LEADER 02911nam 2200577 a 450 001 9910955141803321 005 20251116153426.0 010 0 $a9780191515453 010 0 $a0191515450 010 $a9780191707841 010 $a0191707848 010 $a9781280758478 010 $a1280758473 024 3 $z9780199277940 (hbk.) 035 $a(MiAaPQ)EBC7036968 035 $a(CKB)24235104400041 035 $a(MiAaPQ)EBC422531 035 $a(Au-PeEL)EBL422531 035 $a(CaPaEBR)ebr10271597 035 $a(CaONFJC)MIL75847 035 $a(OCoLC)476257782 035 $a(Au-PeEL)EBL7036968 035 $a(OCoLC)252635839 035 $a(EXLCZ)9924235104400041 100 $a20051129d2005 uy 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aPindar's songs for young athletes of Aigina /$fAnne Pippin Burnett 205 $a1st ed. 210 $aOxford ;$aNew York $cOxford University Press$d2005 215 $ax, 276 p. $cill 311 08$a9780199277940 320 $aIncludes bibliographical references (p. [251]-265) and indexes. 327 $aIntro -- Contents -- Figures -- Abbreviations -- Introduction -- PART I. THE AUDIENCE -- 1. Aigina and the Aiakids -- 2. The Pediments of the Aphaia Temple -- 3. Contest and Coming of Age -- PART II. THE PERFORMANCES -- 4. Nemean 5: Peleus' Wedding Song -- 5. Isthmian 6: The Engendering of Ajax -- 6. Isthmian 5: Achilles and Telephos -- 7. Isthmian 8: A Monster Avoided -- 8. Nemean 4: Wrestling with a Form-Changer -- 9. Nemean 3: The Education of Achilles -- 10. Nemean 6: Athletes as Heroes -- 11. Nemean 8: Slander and Praise -- 12. Nemean 7: Neoptolemos at Delphi -- 13. Olympian 8: Aiakos at the Walls of Troy -- 14. Pythian 8: A Phantom's Dream -- 15. Afternote: The Audience as Participant -- Bibliography -- Index of Passages Cited -- A -- B -- D -- E -- H -- I -- K -- N -- O -- P -- S -- T -- X -- General Index -- A -- B -- C -- D -- E -- F -- H -- I -- K -- L -- M -- N -- O -- P -- R -- S -- T -- V -- W -- Z. 330 $aThis book consists of individual studies of the poet Pindar's eleven odes for the victors of the athletic contests on the island of Aigina. Anne Pippin Burnett addresses questions of mythic self-presentation, as well as Pindar's techniques for unifying his audience and leading it into a shared experience of inspired success. 606 $aAthletes in literature 606 $aSongs, Greek$xHistory and criticism 615 0$aAthletes in literature. 615 0$aSongs, Greek$xHistory and criticism. 676 $a884/.01 700 $aBurnett$b Anne Pippin$f1925-$0187795 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910955141803321 996 $aPindar's songs for young athletes of Aigina$91091659 997 $aUNINA LEADER 04637nam 22005535 450 001 9910728949303321 005 20251113193636.0 010 $a3-031-35190-8 024 7 $a10.1007/978-3-031-35190-7 035 $a(MiAaPQ)EBC30589491 035 $a(Au-PeEL)EBL30589491 035 $a(DE-He213)978-3-031-35190-7 035 $a(PPN)272259527 035 $a(CKB)26869079500041 035 $a(OCoLC)1382388426 035 $a(EXLCZ)9926869079500041 100 $a20230607d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCritical Information Infrastructures Security $e17th International Conference, CRITIS 2022, Munich, Germany, September 14?16, 2022, Revised Selected Papers /$fedited by Bernhard Hämmerli, Udo Helmbrecht, Wolfgang Hommel, Leonhard Kunczik, Stefan Pickl 205 $a1st ed. 2023. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2023. 215 $a1 online resource (284 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v13723 311 08$aPrint version: Hämmerli, Bernhard Critical Information Infrastructures Security Cham : Springer International Publishing AG,c2023 9783031351891 327 $aProtection of Cyber-Physical Systems and Industrial Control Systems -- Root Cause Analysis of Software Aging in Critical Information Infrastructure -- Threat-driven Dynamic Security Policies for Cyber-Physical Infrastructures -- High Data Throughput Exfiltration through Video Cable Emanations -- Design and Justification of a Cybersecurity Assessment Framework for IoT-based Environments -- An Empirical Evaluation of 4.0 CNC Machines -- Dataset Report : LID-DS 2021 -- Analytics, Strategic Management -- Strategic Anticipation in Crisis Management through the Lens of Societal Values - The SANCTUM Project -- An Assessment Model for Prioritizing CVEs in CRITIS in the Context of Time and Fault Criticality -- Towards a Layer Model for Digital Sovereignty: A Holistic Approach -- Building Collaborative Cybersecurity for Critical Infrastructure Protection: Empirical Evidence of Collective Intelligence Information-Sharing Dynamics on ThreatFox -- Automatic Concrete Bridge Crack Detection from Strain Measurements: a Preliminary Study -- Mapping and Simulating Cyber-Physical Threats for Critical Infrastructures -- Identifying Residential Areas based on Open Source Data: a Multi Criteria Holistic Indicator to Optimize Resource Allocation During a Pandemic -- Security Awareness and Crisis Management for C(I)IP -- Modeling Hierarchical Structure of Effective Communication Factors in Cyber Incident Response -- Energy Security in the Context of Hybrid Threats: The Case of the European Natural Gas Network -- Cybersecurity in the German Railway Sector -- The Understanding of Vulnerability of Critical Infrastructure -- Is there a Relationship between Cybersecurity Level and Electricity Outages in Norway? -- Emerging Importance of Cybersecurity in Electric Power Sector as a Hub of Interoperable Critical Infrastructure Protection in the Greater Metropolitan Areas in Japan -- A Water Security Plan to Enhance Resilience of Drinking Water Systems. 330 $aThis book constitutes the refereed proceedings of the 17th International Conference on Critical Information Infrastructures Security, CRITIS 2022, which took place in Munich, Germany, during September 14?16, 2022. The 16 full papers and 4 short papers included in this volume were carefully reviewed and selected from 26 submissions. They are organized in topical sections as follows: protection of cyber-physical systems and industrial control systems (ICS); C(I)IP organization, (strategic) management and legal aspects; human factor, security awareness and crisis management for C(I)IP and critical services; and future, TechWatch and forecast for C(I)IP and critical services. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v13723 606 $aData protection 606 $aData and Information Security 615 0$aData protection. 615 14$aData and Information Security. 676 $a005.8 676 $a005.8 700 $aHämmerli$b Bernhard$01363621 701 $aHelmbrecht$b Udo$01363622 701 $aHommel$b Wolfgang$01363623 701 $aKunczik$b Leonhard$01239763 701 $aPickl$b Stefan$0472376 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910728949303321 996 $aCritical Information Infrastructures Security$93384468 997 $aUNINA