Products related to Identity:
-
Identity Security for Software Development : Building with Identity, Secrets, and Credentials
Maintaining secrets, credentials, and nonhuman identities in secure ways is an important, though often overlooked, aspect of secure software development.Cloud migration and digital transformation have led to an explosion of nonhuman identities—like automation scripts, cloud native apps, and DevOps tools—that need to be secured across multiple cloud and hybrid environments. DevOps security often addresses vulnerability scanning, but it neglects broader discussions like authentication, authorization, and access control, potentially leaving the door open for breaches.That's where an identity security strategy focused on secrets management can help. In this practical book, authors John Walsh and Uzi Ailon provide conceptual frameworks, technology overviews, and practical code snippets to help DevSecOps engineers, cybersecurity engineers, security managers, and software developers address use cases across CI/CD pipelines, Kubernetes and cloud native, hybrid and multicloud, automation/RPA, IOT/OT, and more.You'll learn:The fundamentals of authentication, authorization, access control, and secrets managementWhat developers need to know about managing secrets and identity to build safer appsWhat nonhuman identities, secrets, and credentials are—and how to secure themHow developers work with their cross-function peers to build safer appsHow identity security fits into modern software development practices
Price: 47.99 £ | Shipping*: 0.00 £ -
Intercultural Communication and Identity
This Element asserts how identity as a construct enables a critical awareness of how speakers position themselves and are positioned by others in intercultural encounters.It discusses how identity vis-à-vis culture has been theorized through social psychological, poststructuralist, and critical lenses, and how identity is discursively constructed and mediated.Rejecting essentialist notions of language and culture, this Element demonstrates how inscriptions of identity such as race, ethnicity, nationality, and class can be used to critically examine the dynamics of situated intercultural encounters and to understand how such interactions can index competing and colluding ideologies.By examining identity research from different parts of the world, it casts a light on how identities are performed in diverse intercultural contexts and discusses research methodologies that have been employed to examine identity in intercultural communication.
Price: 17.00 £ | Shipping*: 3.99 £ -
The Architecture of Computer Hardware, Systems Software, and Networking : An Information Technology Approach
The Architecture of Computer Hardware, Systems Software and Networking is designed help students majoring in information technology (IT) and information systems (IS) understand the structure and operation of computers and computer-based devices.Requiring only basic computer skills, this accessible textbook introduces the basic principles of system architecture and explores current technological practices and trends using clear, easy-to-understand language.Throughout the text, numerous relatable examples, subject-specific illustrations, and in-depth case studies reinforce key learning points and show students how important concepts are applied in the real world. This fully-updated sixth edition features a wealth of new and revised content that reflects today’s technological landscape. Organized into five parts, the book first explains the role of the computer in information systems and provides an overview of its components.Subsequent sections discuss the representation of data in the computer, hardware architecture and operational concepts, the basics of computer networking, system software and operating systems, and various interconnected systems and components.Students are introduced to the material using ideas already familiar to them, allowing them to gradually build upon what they have learned without being overwhelmed and develop a deeper knowledge of computer architecture.
Price: 125.95 £ | Shipping*: 0.00 £ -
Identity and Digital Communication : Concepts, Theories, Practices
This comprehensive text explores the relationship between identity, subjectivity and digital communication, providing a strong starting point for understanding how fast-changing communication technologies, platforms, applications and practices have an impact on how we perceive ourselves, others, relationships and bodies.Drawing on critical studies of identity, behaviour and representation, Identity and Digital Communication demonstrates how identity is shaped and understood in the context of significant and ongoing shifts in online communication.Chapters cover a range of topics including advances in social networking, the development of deepfake videos, intimacies of everyday communication, the emergence of cultures based on algorithms, the authenticities of TikTok and online communication’s setting as a site for hostility and hate speech.Throughout the text, author Rob Cover shows how the formation and curation of self-identity is increasingly performed and engaged with through digital cultural practices, affirming that these practices must be understood if we are to make sense of identity in the 2020s and beyond.Featuring critical accounts, everyday examples and analysis of key platforms such as TikTok, this textbook is an essential primer for scholars and students in media studies, psychology, cultural studies, sociology, anthropology, computer science, as well as health practitioners, mental health advocates and community members.
Price: 35.99 £ | Shipping*: 0.00 £
-
How might a communication diary look like in dissociative identity disorder?
A communication diary in dissociative identity disorder (DID) might include entries from different alters, each expressing their thoughts, feelings, and experiences. The diary may show shifts in handwriting, tone, and perspective as different alters take control of the writing. It could also include notes about internal communication between alters, such as leaving messages for each other or coordinating actions. The diary may serve as a tool for the individual to track and understand their different identities and their interactions with each other.
-
What creates identity?
Identity is created through a combination of factors such as personal experiences, cultural background, social interactions, and self-perception. Our upbringing, beliefs, values, and relationships all play a role in shaping who we are and how we see ourselves. Additionally, external influences such as societal norms, media representation, and historical context can also impact our identity formation. Ultimately, identity is a complex and multifaceted concept that is continuously evolving as we navigate through life.
-
What is gender identity?
