This first modern study of Henry the Young King, eldest son of Henry II but the least known Plantagenet monarch, explores the brief but eventful life of the only English ruler after the Norman Conquest to be created co-ruler in his father's lifetime. Crowned at fifteen to secure an undisputed succession, Henry played a central role in the politics of Henry II's great empire and was hailed as the embodiment of chivalry. Yet, consistently denied direct rule, the Young King was provoked first into heading a major rebellion against his father, then to waging a bitter war against his brother Richard for control of Aquitaine, dying before reaching the age of thirty having never assumed actual power. In this remarkable history, Matthew Strickland provides a richly colored portrait of an all-but-forgotten royal figure tutored by Thomas Becket, trained in arms by the great knight William Marshal, and incited to rebellion by his mother Eleanor of Aquitaine, while using his career to explore the nature of kingship, succession, dynastic politics, and rebellion in twelfth-century England and France.
This major reinterpretation of Prussian history from the Napoleonic era to the Revolution of 1848 shows how reforms inspired by the Enlightenment ultimately consolidated an authoritarian political culture. The book casts new light on the origins of German nationalism, demonstrating that the competing discourses of civil servants, aristocrats, and bourgeois political activists produced a new vision of a harmonious nation under monarchical rule.
This book, first published in 2000, is a pioneering study of politics and society in the early Middle Ages. Whereas it is widely believed that the source materials for early medieval Europe are too sparse to allow sustained study of the workings of social and political relationships on the ground, this book focuses on a uniquely well-documented area to investigate the basis of power. Topics covered include the foundation of monasteries, their relationship with the laity, and their role as social centres; the significance of urbanism; the control of land, the development of property rights and the organization of states; community, kinship and lordship; justice and dispute settlement; the uses of the written word; violence and the feud; and the development of political structures from the Roman empire to the high Middle Ages.
Practice the Computer Security Skills You Need to Succeed! 40+ lab exercises challenge you to solve problems based on realistic case studies Step-by-step scenarios require you to think critically Lab analysis tests measure your understanding of lab results Key term quizzes help build your vocabulary Labs can be performed on a Windows, Linux, or Mac platform with the use of virtual machines In this Lab Manual, you'll practice Configuring workstation network connectivity Analyzing network communication Establishing secure network application communication using TCP/IP protocols Penetration testing with Nmap, metasploit, password cracking, Cobalt Strike, and other tools Defending against network application attacks, including SQL injection, web browser exploits, and email attacks Combatting Trojans, man-in-the-middle attacks, and steganography Hardening a host computer, using antivirus applications, and configuring firewalls Securing network communications with encryption, secure shell (SSH), secure copy (SCP), certificates, SSL, and IPsec Preparing for and detecting attacks Backing up and restoring data Handling digital forensics and incident response Instructor resources available: This lab manual supplements the textbook Principles of Computer Security, Fourth Edition, which is available separately Virtual machine files Solutions to the labs are not included in the book and are only available to adopting instructors
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.