|
Showing 1 - 6 of
6 matches in All Departments
The first published archaeological survey of the Egiin Gol valley
of Mongolia, spanning the last 30,000 years and centering on the
integration of local sites and landscape  This is the first
complete intensive regional archaeological survey report for
Mongolia to be published. It presents the experiences and results
of groundbreaking fieldwork that detected ephemeral steppe
settlement sites, extensive monumental constructions, and changing
land use that span the last 30,000 years, from the late Upper
Paleolithic to the nineteenth century. Extensive illustrations of
monuments and ceramics provide comparative data and local detail in
an integrated landscape- and settlement-based approach to the
prehistory and history of eastern Eurasia. Â The authors
examine the place of Egiin Gol in the Xiongnu and Early Turkic
polities and reveal the historical landscape of Buddhist
monasteries and farms, highlighting this region of northern
Mongolia as a historical breadbasket. Throughout, the focus is on
the local and immediate archaeology of the Egiin Gol valley, the
impetus for change and continuity, and how sites and features
worked together to create past cultural landscapes. Â This
volume is aimed at Eurasian and Mongolian specialists,
archaeologists in general, landscape archaeologists, historians of
East Asia and Eurasia, environmental historians, and agrarian
studies scholars interested in the history and study of
pastoralism, including development and rangeland management.
 Distributed for the Yale Peabody Museum of Natural History
Publisher's Note: Products purchased from Third Party sellers are
not guaranteed by the publisher for quality, authenticity, or
access to any online entitlements included with the product.
Exploit and defend against the latest wireless network attacksLearn
to exploit weaknesses in wireless network environments using the
innovative techniques in this thoroughly updated guide. Inside,
you'll find concise technical overviews, the latest attack methods,
and ready-to-deploy countermeasures. Find out how to leverage
wireless eavesdropping, break encryption systems, deliver remote
exploits, and manipulate 802.11 clients, and learn how attackers
impersonate cellular networks. Hacking Exposed Wireless, Third
Edition features expert coverage of ever-expanding threats that
affect leading-edge technologies, including Bluetooth Low Energy,
Software Defined Radio (SDR), ZigBee, and Z-Wave. Assemble a
wireless attack toolkit and master the hacker's weapons Effectively
scan and enumerate WiFi networks and client devices Leverage
advanced wireless attack tools, including Wifite, Scapy, Pyrit,
Metasploit, KillerBee, and the Aircrack-ng suite Develop and launch
client-side attacks using Ettercap and the WiFi Pineapple Hack
cellular networks with Airprobe, Kraken, Pytacle, and YateBTS
Exploit holes in WPA and WPA2 personal and enterprise security
schemes Leverage rogue hotspots to deliver remote access software
through fraudulent software updates Eavesdrop on Bluetooth Classic
and Bluetooth Low Energy traffic Capture and evaluate proprietary
wireless technology with Software Defined Radio tools Explore
vulnerabilities in ZigBee and Z-Wave-connected smart homes and
offices Attack remote wireless networks using compromised Windows
systems and built-in tools
|
You may like...
Not available
|