Gender identity is a deeply-held sense of one's own gender, which may or may not align with the sex assigned at birth. It is a personal understanding of oneself as male, female, a blend of both, or neither. Gender identity is separate from biological sex and can be fluid and diverse, encompassing a wide range of identities beyond the traditional binary of male and female. It is an integral aspect of a person's identity and how they perceive themselves in relation to the world.
-
What is identity politics?
Identity politics refers to the political activity and movements that are based on the shared experiences and identities of specific social groups, such as race, gender, sexual orientation, or religion. It involves organizing and advocating for the rights and interests of these groups, often in response to systemic discrimination and inequality. Identity politics seeks to address the unique challenges and perspectives of marginalized communities and to promote social justice and equality for all individuals.
Similar search terms for Identity:
-
Portable Photosensitive Seal Privacy Identity ID Security Stamp Identity Protection Roller Stamps
Portable Photosensitive Seal Privacy Identity ID Security Stamp Identity Protection Roller Stamps
Price: 1.85 € | Shipping*: 1.99 € -
Entrepreneurial Identity and Identity Work
Identities can potentially serve as powerful elements that both drive, and are shaped by, entrepreneurial actions.Entrepreneurial identity is a complex construct with multidisciplinary roots, and therefore there is scope to more fully enrich our theoretical understanding of identity and identity formation, at both individual and organizational levels, and their relationship to entrepreneurial processes, practices and activities.This book highlights two key features of contemporary research on entrepreneurial identity.First, to see it as a dynamic rather than a (relatively) fixed and unchanging feature, shaped by different life episodes.It is increasingly fluid, multilevel and multidimensional, comprising multiple subidentities rather than a univocal (and unchanging) self.As such, it has a profound effect not only on the way we feel, think and behave, but also on what we aim to achieve.Accordingly, it is vital that its dynamics are better understood, particularly in determining how actors behave in an entrepreneurial context.The book’s second focus is on identity work as the process through which entrepreneurial identities are formed and shaped, and the contributors demonstrate how the dynamics of identity formation relate to entrepreneurial outcomes in a range of individual and organizational contexts.This book was originally published as a special issue of Entrepreneurship & Regional Development.
Price: 43.99 £ | Shipping*: 0.00 £ -
New Media and Intercultural Communication : Identity, Community and Politics
There is increasing awareness of the development of newer «smart» and more interactive media, at precipitate speed, in many parts of the world.The concept of change-as opposed to continuity-is central to the increasing interest in digital media.However, this focus has not yet been matched by substantive theoretical discussions, or by extensive empirical examinations of computer-mediated communication and intercultural communication.Against such a backdrop, this volume offers theoretical insights, fresh evidence and rich applications as it assesses the nature of digital culture(s) in order to address assumptions about the present state of mediated global society(ies) and their future trajectory.Chapters explore what happens in praxis when digital media are implemented across cultures and are contested and negotiated within complex local and political conditions.The book showcases interpretative and critical research from voices with diverse backgrounds, from locations around the world.As such, this volume presents a rich and colorful tapestry that provides opportunities for comparative analyses and deepened international understandings of digital media connections, particularly in the areas of identity, community and politics.
Price: 30.50 £ | Shipping*: 0.00 £ -
Identity
Price: 16.49 £ | Shipping*: 3.99 £
-
What is Supergirl's identity?
Supergirl's identity is Kara Zor-El, a Kryptonian who is the cousin of Superman. She is also known as Kara Danvers, her human alter ego. As Supergirl, she possesses superhuman strength, speed, and the ability to fly, and she uses her powers to protect the Earth from various threats. In her civilian identity as Kara Danvers, she works as a reporter and tries to balance her personal life with her superhero responsibilities.
-
Is gender identity sexist?
Gender identity itself is not inherently sexist. Gender identity is a deeply personal and individual experience that reflects a person's internal sense of their own gender, which may or may not align with the sex they were assigned at birth. However, societal norms, expectations, and stereotypes around gender can be sexist, as they often reinforce traditional gender roles and perpetuate inequality between genders. It is important to separate the concept of gender identity from these societal constructs in order to promote understanding and acceptance of diverse gender identities.
-
What is identity theft?
Identity theft is a type of crime where someone wrongfully obtains and uses another person's personal information, such as their name, Social Security number, or credit card details, without their permission. This stolen information is then used to commit fraud or other illegal activities, often resulting in financial loss or damage to the victim's reputation. Identity theft can have serious consequences for the victim, including damage to their credit score, difficulty obtaining loans or credit, and potential legal issues. It is important for individuals to safeguard their personal information and regularly monitor their financial accounts to detect any suspicious activity.
-
Is cloning identity fraud?
Cloning is not the same as identity fraud. Cloning refers to the creation of a genetically identical copy of an organism, while identity fraud involves using someone else's personal information for fraudulent purposes. While cloning may raise ethical and moral concerns, it is not the same as the criminal act of identity fraud. However, the potential misuse of cloned genetic material could potentially lead to identity fraud if used to create false identities.
* All prices are inclusive of VAT and, if applicable, plus shipping costs. The offer information is based on the details provided by the respective shop and is updated through automated processes. Real-time updates do not occur, so deviations can occur in individual cases.