Against majority opinion within his profession, Donald Bloxham argues that it is legitimate, often unavoidable, and frequently important for historians to make value judgements about the past. History and Morality draws on a wide range of historical examples, and its author's insights as a practicing historian. Examining concepts like impartiality, neutrality, contextualisation, and the use and abuse of the idea of the past as a foreign country, Bloxham's book investigates how far tacit moral judgements infuse works of history, and how strange those histories would look if the judgements were removed. The author argues that rather than trying to eradicate all judgemental elements from their work, historians need to think more consistently about how, and with what justification, they make the judgements that they do. The importance of all this lies not just in the responsibilities that historians bear towards the past - responsibilities to take historical actors on those actors' own terms and to portray the impact of those actors' deeds - but also in the role of history as a source of identity, pride, and shame in the present. The account of moral thought in History and Morality has ramifications far beyond the activities of vocational historians.
Get into the hacker's mind--and outsmart him! Fully updated for the latest threats, tools, and countermeasures Systematically covers proactive, reactive, and preemptive security measures Detailed, step-by-step techniques for protecting HP-UX, Linux, and UNIX systems "Takes on even more meaning now than the original edition!" --Denny Georg, CTO, Information Technology, Hewlett-Packard Secure your systems against today's attacks--and tomorrow's. Halting the Hacker: A Practical Guide to Computer Security, Second Edition combines unique insight into the mind of the hacker with practical, step-by-step countermeasures for protecting any HP-UX, Linux, or UNIX system. Top Hewlett-Packard security architect Donald L. Pipkin has updated this global bestseller for today's most critical threats, tools, and responses. Pipkin organizes this book around the processes hackers use to gain access, privileges, and control--showing you exactly how they work and the best ways to respond. Best of all, Pipkin doesn't just tell you what to do, but why. Using dozens of new examples, he gives you the skills and mindset to protect yourself against any current exploit--and attacks that haven't even been imagined yet. How hackers select targets, identify systems, gather information, gain access, acquire privileges, and avoid detection How multiple subsystems can be used in harmony to attack your computers and networks Specific steps you can take immediately to improve the security of any HP-UX, Linux, or UNIX system How to build a secure UNIX system from scratch--with specifics for HP-UX and Red Hat Linux Systematic proactive, reactive, and preemptive security measures Security testing, ongoing monitoring, incident response, and recovery--in depth Legal recourse: What laws are being broken, what you need to prosecute, and how to overcome the obstacles to successful prosecution About the CD-ROM The accompanying CD-ROM contains an extensive library of HP-UX and Linux software tools for detecting and eliminating security problems and a comprehensive information archive on security-related topics.
Since independence, the political institutions of many African states have undergone a process of consolidation and subsequent deterioration. Constrained by external economic dependency and an acute scarcity of economic and technical resources, state officials have demonstrated a diminished capacity to regulate their societies. Public policies are agreed upon but ineffectively implemented by the weak institutions of the state. Although scholars have analyzed the various facets of state-building in detail, little systematic attention has been given to the issue of the decline of the state and mechanisms to cope with state ineffectiveness in Africa. This book focuses especially on the character of the postcolonial state in Africa, the nature of and reasons for state deterioration, and the mechanisms and policies for coping with state malfunction. Scholars from Africa, the United States, Europe, and the Middle East combine a broad understanding of African political processes with expertise on specific regions. Their analytic and comparative perspective provides a comprehensive and timely treatment of this vital and heretofore neglected theme in African politics.
In The First Cold War, Donald E. Davis and Eugene P. Trani review the Wilson administration’s attitudes toward Russia before, during, and after the Bolshevik seizure of power. They argue that before the Russian Revolution, Woodrow Wilson had little understanding of Russia and made poor appointments that cost the United States Russian goodwill. Wilson later reversed those negative impressions by being the first to recognize Russia’s Provisional Government, resulting in positive U.S.–Russian relations until Lenin gained power in 1917. Wilson at first seemed unsure whether to recognize or repudiate Lenin and the Bolsheviks. His vacillation finally ended in a firm repudiation when he opted for a diplomatic quarantine having almost all of the ingredients of the later Cold War. Davis and Trani argue that Wilson deserves mild criticism for his early indecision and inability to form a coherent policy toward what would become the Soviet Union. But they believe Wilson rightly came to the conclusion that until the regime became more moderate, it was useless for America to engage it diplomatically. The authors see in Wilson’s approach the foundations for the “first Cold War”—meaning not simply a refusal to recognize the Soviet Union, but a strong belief that its influence was harmful and would spread if not contained or quarantined. Wilson’s Soviet policy in essence lasted until Roosevelt extended diplomatic recognition in the 1930s. But The First Cold War suggests that Wilson’s impact extended beyond Roosevelt to Truman, showing that the policies of Wilson and Truman closely resemble each other with the exception of an arms race. Wilson’s intellectual reputation lent credibility to U.S. Cold War policy from Truman to Reagan, and the reader can draw a direct connection from Wilson to the collapse of the USSR. Wilsonians were the first Cold War warriors, and in the era of President Woodrow Wilson, the first Cold War began.
