|
Showing 1 - 12 of
12 matches in All Departments
This book develops an authentic and at the same time revolutionary
musical analysis of ancient Greek poetry. It departs from the
abstract metrical analyses of the past in that it conceives the
rhythmic and harmonic elements of poetry as integral to the whole
expression, and decisive in the interpretation of its meaning.
David offers a thoroughgoing treatment of Homeric poetics: here
some remarkable discoveries in the harmonic movement of epic verse,
when combined with some neglected facts about the origin of the
hexameter in a "dance of the Muses," lead to essential new thinking
about the genesis and the form of Homeric poetry. He also gives a
foretaste of the fruits to be harvested in lyric by a musical
analysis, which applies a new theory of the Greek tonic accent and
considers concretely the role of dance in performance.
Detect potentials bugs in your code or program and develop your own
tools using the Ghidra reverse engineering framework developed by
the NSA project Key Features Make the most of Ghidra on different
platforms such as Linux, Windows, and macOS Leverage a variety of
plug-ins and extensions to perform disassembly, assembly,
decompilation, and scripting Discover how you can meet your
cybersecurity needs by creating custom patches and tools Book
DescriptionGhidra, an open source software reverse engineering
(SRE) framework created by the NSA research directorate, enables
users to analyze compiled code on any platform, whether Linux,
Windows, or macOS. This book is a starting point for developers
interested in leveraging Ghidra to create patches and extend tool
capabilities to meet their cybersecurity needs. You'll begin by
installing Ghidra and exploring its features, and gradually learn
how to automate reverse engineering tasks using Ghidra plug-ins.
You'll then see how to set up an environment to perform malware
analysis using Ghidra and how to use it in the headless mode. As
you progress, you'll use Ghidra scripting to automate the task of
identifying vulnerabilities in executable binaries. The book also
covers advanced topics such as developing Ghidra plug-ins,
developing your own GUI, incorporating new process architectures if
needed, and contributing to the Ghidra project. By the end of this
Ghidra book, you'll have developed the skills you need to harness
the power of Ghidra for analyzing and avoiding potential
vulnerabilities in code and networks. What you will learn Get to
grips with using Ghidra's features, plug-ins, and extensions
Understand how you can contribute to Ghidra Focus on reverse
engineering malware and perform binary auditing Automate reverse
engineering tasks with Ghidra plug-ins Become well-versed with
developing your own Ghidra extensions, scripts, and features
Automate the task of looking for vulnerabilities in executable
binaries using Ghidra scripting Find out how to use Ghidra in the
headless mode Who this book is forThis SRE book is for developers,
software engineers, or any IT professional with some understanding
of cybersecurity essentials. Prior knowledge of Java or Python,
along with experience in programming or developing applications, is
required before getting started with this book.
The riddle of the Indeterminate Dyad has long puzzled students of
Plato, starting right with Aristotle. Plato himself never used the
term in his extant writings. Yet it is considered to be a key part
of his esoteric teachings. Aristotle himself, however, cannot seem
to make sense of it. So the riddle dates back to the very
beginning. It is solved in this study. The dyad turns out to be a
simple algorithm with important implications for number theory, the
theory of the number-line, and the foundations of the modern
calculus. The book begins with a new interpretation of the
notorious geometry lesson of Theodorus ('Theaetetus' 147c-148b).
Unlike previous attempts at a solution, it is rooted in the fine
detail of Plato's Greek prose, and relies solely on Pythagorean
techniques known to be contemporary to the protagonists. The
'Theaetetus', 'Sophist', 'Statesman' and 'Philebus' are shown to be
informed by a particular geometrical paradigm-not some sort of
esoteric code to the argument, but an underlying pattern that
manifests itself in various ways to give shape to Plato's art.
The 18th century was a wealth of knowledge, exploration and rapidly
growing technology and expanding record-keeping made possible by
advances in the printing press. In its determination to preserve
the century of revolution, Gale initiated a revolution of its own:
digitization of epic proportions to preserve these invaluable works
in the largest archive of its kind. Now for the first time these
high-quality digital copies of original 18th century manuscripts
are available in print, making them highly accessible to libraries,
undergraduate students, and independent scholars.Rich in titles on
English life and social history, this collection spans the world as
it was known to eighteenth-century historians and explorers. Titles
include a wealth of travel accounts and diaries, histories of
nations from throughout the world, and maps and charts of a world
that was still being discovered. Students of the War of American
Independence will find fascinating accounts from the British side
of conflict. ++++The below data was compiled from various
identification fields in the bibliographic record of this title.
This data is provided as an additional tool in helping to insure
edition identification: ++++British LibraryT144445With a final
advertisement leaf.London: printed for T. Osborne, 1752. viii,302,
2]p.; 12
|
You may like...
Runner Runner
Gemma Arterton, Ben Affleck, …
Blu-ray disc
(1)
R43
Discovery Miles 430
|