LEADER 04966oam 22006974a 450 001 9910466256803321 005 20190115231653.0 010 $a1-4214-2201-8 035 $a(CKB)3710000001353850 035 $a(MiAaPQ)EBC4719449 035 $a(OCoLC)987302262 035 $a(MdBmJHUP)muse56496 035 $a(EXLCZ)993710000001353850 100 $a20161213d2017 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 14$aThe Draining of the Fens$eProjectors, Popular Politics, and State Building in Early Modern England /$fEric H. Ash 210 1$aBaltimore :$cJohns Hopkins University Press,$d2017. 210 3$aBaltimore, Md. :$cProject MUSE, $d2017 210 4$dİ2017. 215 $a1 online resource (415 pages) 225 0 $aJohns Hopkins studies in the history of technology 311 $a1-4214-2200-X 320 $aIncludes bibliographical references and index. 327 $aIntroduction: The Unrecovered Country : Draining the Land, Building the State -- Part I. Popular Politics, Crown Authority, and the Rise of the Projector -- Land and Life in the Pre-Drainage Fens -- State Building in the Fens, 1570-1607 -- The Crisis of Local Governance, 1609-1616 -- The Struggle to Forge Consensus, 1617-1621 -- Part II. Drainage Projects, Violent Resistance, and State Building -- Draining the Hatfield Level, 1625-1636 -- The First Great Level Drainage, 1630-1642 -- Riot, Civil War, and Popular Politics in the Hatfield Level, 1640-1656 -- The Second Great Level drainage, 1649-1656 -- Epilogue: The Once and Future Fens : Unintended Consequences in an Artificial Landscape -- Glossary. 330 2 $a"This book is a political, social, and environmental history of the many attempts to drain the Fens of eastern England during the late sixteenth and seventeenth centuries, both the early failures and the eventual successes. Fen drainage projects were supposed to transform hundreds of thousands of acres of wetlands into dry farmland capable of growing grain and other crops, and also reform the sickly, backward fenland inhabitants into civilized, healthy farmers, to the benefit of the entire commonwealth. Fenlanders, however, viewed the drainage as a grave threat to their local landscape, economy, and way of life. At issue were two different understandings of the Fens, what they were and ought to be; the power to define the Fens in the present was the power to determine their future destiny. The drainage projects, and the many conflicts they incited, illustrate the ways in which politics, economics, and ecological thought intersected at a time when attitudes toward both the natural environment and the commonwealth were shifting. Promoted by the crown, endorsed by agricultural improvement advocates, undertaken by English and Dutch projectors, and opposed by fenland commoners, the drainage of the Fens provides a fascinating locus to study the process of state building in early modern England, and the violent popular resistance it sometimes provoked. In exploring the many challenges the English faced in re-conceiving and re-creating their Fens, this book addresses important themes of environmental, political, economic, social, and technological history, and reveals new dimensions of the evolution of early modern England into a modern, unitary, capitalist state"--$cProvided by publisher. 410 0$aJohns Hopkins studies in the history of technology. 606 $aHISTORY / Renaissance$2bisacsh 606 $aTECHNOLOGY & ENGINEERING / History$2bisacsh 606 $aHISTORY / Europe / Great Britain$2bisacsh 606 $aSCIENCE / History$2bisacsh 606 $aGovernment, Resistance to$zEngland$xHistory 606 $aPolitical development$xSocial aspects$zEngland$xHistory 606 $aReclamation of land$zEngland$zFens, The$xHistory 606 $aDrainage$zEngland$zFens, The$xHistory 607 $aGreat Britain$xPolitics and government$y1603-1649 607 $aGreat Britain$xPolitics and government$y1558-1603 607 $aFens, The (England)$xPolitics and government 607 $aFens, The (England)$xEnvironmental conditions 607 $aFens, The (England)$xHistory$y17th century 607 $aFens, The (England)$xHistory$y16th century 608 $aElectronic books. 615 0$aHISTORY / Renaissance. 615 0$aTECHNOLOGY & ENGINEERING / History. 615 0$aHISTORY / Europe / Great Britain. 615 0$aSCIENCE / History. 615 0$aGovernment, Resistance to$xHistory. 615 0$aPolitical development$xSocial aspects$xHistory. 615 0$aReclamation of land$xHistory. 615 0$aDrainage$xHistory. 676 $a942.6 700 $aAsh$b Eric H.$f1972-$0917435 801 0$bMdBmJHUP 801 1$bMdBmJHUP 906 $aBOOK 912 $a9910466256803321 996 $aThe Draining of the Fens$92057055 997 $aUNINA LEADER 05524nam 22008655 450 001 9910484593003321 005 20251226202310.0 010 $a3-540-70500-7 024 7 $a10.1007/978-3-540-70500-0 035 $a(CKB)1000000000440814 035 $a(SSID)ssj0000318278 035 $a(PQKBManifestationID)11283551 035 $a(PQKBTitleCode)TC0000318278 035 $a(PQKBWorkID)10310218 035 $a(PQKB)10418898 035 $a(DE-He213)978-3-540-70500-0 035 $a(MiAaPQ)EBC3068679 035 $a(PPN)127051996 035 $a(EXLCZ)991000000000440814 100 $a20100301d2008 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aInformation Security and Privacy $e13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings /$fedited by Yi Mu, Willy Susilo, Jennifer Seberry 205 $a1st ed. 2008. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2008. 215 $a1 online resource (XIII, 480 p.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v5107 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-540-69971-6 320 $aIncludes bibliographical references and index. 327 $aNew Paradigms for Password Security -- Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy -- Secure Biometric Authentication with Improved Accuracy -- A Critical Analysis and Improvement of AACS Drive-Host Authentication -- Comparing the Pre- and Post-specified Peer Models for Key Agreement -- Efficient One-Round Key Exchange in the Standard Model -- On the Improvement of the BDF Attack on LSBS-RSA -- Public-Key Cryptosystems with Primitive Power Roots of Unity -- Relationship between Two Approaches for Defining the Standard Model PA-ness -- Distributed Verification of Mixing - Local Forking Proofs Model -- Fully-Simulatable Oblivious Set Transfer -- Efficient Disjointness Tests for Private Datasets -- Efficient Perfectly Reliable and Secure Message Transmission Tolerating Mobile Adversary -- Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers -- Multidimensional Linear Cryptanalysis of Reduced Round Serpent -- Cryptanalysis of Reduced-Round SMS4 Block Cipher -- On the Unprovable Security of 2-Key XCBC -- Looking Back at a New Hash Function -- Non-linear Reduced Round Attacks against SHA-2 Hash Family -- Collisions for Round-Reduced LAKE -- Preimage Attacks on Step-Reduced MD5 -- Linear Distinguishing Attack on Shannon -- Recovering RC4 Permutation from 2048 Keystream Bytes if j Is Stuck -- Related-Key Chosen IV Attacks on Grain-v1 and Grain-128 -- Signature Generation and Detection of Malware Families -- Reducing Payload Scans for Attack Signature Matching Using Rule Classification -- Implicit Detection of Hidden Processes with a Feather-Weight Hardware-Assisted Virtual Machine Monitor -- FormatShield: A Binary Rewriting Defense against Format String Attacks -- Advanced Permission-Role Relationship in Role-Based Access Control -- Enhancing Micro-Aggregation Technique by Utilizing Dependence-Based Information in Secure Statistical Databases -- Montgomery Residue Representation Fault-Tolerant Computation in GF(2 k ) -- A Tree-Based Approach for Computing Double-Base Chains -- Extractors for Jacobians of Binary Genus-2 Hyperelliptic Curves -- Efficient Modular Arithmetic in Adapted Modular Number System Using Lagrange Representation. 330 $aThis book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP 2008, held in Wollongong, Australia, in July 2008. The 33 revised full papers presented were carefully reviewed and selected from 111 submissions. The papers cover a range of topics in information security, including authentication, key management, public key cryptography, privacy, anonymity, secure communication, ciphers, network security, elliptic curves, hash functions, and database security. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v5107 606 $aCryptography 606 $aData encryption (Computer science) 606 $aElectronic data processing$xManagement 606 $aData protection 606 $aComputer networks 606 $aCoding theory 606 $aInformation theory 606 $aAlgorithms 606 $aCryptology 606 $aIT Operations 606 $aData and Information Security 606 $aComputer Communication Networks 606 $aCoding and Information Theory 606 $aAlgorithms 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aElectronic data processing$xManagement. 615 0$aData protection. 615 0$aComputer networks. 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aAlgorithms. 615 14$aCryptology. 615 24$aIT Operations. 615 24$aData and Information Security. 615 24$aComputer Communication Networks. 615 24$aCoding and Information Theory. 615 24$aAlgorithms. 676 $a005.82 701 $aMu$b Yi$01759813 701 $aSusilo$b Willy$01759814 701 $aSeberry$b Jennifer$056913 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484593003321 996 $aInformation security and privacy$94198467 997 $aUNINA