Listing 1 - 10 of 25 | << page >> |
Sort by
|
Choose an application
"This work puts a particular emphasis on the mixing and osmosis of the first Mediterranean civilizations, with particular reference to the Minoan, Cycladic, Mycenaean, and Trojan, and on the causes of their decline, which are to be identified in a jumble of natural and human causes, and in a long-lasting, slow, but irreversible crisis. It takes into account that the Mediterranean Dimension of the Bronze Age is a garden in which many legends flourished, clearly distinguishing between myth and history, and always bearing in mind that legends are not to be taken literally (nonetheless, they often have a grain of truth). It does not aim to provide an exhaustive report but to compose a broad and evolutionary picture, in which the facts and their connections, which are deducible from archaeological evidence or from the accounts of ancient historians, find their place, in their consequentiality. Its originality lies not in the choice of the subject, but in the way of treating it. The author introduces and explains, in order to be read, and perhaps to get excited. Another characterizing element of Knossos, Mycenae, Troy is the wide use of the 'historical present' that is made there to represent events and construct the text, to reduce the reader's distance from the narrated events, and facilitates their approach to them. This book aims to provide the reader with an overall picture of the cultures that laid the foundations of Western civilization, which is not generic, but rather detailed and updated, and which has scientific solidity"--
Civilization, Aegean --- Civilization, Mycenaean --- Minoans --- Trojans
Choose an application
Literature, Medieval --- Literature, Modern --- Trojans in literature. --- History and criticism.
Choose an application
Epic poetry, Greek --- Trojans in literature --- Trojan War --- History and criticism --- Literature and the war --- Homer. --- Homerus --- Characters --- Trojans. --- Knowledge --- Troy (Extinct city) --- In literature.
Choose an application
Virgil's Aeneid XI is an important, yet sometimes overlooked, book which covers the funerals following the fierce fighting in Book X and a council of the Latins before they and the Trojans resume battle after the end of the truce. This edition contains a thorough Introduction which provides context for Book XI both within and beyond the rest of the poem, explores key characters such as Aeneas and Camilla, and deals with issues of metre and textual transmission. The line-by-line Commentary will be indispensable for students and instructors wishing to enhance their understanding of the poem and especially of Virgil's language and syntax. Accessible and comprehensive, the volume will help readers to appreciate features of Virgilian style as well as deepening their engagement with the content and themes of the Aeneid as a whole.
Latini (Italic people) --- Trojans --- Aeneas --- Aeneas (Legendary character) --- Epic poetry, Latin
Choose an application
Trojans --- Rome --- Troy (Extinct city) --- Troie (Ville ancienne) --- History --- Historiography --- Histoire --- Historiographie
Choose an application
Romances, English. --- Trojans in literature. --- English literature --- History and criticism. --- Troy (Extinct city) --- In literature. --- English romances
Choose an application
This book provides readers with a comprehensive introduction to hardware Trojans. The authors explain the hardware Trojan taxonomy in detail, while delivering deep understanding of the potential impacts throughout the integrated circuit (IC) lifecycle. While discussing the shortcomings of current, industrial IC testing techniques for hardware Trojans, the authors describe the details of emerging techniques to detect them and to prevent their insertion into products. · Provides a comprehensive introduction to hardware Trojans and their potential impact on the integrated circuit lifecycle; · Equips designers with tools for identifying potential vulnerabilities throughout the design cycle and manufacturing; · Describes state-of-the-art techniques for hardware Trojan design, detection, and prevention; · Analyzes susceptibility at the behavioral-, gate-, layout-level to Trojan insertion.
Computer architecture. --- Embedded computer systems. --- Microcomputers. --- Home computers --- Micro computers --- Micros (Microcomputers) --- PCs (Microcomputers) --- Personal computers --- Small computers --- Embedded systems (Computer systems) --- Architecture, Computer --- Engineering. --- Microprocessors. --- Electronic circuits. --- Circuits and Systems. --- Processor Architectures. --- Electronic Circuits and Devices. --- Minicomputers --- Computer systems --- Architecture Analysis and Design Language --- Systems engineering. --- Computer science. --- Informatics --- Science --- Engineering systems --- System engineering --- Engineering --- Industrial engineering --- System analysis --- Design and construction --- Electron-tube circuits --- Electric circuits --- Electron tubes --- Electronics --- Integrated circuits --- Hardware Trojans (Computers) --- Computer hardware Trojans --- Hardware, Malicious (Computers) --- HTHs (Hardware Trojan horses) --- Malicious hardware (Computers) --- Trojans, Computer hardware --- Trojans, Hardware (Computers) --- Computers --- Hardware verification --- Integrated circuit verification --- Verification of hardware --- Verification of integrated circuits --- Verification --- Defects --- Verification.
