991 resultados para Caesar, Julius


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Jewish organization executive. Primarily autographs, photos, writings, speeches, and biographical material, collected by Bisno, relating to ca. 120 Jews who have attained prominence in American public life; together with papers (1923-32) from Congregation Talmud Torah of Los Angeles, letters (1928-37) relating to other Jewish organizations in Los Angeles, and 3 letters of Stephen S. Wise, dealing with the general Jewish situation in Europe in 1933 and with the question of Jewish participation in the 1936 Olympic games. Persons represented include Benjamin N. Cardozo, Abe Fortas, Felix Frankfurter, Henry Horner, Herbert H. Lehman, and Lewis L. Strauss.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Documents and books pertaining to Julius Streicher

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Typescript about Julius and Paula (née Hirsch) Briske and their three children, Hans, Elisabeth, and Julius. Also included are Judge Briske’s letters of appointment.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Letters from Max Warburg (May 1938) and Otto Hirsch (March 1939), thanking him for his contributions to Reichsvertretung and Hilfsverein. Also included are pages from a Jewish calendar for Wuerttemberg 1932/33.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Resumen: No momento em que a Eneida foi composta, entre os anos 29 e 19 a.C, a memória da divinização de César se fazia presente, lançando também a expectativa sobre a consecratio do próprio Imperador. No poema épico, o prenúncio da apoteose de Augusto surge na mesma profecia em que Júpiter assegura a Vênus a acolhida de seu filho, Enéias, entre os imortais (VIRGÍLIO, Eneida, I.259- 289). Este tema reaparece nas Metamorfoses de Ovídio cujas linhas finais do livro XV retratam a transformação de Júlio César em astro – sidus - e mencionam o dia em que o Princeps deverá receber, nos céus, as preces de seus governados (OVÍDIO, Metamorfoses, XV.745-879). Tendo em vista a instituição do culto imperial, problematizaremos nas obras mencionadas as relações entre mito, memória e poder no Principado.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

En este trabajo se aborda la biografía de Augusto realizada por Suetonio como una fuente imprescindible para el estudio del nuevo régimen político, de su instauración y características. Tras una introducción sobre las características del autor y su obra, nos centraremos en Augusto, el ‘fundador del régimen más afortunado’, del que su moderación del, convirtiéndolo en modelo para sus sucesores.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Este artículo se inscribe dentro del programa de perfeccionamiento postdoctoral en el extranjero del Departamento de Educación, Universidades e Investigación del Gobierno Vasco. Forma parte, asimismo, del proyecto HAR2010-21893: «El discurso sobre el imperio en la República romana: Estrategias de dominación en la oratoria diplomática»

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objectives. To determine the prevalence of asthma symptoms among schoolchildren living on two different Brazilian Amazon islands and to identify the risk factors related to this condition. Methods. A cross-sectional study of 400 schoolchildren (5-8 years old) using written questionnaires produced by the International Study of Asthma and Allergies in Childhood, a skin prick test (allergic sensitization), and a stool examination (for helminthic infection). Nonparametric tests were carried out, and the risk factors were identified by logistic regression. Results. the prevalence of active asthma symptoms was markedly higher in children living on Outeiro Island (OI) than those living on Comb Island (CBI) (30.5% and 16.5%, respectively). the logistic regression identified several risk factors of asthma symptoms on CBI: parental history of asthma, night coughing in the past year, and currently have a cat. On OI, the major risk factors were parental history of asthma, personal history of eczema, having two or more older siblings, and night coughing in the past year. the risk factors in common on both the islands were night coughing in the past year and parental history of asthma. Conclusions. the prevalence of asthma symptoms was higher in those with a lifestyle closer to that observed in urban areas (i.e., better sanitation and hygiene), reinforcing the protective effect of a rural environment. Different risk factors were associated with asthma symptoms in schoolchildren living on OI and on CBI. This fact may reflect the environmental individuality and particularities of each island.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Maddrell, John, 'What we have discovered about the Cold War is what we already knew: Julius Mader and Western Espionage during the Cold War', Cold War History (2005) 5(2) pp.235-258 RAE2008

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This report summarizes our results from security analysis covering all 57 competitions for authenticated encryption: security, applicability, and robustness (CAESAR) first-round candidates and over 210 implementations. We have manually identified security issues with three candidates, two of which are more serious, and these ciphers have been withdrawn from the competition. We have developed a testing framework, BRUTUS, to facilitate automatic detection of simple security lapses and susceptible statistical structures across all ciphers. From this testing, we have security usage notes on four submissions and statistical notes on a further four. We highlight that some of the CAESAR algorithms pose an elevated risk if employed in real-life protocols due to a class of adaptive-chosen-plaintext attacks. Although authenticated encryption with associated data are often defined (and are best used) as discrete primitives that authenticate and transmit only complete messages, in practice, these algorithms are easily implemented in a fashion that outputs observable ciphertext data when the algorithm has not received all of the (attacker-controlled) plaintext. For an implementor, this strategy appears to offer seemingly harmless and compliant storage and latency advantages. If the algorithm uses the same state for secret keying information, encryption, and integrity protection, and the internal mixing permutation is not cryptographically strong, an attacker can exploit the ciphertext–plaintext feedback loop to reveal secret state information or even keying material. We conclude that the main advantages of exhaustive, automated cryptanalysis are that it acts as a very necessary sanity check for implementations and gives the cryptanalyst insights that can be used to focus more specific attack methods on given candidates.

Relevância:

20.00% 20.00%

Publicador: