000 06394cam a2200733Mi 4500
001 ocn976024248
003 OCoLC
005 20241003151252.0
006 m d
007 cr |||||||||||
008 160830s2016 enka fo 000 0 eng d
040 _aAUD
_beng
_erda
_epn
_cAUD
_dOCLCO
_dOCLCQ
_dOCLCF
_dOCLCA
_dUKAHL
_dYDX
_dJSTOR
_dEBLCP
_dUKMGB
_dN$T
015 _aGBB6C6632
_2bnb
020 _a1784913006
020 _a9781784913007
_q(electronic bk.)
020 _z9781784912994 (pbk.)
035 _a2640421
_b(N$T)
035 _a(OCoLC)976024248
037 _a22573/ctv17ckj9s
_bJSTOR
043 _af-ua---
050 4 _aDT62.T6
_bC53 2016
072 7 _aSOC
_x003000
_2bisacsh
082 0 4 _a932
_223
049 _aMAIN
100 1 _aClark, Reg
_q(Reg J.),
_eauthor.
_91051572
245 1 0 _aTomb security in ancient Egypt from the Predynastic to the Pyramid Age /
_cReg Clark.
264 1 _aOxford :
_bArchaeopress,
_c[2016]
300 _a1 online resource :
_billustrations (black and white)
336 _atext
_btxt
_2rdacontent
336 _astill image
_bsti
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
490 0 _aArchaeopress Egyptology
500 _aPreviously issued in print: 2016.
520 8 _aEgyptians went to great lengths to protect their dead from the omnipresent threat of robbery by incorporating specially developed architectural features in their tombs. However, the architecture of tomb security has rarely been studied as a subject in its own right and is usually treated as a secondary topic in publications of a scholarly nature, which tend to regard its role as incidental to the design of the tomb rather than perhaps being the driving force behind it. This issue had been raised in the early Twentieth Century by Reisner (1908: 11), who suggested that the rapid evolution of Egyptian tomb substructures was as a result of the desire for tomb security and more ostentatious tombs, rather than a development spurred by religious or funerary practices.
521 _aSpecialized.
588 0 _aOnline resource; title from home page (viewed on November 7, 2016).
500 _aAvailable through Archaeopress Digital Subscription Service.
505 0 _aCover -- Title Page -- Copyright Page -- Contents -- List of Figures -- Acknowledgements -- Abbreviations -- Conventions -- List of Figures and Maps -- 1. Introduction -- 1.1 The purpose of the Egyptian tomb and the need for it to be secure -- 1.2 Aims and objectives -- 1.3 Previous scholarship -- 1.4 Methodology -- 1.5 Dating -- 1.6 Database analysis -- 1.7 Structure of the book -- 1.8 Contributions made by this research -- 2. Substructure and access route typology -- 2.1 Tomb types -- 2.2 Superstructures -- 3. The early precursors of tomb security
505 8 _a3.1 The Late Palaeolithic: an early beginning -- 3.2 The Neolithic and Predynastic Periods -- 3.3 Conclusion -- 4. The defence of the burial chamber -- 4.1 Royal tombs -- 4.1.1 Dynasty 0 and the First Dynasty -- 4.1.2 The Second Dynasty -- 4.1.3 The Third Dynasty -- 4.1.4 The early Fourth Dynasty -- 4.1.5 Conclusion -- 4.2 Private tombs -- 4.2.1 Burial chambers in Type IB, IC and ID pit tombs -- 4.2.1.1 The burial chamber in Type IB and IC pit tombs -- 4.2.1.2 The burial chamber in Type ID pit tombs -- 4.2.2 Burial chambers in subterranean Type II tombs
505 8 _a4.2.2.1 The burial chambers in the Abu Roash Type II tombs -- 4.2.2.2 The burial chambers in Type IIA tombs with stairway access -- 4.2.2.3 The burial chamber in Type IIB 'deep' staircase tombs -- 4.2.2.4 The burial chamber in Type IIA-C stair-shaft tombs -- 4.2.2.5 The burial chambers in Type IIC shaft tombs -- 4.2.3 Burial chambers in Type III tombs with sloping corridors -- 4.2.4 Conclusion -- 5. The security of the access route and its blockings -- 5.1 Stairs, shafts and corridors -- 5.1.1 Royal tombs -- 5.1.2 Private tombs
505 8 _a5.1.2.1 The access routes of Type ID tombs -- the staircase or slope -- 5.1.2.2 The access routes of Type IIA tombs -- the staircase or slope -- 5.1.2.3 The access routes of Type IIB tombs -- the 'deep' staircase -- 5.1.2.4 The access routes of Type IIA-C tombs -- the stair-shaft -- 5.1.2.5 The access routes of Type IIC tombs -- the shaft -- 5.1.2.6 The access routes of Type III tombs -- sloping corridors -- 5.1.3 Conclusion -- 5.2 Backfill to blockwork -- the closure of the access -- route -- 5.2.3 Conclusion -- 5.2.2 Manufactured or built blockings -- 5.2.2.1 Mud-brick
505 8 _a5.2.2.2 Stone walls and blocking -- 5.2.2.3 Wooden doors -- 5.2.1 Backfill -- 5.2.1.1 Sand -- 5.2.1.2 Rubble -- 5.2.1.3 Liquid mud -- 5.3 Portcullises and plug-stones -- 5.3.1 The portcullis -- 5.3.1.1 Royal tombs -- 5.3.1.2 Private tombs -- 5.3.2 Plug-stones -- 5.3.2.1 Royal tombs -- 5.3.2.2 Private tombs -- 5.3.3 Conclusion -- 6. Mounds, mastabas and pyramids -- the security of the superstructure -- 6.1 Royal tombs -- 6.1.1 Dynasty '0' to the mid First Dynasty -- 6.1.2 The second half of the First Dynasty -- 6.1.3 The Second Dynasty -- 6.1.4 The Third Dynasty -- 6.1.5 The early Fourth Dynasty
504 _aIncludes bibliographical references and index.
590 _aAdded to collection customer.56279.3
650 0 _aTombs
_zEgypt
_xDesign and construction
_xHistory.
_91051573
650 0 _aVernacular architecture
_xSecurity measures
_zEgypt.
_91051574
650 0 _aPyramids
_xSecurity measures
_zEgypt.
_91051575
651 0 _aEgypt
_xAntiquities
_xCollection and preservation.
_91051576
650 7 _aSOCIAL SCIENCE / Archaeology
_2bisacsh
_9278538
650 7 _aAntiquities
_xCollection and preservation.
_2fast
_0(OCoLC)fst00810747
_9139813
650 7 _aTombs
_xDesign and construction.
_2fast
_0(OCoLC)fst01152443
_91051577
651 7 _aEgypt.
_2fast
_0(OCoLC)fst01208755
_9119750
655 4 _aElectronic books.
_9396
655 7 _aHistory.
_2fast
_0(OCoLC)fst01411628
_99192
710 2 _aArchaeopress,
_epublisher.
776 0 8 _iPrint version:
_z9781784912994
856 4 0 _3EBSCOhost
_uhttps://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2640421
938 _aProQuest Ebook Central
_bEBLB
_nEBL6362709
938 _aYBP Library Services
_bYANK
_n301586795
938 _aAskews and Holts Library Services
_bASKH
_nAH30695084
938 _aEBSCOhost
_bEBSC
_n2640421
994 _a92
_bN$T
999 _c739112
_d739112