enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Political commentary of the Aeneid - Wikipedia

    en.wikipedia.org/wiki/Political_commentary_of...

    The Aeneid was written during a period of political unrest in Rome. The Roman republic had effectively been abolished, and Octavian (Augustus Caesar) had taken over as the leader of the new Roman empire. The Aeneid was written to praise Augustus by drawing parallels between him and the protagonist, Aeneas. Virgil does so by mirroring Caesar ...

  3. Aeneid - Wikipedia

    en.wikipedia.org/wiki/Aeneid

    Aeneas Flees Burning Troy, by Federico Barocci (1598). Galleria Borghese, Rome, Italy Map of Aeneas' fictional journey. The Aeneid (/ ɪ ˈ n iː ɪ d / ih-NEE-id; Latin: Aenēĭs [ae̯ˈneːɪs] or [ˈae̯neɪs]) is a Latin epic poem that tells the legendary story of Aeneas, a Trojan who fled the fall of Troy and travelled to Italy, where he became the ancestor of the Romans.

  4. Shield of Aeneas - Wikipedia

    en.wikipedia.org/wiki/Shield_of_Aeneas

    Aeneas defeats Turnus, by Luca Giordano, 1634–1705.Though Virgil's sweeping descriptions cannot be seen, Aeneas is holding his shield in his left hand. The Shield of Aeneas is the shield that Aeneas receives from the god Vulcan in Book VIII of Virgil's Aeneid to aid in his war against the Rutuli.

  5. Julius Caesar - Wikipedia

    en.wikipedia.org/wiki/Julius_Caesar

    Gaius Julius Caesar [a] (12 July 100 BC – 15 March 44 BC) was a Roman general and statesman. A member of the First Triumvirate, Caesar led the Roman armies in the Gallic Wars before defeating his political rival Pompey in a civil war and subsequently became dictator from 49 BC until his assassination in 44 BC.

  6. History of cryptography - Wikipedia

    en.wikipedia.org/wiki/History_of_cryptography

    To put this in context, each binary unit of information, or bit, has a value of 0 or 1. An 8-bit key would then have 256 or 2^8 possible keys. A 56-bit key would have 2^56, or 72 quadrillion, possible keys to try and decipher the message. With modern technology, cyphers using keys with these lengths are becoming easier to decipher.

  7. Timeline of cryptography - Wikipedia

    en.wikipedia.org/wiki/Timeline_of_cryptography

    600-500 – Hebrew scholars make use of simple monoalphabetic substitution ciphers (such as the Atbash cipher) c. 400 – Spartan use of scytale (alleged) c. 400 – Herodotus reports use of steganography in reports to Greece from Persia (tattoo on shaved head) 100-1 A.D.- Notable Roman ciphers such as the Caesar cipher.

  8. Catalogue of Ships - Wikipedia

    en.wikipedia.org/wiki/Catalogue_of_Ships

    Map of Homeric Greece. In the debate since antiquity over the Catalogue of Ships, the core questions have concerned the extent of historical credibility of the account, whether it was composed by Homer himself, to what extent it reflects a pre-Homeric document or memorized tradition, surviving perhaps in part from Mycenaean times, or whether it is a result of post-Homeric development. [2]

  9. Ascanius - Wikipedia

    en.wikipedia.org/wiki/Ascanius

    The boy Ascanius weeps and Venus hovers nearby as the physician Iapyx treats the wound of Aeneas (wall painting from Pompeii, 1st century AD). Ascanius (/ ə ˈ s k eɪ n i ə s /; Ancient Greek: Ἀσκάνιος) [1] was a legendary king of Alba Longa (1176-1138 BC) and the son of the Trojan hero Aeneas and Creusa, daughter of Priam.