Angebote zu "Virtual" (26 Treffer)

Kategorien

Shops

Space, Time and the Construction of Identity
88,95 € *
ggf. zzgl. Versand

Given the consolidated position of English as the international language for communication in business and management, as well as in institutional contexts, this book depicts a wide panorama of encounters where identity, image and reputation are a key focus in creating effective interactions. The main theme of the work is how temporal and spatial meaning representations in language reflect and, in turn, construct these personal, professional and corporate identities. From each chapter different sociolinguistic realities emerge which affect English, as it is used by both native and non-native speakers, especially in the relationship between local or national cultures and the global professional discourse community.In this context not only have domain-specific language features been analysed, but also the communication strategies and interactive patterns at work in how different geo-political cultures construe, manifest and adjust their identities over the course of time and in varying physical, virtual, and cognitive spaces.

Anbieter: Dodax AT
Stand: 22.01.2020
Zum Angebot
Online Communication in the Context of Personal...
12,99 € *
ggf. zzgl. Versand

Online Communication in the Context of Personal Virtual and Corporate Identity Formation ab 12.99 € als Taschenbuch: . Aus dem Bereich: Bücher, Wissenschaft, Medienwissenschaft,

Anbieter: hugendubel
Stand: 22.01.2020
Zum Angebot
Online Communication in the Context of Personal...
4,99 € *
ggf. zzgl. Versand

Online Communication in the Context of Personal Virtual and Corporate Identity Formation ab 4.99 € als epub eBook: . Aus dem Bereich: eBooks, Belletristik, Erzählungen,

Anbieter: hugendubel
Stand: 22.01.2020
Zum Angebot
Persephone Falling: The Persephone Saga, Book 1...
9,95 € *
ggf. zzgl. Versand

Corporations are culture. Alena is corporate nobility, born on Olympus Station which orbits far above the Earth. The trappings of ancient Greece live on in Olympus Corporation. When tragedy strikes Alena finds herself crashing to Earth and having to find a new life amongst those who dwell below. The savagery of the surface is well known, where many do not even have a proper corporation to give their lives meaning and independent contractors keep the old corporate wars alive. Taking on the identity of Persephone, a sponsored corporate hero in the virtual network, Alena learns of the horrors one corporation is inflicting on the population and she is forced to decide just what ideals are worth fighting for when losing means a fate far worse than death. 1. Language: English. Narrator: Mare Trevathan. Audio sample: http://samples.audible.de/bk/acx0/098499/bk_acx0_098499_sample.mp3. Digital audiobook in aax.

Anbieter: Audible
Stand: 22.01.2020
Zum Angebot
Digital Strategies for Powerful Corporate Commu...
35,99 € *
ggf. zzgl. Versand

The explosion of blogs, social networkingsites, wikis, video sharing sites, and otherpowerful digital communications platformsmay be the biggest game-changer to impactbusiness since mechanized manufacturing. In today's Web 2.0 world, company stakeholders--including employees, customers,and investors--are empowered in waysunimaginable just a few years ago, andtraditional corporate hierarchies areyesterday's news. Rather than attempt to turn back the clockand reassert strict, top-down control overstakeholder relationships, the smartestcompanies worldwide are responding withbold new digital communications strategiesbased on transparency, authenticity, andinclusion, instead of secrecy, artificiality,and exclusion. International corporate communicationsguru Paul A. Argenti provides a lively, up-to-the-minute review of the Web 2.0 landscapeand analyzes the increasingly central rolecorporate communications plays in virtuallyevery organizational function. Argenti andcoauthor Courtney Barnes advise corporateleaders on how to deploy proven strategiesfor using new and emerging digitalplatforms to * Manage brand identity andcompany reputation * Build a culture of engagementand transparency * Turn stakeholders into"company evangelists" * Manage internal communications acrosstime zones and language barriers * Recruit and retain the best talent * Develop compelling messages based oncustomer and investor needs and desires Argenti and Barnes provide case studiesillustrating digital communications bestpractices at HP, Southwest Airlines, Sony,Dell, IBM, Starbucks, HBO, FedEx, GE, andother major players. This groundbreaking book will teach youhow to gain real, manageable control overyour organization's communications intoday's virtual world.