Choose an application
This book describes the integrated circuit supply chain flow and discusses security issues across the flow, which can undermine the trustworthiness of final design. The author discusses and analyzes the complexity of the flow, along with vulnerabilities of digital circuits to malicious modifications (i.e. hardware Trojans) at the register-transfer level, gate level and layout level. Various metrics are discussed to quantify circuit vulnerabilities to hardware Trojans at different levels. Readers are introduced to design techniques for preventing hardware Trojan insertion and to facilitate hardware Trojan detection. Trusted testing is also discussed, enabling design trustworthiness at different steps of the integrated circuit design flow. Coverage also includes hardware Trojans in mixed-signal circuits. Provides a comprehensive vulnerability analysis across the integrated circuits design flow; Introduces security metrics to measure quantitatively the vulnerability of a circuit to hardware Trojan insertion; Describes design techniques to prevent hardware Trojan insertion and to facilitate hardware Trojan detection; Presents testing techniques for trustworthiness at each circuit level.
Computer security. --- Hardware Trojans (Computers) --- Prevention. --- Engineering. --- Microprocessors. --- Electronic circuits. --- Circuits and Systems. --- Processor Architectures. --- Systems and Data Security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer hardware Trojans --- Hardware, Malicious (Computers) --- HTHs (Hardware Trojan horses) --- Malicious hardware (Computers) --- Trojans, Computer hardware --- Trojans, Hardware (Computers) --- Protection --- Security measures --- Defects --- Systems engineering. --- Computer science. --- Informatics --- Science --- Engineering systems --- System engineering --- Engineering --- Industrial engineering --- System analysis --- Design and construction --- Minicomputers --- Electron-tube circuits --- Electric circuits --- Electron tubes --- Electronics
Choose an application
This book provides readers with a valuable reference on cyber weapons and, in particular, viruses, software and hardware Trojans. The authors discuss in detail the most dangerous computer viruses, software Trojans and spyware, models of computer Trojans affecting computers, methods of implementation and mechanisms of their interaction with an attacker — a hacker, an intruder or an intelligence agent. Coverage includes Trojans in electronic equipment such as telecommunication systems, computers, mobile communication systems, cars and even consumer electronics. The evolutionary path of development of hardware Trojans from "cabinets", "crates" and "boxes" to the microcircuits (IC) is also discussed. Readers will benefit from the detailed review of the major known types of hardware Trojans in chips, principles of their design, mechanisms of their functioning, methods of their introduction, means of camouflaging and detecting, as well as methods of protection and counteraction. Describes the evolution of hardware Trojans from "cabinets", "boxes" and "cases" to advanced circuits; Discusses both software and hardware Trojans, the principles of their design, the mechanisms of functioning, the methods of detection, the methods of masking them, the methods of prevention and protection; Presents complex topics using simple language, minimizing mathematics.
Computer viruses. --- Hardware Trojans (Computers) --- Software viruses --- Viruses, Computer --- Computer crimes --- Malware (Computer software) --- Computer hardware Trojans --- Hardware, Malicious (Computers) --- HTHs (Hardware Trojan horses) --- Malicious hardware (Computers) --- Trojans, Computer hardware --- Trojans, Hardware (Computers) --- Computers --- Defects --- Electronic circuits. --- Computer engineering. --- Internet of things. --- Embedded computer systems. --- Microprocessors. --- Circuits and Systems. --- Cyber-physical systems, IoT. --- Processor Architectures. --- Minicomputers --- Embedded systems (Computer systems) --- Computer systems --- Architecture Analysis and Design Language --- IoT (Computer networks) --- Things, Internet of --- Computer networks --- Embedded Internet devices --- Machine-to-machine communications --- Electron-tube circuits --- Electric circuits --- Electron tubes --- Electronics --- Design and construction
Choose an application
Comparative literature --- Old English literature --- Old French literature --- Italian literature --- anno 1100-1199 --- Literature, Medieval --- Middle Ages --- Trojans in literature --- Medievalists --- History and criticism --- Historiography
Listing 1 - 10 of 25 | << page >> |
Sort by
|