention of web giants, governments and especially all types of hackers.Thanks to this book, private and public organizations will have at their disposal a tool that highlights, on the one hand, the major challenges raised by privacy in the context of the Internet of Things and, on the other hand, recommendations for improving good practices. Digital identity is presented as a bulwark for the protection of privacy.It opens up new avenues for improving digital trust.Concretely, there are a set of challenges that are associated with the management of digital identity, mainly in relation to the compliance and governance of personnel data in order to eliminate privacy and security risks.

    Price: 84.99 £ | Shipping*: 0.00 £
  • Entrepreneurial Identity and Identity Work
    Entrepreneurial Identity and Identity Work

    Identities can potentially serve as powerful elements that both drive, and are shaped by, entrepreneurial actions.Entrepreneurial identity is a complex construct with multidisciplinary roots, and therefore there is scope to more fully enrich our theoretical understanding of identity and identity formation, at both individual and organizational levels, and their relationship to entrepreneurial processes, practices and activities.This book highlights two key features of contemporary research on entrepreneurial identity.First, to see it as a dynamic rather than a (relatively) fixed and unchanging feature, shaped by different life episodes.It is increasingly fluid, multilevel and multidimensional, comprising multiple subidentities rather than a univocal (and unchanging) self.As such, it has a profound effect not only on the way we feel, think and behave, but also on what we aim to achieve.Accordingly, it is vital that its dynamics are better understood, particularly in determining how actors behave in an entrepreneurial context.The book’s second focus is on identity work as the process through which entrepreneurial identities are formed and shaped, and the contributors demonstrate how the dynamics of identity formation relate to entrepreneurial outcomes in a range of individual and organizational contexts.This book was originally published as a special issue of Entrepreneurship & Regional Development.

    Price: 43.99 £ | Shipping*: 0.00 £
  • The Possessive Investment in Whiteness : How White People Profit from Identity Politics
    The Possessive Investment in Whiteness : How White People Profit from Identity Politics

    George Lipsitz’s classic book The Possessive Investment in Whiteness argues that public policy and private prejudice work together to create a possessive investment in whiteness that is responsible for the racialized hierarchies of our society.Whiteness has a cash value: it accounts for advantages that come to individuals through profits made from housing secured in discriminatory markets, through the unequal educational opportunities available to children of different races, through insider networks that channel employment opportunities to the friends and relatives of those who have profited most from past and present discrimination, and especially through intergenerational transfers of inherited wealth that pass on the spoils of discrimination to succeeding generations.White Americans are encouraged to invest in whiteness, to remain true to an identity that provides them with structured advantages. In this twentieth anniversary edition, Lipsitz provides a new introduction and updated statistics; as well as analyses of the enduring importance of Hurricane Katrina; the nature of anti-immigrant mobilizations; police assaults on Black women, the killings of Trayvon Martin, Michael Brown, and Freddie Gray; the legacy of Obama and the emergence of Trump; the Charleston Massacre and other hate crimes; and the ways in which white fear, white fragility, and white failure have become drivers of a new ethno-nationalism.As vital as it was upon its original publication, the twentieth anniversary edition of The Possessive Investment in Whiteness is an unflinching but necessary look at white supremacy.

    Price: 27.99 £ | Shipping*: 0.00 £
  • What is identity politics?

    Identity politics refers to the political activity and movements that are based on the shared experiences and identities of specific social groups, such as race, gender, sexual orientation, or religion. It involves organizing and advocating for the rights and interests of these groups, often in response to systemic discrimination and inequality. Identity politics seeks to address the unique challenges and perspectives of marginalized communities and to promote social justice and equality for all individuals.

  • What is Supergirl's identity?

    Supergirl's identity is Kara Zor-El, a Kryptonian who is the cousin of Superman. She is also known as Kara Danvers, her human alter ego. As Supergirl, she possesses superhuman strength, speed, and the ability to fly, and she uses her powers to protect the Earth from various threats. In her civilian identity as Kara Danvers, she works as a reporter and tries to balance her personal life with her superhero responsibilities.

  • Is gender identity sexist?

    Gender identity itself is not inherently sexist. Gender identity is a deeply personal and individual experience that reflects a person's internal sense of their own gender, which may or may not align with the sex they were assigned at birth. However, societal norms, expectations, and stereotypes around gender can be sexist, as they often reinforce traditional gender roles and perpetuate inequality between genders. It is important to separate the concept of gender identity from these societal constructs in order to promote understanding and acceptance of diverse gender identities.

  • What is identity theft?

    Identity theft is a type of crime where someone wrongfully obtains and uses another person's personal information, such as their name, Social Security number, or credit card details, without their permission. This stolen information is then used to commit fraud or other illegal activities, often resulting in financial loss or damage to the victim's reputation. Identity theft can have serious consequences for the victim, including damage to their credit score, difficulty obtaining loans or credit, and potential legal issues. It is important for individuals to safeguard their personal information and regularly monitor their financial accounts to detect any suspicious activity.

* All prices are inclusive of VAT and, if applicable, plus shipping costs. The offer information is based on the details provided by the respective shop and is updated through automated processes. Real-time updates do not occur, so deviations can occur in individual cases.