100% found this document useful (1 vote)
103 views47 pages

Instant Download The AI Revolution in Networking, Cybersecurity, and Emerging Technologies Omar Santos PDF All Chapters

AI

Uploaded by

luddenmaciaz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
103 views47 pages

Instant Download The AI Revolution in Networking, Cybersecurity, and Emerging Technologies Omar Santos PDF All Chapters

AI

Uploaded by

luddenmaciaz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 47

Download the full version of the ebook at

https://ebookmass.com

The AI Revolution in Networking,


Cybersecurity, and Emerging Technologies Omar
Santos

https://ebookmass.com/product/the-ai-revolution-
in-networking-cybersecurity-and-emerging-
technologies-omar-santos/

Explore and download more ebook at https://ebookmass.com


Recommended digital products (PDF, EPUB, MOBI) that
you can download immediately if you are interested.

Cybersecurity in Intelligent Networking Systems 1st


Edition Shengjie Xu

https://ebookmass.com/product/cybersecurity-in-intelligent-networking-
systems-1st-edition-shengjie-xu/

testbankdeal.com

Emerging Nanotechnologies in Rechargeable Energy Storage


Systems. A volume in Micro and Nano Technologies 1st
Edition Edition Lide M. Rodriguez-Martinez And Noshin Omar
(Eds.)
https://ebookmass.com/product/emerging-nanotechnologies-in-
rechargeable-energy-storage-systems-a-volume-in-micro-and-nano-
technologies-1st-edition-edition-lide-m-rodriguez-martinez-and-noshin-
omar-eds/
testbankdeal.com

The AI Revolution in Project Management: Elevating


Productivity with Generative AI 1st Edition Kanabar

https://ebookmass.com/product/the-ai-revolution-in-project-management-
elevating-productivity-with-generative-ai-1st-edition-kanabar/

testbankdeal.com

Smart Grid and Enabling Technologies (Wiley - IEEE) 1st


Edition Omar Ellabban

https://ebookmass.com/product/smart-grid-and-enabling-technologies-
wiley-ieee-1st-edition-omar-ellabban/

testbankdeal.com
Emerging Technologies in Environmental Bioremediation 1st
Edition Maulin P. Shah

https://ebookmass.com/product/emerging-technologies-in-environmental-
bioremediation-1st-edition-maulin-p-shah/

testbankdeal.com

The AI Revolution in Medicine: GPT-4 and Beyond Peter Lee

https://ebookmass.com/product/the-ai-revolution-in-medicine-gpt-4-and-
beyond-peter-lee-2/

testbankdeal.com

The AI Revolution in Medicine: GPT-4 and Beyond Peter Lee

https://ebookmass.com/product/the-ai-revolution-in-medicine-gpt-4-and-
beyond-peter-lee-3/

testbankdeal.com

The AI Revolution in Medicine: GPT-4 and Beyond Peter Lee

https://ebookmass.com/product/the-ai-revolution-in-medicine-gpt-4-and-
beyond-peter-lee/

testbankdeal.com

Emerging Technologies in Engineering Mahesh P. K.

https://ebookmass.com/product/emerging-technologies-in-engineering-
mahesh-p-k/

testbankdeal.com
About This eBook
ePUB is an open, industry-standard format for eBooks. However,
support of ePUB and its many features varies across reading devices
and applications. Use your device or app settings to customize the
presentation to your liking. Settings that you can customize often
include font, font size, single or double column, landscape or portrait
mode, and figures that you can click or tap to enlarge. For additional
information about the settings and features on your reading device
or app, visit the device manufacturer’s Web site.
Many titles include programming code or configuration examples. To
optimize the presentation of these elements, view the eBook in
single-column, landscape mode and adjust the font size to the
smallest setting. In addition to presenting code and configurations in
the reflowable text format, we have included images of the code
that mimic the presentation found in the print book; therefore,
where the reflowable format may compromise the presentation of
the code listing, you will see a “Click here to view code image” link.
Click the link to view the print-fidelity code image. To return to the
previous page viewed, click the Back button on your device or app.
The AI Revolution in
Networking, Cybersecurity,
and Emerging Technologies
The AI Revolution in
Networking, Cybersecurity,
and Emerging Technologies

Omar Santos, Samer Salam, Hazim Dahir


Cover: Javier Pardina/Shutterstock
Figure 5-4: GreenOak/Shutterstock
Figure 5-5: U.S. Bureau Transportation Statistics
Figure 5-6: malinikart/Alamy Images
Many of the designations used by manufacturers and sellers to
distinguish their products are claimed as trademarks. Where those
designations appear in this book, and the publisher was aware of a
trademark claim, the designations have been printed with initial
capital letters or in all capitals.

The authors and publisher have taken care in the preparation of this
book, but make no expressed or implied warranty of any kind and
assume no responsibility for errors or omissions. No liability is
assumed for incidental or consequential damages in connection with
or arising out of the use of the information or programs contained
herein.
For information about buying this title in bulk quantities, or for
special sales opportunities (which may include electronic versions;
custom cover designs; and content particular to your business,
training goals, marketing focus, or branding interests), please
contact our corporate sales department at
[email protected] or (800) 382-3419.
For government sales inquiries, please contact
[email protected].

