We live in a world transformed by scientific discovery. Yet today, science and its practitioners have come under political attack. In this fascinating history spanning continents and centuries, historian David Wootton offers a lively defense of science, revealing why the Scientific Revolution was truly the greatest event in our history.
The Invention of Science goes back five hundred years in time to chronicle this crucial transformation, exploring the factors that led to its birth and the people who made it happen. Wootton argues that the Scientific Revolution was actually five separate yet concurrent events that developed independently, but came to intersect and create a new worldview. Here are the brilliant iconoclasts—Galileo, Copernicus, Brahe, Newton, and many more curious minds from across Europe—whose studies of the natural world challenged centuries of religious orthodoxy and ingrained superstition.
From gunpowder technology, the discovery of the new world, movable type printing, perspective painting, and the telescope to the practice of conducting experiments, the laws of nature, and the concept of the fact, Wotton shows how these discoveries codified into a social construct and a system of knowledge. Ultimately, he makes clear the link between scientific discovery and the rise of industrialization—and the birth of the modern world we know.
Aldous Huxley's "brilliant" (Los Angeles Times) and gripping account of one of the strangest occurrences in history, hailed as the "peak achievement of Huxley’s career" by the New York Times
In 1632 an entire convent in the small French village of Loudun was apparently possessed by the devil. After a sensational and celebrated trial, the convent's charismatic priest Urban Grandier—accused of spiritually and sexually seducing the nuns in his charge—was convicted of being in league with Satan. Then he was burned at the stake for witchcraft.
A remarkable true story of religious and sexual obsession, The Devils of Loudon is considered by many to be Aldous Huxley's nonfiction masterpiece.
Peter Wilson's book is a major work, the first new history of the war in a generation, and a fascinating, brilliantly written attempt to explain a compelling series of events. Wilson's great strength is in allowing the reader to understand the tragedy of mixed motives that allowed rulers to gamble their countries' future with such horrifying results. The principal actors in the drama (Wallenstein, Ferdinand II, Gustavus Adolphus, Richelieu) are all here, but so is the experience of the ordinary soldiers and civilians, desperately trying to stay alive under impossible circumstances.
The extraordinary narrative of the war haunted Europe's leaders into the twentieth century (comparisons with 1939-45 were entirely appropriate) and modern Europe cannot be understood without reference to this dreadful conflict.
The book includes general discussions of the Russian soldier, the Russian officer and the rapacious Cossacks, and concludes by identifying certain important continuities between the Russian past and present.
If you are a security professional or researcher, with knowledge of different operating systems and a conceptual idea of penetration testing, and you would like to grow your knowledge in Python, then this book is ideal for you.What You Will LearnFamiliarise yourself with the generation of Metasploit resource filesUse the Metasploit Remote Procedure Call (MSFRPC) to automate exploit generation and executionUse Python's Scapy, network, socket, office, Nmap libraries, and custom modulesParse Microsoft Office spreadsheets and eXtensible Markup Language (XML) data filesWrite buffer overflows and reverse Metasploit modules to expand capabilitiesExploit Remote File Inclusion (RFI) to gain administrative access to systems with Python and other scripting languagesCrack an organization's Internet perimeterChain exploits to gain deeper access to an organization's resourcesInteract with web services with PythonIn Detail
Python is a powerful new-age scripting platform that allows you to build exploits, evaluate services, automate, and link solutions with ease. Python is a multi-paradigm programming language well suited to both object-oriented application development as well as functional design patterns. Because of the power and flexibility offered by it, Python has become one of the most popular languages used for penetration testing.
This book highlights how you can evaluate an organization methodically and realistically. Specific tradecraft and techniques are covered that show you exactly when and where industry tools can and should be used and when Python fits a need that proprietary and open source solutions do not.
Initial methodology, and Python fundamentals are established and then built on. Specific examples are created with vulnerable system images, which are available to the community to test scripts, techniques, and exploits. This book walks you through real-world penetration testing challenges and how Python can help.
From start to finish, the book takes you through how to create Python scripts that meet relative needs that can be adapted to particular situations. As chapters progress, the script examples explain new concepts to enhance your foundational knowledge, culminating with you being able to build multi-threaded security tools, link security tools together, automate reports, create custom exploits, and expand Metasploit modules.Style and approach
This book is a practical guide that will help you become better penetration testers and/or Python security tool developers. Each chapter builds on concepts and tradecraft using detailed examples in test environments that you can simulate.
If you are a Python programmer or a security researcher who has basic knowledge of Python programming and wants to learn about penetration testing with the help of Python, this course is ideal for you. Even if you are new to the field of ethical hacking, this course can help you find the vulnerabilities in your system so that you are ready to tackle any kind of attack or intrusion.What You Will LearnFamiliarize yourself with the generation of Metasploit resource files and use the Metasploit Remote Procedure Call to automate exploit generation and executionExploit the Remote File Inclusion to gain administrative access to systems with Python and other scripting languagesCrack an organization's Internet perimeter and chain exploits to gain deeper access to an organization's resourcesExplore wireless traffic with the help of various programs and perform wireless attacks with Python programsGather passive information from a website using automated scripts and perform XSS, SQL injection, and parameter tampering attacksDevelop complicated header-based attacks through PythonIn Detail
Cybercriminals are always one step ahead, when it comes to tools and techniques. This means you need to use the same tools and adopt the same mindset to properly secure your software. This course shows you how to do just that, demonstrating how effective Python can be for powerful pentesting that keeps your software safe. Comprising of three key modules, follow each one to push your Python and security skills to the next level.
In the first module, we'll show you how to get to grips with the fundamentals. This means you'll quickly find out how to tackle some of the common challenges facing pentesters using custom Python tools designed specifically for your needs. You'll also learn what tools to use and when, giving you complete confidence when deploying your pentester tools to combat any potential threat.
In the next module you'll begin hacking into the application layer. Covering everything from parameter tampering, DDoS, XXS and SQL injection, it will build on the knowledge and skills you learned in the first module to make you an even more fluent security expert.
Finally in the third module, you'll find more than 60 Python pentesting recipes. We think this will soon become your trusted resource for any pentesting situation.
This Learning Path combines some of the best that Packt has to offer in one complete, curated package. It includes content from the following Packt products:Learning Penetration Testing with Python by Christopher DuffyPython Penetration Testing Essentials by MohitPython Web Penetration Testing Cookbook by Cameron Buchanan,Terry Ip, Andrew Mabbitt, Benjamin May and Dave MoundStyle and approach
This course provides a quick access to powerful, modern tools, and customizable scripts to kick-start the creation of your own Python web penetration testing toolbox.
In December 1667, maverick physician Jean Denis transfused calf’s blood into one of Paris’s most notorious madmen. Days later, the madman was dead and Denis was framed for murder. A riveting exposé of the fierce debates, deadly politics, and cutthroat rivalries behind the first transfusion experiments, Blood Work takes us from dissection rooms in palaces to the streets of Paris, providing an unforgettable portrait of an era that wrestled with the same questions about morality and experimentation that haunt medical science today.
Ackroyd paints a vivid portrait of James I and his heirs. Shrewd and opinionated, the new King was eloquent on matters as diverse as theology, witchcraft and the abuses of tobacco, but his attitude to the English parliament sowed the seeds of the division that would split the country in the reign of his hapless heir, Charles I. Ackroyd offers a brilliant – warts and all – portrayal of Charles's nemesis Oliver Cromwell, Parliament's great military leader and England's only dictator, who began his career as a political liberator but ended it as much of a despot as 'that man of blood', the king he executed.
England's turbulent seventeenth century is vividly laid out before us, but so too is the cultural and social life of the period, notable for its extraordinarily rich literature, including Shakespeare's late masterpieces, Jacobean tragedy, the poetry of John Donne and Milton and Thomas Hobbes' great philosophical treatise, Leviathan. Civil War also gives us a very real sense of the lives of ordinary English men and women, lived out against a backdrop of constant disruption and uncertainty.
Although hints of a crisis appeared as early as the 1570s, the temperature by the end of the sixteenth century plummeted so drastically that Mediterranean harbors were covered with ice, birds literally dropped out of the sky, and “frost fairs” were erected on a frozen Thames—with kiosks, taverns, and even brothels that become a semi-permanent part of the city.
Recounting the deep legacy and far-ranging consequences of this “Little Ice Age,” acclaimed historian Philipp Blom reveals how the European landscape had suddenly, but ineradicably, changed by the mid-seventeenth century. While apocalyptic weather patterns destroyed entire harvests and incited mass migrations, they gave rise to the growth of European cities, the emergence of early capitalism, and the vigorous stirrings of the Enlightenment. A timely examination of how a society responds to profound and unexpected change, Nature’s Mutiny will transform the way we think about climate change in the twenty-first century and beyond.
This book presents a selection of contemporaries’ accounts of the king’s trial and their reactions to it, as well as a report of the trial of the king’s own judges once the wheel of fortune turned and monarchy was restored. It uses the words of people directly involved to offer insight into the causes and consequences of these momentous events.
It gives a fresh portrayal of Henry VIII, cutting away the misleading mythology that surrounds him in order to provide a vivid account of this passionate, wilful, intelligent and destructive king. This compelling biography will be essential reading for all early modern students.
Now fully integrated with Brian Levack’s The Witchcraft Sourcebook, there are links to the sourcebook throughout the text, pointing students towards key primary sources to aid them in their studies. The two books are drawn together on a new companion website with supplementary materials for those wishing to advance their studies, including an extensive guide to further reading, a chronology of the history of witchcraft and an interactive map to show the geographical spread of witch-hunts and witch trials across Europe and North America.
A long-standing favourite with students and lecturers alike, this new edition of The Witch-Hunt in Early Modern Europe will be essential reading for those embarking on or looking to advance their studies of the history of witchcraft
Using the stories of ordinary people, Block illustrates how engaging with the powerful rhetoric and rituals of Christianity was central to survival. Isobel Criolla was a runaway slave in Cartagena who successfully lobbied the Spanish governor not to return her to an abusive mistress. Nicolas Burundel was a French Calvinist who served as henchman to the Spanish governor of Jamaica before his arrest by the Inquisition for heresy. Henry Whistler was an English sailor sent to the Caribbean under Oliver Cromwell's plan for holy war against Catholic Spain. Yaff and Nell were slaves who served a Quaker plantation owner, Lewis Morris, in Barbados. Seen from their on-the-ground perspective, the development of modern capitalism, race, and Christianity emerges as a story of negotiation, contingency, humanity, and the quest for community.
Ordinary Lives in the Early Caribbean works in both a comparative and an integrative Atlantic world frame, drawing on archival sources from Spain, England, Barbados, Colombia, and the United States. It pushes the boundaries of how historians read silences in the archive, asking difficult questions about how self-censorship, anxiety, and shame have shaped the historical record. The book also encourages readers to expand their concept of religious history beyond a focus on theology, ideals, and pious exemplars to examine the communal efforts of pirates, smugglers, slaves, and adventurers who together shaped the Caribbean's emerging moral economy.
These criminal cases reveal the fascinating complexities of early modern English society. The vivid depictions of these stories were used by the English church and state to describe the proper boundaries of behaviour, and the dangers that could result from the sins of avarice, apathy, vice or violence. Readers will learn about the public interest and involvement in crime and punishment and the way the criminal justice system was used to correct and deter criminal activity and restore social boundaries such as rank, gender, family, religion, and physical boundaries of person and property.
Perfect for the student reader, this collection provides guided access to these exciting sources. Each transcription is modernized and annotated and is preceded by a brief discussion of key historical context and themes. Including an introductory essay on the topic of the English criminal justice system in the early modern period, as well as a glossary of key terms in English criminal law, this is an ideal introduction for students of crime and criminal justice in England.