|
Showing 1 - 8 of
8 matches in All Departments
The Neolithic is thought to have arrived in Egypt via diffusion
from an origin in southwest Asia, relatively late compared to
neighboring locations. The authors suggest an alternative approach
to understanding the development of food production in Egypt based
on the results of new fieldwork in the Fayum. They provide the
results of a detailed study of the Fayum archaeological landscape
interpretable at different temporal and spatial scales, using an
expanded version of low-level food production to organize
observations concerning paleoenvironment, socioeconomy, settlement,
and mobility. While domestic plants and animals were indeed
introduced from elsewhere, when a number of aspects of the
archaeological record are compared, a settlement system is
suggested that has no obvious analogues with the Neolithic in
southwest Asia. The results obtained from the Fayum are used to
assess other contemporary sites in Egypt.
|
Brother Wolf (Paperback)
A J Holdaway; Illustrated by MS Wei a Lonewolf; Edited by MS Tina Winograd
|
R416
Discovery Miles 4 160
|
Ships in 10 - 15 working days
|
A Presidential Commission, several writers, and numerous network
security incidents have called attention to the potential
vulnerability of the Defense Information Infrastructure (DII) to
attack. Transmission Control Protocol/Internet Protocol (TCP/IP)
networks are inherently resistant to physical attack because of
their decentralized structure, but are vulnerable to CNA. Passive
defenses can be very effective in forestalling CNA, but their
effectiveness relies on the capabilities and attentiveness of
system administrators and users. There are still many measures that
can be taken to improve the effectiveness of passive defenses, and
one of these is active defense. It can be divided into three
categories: preemptive attacks, counterattacks, and active
deception. Preemptive attacks show little potential for affecting
an adversary's CNA capabilities, since these are likely to remain
isolated from the Internet until actually beginning their attack.
Counterattacks show more promise, but only if begun early enough to
permit all preparatory activities to be completed before the
adversary's CNA is completed. Active deception also shows promise,
but only as long as intrusions can be detected quickly and
accurately, and adversaries redirected into "dummy" networks.
Active and passive defense measures can work synergistically, to
strengthen one another.
|
|