Review of Joshua in 3-D: A Commentary on Biblical Conquest and Manifest Destiny, by L. Daniel Hawk
نویسندگان
چکیده
منابع مشابه
Manifest Destiny and American Identity in Cormac McCarthy’s Blood Meridian
McCarthy scholarship has predominantly tended to stress the writer’s revisionism with regard to his rendering of the myth of the American West in Blood Meridian (1985). McCarthy’s novel has beenmainlyhailed as a critique of the violence of manifest destiny. This study aims to delineate aspects of McCarthy’s narrative which resist the predominant view of him as a revisionist. In this re...
متن کاملSprawl: The New Manifest Destiny?
Manganese is a naturally occurring element that constitutes approximately 0.1% of the earth's crust, and low levels of Mn in water, food, and air are ubiquitous. In certain geo-logic regions, long contact times between ground water and bedrock enriched in Mn can lead to locally high levels in the water [U.S. Environmental Protection Agency (EPA) 2004]. Mn is an essential nutrient, and ingestion...
متن کاملThe Manifest Destiny of Artificial Intelligence
This reprint is provided for personal and noncommercial use. For any other use, please send a request Brian Hayes by electronic mail to [email protected].
متن کاملon translation of politeness strategies in dialogues involving female characters in translations and retranslations of novels translated before and after the islamic revolution of iran and their effects on the image of women: a polysystem theory approach
abstract reception environment has considerable effects on accepting a translation. as the expectations of a target culture and its values and needs change throughout history, its criteria for accepting a translation or rejecting it will change accordingly (gentzler, 2001). the expectations of iran, as the reception environment in the present study, have changed after the islamic revolution. i...
Panel: Usable Cryptography: Manifest Destiny or Oxymoron?
Outside of SSL, Notes/Domino, and federal PKIs, PK cryptography hasn't caught on. SSL is hugely successful in providing network protection. But its server authentication feature is currently useless in phishing attacks, and its client authentication is largely unused. A number of user studies indicate that while some subset of users know about and notice "the padlock", few know what it really i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Relegere: Studies in Religion and Reception
سال: 2011
ISSN: 1179-7231
DOI: 10.11157/rsrr1-1-398