LEADER 02682nam 2200433 n 450 001 996391716103316 005 20200824121745.0 035 $a(CKB)4940000000108437 035 $a(EEBO)2264201393 035 $a(UnM)99863408e 035 $a(UnM)99863408 035 $a(EXLCZ)994940000000108437 100 $a19930422d1646 uy | 101 0 $aeng 135 $aurbn||||a|bb| 200 10$aMercurius rusticus$b[electronic resource] $eor, The countries complaint of the barbarous out-rages committed by the sectaries of this late flourishing kingdome. Together with a briefe chronologie of the battails, sieges, conflicts, and other most remarkable passages from the beginning of this unnaturall warre, to the 25. of March, 1646 210 $a[Oxford $cs.n.]$dPrinted in the yeere, 1646 215 $a[18], 223, [1]; [12], 34, [70] p. $cill 300 $aAttributed to Bruno Ryves. 300 $aWith an additional title page, engraved: Mercurius rusticus, the country's complaint. 300 $a"Mercurius rusticus: or, The countries complaint of the sacriledges, prophanations, and plunderings, committed by the schismatiques on the cathedrall churches of this kingdome" has separate title page with imprint "Oxford, printed in the yeare, 1646"; pagination and register are continuous. Following this is "Querela Cantabrigiensis", a reissue of Wing B1009. It is attributed to John Barwick, and sometimes also to Bruno Ryves. To the original [12], 28 p. of the latter are added new quires ² D ³B-C ³D? ² E (29-34, [70] p.), comprising an addendum to the second part of "Mercurius rusticus", indexes to part 1 and to the "Querela", and "Mercurius Belgicus" with separate dated title page. Quires ³B-D of the latter are reissued from "Englands Iliads in a nut-shell" by Sir George Wharton (Wing W1544). 300 $aThe two parts of "Mercurius rusticus" appeared originally in 1643 as a newsbook issued in 21 numbers. 300 $aReproduction of the original in the British Library. 330 $aeebo-0018 517 3 $aCountries complaint of the barbarous outrages committed by the sectaries of this late flourishing kingdome 606 $aCathedrals$zEngland$vEarly works to 1800 607 $aGreat Britain$xHistory$yCivil War, 1642-1649$vEarly works to 1800 615 0$aCathedrals 700 $aRyves$b Bruno$f1596-1677.$01002758 701 $aBarwick$b John$f1612-1664.$01006591 701 $aWharton$b George$cSir,$f1617-1681.$0792771 801 0$bCu-RivES 801 1$bCu-RivES 801 2$bCStRLIN 801 2$bWaOLN 906 $aBOOK 912 $a996391716103316 996 $aMercurius rusticus$92412142 997 $aUNISA LEADER 03370nam 22007575 450 001 9910357842103321 005 20251225200550.0 010 $a3-030-34637-4 024 7 $a10.1007/978-3-030-34637-9 035 $a(CKB)4100000009939720 035 $a(MiAaPQ)EBC6002531 035 $a(DE-He213)978-3-030-34637-9 035 $a(PPN)242823904 035 $a(EXLCZ)994100000009939720 100 $a20191109d2019 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aScience of Cyber Security $eSecond International Conference, SciSec 2019, Nanjing, China, August 9?11, 2019, Revised Selected Papers /$fedited by Feng Liu, Jia Xu, Shouhuai Xu, Moti Yung 205 $a1st ed. 2019. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2019. 215 $a1 online resource (387 pages) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v11933 311 08$a3-030-34636-6 327 $aArtificial Intelligence for Cybersecurity -- Machine Learning for Cybersecurity -- Attack and Defense -- Blockchain, Attack and Defense -- Encryption and Application. 330 $aThis book constitutes the proceedings of the Second International Conference on Science of Cyber Security, SciSec 2019, held in Nanjing, China, in August 2019. The 20 full papers and 8 short papers presented in this volume were carefully reviewed and selected from 62 submissions. These papers cover the following subjects: Artificial Intelligence for Cybersecurity, Machine Learning for Cybersecurity, and Mechanisms for Solving Actual Cybersecurity Problems (e.g., Blockchain, Attack and Defense; Encryptions with Cybersecurity Applications). . 410 0$aSecurity and Cryptology,$x2946-1863 ;$v11933 606 $aData protection 606 $aSoftware engineering 606 $aComputers and civilization 606 $aSocial sciences$xData processing 606 $aComputer networks 606 $aDatabase management 606 $aData and Information Security 606 $aSoftware Engineering 606 $aComputers and Society 606 $aComputer Application in Social and Behavioral Sciences 606 $aComputer Communication Networks 606 $aDatabase Management 615 0$aData protection. 615 0$aSoftware engineering. 615 0$aComputers and civilization. 615 0$aSocial sciences$xData processing. 615 0$aComputer networks. 615 0$aDatabase management. 615 14$aData and Information Security. 615 24$aSoftware Engineering. 615 24$aComputers and Society. 615 24$aComputer Application in Social and Behavioral Sciences. 615 24$aComputer Communication Networks. 615 24$aDatabase Management. 676 $a005.8 676 $a005.8 702 $aLiu$b Feng$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aXu$b Jia$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aXu$b Shouhuai$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aYung$b Moti$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910357842103321 996 $aScience of Cyber Security$92295527 997 $aUNINA