Anbieter: buecher
Stand: 22.01.2020
Zum Angebot
Digital Strategies for Powerful Corporate Commu...
35,99 € *
ggf. zzgl. Versand

The explosion of blogs, social networkingsites, wikis, video sharing sites, and otherpowerful digital communications platformsmay be the biggest game-changer to impactbusiness since mechanized manufacturing. In today's Web 2.0 world, company stakeholders--including employees, customers,and investors--are empowered in waysunimaginable just a few years ago, andtraditional corporate hierarchies areyesterday's news. Rather than attempt to turn back the clockand reassert strict, top-down control overstakeholder relationships, the smartestcompanies worldwide are responding withbold new digital communications strategiesbased on transparency, authenticity, andinclusion, instead of secrecy, artificiality,and exclusion. International corporate communicationsguru Paul A. Argenti provides a lively, up-to-the-minute review of the Web 2.0 landscapeand analyzes the increasingly central rolecorporate communications plays in virtuallyevery organizational function. Argenti andcoauthor Courtney Barnes advise corporateleaders on how to deploy proven strategiesfor using new and emerging digitalplatforms to * Manage brand identity andcompany reputation * Build a culture of engagementand transparency * Turn stakeholders into"company evangelists" * Manage internal communications acrosstime zones and language barriers * Recruit and retain the best talent * Develop compelling messages based oncustomer and investor needs and desires Argenti and Barnes provide case studiesillustrating digital communications bestpractices at HP, Southwest Airlines, Sony,Dell, IBM, Starbucks, HBO, FedEx, GE, andother major players. This groundbreaking book will teach youhow to gain real, manageable control overyour organization's communications intoday's virtual world.

Anbieter: buecher
Stand: 22.01.2020
Zum Angebot
Apricorn Aegis Secure Key 3z USB-Stick 16 GB US...
110,66 € *
ggf. zzgl. Versand

