Buy ennoia.eu ?

Products related to Identity:


  • Cornwall, Connectivity and Identity in the Fourteenth Century
    Cornwall, Connectivity and Identity in the Fourteenth Century

    The links between Cornwall, a county frequently considered remote and separate in the Middle Ages, and the wider realm of England are newly discussed. WINNER: The Federation of Old Cornwall Societies (FOCS) Holyer an Gof Cup for non-fiction, 2020. Stretching out into the wild Atlantic, fourteenth-century Cornwall was a land at the very ends of the earth.Within itsboundaries many believed that King Arthur was a real-life historical Cornishman and that their natal shire had once been the home of mighty giants.Yet, if the county was both unusual and remarkable, it still held an integral place in the wider realm of England. Drawing on a wide range of published and archival material, this book seeks to show how Cornwall remained strikingly distinctive while still forming part of the kingdom.It argues that myths,saints, government, and lordship all endowed the name and notion of Cornwall with authority in the minds of its inhabitants, forging these people into a commonalty.At the same time, the earldom-duchy and the Crown together helped to link the county into the politics of England at large.With thousands of Cornishmen and women drawn east of the Tamar by the needs of the Crown, warfare, lordship, commerce, the law, the Church, and maritime interests, connectivity with the wider realm emerges as a potent integrative force. Supported by a cast of characters ranging from vicious pirates and gentlemen-criminals through to the Black Prince, the volume sets Cornwall in the latest debates about centralisation, devolution, and collective identity, about the nature of Cornishness and Englishness themselves. S.J. DRAKE is a Research Associate at the Institute of Historical Research.He was born and brought up in Cornwall.

    Price: 34.99 £ | Shipping*: 0.00 £
  • Learning Digital Identity : Design, Deploy, and Manage Identity Architectures
    Learning Digital Identity : Design, Deploy, and Manage Identity Architectures

    Why is it difficult for so many companies to get digital identity right?If you're still wrestling with even simple identity problems like modern website authentication, this practical book has the answers you need.Author Phil Windley provides conceptual frameworks to help you make sense of all the protocols, standards, and solutions available and includes suggestions for where and when you can apply them. By linking current social login solutions to emerging self-sovereign identity issues, this book explains how digital identity works and gives you a firm grasp on what's coming and how you can take advantage of it to solve your most pressing identity problems.VPs and directors will learn how to more effectively leverage identity across their businesses. This book helps you:Learn why functional online identity is still a difficult problem for most companiesUnderstand the purpose of digital identity and why it's fundamental to your business strategyLearn why "rolling your own" digital identity infrastructure is a bad ideaDifferentiate between core ideas such as authentication and authorizationExplore the properties of centralized, federated, and decentralized identity systemsDetermine the right authorization methods for your specific applicationUnderstand core concepts such as trust, risk, security, and privacyLearn how digital identity and self-sovereign identity can make a difference for you and your organization

    Price: 44.99 £ | Shipping*: 0.00 £
  • Mobility and Masks : Cultural Identity in Travel Literature
    Mobility and Masks : Cultural Identity in Travel Literature

    Travelers have always experimented with disguise while observing the disguises of others.Each of the chapters in Mobility and Masks illustrates the strategies of concealment in the experience of travel: a seventeenth-century German aristocrat discovers new freedom as she travels incognito, Jesuits write home from China in the eighteenth century about how costume changes serve their mission, a Chinese opera star reflects on his own masked art during a tour of Russia in 1935.Masking can be a racial marker, as shown in two nineteenth-century accounts: an English woman encountering the creole culture of the West Indies and a French woman observing how cosmetic beauty is defined in Shanghai.Fictional representations of the masked traveler are illustrative, too: masked voices in the lyric poetry of Horace, the masked woman as an obstacle in classic adventure tales, the failure of cultural masking in the story of a modern immigrant.

    Price: 16.95 £ | Shipping*: 3.99 £
  • Identity Security for Software Development : Building with Identity, Secrets, and Credentials
    Identity Security for Software Development : Building with Identity, Secrets, and Credentials

    Maintaining secrets, credentials, and nonhuman identities in secure ways is an important, though often overlooked, aspect of secure software development.Cloud migration and digital transformation have led to an explosion of nonhuman identities—like automation scripts, cloud native apps, and DevOps tools—that need to be secured across multiple cloud and hybrid environments. DevOps security often addresses vulnerability scanning, but it neglects broader discussions like authentication, authorization, and access control, potentially leaving the door open for breaches.That's where an identity security strategy focused on secrets management can help. In this practical book, authors John Walsh and Uzi Ailon provide conceptual frameworks, technology overviews, and practical code snippets to help DevSecOps engineers, cybersecurity engineers, security managers, and software developers address use cases across CI/CD pipelines, Kubernetes and cloud native, hybrid and multicloud, automation/RPA, IOT/OT, and more.You'll learn:The fundamentals of authentication, authorization, access control, and secrets managementWhat developers need to know about managing secrets and identity to build safer appsWhat nonhuman identities, secrets, and credentials are—and how to secure themHow developers work with their cross-function peers to build safer appsHow identity security fits into modern software development practices

    Price: 47.99 £ | Shipping*: 0.00 £
  • What is the difference between Corporate Identity and Corporate Design?

    Corporate identity refers to the overall image and perception of a company, including its values, mission, and personality. It encompasses the company's culture, behavior, and communication style. On the other hand, corporate design focuses specifically on the visual elements of a company, such as its logo, color scheme, typography, and overall visual aesthetic. While corporate identity is more about the intangible aspects of a company's image, corporate design is about the tangible visual elements that represent the company.

  • What creates identity?

