The Oracle Sequence The Scarab

Mirany is the new Bearer, afraid of her Perilous duties for the gncl in the rituals of the Oracle, and l'ear!'ul of her sl'i.'rQl£ t|I.lCsti(ming Do-cs the gnrl truly exist? w'ww.h0dderdhildrens. C(J.1.1l( Paperback lncarceron Sapphiquc ...

The Oracle Sequence  The Scarab

The final story in the Oracle sequence. We are again in the distand land of deserts and islands ruled by one god whose wishes are conveyed through the Oracle. The Archon, child god-on-earth, returns from his journey across the desert to the Well of Songs, to find the tyrannical General Argelin has siezed control and his reign of madness is oppressing the Two Lands. He has publicly denounced the gods, and established a reign of terror. Mirany is in hiding, and the Nine are scattered. Will Argelin's obsession bring the Rain Queen's wrath down on them all? And whose is the sinister new power hidden in the sign of the Scarab? In the descent into anarchy, Mirany and the Archon must attempt the final, impossible journey of the soul. Through the Nine Gateways into death. And back.

More Books:

Oracle Essentials
Language: en
Pages: 374
Authors: Rick Greenwald, Robert Stackowiak, Jonathan Stern
Categories: Computers
Type: BOOK - Published: 2004-02-11 - Publisher: "O'Reilly Media, Inc."

Distilling a vast amount of knowledge into an easy-to-read volume covering the full range of Oracle's features and technologies, this title includes an overview of Oracle 10g, along with recent releases 9i and 8i. It provides everything you should need to install and run the Oracle databases.
Provable Security
Language: en
Pages: 347
Authors: Willy Susilo, Reza Reyhanitabar
Categories: Computers
Type: BOOK - Published: 2013-10-15 - Publisher: Springer

This book constitutes the refereed proceedings of the 7th International Conference on Provable Security, ProvSec 2013, held in Melaka, Malaysia, in October 2013. The 18 full papers presented together with 1 invited talk were carefully reviewed and selected from 44 submissions. The papers cover the following topics: key exchange protocols,
Information Security and Cryptology
Language: en
Pages: 439
Authors: Moti Yung, Peng Liu, Dongdai Lin
Categories: Computers
Type: BOOK - Published: 2009-04-29 - Publisher: Springer

This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2008, held in Beijing, China, in December 2008. The 28 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 183 submissions. The papers are organized
Provable Security
Language: en
Pages: 275
Authors: Josef Pawel Pieprzyk, Fangguo Zhang
Categories: Computers
Type: BOOK - Published: 2009-11-09 - Publisher: Springer

This book constitutes the refereed proceedings of the Third International Conference on Provable Security, ProvSec 2009, held in Guangzhou, China, November 11-13, 2009. The 19 revised full papers and two invited talks presented were carefully reviewed and selected from 64 submissions. The papers are organized in topical sections on encryption,
Beginning Visual Basic 2005 Databases
Language: en
Pages: 768
Authors: Thearon Willis
Categories: Computers
Type: BOOK - Published: 2005-11-11 - Publisher: John Wiley & Sons

As one of the most popular programming languages in the world, Visual Basic continues to expand on the functionality and flexibility of its framework. This book explains how to use Visual Basic 2005 to write efficient database applications that can be used throughout an enterprise. With this teaching tool, you'll