Aegis Secure Key 3z Merges Advanced Data Protection, Affordability, and Mass Configurability Easy to use USB 3.0 flash drive with on-the-fly 256-bit AES hardware encryption, onboard secure PIN access and FIPS 140-2 Level 3 validation. With software-free operation, cross-platform compatibility, USB 3.0 speed, Aegis Configurator compatibility, and our most advanced security feature set, Apricorn’s Aegis Secure Key 3z takes advanced data security to a new level of efficiency and affordability. FIPS 140-2 Level 3 to meet the U.S. government standards for information technology and computer security. NIST FIPS 140 is the cryptography standard program required by the US federal government for protection of sensitive data. The Aegis Secure Key’s FIPS 140-2 validation covers 11 areas of its cryptographic security system, including physical security, cryptographic key management and design integrity. Available in four levels, the Aegis Secure Key’s FIPS 140-2 Level 3 validation encompasses both the Aegis Secure Key’s physical tamper-resistant features as well as its identity-based authentication. Utilizes Military Grade 256-bit AES XTS Hardware Encryption All data on the Aegis Secure Key is encrypted on the fly with the built-in 256-bit AES XTS hardware encryption. Onboard Alphanumeric Keypad – Prevents Hardware and Software Key Logging Using a rechargeable battery, the Aegis Secure Key enables the user to unlock the drive with a 7-16 digit PIN BEFORE connecting to the USB port on your computer, tablet or mobile device. The embedded keypad prevents hardware and software key logging attempts to capture your password entered via the host system. Software-Free Design – With no admin rights to contend with, the Aegis Secure Key is a breeze to implement Aegis Configurator Compatible Create custom profiles and simultaneously mass configure multiple Secure Keys in a matter of seconds with Apricorn’s new Aegis Configurator / Powered Hub bundle. Independent User and Admin PINs The Aegis Secure Key can be configured with independent User and Admin PINs, making it ideal for corporate and government deployment. If the User forgets their PIN, the drive can be unlocked using the Admin PIN which can then clear the forgotten User PIN and allow for the User to set a new PIN. User Forced Enrollment Once a device is configured by the Admin, it can then be deployed in a state of USER FORCED ENROLLMENT in which the User must first establish his or her own User PIN before the drive can be accessed or used. Data Recovery PINs In the event that a User PIN is forgotten, up to 4 one-time use recovery PINs can be programmed to permit access to the drives data by creating a new state of User Forced Enrollment. Drive Reset Feature The Aegis Secure Key also includes a drive reset feature which clears both User and Admin PINs, destroys the data, creates a new randomly generated encryption key and allows the drive to be reused. The Aegis Secure Key is capable of generating an infinite number of randomly generated encryption keys, allowing the user to reset the drive as often as required. Dust and Water Resistant Durable Aluminum Housing - IP57 Certification Protecting data goes well beyond encryption. Tough enough to go anywhere, the Aegis Secure Key 3z's resilient design makes it perfect for travel and field applications. With its rugged, extruded aluminum crush-resistant casing, the Aegis Secure Key 3z is tamper evident and well-protected against physical damage. Sealed from Physical Attacks by Tough Epoxy Coating The internal drive components are completely protected by a super tough epoxy compound, making it virtually impossible to remove without causing permanent damage to the electronics. This barrier prevents a potential hacker from accessing the encryption circuitry and launching a variety of potential attacks. Brute Force Self Destruct Feature As the Aegis Secure Key is unlocked using its own keypad and not via a keyboard, it is not vulnerable to software/hardware based key-loggers or brute force attacks. In addition the Aegis Secure Key further protects your data with a programmable “Brute Force Hack Defense Mechanism” which deletes the encryption key and destroys all stored data if the incorrect PIN is entered up to a total of 20 consecutive times. Unattended Auto Lock feature The Aegis Secure Key automatically locks once you unplug the drive from your computer's USB port or power to the USB port is turned off or after a pre-programmed period of inactivity Wear Resistant Key Pad Designed with protection in mind, the entire Aegis Secure Drive family incorporates ‘wear resistant’ keypads to hide key usage and avoid tipping off a potential hacker to the commonly used keys. Two Read-Only Modes The Secure Key 3z has two read-only modes. One is set by the admin in the admin mode and can’t be modified or disabled by anyone other than the admin. The second read-only mode can be set and disabled by a user but can also be overridden by the admin as well. Ideal for situations where the contents of the Secure Key needs to be accessed by several people in a public setting, or for forensic applications where the drive's contents must be kept intact and unaltered for later examination. Lock Override Mode Designated for specific cases in which the key needs to remain unlocked through USB port re-enumeration such as during reboot, or passing through a virtual machine.

Anbieter: Dodax AT
Stand: 22.01.2020
Zum Angebot
Apricorn 64GB Aegis Secure Key 3z USB-Stick USB...
179,74 € *
ggf. zzgl. Versand

Aegis Secure Key 3z Merges Advanced Data Protection, Affordability, and Mass Configurability Easy to use USB 3.0 flash drive with on-the-fly 256-bit AES hardware encryption, onboard secure PIN access and FIPS 140-2 Level 3 validation. With software-free operation, cross-platform compatibility, USB 3.0 speed, Aegis Configurator compatibility, and our most advanced security feature set, Apricorn’s Aegis Secure Key 3z takes advanced data security to a new level of efficiency and affordability. FIPS 140-2 Level 3 to meet the U.S. government standards for information technology and computer security. NIST FIPS 140 is the cryptography standard program required by the US federal government for protection of sensitive data. The Aegis Secure Key’s FIPS 140-2 validation covers 11 areas of its cryptographic security system, including physical security, cryptographic key management and design integrity. Available in four levels, the Aegis Secure Key’s FIPS 140-2 Level 3 validation encompasses both the Aegis Secure Key’s physical tamper-resistant features as well as its identity-based authentication. Utilizes Military Grade 256-bit AES XTS Hardware Encryption All data on the Aegis Secure Key is encrypted on the fly with the built-in 256-bit AES XTS hardware encryption. Onboard Alphanumeric Keypad – Prevents Hardware and Software Key Logging Using a rechargeable battery, the Aegis Secure Key enables the user to unlock the drive with a 7-16 digit PIN BEFORE connecting to the USB port on your computer, tablet or mobile device. The embedded keypad prevents hardware and software key logging attempts to capture your password entered via the host system. Software-Free Design – With no admin rights to contend with, the Aegis Secure Key is a breeze to implement Aegis Configurator Compatible Create custom profiles and simultaneously mass configure multiple Secure Keys in a matter of seconds with Apricorn’s new Aegis Configurator / Powered Hub bundle. Independent User and Admin PINs The Aegis Secure Key can be configured with independent User and Admin PINs, making it ideal for corporate and government deployment. If the User forgets their PIN, the drive can be unlocked using the Admin PIN which can then clear the forgotten User PIN and allow for the User to set a new PIN. User Forced Enrollment Once a device is configured by the Admin, it can then be deployed in a state of USER FORCED ENROLLMENT in which the User must first establish his or her own User PIN before the drive can be accessed or used. Data Recovery PINs In the event that a User PIN is forgotten, up to 4 one-time use recovery PINs can be programmed to permit access to the drives data by creating a new state of User Forced Enrollment. Drive Reset Feature The Aegis Secure Key also includes a drive reset feature which clears both User and Admin PINs, destroys the data, creates a new randomly generated encryption key and allows the drive to be reused. The Aegis Secure Key is capable of generating an infinite number of randomly generated encryption keys, allowing the user to reset the drive as often as required. Dust and Water Resistant Durable Aluminum Housing - IP57 Certification Protecting data goes well beyond encryption. Tough enough to go anywhere, the Aegis Secure Key 3z's resilient design makes it perfect for travel and field applications. With its rugged, extruded aluminum crush-resistant casing, the Aegis Secure Key 3z is tamper evident and well-protected against physical damage. Sealed from Physical Attacks by Tough Epoxy Coating The internal drive components are completely protected by a super tough epoxy compound, making it virtually impossible to remove without causing permanent damage to the electronics. This barrier prevents a potential hacker from accessing the encryption circuitry and launching a variety of potential attacks. Brute Force Self Destruct Feature As the Aegis Secure Key is unlocked using its own keypad and not via a keyboard, it is not vulnerable to software/hardware based key-loggers or brute force attacks. In addition the Aegis Secure Key further protects your data with a programmable “Brute Force Hack Defense Mechanism” which deletes the encryption key and destroys all stored data if the incorrect PIN is entered up to a total of 20 consecutive times. Unattended Auto Lock feature The Aegis Secure Key automatically locks once you unplug the drive from your computer's USB port or power to the USB port is turned off or after a pre-programmed period of inactivity Wear Resistant Key Pad Designed with protection in mind, the entire Aegis Secure Drive family incorporates ‘wear resistant’ keypads to hide key usage and avoid tipping off a potential hacker to the commonly used keys. Two Read-Only Modes The Secure Key 3z has two read-only modes. One is set by the admin in the admin mode and can’t be modified or disabled by anyone other than the admin. The second read-only mode can be set and disabled by a user but can also be overridden by the admin as well. Ideal for situations where the contents of the Secure Key needs to be accessed by several people in a public setting, or for forensic applications where the drive's contents must be kept intact and unaltered for later examination. Lock Override Mode Designated for specific cases in which the key needs to remain unlocked through USB port re-enumeration such as during reboot, or passing through a virtual machine.

Anbieter: Dodax AT
Stand: 22.01.2020
Zum Angebot
Apricorn 64GB Aegis Secure Key 3z USB-Stick USB...
170,53 € *
ggf. zzgl. Versand