    Identity is created through a combination of factors such as personal experiences, cultural background, social interactions, and self-perception. Our upbringing, beliefs, values, and relationships all play a role in shaping who we are and how we see ourselves. Additionally, external influences such as societal norms, media representation, and historical context can also impact our identity formation. Ultimately, identity is a complex and multifaceted concept that is continuously evolving as we navigate through life.

  • Who is responsible for the design of the last identity card?

    The design of the last identity card is typically the responsibility of a government agency or department that oversees identification and documentation. This may involve collaboration with graphic designers, security experts, and other relevant professionals to ensure the card meets security standards and is visually appealing. The design process may also involve input from stakeholders and the general public to ensure the card meets the needs and expectations of its users.

  • What is gender identity?

    Gender identity is a deeply-held sense of one's own gender, which may or may not align with the sex assigned at birth. It is a personal understanding of oneself as male, female, a blend of both, or neither. Gender identity is separate from biological sex and can be fluid and diverse, encompassing a wide range of identities beyond the traditional binary of male and female. It is an integral aspect of a person's identity and how they perceive themselves in relation to the world.

Similar search terms for Identity:


  • Fashion and Environmental Sustainability : Entrepreneurship, Innovation and Technology
    Fashion and Environmental Sustainability : Entrepreneurship, Innovation and Technology

    The wide range of topics that the book covers are organised into sections reflecting a cradle to grave view of how entrepreneurial, innovative, and tech-savvy approaches can advance environmental sustainability in the fashion sector.These sections include: sustainable materials; innovation in design, range planning and product development; sustainable innovations in fashion supply chains; sustainable innovations in fashion retail and marketing; sustainable alternatives for end-of-life and circular economy initiatives; and more sustainable alternative fashion business models.

    Price: 90.50 £ | Shipping*: 0.00 £
  • Identity Design : Design the Identity You Need to get the Life You Want
    Identity Design : Design the Identity You Need to get the Life You Want

    If you’re not happy most of the time it’s not because you don’t have what you want, it’s because you don’t know who you are.Identity Design is the research-driven guide to powerful and generous living.If you want more meaning in your life, you need to answer this question: Who do you want to be?Written by Judge Frank, a juvenile Court judge in Detroit who has spent years transforming the lives of young people facing extreme challenges, this is a personal manual for identity design

    Price: 12.99 £ | Shipping*: 3.99 £
  • Portable Photosensitive Seal Privacy Identity ID Security Stamp Identity Protection Roller Stamps
    Portable Photosensitive Seal Privacy Identity ID Security Stamp Identity Protection Roller Stamps

    Portable Photosensitive Seal Privacy Identity ID Security Stamp Identity Protection Roller Stamps

    Price: 2.03 € | Shipping*: 1.99 €
  • Oriental Interiors : Design, Identity, Space
    Oriental Interiors : Design, Identity, Space

    Since the publication of Edward Said’s groundbreaking work Orientalism 35 years ago, numerous studies have explored the West’s fraught and enduring fascination with the so-called Orient.Focusing their critical attention on the literary and pictorial arts, these studies have, to date, largely neglected the world of interior design. Oriental Interiors is the first book to fully explore the formation and perception of eastern-inspired interiors from an orientalist perspective. Orientalist spaces in the West have taken numerous forms since the 18th century to the present day, and the fifteen chapters in this collection reflect that diversity, dealing with subjects as varied and engaging as harems, Turkish baths on RMS Titanic, Parisian bachelor quarters, potted palms, and contemporary yoga studios.It explores how furnishings, surface treatments, ornament and music, for example, are deployed to enhance the exoticism and pleasures of oriental spaces, looking across a range of international locations. Organized into three parts, each introduced by the editor, the essays are grouped by theme to highlight critical paths into the intersections between orientalist studies, spatial theory, design studies, visual culture and gender studies, making this essential reading for students and researchers alike.

    Price: 120.00 £ | Shipping*: 0.00 £
  • What is identity politics?

    Identity politics refers to the political activity and movements that are based on the shared experiences and identities of specific social groups, such as race, gender, sexual orientation, or religion. It involves organizing and advocating for the rights and interests of these groups, often in response to systemic discrimination and inequality. Identity politics seeks to address the unique challenges and perspectives of marginalized communities and to promote social justice and equality for all individuals.

  • What is Supergirl's identity?

    Supergirl's identity is Kara Zor-El, a Kryptonian who is the cousin of Superman. She is also known as Kara Danvers, her human alter ego. As Supergirl, she possesses superhuman strength, speed, and the ability to fly, and she uses her powers to protect the Earth from various threats. In her civilian identity as Kara Danvers, she works as a reporter and tries to balance her personal life with her superhero responsibilities.

  • Is gender identity sexist?

    Gender identity itself is not inherently sexist. Gender identity is a deeply personal and individual experience that reflects a person's internal sense of their own gender, which may or may not align with the sex they were assigned at birth. However, societal norms, expectations, and stereotypes around gender can be sexist, as they often reinforce traditional gender roles and perpetuate inequality between genders. It is important to separate the concept of gender identity from these societal constructs in order to promote understanding and acceptance of diverse gender identities.

  • What is identity theft?

    Identity theft is a type of crime where someone wrongfully obtains and uses another person's personal information, such as their name, Social Security number, or credit card details, without their permission. This stolen information is then used to commit fraud or other illegal activities, often resulting in financial loss or damage to the victim's reputation. Identity theft can have serious consequences for the victim, including damage to their credit score, difficulty obtaining loans or credit, and potential legal issues. It is important for individuals to safeguard their personal information and regularly monitor their financial accounts to detect any suspicious activity.

* All prices are inclusive of VAT and, if applicable, plus shipping costs. The offer information is based on the details provided by the respective shop and is updated through automated processes. Real-time updates do not occur, so deviations can occur in individual cases.