For questions about sales outside the U.S., please contact


[email protected].
Visit us on the Web: informit.com/aw

Library of Congress Control Number: 2024930069


Copyright © 2024 Pearson Education, Inc.

Hoboken, NJ

Please contact us with concerns about any potential bias at


https://www.pearson.com/report-bias.html.
All rights reserved. This publication is protected by copyright, and
permission must be obtained from the publisher prior to any
prohibited reproduction, storage in a retrieval system, or
transmission in any form or by any means, electronic, mechanical,
photocopying, recording, or likewise. For information regarding
permissions, request forms and the appropriate contacts within the
Pearson Education Global Rights & Permissions Department, please
visit www.pearsoned.com/permissions/.

ISBN-13: 978-0-13-829369-7
ISBN-10: 0-13-829369-4

$PrintCode

Editor-in-Chief
Mark Taub

Director ITP Product Management


Brett Bartow

Executive Editor
James Manly

Managing Editor
Sandra Schroeder

Development Editor
Christopher A. Cleveland

Production Editor
Mary Roth

Copy Editor
Jill Hobbs

Technical Editor
Petar Radanliev

Editorial Assistant
Cindy Teeters

Cover Designer
Chuti Prasertsith

Composition
codeMantra

Indexer
Erika Millen

Proofreader
Jennifer Hinchliffe
Visit https://ebookmass.com
now to explore a rich
collection of eBooks and enjoy
exciting offers!
I would like to dedicate this book to my lovely wife, Jeannette, and
my
two beautiful children, Hannah and Derek, who have inspired and
supported me
throughout the development of this book.

—Omar Santos

To Zeina, Kynda, Malek, Ziyad, Mom, Dad, and Samir.

—Samer Salam

To Angela, Hala, Leila, and Zayd, the “real” Intelligence behind


everything good in my life.