Aegis Secure Key 3z Merges Advanced Data Protection, Affordability, and Mass Configurability Easy to use USB 3.0 flash drive with on-the-fly 256-bit AES hardware encryption, onboard secure PIN access and FIPS 140-2 Level 3 validation. With software-free operation, cross-platform compatibility, USB 3.0 speed, Aegis Configurator compatibility, and our most advanced security feature set, Apricorn’s Aegis Secure Key 3z takes advanced data security to a new level of efficiency and affordability. FIPS 140-2 Level 3 to meet the U.S. government standards for information technology and computer security. NIST FIPS 140 is the cryptography standard program required by the US federal government for protection of sensitive data. The Aegis Secure Key’s FIPS 140-2 validation covers 11 areas of its cryptographic security system, including physical security, cryptographic key management and design integrity. Available in four levels, the Aegis Secure Key’s FIPS 140-2 Level 3 validation encompasses both the Aegis Secure Key’s physical tamper-resistant features as well as its identity-based authentication. Utilizes Military Grade 256-bit AES XTS Hardware Encryption All data on the Aegis Secure Key is encrypted on the fly with the built-in 256-bit AES XTS hardware encryption. Onboard Alphanumeric Keypad – Prevents Hardware and Software Key Logging Using a rechargeable battery, the Aegis Secure Key enables the user to unlock the drive with a 7-16 digit PIN BEFORE connecting to the USB port on your computer, tablet or mobile device. The embedded keypad prevents hardware and software key logging attempts to capture your password entered via the host system. Software-Free Design – With no admin rights to contend with, the Aegis Secure Key is a breeze to implement Aegis Configurator Compatible Create custom profiles and simultaneously mass configure multiple Secure Keys in a matter of seconds with Apricorn’s new Aegis Configurator / Powered Hub bundle. Independent User and Admin PINs The Aegis Secure Key can be configured with independent User and Admin PINs, making it ideal for corporate and government deployment. If the User forgets their PIN, the drive can be unlocked using the Admin PIN which can then clear the forgotten User PIN and allow for the User to set a new PIN. User Forced Enrollment Once a device is configured by the Admin, it can then be deployed in a state of USER FORCED ENROLLMENT in which the User must first establish his or her own User PIN before the drive can be accessed or used. Data Recovery PINs In the event that a User PIN is forgotten, up to 4 one-time use recovery PINs can be programmed to permit access to the drives data by creating a new state of User Forced Enrollment. Drive Reset Feature The Aegis Secure Key also includes a drive reset feature which clears both User and Admin PINs, destroys the data, creates a new randomly generated encryption key and allows the drive to be reused. The Aegis Secure Key is capable of generating an infinite number of randomly generated encryption keys, allowing the user to reset the drive as often as required. Dust and Water Resistant Durable Aluminum Housing - IP57 Certification Protecting data goes well beyond encryption. Tough enough to go anywhere, the Aegis Secure Key 3z's resilient design makes it perfect for travel and field applications. With its rugged, extruded aluminum crush-resistant casing, the Aegis Secure Key 3z is tamper evident and well-protected against physical damage. Sealed from Physical Attacks by Tough Epoxy Coating The internal drive components are completely protected by a super tough epoxy compound, making it virtually impossible to remove without causing permanent damage to the electronics. This barrier prevents a potential hacker from accessing the encryption circuitry and launching a variety of potential attacks. Brute Force Self Destruct Feature As the Aegis Secure Key is unlocked using its own keypad and not via a keyboard, it is not vulnerable to software/hardware based key-loggers or brute force attacks. In addition the Aegis Secure Key further protects your data with a programmable “Brute Force Hack Defense Mechanism” which deletes the encryption key and destroys all stored data if the incorrect PIN is entered up to a total of 20 consecutive times. Unattended Auto Lock feature The Aegis Secure Key automatically locks once you unplug the drive from your computer's USB port or power to the USB port is turned off or after a pre-programmed period of inactivity Wear Resistant Key Pad Designed with protection in mind, the entire Aegis Secure Drive family incorporates ‘wear resistant’ keypads to hide key usage and avoid tipping off a potential hacker to the commonly used keys. Two Read-Only Modes The Secure Key 3z has two read-only modes. One is set by the admin in the admin mode and can’t be modified or disabled by anyone other than the admin. The second read-only mode can be set and disabled by a user but can also be overridden by the admin as well. Ideal for situations where the contents of the Secure Key needs to be accessed by several people in a public setting, or for forensic applications where the drive's contents must be kept intact and unaltered for later examination. Lock Override Mode Designated for specific cases in which the key needs to remain unlocked through USB port re-enumeration such as during reboot, or passing through a virtual machine.

Anbieter: Dodax
Stand: 22.01.2020
Zum Angebot