Castles, Walls, Fortresses.The Sasanian Effort to Defend the Territory

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Melanocortins defend their territory: multifaceted neuroprotection in cerebral ischemia.

Stroke is the leading cause of adult disability and the third leading cause of death (1). Its dramatic, often catastrophic attack unleashes an extremely challenging therapeutic target. Typically, an intravascular blood clot occludes a vessel such as the middle cerebral artery, causing focal ischemia deep in its perfusion territory, and triggering a rapidly closing window of opportunity for trea...

متن کامل

To Defend or Not To Defend: That’s the Question

Enterococcus faecalis is an opportunistic pathogen and is one of the leading causes of nosocomial infections. E. faecalis harbors a number of antibiotic resistance genes, and most of these are present on mobile genetic elements (MGEs) that can be disseminated within the species, as well as to other members of the human microflora. In an article by Price and colleagues [V. J. Price et al., mSphe...

متن کامل

The Castles Project

We describe the goals of the CASTLES (CfA-Arizona-SpaceTelescope-LEns-Survey) project including a sample of NICMOS images of gravitational lenses and a brief list of the preliminary findings.

متن کامل

Stephen Castles

International migration is an important factor in social, cultural and political change in East Asian. The paper discusses both emigration and immigration countries, using the Philippines as an example for the former, and Japan and Malaysia for the latter. It is argued that population mobility is an important element of the cross-border flows and transnational networks that constitute globaliza...

متن کامل

Hijacking .NET to Defend PowerShell

With the rise of attacks using PowerShell in the recent months, there has not been a comprehensive solution for monitoring or prevention. Microsoft recently released the AMSI solution for PowerShell v5, however this can also be bypassed. This paper focuses on repurposing various stealthy runtime .NET hijacking techniques implemented for PowerShell attacks for defensive monitoring of PowerShell....

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Historia i Świat

سال: 2020

ISSN: 2299-2464

DOI: 10.34739/his.2020.09.03