| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910450055803321 |
|
|
Autore |
Holt Frank Lee |
|
|
Titolo |
Alexander the Great and the mystery of the elephant medallions [[electronic resource] /] / Frank L. Holt |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Berkeley, Calif., : University of California Press, c2003 |
|
|
|
|
|
|
|
ISBN |
|
1-282-35812-X |
9786612358128 |
0-520-93878-X |
1-59734-457-5 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (225 p.) |
|
|
|
|
|
|
Collana |
|
Hellenistic culture and society ; ; 44 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Coins, Ancient |
Coins, Greek |
Elephants in numismatics |
Electronic books. |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references (p. 175-189) and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Front matter -- CONTENTS -- MAPS AND ILLUSTRATIONS -- PREFACE -- ONE. Man of Mystery -- TWO. A Treasure -- THREE. Picking a Fight -- FOUR. Whose Pachyderm, Whole or Halved? -- FIVE. Another Treasure -- SIX. A Closer Look -- SEVEN. A Dark and Stormy Night -- APPENDIX A. THE PUBLISHED ELEPHANT MEDALLIONS -- APPENDIX B. SOME POSSIBLE FORGERIES OF THE LARGE MEDALLION -- APPENDIX C. THE 1973 IRAQ HOARD -- INDEX |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
To all those who witnessed his extraordinary conquests, from Albania to India, Alexander the Great appeared invincible. How Alexander himself promoted this appearance-how he abetted the belief that he enjoyed divine favor and commanded even the forces of nature against his enemies-is the subject of Frank L. Holt's absorbing book. Solid evidence for the "supernaturalized" Alexander lies in a rare series of medallions that depict the triumphant young king at war against the elephants, archers, and chariots of Rajah Porus of India at the Battle of the Hydaspes River. Recovered from Afghanistan and Iraq in sensational and sometimes perilous circumstances, these ancient artifacts have |
|
|
|
|
|
|
|
|
|
|
|
|
|
long animated the modern historical debate about Alexander. Holt's book, the first devoted to the mystery of these ancient medallions, takes us into the history of their discovery and interpretation, into the knowable facts of their manufacture and meaning, and, ultimately, into the king's own psyche and his frightening theology of war. The result is a valuable analysis of Alexander history and myth, a vivid account of numismatics, and a spellbinding look into the age-old mechanics of megalomania. |
|
|
|
|
|
|
2. |
Record Nr. |
UNISA996396540003316 |
|
|
Titolo |
Whereas by an act made in this present Parliament, intituled, An act for the enlargement of the periods of time limited in an act for the better execution of His Majesties gracious declaration, for the settlement of his kingdom of Ireland, &c. .. [[electronic resource] /] / by the Lord Lieutenant and Council, Ormonde |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Dublin, : Printed by John Crooke ... and are to be sold by Samuel Dancer ..., 1663 |
|
|
|
|
|
|
|
|
|
Descrizione fisica |
|
|
|
|
|
|
Altri autori (Persone) |
|
OrmondeJames Butler, Duke of, <1610-1688.> |
|
|
|
|
|
|
Soggetti |
|
Ireland History 1649-1775 |
Ireland Politics and government 17th century |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Caption title. |
Title from first 5 lines of text. |
Imprint from colophon. |
Statement of responsibility transposed from head of title. |
"Given at the Council-chamber in Dublin, the 27th. day of May 1663." |
Reproduction of original in Bodleian Library. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
|
|
|
|
|
|
|
|
|
|
|
|
3. |
Record Nr. |
UNINA9910568278803321 |
|
|
Titolo |
Advances in Nature-Inspired Cyber Security and Resilience / / edited by Shishir Kumar Shandilya, Neal Wagner, V.B. Gupta, Atulya K. Nagar |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
|
|
Edizione |
[1st ed. 2022.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (194 pages) |
|
|
|
|
|
|
Collana |
|
EAI/Springer Innovations in Communication and Computing, , 2522-8609 |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
|
|
Soggetti |
|
Telecommunication |
Computational intelligence |
Artificial intelligence |
Dynamics |
Nonlinear theories |
Data protection |
Communications Engineering, Networks |
Computational Intelligence |
Artificial Intelligence |
Applied Dynamical Systems |
Data and Information Security |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Nature-inspired Cyber Security and Resilience: An Overview -- Detection of Reconnaissance Attacks on IoT Devices Using Deep Neural Networks -- Particle Swarm Optimization driven DSE based Low Cost Hardware Security for Securing DSP IP Cores -- Malicious Activity Detection in IoT Networks: A Nature-Inspired Approach -- Nature-inspired malware & anomaly detection in android-based systems -- A Review of Artificial Intelligence and Machine Learning Methods for Cybersecurity Applications -- A Nature Inspired DNA Encoding |
|
|
|
|
|
|
|
|
|
|
|
Technique for Quantum Session Key Exchange Protocol -- Novel Hybridized Crow Optimization for Secure Data Transmission in Cyber Networks -- Malware attacks: Dimensions, Impact, and Defenses. |
|
|
|
|
|
|
Sommario/riassunto |
|
This book presents a comprehensive reference source for dynamic and innovative research in the field of cyber security, focusing on nature-inspired research and applications. The authors present the design and development of future-ready cyber security measures, providing a critical and descriptive examination of all facets of cyber security with a special focus on recent technologies and applications. The book showcases the advanced defensive cyber security mechanism that is a requirement in the industry and highlights measures that provide efficient and fast solutions. The authors explore the potential of AI-based and nature-inspired based computing compatibilities in establishing an adaptive defense mechanism system. The book focuses on current research while highlighting the empirical results along with theoretical concepts to provide a reference for students, researchers, scholars, professionals, and practitioners in the field of cyber security and analytics. This book features contributions from leading scholars from all over the world. Presents a comprehensive reference for innovative research in the field of cyber security and resilience with a nature-inspired focus; Presents research in artificial intelligence, machine learning, soft computing, and nature-inspired computing that can advance real-time cyber security applications; Relevant to industry professionals and researchers in cyber-security. |
|
|
|
|
|
|
|
| |