Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Architecture, Society, and Ritual in Viking Age Scandinavia: Doors, Dwellings, and Domestic Space

Buy
In this book, Marianne Hem Eriksen explores the social organization of Viking Age Scandinavia through a study of domestic architecture, and in particular, the doorway. A highly charged architectural element, the door is not merely a practical, constructional solution. Doors control access, generate movement, and demark boundaries, yet also serve as potent ritual objects. For this study, Eriksen analyzes and interprets the archaeological data of house remains from Viking Age Norway, which are here synthesized for the first time. Using social approaches to architecture, she demonstrates how the domestic space of the Viking household, which could include masters and slaves, wives and mistresses, children and cattle, was not neutral. Quotidian and ritual interactions with, through, and orchestrated by doorways prove to be central to the production of a social world in the Viking Age. Eriksen's book challenges the male-dominated focus of research on the Vikings and expands research questions beyond topics of seaborne warriors, trade, and craft.
(HTML tags aren't allowed.)

Linux Multimedia Hacks
Linux Multimedia Hacks

The fact that Linux has more multimedia application choices than Mac OS X and Windows combined may come as a surprise to many, but not to those who know Linux well. In Linux Multimedia Hacks, author Kyle Rankin showcases the best available multimedia tools so you can maximize the entertainment...

Flash ActionScript for Designers with CDROM
Flash ActionScript for Designers with CDROM
From user interactivity and eye candy effects to automated content management, ActionScript gives you the power to take your Flash movies to the next level. But what if you're not comfortable with objects, variables, and all that other programming stuff? Relax! Using plenty of easy-to-understand tutorials and an absolute minimum of geek-speak, Doug...
How to Cheat at Deploying and Securing RFID
How to Cheat at Deploying and Securing RFID
RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from Exxon EZ pass to dogs to beer kegs to library books.

For security
...

Numerical Issues in Statistical Computing for the Social Scientist (Wiley Series in Probability and Statistics)
Numerical Issues in Statistical Computing for the Social Scientist (Wiley Series in Probability and Statistics)
At last—a social scientist's guide through the pitfalls of modern statistical computing
Addressing the current deficiency in the literature on statistical methods as they apply to the social and behavioral sciences, Numerical Issues in Statistical Computing for the Social Scientist seeks to provide readers with a unique practical
...
OS X Mountain Lion Simplified
OS X Mountain Lion Simplified

The easy way for visual learners to get up to speed on Mac OS X Mountain Lion

OS X Mountain Lion is the latest version of the Mac desktop operating system, offering great new features for millions of users. If you're switching to a Mac, upgrading from an earlier OS, or just getting started with computers, Mac OS X...

Cisco Networking Academy Program CCNA 1 and 2 Companion Guide, Third Edition
Cisco Networking Academy Program CCNA 1 and 2 Companion Guide, Third Edition
Cisco Networking Academy Program CCNA 1 and 2 Companion Guide, Third Edition,
supplements your classroom and laboratory experience with the Cisco Networking
Academy Program, whose curriculum is designed to empower you to enter employment
or further education and training in the computer networking field.

This book trains
...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy