04329nam 2200601 450 991048056990332120210104163950.01-4832-9585-09781483295855 (e-book)9780123266514(CKB)3710000000200722(EBL)1875397(SSID)ssj0001413806(PQKBManifestationID)12004875(PQKBTitleCode)TC0001413806(PQKBWorkID)11431246(PQKB)11449308(MiAaPQ)EBC1875397(EXLCZ)99371000000020072220141210h19791989 uy 0engur|n|---|||||txtccrPrinciples of archaeological stratigraphy /Edward C. Harris2nd ed.London, England :Academic Press,1979.©19891 online resource (185 p.)Description based upon print version of record.0-12-326651-3 Includes bibliographical references and index.Front Cover; Principles of Archaeological Stratigraphy; Copyright Page; Foreword; Acknowledgements; Preface; Table of Contents; Introduction; Chapter 1. The concept of stratigraphy in geology; Steno and sharks' teeth; Correlation of strata; Geological processes; Laws of geological stratigraphy; Chapter 2. The concept of stratigraphy in archaeology; Man-made fossils; Early stratigraphic theories; The Wheeler-Kenyon school; Law of Superposition; Chapter 3. Techniques of archaeological excavation; Strategies of excavation; Processes of excavationChapter 4. Early recording methods on excavationsChapter 5. The laws of archaeological stratigraphy; Law of Superposition; Law of Original Horizontality; Law of Original Continuity; Law of Stratigraphical Succession; The Harris Matrix and stratigraphic sequences; Chapter 6. Deposits as units of stratification; Characteristics of stratification; Process of stratification; Deposits and layers; Attributes of deposits; Chapter 7. Interfaces as units of stratification; Horizontal layer interfaces; Upstanding layer interfaces; Horizontal feature interfaces; Vertical feature interfacesPeriod interfacesInterfaces of destruction; Chapter 8. Archaeological sections; Early types of sections; Purpose of sections; Types of sections; Drafting archaeological sections; Chapter 9. Archaeological plans; Multiple feature plan; Composite plans; Planning of interfaces of destruction; Single-layer plans; Chapter 10. Correlation, phasing and stratigraphie sequences; Correlation and stratification; Stratigraphic 'phasing'; Stratigraphic sequences; Periodization of stratigraphic sequences; Chapter 11. Stratigraphic sequences and post-excavation analysesNon-historical aspects of contained remains'Reversed stratigraphy'; Recording of artefacts; Dating of artefacts and strata; 'Horizontal stratigraphy'; Artefacts and stratigraphic sequences; Chapter 12. An outline for stratigraphic recording on excavations; Glossary of terms used in archaeological stratigraphy; Bibliography; IndexThis book is the only text devoted entirely to archaeological stratigraphy, a subject of fundamental importance to most studies in archaeology. The first edition appeared in 1979 as a result of the invention, by the author, of the Harris Matrix--a method for analyzing and presenting the stratigraphic sequences of archaeological sites. The method is now widely used in archaeology all over the world.The opening chapters of this edition discuss the historical development of the ideas of archaeological stratigraphy. The central chapters examine the laws and basic concepts of the subject, and the lArchaeological geologyMethodologyExcavations (Archaeology)Electronic books.Archaeological geologyMethodology.Excavations (Archaeology)930.1/028/3930.10283Harris Edward C(Edward Cecil),1946-184244MiAaPQMiAaPQMiAaPQBOOK9910480569903321Principles of archaeological stratigraphy898361UNINA04305oam 2200457 450 99646452790331620210706174758.03-030-68887-910.1007/978-3-030-68887-5(CKB)4100000011763285(DE-He213)978-3-030-68887-5(MiAaPQ)EBC6478292(PPN)253858674(EXLCZ)99410000001176328520210706d2021 uy 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierRisks and security of Internet and systems 15th international conference, CRiSIS 2020, Paris, France, November 4-6, 2020, revised selected papers /Joaquin Garcia-Alfaro [and three others] editors1st ed. 2021.Cham, Switzerland :Springer,[2021]©20211 online resource (XI, 378 p. 93 illus., 56 illus. in color.) Information Systems and Applications, incl. Internet/Web, and HCI ;125283-030-68886-0 Keynote Talk -- New Dimensions of Information Warfare: The Economic Pillar — Fintech and Cryptocurrencies -- Vulnerabilities, Attacks and Intrusion Detection -- Measuring and Modeling Software Vulnerability Security Advisory Platforms -- Frequency Hopping Spread Spectrum to Counter Relay Attacks in PKESs -- A Deeper Analysis of Adversarial Examples in Intrusion Detection -- TLS, Openness and Security Control -- Implementation Flaws in TLS Stacks: Lessons Learned and Study of TLS 1.3 Benefits -- Security through Transparency and Openness in Computer Design -- An ML Behavior-based Security Control for Smart Home Systems -- Access Control, Risk Assessment and Security Knowledge -- A Posteriori Analysis of Policy Temporal Compliance -- Asset-driven Approach for Security Risk Assessment in IoT Systems -- Heterogeneous security events prioritization using auto-encoders -- Community Knowledge about Security: Identification and Classification of User Contributions -- Risk Analysis, Neural Networks and Web Protection -- Modelling Security Risk Scenarios using Subjective Attack Trees -- Premium Access to Convolutional Neural Networks -- An OWASP Top Ten Driven Survey for Web Application Protection Methods -- Infrastructure Security and Malware Detection -- Autonomous Vehicle Security: Literature Review of Real Attack Experiments -- New Dataset for Industry 4.0 to address the change in threat landscape -- Toward Semantic-Based Android Malware Detection Using Model Checking and Machine Learning -- Short Papers -- Augmented Voting Reality -- Malicious Http Request Detection using Code-Level Convolutional Neural Network -- Enhancement of a business model with a Business Contextual Risk Model -- Secure Data Processing for Industrial Remote Diagnosis and Maintenance -- Towards Attacker Attribution for Risk Analysis -- Modelling and Verification of Safety of Access Control in SCADA Systems -- Security Assessment and Hardening of Autonomous Vehicles.This book constitutes the proceedings of the 15th International Conference on Risks and Security of Internet and Systems, CRiTIS 2020, which took place during November 4-6, 2020. The conference was originally planned to take place in Paris, France, but had to change to an online format due to the COVID-19 pandemic. The 16 full and 7 short papers included in this volume were carefully reviewed and selected from 44 submissions. In addition, the book contains one invited talk in full paper length. The papers were organized in topical sections named: vulnerabilities, attacks and intrusion detection; TLS, openness and security control; access control, risk assessment and security knowledge; risk analysis, neural networks and Web protection; infrastructure security and malware detection.Information Systems and Applications, incl. Internet/Web, and HCI ;12528Computer securityCongressesComputer security005.8Garcia-Alfaro JoaquinMiAaPQMiAaPQUtOrBLWBOOK996464527903316Risks and Security of Internet and Systems2102247UNISA