—Hazim Dahir
Contents
Preface

1 Introducing the Age of AI: Emergence, Growth, and


Impact on Technology
The End of Human Civilization
Significant Milestones in AI Development (This Book Is
Already Obsolete)
The AI Black Box Problem and Explainable AI
What’s the Difference Between Today’s Large Language
Models and Traditional Machine Learning?
Hugging Face Hub: A Game-Changer in Collaborative
Machine Learning
AI’s Expansion Across Different Industries: Networking,
Cloud Computing, Security, Collaboration, and IoT
AI’s Impacts on the Job Market
AI’s Impacts on Security, Ethics, and Privacy
Prompt Injection Attacks
Insecure Output Handling
Training Data Poisoning
Model Denial of Service
Supply Chain Vulnerabilities
Sensitive Information Disclosure
Insecure Plugin Design
Excessive Agency
Overreliance
Model Theft
Model Inversion and Extraction
Backdoor Attacks
MITRE ATLAS Framework
AI and Ethics
AI and Privacy
Summary
References
2 Connected Intelligence: AI in Computer Networking
The Role of AI in Computer Networking
AI for Network Management
Automating Network Planning
Automating Network Configuration
Automating Network Assurance
AI for Network Optimization
Routing Optimization
Radio Resource Management
Energy Optimization
AI for Network Security
Access Control
Anti-malware Systems
Firewalls
Behavioral Analytics
Software and Application Security
AI for Network Traffic Analysis
AI in Network Digital Twins
Summary
References
3 Securing the Digital Frontier: AI’s Role in
Cybersecurity
AI in Incident Response: Analyzing Potential Indicators to
Determine the Type of Attack
Predictive Analytics
Sentiment Analysis and Potential Threat Intelligence
Text-Based Anomaly Detection
Enhancing Human Expertise in the Security
Operations Center Through AI
Integration with Other Models
AI in Vulnerability Management and Vulnerability
Prioritization
AI in Security Governance, Policies, Processes, and
Procedures
Using AI to Create Secure Network Designs
Role of AI in Secure Network Design
AI and Security Implications of IoT, OT, Embedded, and
Specialized Systems
AI and Physical Security
How AI Is Transforming Physical Security
Security Co-pilots
Enhanced Access Control
AI in Security Assessments, Red Teaming, and Penetration
Testing
AI in Identity and Account Management
Intelligent Authentication
Automated Account Provisioning and Deprovisioning
Dynamic Access Control
Using AI for Fraud Detection and Prevention
AI and Cryptography
AI-Driven Cryptanalysis
Dynamic Cryptographic Implementations
Integration with Quantum Cryptography
AI in Secure Application Development, Deployment, and
Automation
Dynamic Analysis
Intelligent Threat Modeling
Secure Configuration Management
Intelligent Patch Management While Creating Code
Summary
References
4 AI and Collaboration: Building Bridges, Not Walls
Collaboration Tools and the Future of Work
Innovations in Multimedia and Collaboration
What Is Hybrid Work and Why Do We Need It?
AI for Collaboration
Authentication, Verification, or Authorization
Through Voice or Speech Recognition
Reducing Language Barriers with Real-Time
Translation
Virtual Assistants
Task Management
Context and Intent Analysis
Workflow Automation
Prescriptive Analytics
Learning and Development
Physical Collaboration Spaces
Virtual Collaboration Spaces
Team Dynamics
Document Management
The Contact Center: A Bridge to Customers
Virtual Agents
Call Routing Optimization
24 × 7 × 365 Support
Multilanguage Support
Customer Sentiment
Quality Assurance and Agent Coaching
Large Case Volume Handling
Predictive Analytics
Upgrading and Upselling
AR/VR: A Closer Look
Interactive Learning
AI-Assisted Real-Time Rendering
Content Generation
Personalization of Interaction
Virtual Assistant/Selling
NLP and NLU
Sentiments and Emotions
Affective Computing
Summary
References
5 AI in the Internet of Things (AIoT)
Understanding the IoT Landscape
AI for Data Analytics and Decision-Making
Data Processing
Anomaly Detection
Predictive Maintenance
Advanced Data Analytics
AI for IoT Resource Optimization
AI for IoT in Supply Chains
AI for IoT Security
AI and Threat Detection in IoT
AI and Vulnerability Detection in IoT Environments
AI and Authentication in IoT
AI and Physical Safety and Security
AI for IoT in Sustainability
Water Management and Preservation
Energy Management
Sustainable Waste Management and Recycling
Wildlife Conservation
Circular Economy
Summary
References
6 Revolutionizing Cloud Computing with AI
Understanding the Cloud Computing Environment
Virtualization
Application Mobility
Cloud Services
Deployment Models
Cloud Orchestration
AI in Cloud Infrastructure Management
Workload and VM Placement
Demand Prediction and Load-Balancing
Anomaly Detection
AI for Cloud Security
Vulnerabilities and Attacks
How Can AI Help?
Challenges for AI
AI for Cloud Optimization
Cloud Service Optimization
Cloud Infrastructure Optimization
AI and Machine Learning as a Service
AI Infrastructure Services
AI Developer Services: AutoML and Low-Code/No-
Code AI
AI Software Services
Advantages of AIaaS
Challenges of AI and Machine Learning in the Cloud
What Lies Ahead
Summary
References
7 Impact of AI in Other Emerging Technologies
Executive Order on the Safe, Secure, and Trustworthy
Development and Use of Artificial Intelligence
AI in Quantum Computing
Quantum Algorithm Development
Algorithmic Tuning and Automated Circuit Synthesis
Hyperparameter Optimization, Real-Time
Adaptation, and Benchmarking for Performance
Analysis
How AI Can Revolutionize Quantum Hardware
Optimization
Control Operation and Resource Optimization
Data Analysis and Interpretation
Quantum Machine Learning: Leveraging AI
Research to Uncover Quantum Advantages in
ML Tasks
AI in Blockchain Technologies
Automating the Execution of Smart Contracts with
AI
Could We Optimize Blockchain Mining Through AI
Algorithms?
Additional Use Cases in Healthcare, Supply Chain
Management, Financial Services, and
Cybersecurity
AI in Autonomous Vehicles and Drones
AI in Edge Computing
Extending the Cloud: Edge and Fog
Taking AI to the Edge
Lightweight AI and Tiny ML
Applications and Use Cases
Web 3.0
Summary
References
Visit https://ebookmass.com
now to explore a rich
collection of eBooks and enjoy
exciting offers!
Index
Preface
The AI Revolution in Networking, Cybersecurity, and Emerging
Technologies offers an immersive journey into the world of artificial
intelligence and its profound impact on key domains of technology.
This manuscript demystifies AI’s emergence, growth, and current
impact, shedding light on its revolutionary applications in computer
networking, cybersecurity, collaboration technologies, IoT, cloud
computing, and other emerging technologies.
From explaining AI’s role in managing and optimizing networks to its
integral part in securing the digital frontier, the book offers a wealth
of insights. It explores how AI is building robust bridges in
collaboration tools and turning IoT into a super-intelligent network of
devices. The reader will also discover how AI is transforming the
cloud into a self-managing, secure, and ultra-efficient environment
and propelling other technologies towards unprecedented
advancements.
Our motivation is for this book to serve as a comprehensive guide
that bridges the gap between the complex world of artificial
intelligence and its practical implications in the field of IT. We aim to
make the profound impacts and potential of AI in various technology
sectors not only understandable but also tangible for a wide
spectrum of readers. Additionally, part of our vision is to create an
essential resource that empowers readers to understand, navigate,
and address the opportunities, complex challenges, and
responsibilities associated with AI technologies. This book will
empower readers, whether they are IT professionals, tech
enthusiasts, business leaders, or students, with the necessary
knowledge and insights into how AI is reshaping the IT landscape.
By providing a clear, in-depth exploration of AI’s role in computer
networking, cybersecurity, IoT, cloud computing, and more, we aim
to equip readers to harness the power of AI in their respective fields.
Random documents with unrelated
content Scribd suggests to you:
The Project Gutenberg eBook of The Mongols
in Russia
This ebook is for the use of anyone anywhere in the United States
and most other parts of the world at no cost and with almost no
restrictions whatsoever. You may copy it, give it away or re-use it
under the terms of the Project Gutenberg License included with this
ebook or online at www.gutenberg.org. If you are not located in the
United States, you will have to check the laws of the country where
you are located before using this eBook.

Title: The Mongols in Russia

Author: Jeremiah Curtin

Release date: January 20, 2024 [eBook #72764]

Language: English

Original publication: Boston: Little Brown & Company, 1908

Credits: Jeroen Hellingman and the Online Distributed


Proofreading Team at https://www.pgdp.net/ for Project
Gutenberg (This file was produced from images
generously made available by The Internet
Archive/Canadian Libraries)

*** START OF THE PROJECT GUTENBERG EBOOK THE MONGOLS


IN RUSSIA ***
[Contents]

[Contents]

THE MONGOLS IN RUSSIA

[Contents]
Jeremiah Curtin in the Ruins of the Roman Forum
[Contents]
THE MONGOLS IN RUSSIA

BY
JEREMIAH CURTIN
AUTHOR OF “THE MONGOLS, A
HISTORY,” “MYTHS AND FOLK-LORE OF
IRELAND,” “HERO-TALES OF IRELAND,”
“MYTHS AND FOLK-TALES OF THE
RUSSIANS, WESTERN SLAVS, AND
MAGYARS,” “CREATION MYTHS OF
PRIMITIVE AMERICA,” ETC.
BOSTON
LITTLE, BROWN, AND COMPANY
1908

[Contents]

Copyright, 1908,
By A. M. Curtin.

All rights reserved

Colonial Press
Electrotyped and Printed by C. H. Simonds & Co.
Boston, U. S. A.

[Contents]

THIS WORK
AS WAS ITS COMPANION VOLUME
The Mongols, A History
IS DEDICATED TO
Theodore Roosevelt
PRESIDENT OF THE UNITED STATES

[Contents]
NOTE

In gathering material for “The Mongols 📘” and “The Mongols in


Russia,” Mr. Curtin used the early chronicles of China, Persia,
and Russia. To obtain these chronicles he went several times
to Russia and once to the Orient. [ix]

[Contents]
CONTENTS

CHAPTER I PAGE

Kurultai held by Ogotai.—Sarai, the Mongol capital.—Patriarchal


system of Russia.—Rurik, 862.—Death of Rurik, 879.—Oleg,
successor of Rurik.—Askold and Dir.—Oleg takes Kief.—Expedition
against Constantinople.—First Russian treaty.—Death of Oleg, 912.
—Reign of Igor.—Attacks on the Byzantine Empire, 941, 944.—
Murder of Igor, 945.—Olga avenges the murder of her husband.—
Reign of Olga.—Succession of Sviatoslav, 957.—Olga receives
Christianity.—The Kazars.—Sviatoslav controls Bulgaria.—Kief
attacked by Petchenegs.—Death of Olga.—Sviatoslav divides his
inheritance.—Second war with Bulgaria.—Murder of Sviatoslav, 972.
—Dispute between the sons of Sviatoslav.—Yaropolk becomes
master of Russia.—Vladimir takes Polotsk.—Blud betrays Yaropolk.
—Vladimir becomes Prince of Kief.—Religion of Russia.—Marriage
of Vladimir with Anna, sister of the Greek Emperor.—Death of
Vladimir, 1015.—Vladimir’s twelve sons.—Sviatopolk seizes power.
—Murder of Boris and Glaib.—Defeat of Sviatopolk.—Sviatopolk
seeks assistance in Poland.—Sviatopolk defeated a second time.—
Mystislav appears before Kief.—Mystislav takes Novgorod.—Battle
of Listven.—Yaroslav enters Kief.—Yaroslav becomes Grand Prince,
1016.—Death of Mystislav, 1035.—Yaroslav frames a code of laws.
—Arranges the succession.—Death of Yaroslav the Lawgiver, 1054.
—Russia divided between the sons of Yaroslav.—Izyaslav Prince of
Kief.—Vseslav the Wizard.—Vseslav imprisoned by Izyaslav.—
Polovtsi cross the boundary of Pereyaslavl, 1055.—Peace made by
the Polovtsi.—Polovtsi defeat the Russian princes.—Kief dissatisfied
with Izyaslav.—Kief reënstates Izyaslav.—Izyaslav driven from Kief a
second time.—Sviatoslav becomes Grand Prince.—Izyaslav’s son
visits Rome.—Polish king asks Pope Gregory to assist Izyaslav.—
Monomach and Glaib.—Polovtsi warriors employed for the first time.
—Death of Sviatoslav, 1076.—Death of Glaib.—Polovtsi led in by
Oleg and Boris.—Izyaslav, Yaropolk and Monomach march against
Oleg.—Death of Boris.—Death of Izyaslav.—Vsevolod becomes
Grand Prince, 1078.—Volodar and Vassilko.—Chernigoff given to
Monomach.—Polovtsi army sent against Vsevolod.—Death of
Roman, 1079.—Trouble in Volynia.—Traffic with Tsargrad.—Flight of
Yaropolk.—Surrender of Lutsk.—David, son of Igor, rules Volynia.—
Galitch seized from the King of Poland.—Death of Yaropolk, 1086
1

CHAPTER II

Death of Vsevolod, 1093.—Sviatopolk, Prince of Kief.—Conflict


between Sviatopolk and the Polovtsi.—Defeat of Sviatopolk.—
Polovtsi [x]attack Kief.—Polovtsi army led in by Oleg.—Siege of
Chernigoff.—Oleg master of Chernigoff.—Polovtsi Khans visit
Pereyaslavl to sell peace, both are killed.—Advance of Oleg against
Murom.—Itlar and Kitan, Polovtsi Khans, come to Pereyaslavl, 1095.
—Death of Izyaslav.—Murom receives Oleg.—Mystislav seizes
Oleg’s officials.—Mystislav pursues Oleg.—Defeat of Oleg.—Princes
of Russia meet at Lubetch, 1097.—David suspicious of Monomach
and Vassilko.—David explains the plot to Sviatopolk.—Capture of
Vassilko.—David blinds Vassilko.—Volodar attacks David.—Vassilko
seeks revenge.—Sviatopolk lays siege to Vladimir.—Yaroslav goes
to Hungary to find aid for Vassilko.—Koloman of Hungary lays siege
to Premysl.—Mystislav defends Vladimir.—Death of Mystislav.—
Vladimir men defeat David.—The Russian princes meet at
Vititchevo, 1100.—Monomach acts against steppe tribes.—Defeat of
the Polovtsi.—Expeditions against the Polovtsi, 1110 and 1111.—
Death of Sviatopolk, 1113.—Monomach becomes Prince of Kief,
1113.—Monomach marches against Minsk, 1116.—Trouble in
Volynia.—Monomach expels Yaroslav, and seats Roman in Volynia.
—Death of Roman.—Andrei, Roman’s successor.—Kidnapping of
Volodar.—Efforts of Vassilko to free his brother.—Yaroslav, with
Cheks, Poles and Hungarians, attacks Vladimir, 1123.—Death of
Yaroslav, 1123.—Death of Monomach, 1125.—Mystislav succeeds
Vladimir Monomach, 1125.—Yaroslav, son of Monomach, founds the
principality of Ryazan.—Mystislav frees himself of the Polovtsi
princes.—Yaroslav successor of Oleg of Chernigoff.—Vsevolod
opposes his uncle.—Yaroslav withdraws to Ryazan.—Death of
Mystislav, 1132.—Yaropolk successor of Mystislav, his brother.—
Mystislav’s sons rise against their uncle.—Vsevolod receives
Pereyaslavl from Mystislav.—Yuri Dolgoruki expels Vsevolod.—
Pskoff resolves to declare its independence.—Sviatoslav sent to
attack Pskoff.—Yuri Dolgoruki receives Gorodok.—Vsevolod seizes
Chernigoff.—Death of Yaropolk.—Vyacheslav successor of Yaropolk,
1150.—Vyacheslav drives Vsevolod from Kief.—Position of
Monomach’s descendants.—Vsevolod attacks his enemies
separately.—Yuri seizes Torjok 33

CHAPTER III

Death of Andrei.—Vyacheslav takes Pereyaslavl.—Vsevolod calls a


council.—Siege of Pereyaslavl by dissatisfied heirs.—Defeat of the
besiegers.—Vsevolod asks aid of Sviatosha.—Izyaslav obtains
Pereyaslavl.—Visit of Izyaslav to Yuri in Suzdal.—Position of the
descendants of Monomach and Oleg.—Death of Volodar and
Vassilko, 1124.—Quarrel between Vsevolod and Vladimirko.—
Vladimirko calls in Hungarians, 1127.—Vladimirko’s enemies grow
defiant.—Siege of Galitch.—Triumph of Vladimirko.—Vsevolod
enters Galitch (1146).—Position of Novgorod.—Vsevolod declares
Igor his successor, 1145.—Death of Vsevolod, 1146.—Igor remains
with the army and sends Sviatoslav to Kief.—Defeat of Igor.—
Capture of Sviatoslav.—Izyaslav enters Kief.—Power returns to
Monomach’s descendants.—Flight of Sviatoslav to Chernigoff.—
Sviatoslav asks aid of Yuri.—Effort of the sons of David to crush
Sviatoslav.—Rostislav of Murom attacks Yuri’s country.—The sons of
David move on Putivl.—Flight of Sviatoslav.—Sons of David resolve
to kill Sviatoslav.—Sviatoslav reaches the forests of Vyatichi.—
Izyaslav leaves his sister’s son in Chernigoff.—Yuri of Suzdal sends
aid to Sviatoslav.—Death of Ivan, son of Yuri.—Yuri invites
Sviatoslav [xi]to meet him in Moskva (Moscow), 1146.—The name
Moscow appears for the first time in history, 1146.—Izyaslav
addresses his boyars.—Izyaslav sends envoys to the sons of David.
—Murder of Igor.—Glaib seizes Kursk.—Struggle of Chernigoff
princes against Izyaslav.—Rostislav deceives the Kief people.—
Novgorod assembles forces to march against Yuri.—Izyaslav sends
envoys to Sviatoslav.—Sviatoslav consults with Yuri.—Yuri marches
to Pereyaslavl.—Yuri sends a message to Izyaslav.—The bishop
begs Izyaslav to make peace.—Defeat and flight of Izyaslav.—
Izyaslav sends to Poland for aid.—Message of Izyaslav to
Vyatcheslav.—Vyatcheslav begs Yuri to make peace.—Yuri invests
Lutsk.—Yuri makes peace.—Izyaslav obtains aid from the Polovtsi.
—Vyatcheslav and Izyaslav rule Kief.—Yuri approaches Kief.—Flight
of Vyatcheslav and Izyaslav.—Izyaslav asks aid of the King of
Hungary.—Vladimirko lavishes gold on the Hungarians and they
withdraw.—Escape of Boris.—Kief welcomes Izyaslav.—Triumph of
Vyatcheslav.—Contest between Vyatcheslav and Yuri.—Yuri attacks
Vyatcheslav.—Defeat of Yuri.—Yuri takes oath not to attack Kief
while it is held by Izyaslav and his uncle.—Return of Yuri to Suzdal.
—Yuri brings Polovtsi legions to besiege Chernigoff.—Defeat of Yuri.
—Triumph of Izyaslav and his uncle 58

CHAPTER IV

Izyaslav and the King of Hungary attack Vladimirko, 1151.—Escape


of Vladimirko.—Vladimirko declares that he is dying and begs for
peace.—Izyaslav yields.—Vladimirko sends troops to help Yuri.—
Refusal of Vladimirko to fulfil promises.—Death of Vladimirko.—
Yaroslav successor of Vladimirko.—Battle at Terebovl.—Defeat of
Izyaslav.—Death of Izyaslav, 1154.—Rostislav succeeds his brother.
—Attack on Pereyaslavl.—Death of Vyatcheslav.—Defeat of
Rostislav.—Kief men call Izyaslav to the throne.—Peace between
Yuri and Rostislav.—Yuri meets an old friend.—Yuri enters Kief,
1155.—Disaffection of Kief.—Death of Yuri, 1157.—Andrei carries
the miraculous image to Vladimir.—Founding of Bogolyuboff.—
Mystislav successor of Yuri.—Andrei marches against Mystislav,
1169.—Destruction of Kief.—Andrei adorns Vladimir.—History of
Vladimir.—Suzdal and Rostoff jealous of Vladimir.—Enemies of
Andrei.—Methods of Andrei.—Pride of Novgorod.—Andrei attacks
Bulgar.—Triumph of Andrei.—Friendship of the Greek Emperor and
the Patriarch.—Andrei calls a council.—Asks the Patriarch to give
Vladimir a metropolitan.—Refusal of the Patriarch.—Marriage of
Andrei.—Youth of Andrei.—Murder and burial of Andrei, 1174.—Fear
of the boyars.—Execution of the murderers.—Andrei’s two nephews
chosen to succeed him.—Sviatoslav of Chernigoff displeased; insists
that the brothers of Andrei shall be associated with the nephews.—
Boyars masters in Vladimir.—Vladimir men send for Mihalko and
Vsevolod, and install them, 1176 88

CHAPTER V
Death of Mihalko, 1176.—Men of Vladimir kiss the cross to Vsevolod.
—Vsevolod gives Rostoff to Mystislav.—Mystislav invades Vladimir.
—Battle near Yurieff.—Flight of Mystislav.—Triumph of Vsevolod.—
Burning of Moscow.—Attack on Vladimir.—Seizure of Bogolyuboff by
Glaib.—Defeat of Mystislav and the Polovtsi.—Decision regarding
prisoners.—Blinding of Yaropolk and Mystislav.—Refusal of Glaib to
receive freedom with conditions.—Death of [xii]Glaib.—Importance of
Vladimir as a capital.—Activity of the Prince of Vladimir in Novgorod
affairs.—Defense of Novgorod against pagans.—Attempt of
Mystislav to punish Polovtsi.—Death of Mystislav.—Flight of Roman
to the steppes.—Submission of Ryazan.—Choice of Vladimir as
Prince of Novgorod.—Imprisonment of Glaib.—Efforts of Sviatoslav
to liberate his son.—Retreat of Sviatoslav.—Preparations of Rurik to
seize Kief.—Asks aid of Yaroslav Eight Minds.—March of Yaroslav
and Igor from Chernigoff.—Allies from Lithuania.—Desire of
Smolensk to force battle.—Attack of the Prince of Vladimir on Nova-
Torg.—Peace is made.—Defeat of Mohammedans.—Death of
Izyaslav, son of Glaib.—Party struggles in Novgorod.—Trouble in
Ryazan.—Address of Big Nest to Ryazan people.—Pronsk princes
ask for assistance.—Retreat from Kolomna.—Surrender of Pronsk.—
Deceitful submission of Roman.—Attack on Kolomna by the Prince
of Vladimir.—Peace made with Ryazan.—Accusations against
Porfiri, the Chernigoff bishop.—Sviatoslav invites all princes to join
him in an expedition against the Polovtsi.—A great victory.—Eight
Minds, Prince of Galitch.—Triumph of Sviatoslav.—March of Igor
against the Polovtsi.—Defeat of Igor.—Death of Glaib 111

CHAPTER VI

Death of Vladimir of Pereyaslavl.—Inheritance of Pereyaslavl by the


Prince of Vladimir.—Onrush of Polovtsi.—Grief of Igor.—Escape of
Igor from imprisonment among Polovtsi.—Polovtsi raids.—Decline of
Kief.—Influence of the Latins.—Death of Yaroslav Eight Minds, 1187.
—Anastasia, mistress of Eight Minds.—Bond between Galitch and
Hungary.—Vladimir, son of Eight Minds.—Marriage of Vladimir.—
Flight of Vladimir and his family.—Reception of Vladimir by Bela III.—
Seizure of Vladimir’s property by Roman.—Assistance given Roman
by Rurik of Smolensk.—Honor given King Bela in Galitch.—Bela
takes the title Rex Galiciæ.—Andrei, son of Bela, made king in
Galitch.—Position of Andrei in Galitch.—Rostislav invited to the
throne of Galitch.—Battle outside the capital.—Death of Rostislav.—
Church trouble in Galitch.—Dispute between Rurik and Sviatoslav.—
Plans of the Kief prince.—Escape of Vladimir of Galitch from
imprisonment in Hungary.—Vladimir begs aid of Barbarossa.—
Barbarossa commands Kazimir of Poland to assist Vladimir.—
Vladimir enters Galitch with a Polish army.—Flight of Andrei.—
Decision of Chernigoff princes that war alone can settle boundaries.
—Death of Sviatoslav, 1194.—Rurik, Prince of Kief.—Roman, son-in-
law of Rurik.—Rurik feels the policy of Big Nest.—Feast giving
between Rurik and David.—Trouble between Rurik and Big Nest.—
Appeal to Nikifor, the metropolitan.—Roman reproaches Rurik.—
Roman seeks aid in Cracow.—Roman assists the Poles.—Defeat of
Roman.—Message from Big Nest and Rurik to the descendants of
Oleg.—Big Nest promises to march against Chernigoff.—Victory of
Chernigoff.—Rurik reproaches Big Nest.—Rurik marches on
Chernigoff.—Death of Vsevolod Buitur.—Message of Rurik to the
Galitch prince.—Council of Ryazan princes.—Demand of Big Nest
that Yaropolk should leave Novgorod.—Rurik reproaches Big Nest.—
Indifference of Big Nest.—Death of Rostislav, 1198.—Death of
Vladimir, son of Eight Minds.—Struggle between Bela of Hungary
and Roman.—Rule of Roman in Galitch.—Ingvar is seated on the
Kief throne.—Chermny and Rurik bring Polovtsi against Kief, 1204.—
Capture of Kief.—Rurik [xiii]again prince in Kief, 1205.—Campaign
against Polovtsi.—Rurik becomes a monk.—Rostislav prince in Kief.
—Meeting in Kief of the ruling princes.—Occupation of Lublin
133

CHAPTER VII

Death of Roman, 1205.—Rurik, the monk, again prince in Kief.—


Quarrels in Galitch.—Escape of Roman’s widow and children.—
Desire of Andrei to establish Daniel in Galitch, 1206.—Chermny
leads troops into Galitch.—Trouble with Galitch boyars.—Recall of
Andrei.—Satisfaction of Chermny.—Desire of the boyars to get
possession of Volynia.—Aid asked of Leshko by Roman’s widow,
1211.—Disorder in Galitch and Volynia.—Trouble in Kief.—Rule of
Chermny in the Kief country, 1207.—Vassilko and Daniel.—Desire of
Alexander Bailski to rule in Volynia.—Ingvar claims Volynia.—
Vassilko receives Brest.—Quarrels of the sons of Igor.—Big Nest
marches against Chermny.—Quarrel of Big Nest and son.—Big Nest
moves on Ryazan.—Ryazan men beg for peace.—Crossing of the
Oká.—Return of the army to Vladimir, November, 1207.—Big Nest
sends Yaroslav, his son, to Ryazan as prince, 1208.—Intrigue of
Glaib.—Burning of Ryazan and Bailgorod.—Disorder increases in
Galitch.—Expulsion of the sons of Igor.—Coming of Benedict Bor.—
Escape of Benedict Bor.—Volodislav, a boyar, promises Galitch to
Andrei of Hungary.—Reception of Daniel by Galitch.—Triumph of
Daniel.—Parting of Daniel and his mother.—Establishment in Galitch
of Roman’s widow.—Torture and exile of Volodislav.—Triumph of
Mystislav.—Return of Volodislav.—Rule of Volodislav in Galitch.—
Andrei of Hungary and his queen.—History of Benedict Bor.—Volynia
rises against Volodislav.—Defeat of Volodislav.—The young King
and Queen of Galitch.—Volodislav dies in prison.—Latin priesthood
brought into Galitch, 1214.—Dispute between Novgorod and Big
Nest.—Mystislav the Gallant, son of Mystislav the Brave.—
Appearance of Mystislav in Novgorod.—Success of Mystislav the
Gallant.—Trouble between Big Nest and his son.—Death of Big
Nest, 1212.—Mystislav the Gallant assists Kief.—Flight of Chermny.
—Death of Chermny, father of Michael the Martyr 161

CHAPTER VIII

Triumph of Mystislav the Gallant.—Superiority of Mystislav over


Russian princes.—Marriage of Daniel, Roman’s son.—Success of
Daniel.—Perilous position of Daniel.—Endurance of Daniel.—
Yaroslav Prince of Novgorod.—Misfortunes of Novgorod.—
Appearance of Mystislav the Gallant in Novgorod.—War between
Novgorod and Vladimir.—Reinstatement of Constantine by Mystislav,
1215.—Battle of Lipetsk.—Departure of Yuri.—Death of Vassili, son
of Mystislav the Gallant.—Installation of Latin priests in Galitch.—
Decision of Russian princes to regain Galitch.—Battles fought by
Daniel.—Reign of Koloman and Silomeya in Galitch.—Management
of Sudislav “the traitor.”—Hurried preparations to defend Galitch.—
Seizure of towns and cities by Leshko of Poland.—Defeat of the
Poles.—Storming of Galitch by Mystislav.—Conspiracies in Galitch
and Volynia.—Success of Daniel, son of Roman.—Troubles in
Novgorod, way to the sea cut off by Fins.—Troubles among
Lithuanian tribes 185 [xiv]
CHAPTER IX

The Baltic coast.—Kors and Livs.—Merchants of the 12th century.—


Visit of Meinhardt to Polotsk, 1186–7.—Attack of Kors and Livs on
the Germans.—Founding of Holm or Kirchholm.—Conversion of
pagan tribes.—Death of Meinhardt, 1196.—Victory of the Germans.
—Reëstablishment of the Livonian Church.—Decision of Rome.—
Albert von Apeldern Bukshevden.—Building of a fortress.—Founding
of the city of Riga.—Dispute between Albert, Bishop of Livonia, and
the Order.—Seizure of Polotsk territory.—Embassy sent by the
bishop to Vladimir.—Preparations of Riga for defense.—Embassy
from Riga.—Message sent by the abbot to the envoys of the prince.
—Attack on Holm by Ako.—Defeat of Ako.—Campaign of Vladimir
against Riga.—Negotiations between the bishop and Vladimir.—
Dissatisfaction of the people subject to Riga.—Crossing of the Dvina.
—Complaints of the bishop against Pskoff and Novgorod.—Refusal
of Pskoff and Novgorod to make a treaty with Riga.—Meeting of the
archbishop and Vladimir.—Prince of Polotsk.—Return of Mystislav
the Gallant to Novgorod, 1214.—Defeat of the knights of Riga.—
Cruelties of the knights.—Fate of Kors and Livs.—Trouble in
Lithuania from Prussian refugees.—Esthonia.—Expedition of
Yaroslav against Riga.—Prince Vyachko of Kuikenos.—Siege of
Yurieff.—Burning of Yurieff by its defenders.—Capture of Yurieff.—
Quarrels between Pskoff and Novgorod.—Occupation of
Pereyaslavl.—Radical changes in Russia.—Battle on the Kalka,
1224.—Defeat of the Russians.—Accusations against Daniel.—
Death of Mystislav, 1228 206

CHAPTER X

Vladimir, son of Rurik, prince in Kief.—Trouble over the Kief


principality.—Michael of Chernigoff.—War throughout Galitch and
Volynia, from 1230 to 1240.—Escape of Daniel.—Defeat of Michael.
—Constant dissensions in Russia.—Intriguing of Galitch boyars.—
Plot against Daniel.—Riots in Galitch.—Capture of Peremysl.—
Shifting fortune of Daniel.—Schemes of Bailski.—Yaroslav, son of
Big Nest, Prince of Kief, 1237.—Capture of Kief by Michael of
Chernigoff.—Desertion of Kief in 1239.—Ruin of Pereyaslavl by the
Mongols.—Triumph of Daniel.—Mongol tempest.—Attack on Trans-

You might also like