scispace - formally typeset
Search or ask a question
Author

Jean Giraudoux

Bio: Jean Giraudoux is an academic researcher. The author has contributed to research in topics: Trojan & Vanguard. The author has an hindex of 4, co-authored 36 publications receiving 85 citations.
Topics: Trojan, Vanguard, Tiger

Papers
More filters
Book
01 Apr 2001
TL;DR: In this paper, a presentation du texte et de l'auteur, une chronologie et un dossier pour l'enseignement de l´histoire des arts and une rubrique sur le film Troie are presented.
Abstract: Helene est retenue prisonniere bien que Pâris ne l'aime plus. Hector, au nom de Troie, et Ulysse, pour la Grece, tentent de sauver la paix. Avec une presentation du texte et de l'auteur, une chronologie et un dossier pour l'enseignement de l'histoire des arts et une rubrique sur le film Troie. ©Electre 2019

9 citations

Book
01 Jan 1955

8 citations

Book
01 Jan 1975

5 citations

Book
01 Jan 1945

5 citations

Journal ArticleDOI
01 Jan 1947

4 citations


Cited by
More filters
Book
Thomas Rid1
01 Sep 2013
TL;DR: Cyber War will not take place: Cyber War Will Not Take Place as mentioned in this paper is a recent book by Thomas Rid, who argues that the focus on war and winning distracts from the real challenge of cyberspace: non-violent confrontation that may rival or even replace violence in surprising ways.
Abstract: "Cyber war is coming," announced a land-mark RAND report in 1993. In 2005, the U.S. Air Force boasted it would now fly, fight, and win in cyberspace, the "fifth domain" of warfare. This book takes stock, twenty years on: is cyber war really coming? Has war indeed entered the fifth domain? Cyber War Will Not Take Place cuts through the hype and takes a fresh look at cyber security. Thomas Rid argues that the focus on war and winning distracts from the real challenge of cyberspace: non-violent confrontation that may rival or even replace violence in surprising ways. The threat consists of three different vectors: espionage, sabotage, and subversion. The author traces the most significant hacks and attacks, exploring the full spectrum of case studies from the shadowy world of computer espionage and weaponised code. With a mix of technical detail and rigorous political analysis, the book explores some key questions: What are cyber weapons? How have they changed the meaning of violence? How likely and how dangerous is crowd-sourced subversive activity? Why has there never been a lethal cyber attack against a country's critical infrastructure? How serious is the threat of "pure" cyber espionage, of exfiltrating data without infiltrating humans first? And who is most vulnerable: which countries, industries, individuals?

341 citations

Journal ArticleDOI
TL;DR: In this article, the authors argue that cyber war has never happened in the past, cyber war does not take place in the present, and that it is unlikely cyber war will occur in the future.
Abstract: For almost two decades, experts and defense establishments the world over have been predicting that cyber war is coming. But is it? This article argues in three steps that cyber war has never happened in the past, that cyber war does not take place in the present, and that it is unlikely that cyber war will occur in the future. It first outlines what would constitute cyber war: a potentially lethal, instrumental, and political act of force conducted through malicious code. The second part shows what cyber war is not, case-by-case. Not one single cyber offense on record constitutes an act of war on its own. The final part offers a more nuanced terminology to come to terms with cyber attacks. All politically motivated cyber attacks are merely sophisticated versions of three activities that are as old as warfare itself: sabotage, espionage, and subversion.

212 citations

Journal ArticleDOI
TL;DR: The nonrelativistic quark model, when applied to baryons, involves an interesting three-body problem where the constituents are bound by a confining potential.

131 citations

Journal ArticleDOI
TL;DR: The present annual bibliography follows the basic principles and limitations described in the first installment of March '974 as mentioned in this paper, and includes playwrights who lived past 1900 (plus Biichner and Becque), influential men and women of the theatre other than performers.
Abstract: The present annual bibliography follows the basic principles and limitations described in the first installment of March '974. The main objective is to record current scholarship, criticism, and commentary that may prove valuable to students of modem dramatic literature. The bibliography embraces all the expected areas and topics of modem world drama, including playwrights who lived past 1900 (plus Biichner and Becque) and influential men and women of the theatre other than performers. The checklist is divided as follows:

43 citations

DissertationDOI
01 Jan 2005
TL;DR: The treatment of myth in modern drama (1923-1950): Towards a Typology of Methods Between the years 1923 and 1950, a great number of plays employed myth as subject matter or theme.
Abstract: of Thesis The Treatment of Myth in Modern Drama (1923-1950): Towards a Typology of Methods Between the years 1923 and 1950, a great number of plays employed myth as subject matter or theme. The thesis examines this phenomenon in relation: a) to the modernist movement and its fascination with myth and mythological motifs, b) in relation to the efforts of modernist artists to find means appropriate to non-naturalistic modes of expression. Criticism up to now has surveyed myth-plays focusing on the thematic and ideological treatment of myths (psychoanalytic, religious, political, etc). This thesis proposes a new approach to this issue: it concentrates on techniques of incorporating myth in the structure of a play and on how myth functions within and through it. It identifies three prevailing techniques as methods. These methods form exclusive categories within the period under discussion. Therefore, plays are grouped according to method in order to explore a series of different dramaturgical strategies. Each of the three methods itself reflects a self-conscious attitude towards myth. Therefore, the thesis does not limit itself merely to investigating methods of incorporating myths into dramatic structures. It also examines the ideological substratum of those attitudes as they determine the discourses developed.

29 citations