23 research outputs found

    Our Enemy, the State: Liberty versus Power on the American Home Front during the First World War

    Get PDF
    World War I marked a significant shift in the structure and practice of the federal government. The key feature of this shift was the centralization of national power in the federal government and a burgeoning bureaucracy. This increase in the centralization of power led to an escalation of conflicts between the expanded assertions of national power and the civil liberties of American citizens. While this relationship between state power and civil liberties has been the focus of extensive scholarly research, much less has been written about a mostly forgotten perspective that viewed war as destructive to human flourishing beyond the dictates of court-defined civil liberties. Based upon a classical liberal tradition, shaped by the experiences of those who lived through the war and adapted by a subsequent generation of libertarian scholars, this study examines the transformation of social power into state power during the First World War through this perspective. American participation in the war redistributed power from the voluntary interactions within society to the coercive hand of the state. The war apparatus on the home front played upon existing prejudices and invented new ones by co-opting social institutions into state-endorsed mechanisms of coercion. Ultimately, the war unleashed a major acceleration in the transformation of social power into state power. This transformation represented a fundamental shift from a society that placed great emphasis on voluntarism to one centered on the use of the force of the state to achieve political aims. In this post-war statism, war became the health of the state, and its long-lasting effects are felt even today

    Economy as Empire: Dutch Disease and the Decline of Imperial Spain

    No full text

    The Emergence of Wendell Willkie as the 1940 Republican Nominee

    No full text

    The General Smith: Early 19th Century Baltimore and the Supreme Court\u27s Admiralty Jurisdiction

    No full text
    The General Smith is a minor admiralty case that established the homeport lien doctrine, a doctrine that was overturned by federal law over a century ago. The case itself has been mostly forgotten to history, and is but a footnote even to admiralty historians. Yet the story behind the case provides fascinating insight early 19th century Baltimore as a growing hub of trade and commerce in the years immediately after the War of 1812. The story behind the case reveals to us the colorful personalities of Baltimore’s early 19th century maritime merchants and lawyers. Most importantly, it helps to uncover surprising insights into the inner workings of the Supreme Court of the United States and clandestine efforts by the Court\u27s personalities to enlarge the admiralty jurisdiction of the federal courts

    Humanoid Humeral Pointing Kinematics

    No full text
    Humanoid humeral pointing kinematics is implemented in a humanoid robotic shoulder complex consisting of a parallel mechanism as the innermost shoulder girdle and a serial mechanism as the outermost spherical glenohumeral joint. These subsystems operate cooperatively as an offset double pointing system. The humanoid humeral pointing kinematics are also implemented within a passive humanoid shoulder complex

    Humanoid Humeral Pointing Kinematics

    No full text
    Humanoid humeral pointing kinematics is implemented in a humanoid robotic shoulder complex consisting of a parallel mechanism as the innermost shoulder girdle and a serial mechanism as the outermost spherical glenohumeral joint. These subsystems operate cooperatively as an offset double pointing system. The humanoid humeral pointing kinematics are also implemented within a passive humanoid shoulder complex

    Defense against the Black Arts

    Get PDF
    As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It provides hands-on instruction to a host of techniques used to hack into a variety of systems. Exposing hacker methodology with concrete examples, this book shows you how to outwit computer predators at their own game. Among the many things you‘ll learn: How to get into a Windows operating system without having the username or password Vulnerabilities associated with passwords and how to keep them out of the hands of hackers How hackers use the techniques of computer forensic examiners to wreak havoc on individuals and companies Hiding one‘s IP address to avoid detection Manipulating data to and from a web page or application for nefarious reasons How to find virtually anything on the internet How hackers research the targets they plan to attack How network defenders collect traffic across the wire to indentify intrusions Using Metasploit to attack weaknesses in systems that are unpatched or have poorly implemented security measures The book profiles a variety of attack tools and examines how Facebook and other sites can be used to conduct social networking attacks. It also covers techniques utilized by hackers to attack modern operating systems, such as Windows 7, Windows Vista, and Mac OS X. The author explores a number of techniques that hackers can use to exploit physical access, network access, and wireless vectors

    Defense against the Black Arts

    Get PDF
    As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It provides hands-on instruction to a host of techniques used to hack into a variety of systems. Exposing hacker methodology with concrete examples, this book shows you how to outwit computer predators at their own game. Among the many things you‘ll learn: How to get into a Windows operating system without having the username or password Vulnerabilities associated with passwords and how to keep them out of the hands of hackers How hackers use the techniques of computer forensic examiners to wreak havoc on individuals and companies Hiding one‘s IP address to avoid detection Manipulating data to and from a web page or application for nefarious reasons How to find virtually anything on the internet How hackers research the targets they plan to attack How network defenders collect traffic across the wire to indentify intrusions Using Metasploit to attack weaknesses in systems that are unpatched or have poorly implemented security measures The book profiles a variety of attack tools and examines how Facebook and other sites can be used to conduct social networking attacks. It also covers techniques utilized by hackers to attack modern operating systems, such as Windows 7, Windows Vista, and Mac OS X. The author explores a number of techniques that hackers can use to exploit physical access, network access, and wireless vectors
    corecore