Javascript is disabled. Please enable it for better working experience.

Showing results for : Trojan War

About 10 results ( 0,28 seconds)

Trojan War
http://www.researchomatic.com/Trojan-War-33339.html

Trojan War, as narrated in Homer's Iliad, has for centuries been interpreted as a literal truth or as a legend based on a conflict that really did happen. It is natural for one to believe that a story as fabulous and colorful like that of I...

Trojan War
http://www.researchomatic.com/Trojan-War-129396.html

Trojan War legend describes how the allied Greeks—under the command of King Agamemnon of Mycenae—sailed from Greece and laid siege to the non-Greek city of Troy (also called Ilion or Ilium), located outside the mouth of the Hellespont sea c...

Worms And Trojan Horses
http://www.researchomatic.com/Worms-And-Trojan-Horses-16343.html

Worms spread from computer to computer, but different a virus, it has the capability to journey without any human action. A worm takes advantage of document or data transport features on your scheme, which is what permits it to travel unaid...

The Trojan Women" By Euripides
http://www.researchomatic.com/The-Trojan-Women-By-Euripides-48020.html

the very vintage Greek tragedians. The Trojan Women (415 BC) has long been advised an innovative creative portrayal of the Trojan War and a penetrating portrayal of the barbaric demeanour of Euripides' own countrymen, the Athenians, in the ...

Compare Blood Wedding (The Play) And Trojan Barbie
http://www.researchomatic.com/Compare-Blood-Wedding-The-Play-And-Trojan-Barbie-52098.html

Compare Blood Wedding (the play) and Trojan Barbie (the play) with focus on artistic styles, themes, character clusters, structures, or performance structures. After reviewing both the plays Blood Wedding and Trojan Barbie we can find a str...

Worms And Trojan Horses
http://www.researchomatic.com/Worms-And-Trojan-Horses-84735.html

Worms and Trojan horses. Both are used to deploy malicious software. The purpose is to destroy files, log keystrokes, or open back door to users system, allowing a hacker to control it remotely (Vangie, 2010). Worms They have the capacity t...

Viruses, Trojans And Backdoors
http://www.researchomatic.com/Viruses-Trojans-And-Backdoors-122468.html

viruses, worms, and all kinds of Trojans (backdoors, root kits, Trojans, extortionists, blocking Windows), etc. While most computer major epidemics viruses, our media has always loved to blow about the "danger" crafts once virus writers (wh...