The publication of Volume V of Physical Properties of High Temperature Superconductors is expected in March, 1996. It will have chapters of interest for both fundamental studies and applied research. The topics discussed are expected to include the electromagnetic response (penetration depth and surface resistance), local lattice distortions, the influence of vortex fluctuations on macroscopic behavior, the properties of superlattices, and the symmetry of the superconducting order parameter.
This is the first full-length study of Irish Ribbonism, tracing the development of the movement from its origins in the Defender movement of the 1790s to the latter part of the century when the remnants of the Ribbon tradition found solace in a new movement: the quasi-constitutional affinities of the Ancient Order of Hibernians. Placing Ribbonism firmly within Ireland's long tradition of collective action and protest, this book shows that, owing to its diversity and adaptability, it shared similarities, but also stood apart from, the many rural redresser groups of the period and showed remarkable longevity not matched by its contemporaries. The book describes the wider context of Catholic struggles for improved standing, explores traditions and networks for association, and it describes external impressions. Drawing on rich archives in the form of state surveillance records, 'show trial' proceedings and press reportage, the book shows that Ribbonism was a sophisticated and durable underground network drawing together various strands of the rural and urban Catholic populace in Ireland and Britain. Ribbon Societies in Nineteenth-Century Ireland and its Diaspora is a fascinating study that demonstrates Ribbonism operated more widely than previous studies have revealed.
The Definitive Telecommunications Reference--Fully Updated Understand cutting-edge telecommunication and networking technologies using this straightforward, real-world implementation guide. Fully revised to cover all of the latest transmission protocols, Voice & Data Communications Handbook, Fifth Edition covers all the bases-from analog transmission, VPNs, and LANs to DSL, CATV, WiFi, VoIP, and GSM. This authoritative volume covers the ins-and-outs of each vital topic, supplies practical examples and solutions, and provides helpful self-tests. You'll also find up-to-date information on regulatory standards, switches, routers, frame relay, and security procedures. Use new wireless technologies Understand the building blocks of analog transmission-bandwith, amplitude, and frequency Provide transparent communications using the OSI model and seven-layer architecture Comply with local and federal regulations and RBOCs Transmit information using routers, SS7, PBX, and KTS switches Send and receive data across TCP/IP, wireless, cellular, and optical systems Create a connection using a modem Connect to multiple VPNs and LANs using frame relay, ATM, and MPLS Deploy high-speed broadband access with cable modems, xDSL, and CATV Get details on VoIP, SIP, and voice over data services Increase bandwidth using IP telephony techniques and PBX equipment
The Definitive Telecommunications Reference--Fully Updated Understand cutting-edge telecommunication and networking technologies using this straightforward, real-world implementation guide. Fully revised to cover all of the latest transmission protocols, Voice & Data Communications Handbook, Fifth Edition covers all the bases-from analog transmission, VPNs, and LANs to DSL, CATV, WiFi, VoIP, and GSM. This authoritative volume covers the ins-and-outs of each vital topic, supplies practical examples and solutions, and provides helpful self-tests. You'll also find up-to-date information on regulatory standards, switches, routers, frame relay, and security procedures. Use new wireless technologies Understand the building blocks of analog transmission-bandwith, amplitude, and frequency Provide transparent communications using the OSI model and seven-layer architecture Comply with local and federal regulations and RBOCs Transmit information using routers, SS7, PBX, and KTS switches Send and receive data across TCP/IP, wireless, cellular, and optical systems Create a connection using a modem Connect to multiple VPNs and LANs using frame relay, ATM, and MPLS Deploy high-speed broadband access with cable modems, xDSL, and CATV Get details on VoIP, SIP, and voice over data services Increase bandwidth using IP telephony techniques and PBX equipment
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.