Blog Smith

Blog Smith is inspired by the myth of Hephaestus in the creation of blacksmith-like, forged materials: ideas. This blog analyzes topics that interest me: IT, politics, technology, history, education, music, and the history of religions.

Wednesday, January 31, 2018

Islamist Auto Attack in Philadelphia

/police-phllly-terror-not

philadelphia-islamic-terror

Cupcake Harvard

Cupcake

Tariq Ramadan Rape

France:-Leading-Islamic-scholar-in-custody-amid-rape-claims

Tuesday, January 30, 2018

Monday, January 29, 2018

Sunday, January 28, 2018

Bach's Children

Toccata and Fugue in D Minor ( Rock Version ) - Tom Bergner

https://m.youtube.com/watch?v=X1djEjSeCEg

Emerson, Lake & Palmer-Toccata (California Jam 1974, remastered by RudenkoArt)

https://m.youtube.com/watch?v=X1djEjSeCEg


Nationalizing 5G

trump-team-debates-nationalizing-5g-network

Part Muslim Duterte 42 Virgins

42 virgins

Boomerang Employees

/linkedin-vp-explains-why-boomerang-employees-are-becoming-the-new-normal-2016-10

Friday, January 26, 2018

HUM 112 REL 212 1979 Islamic Revolution Iran Protest 2018 & Hijabs

01/sick-hijab-sharia-law-sharia-police

President, Netanyahu at Davos

01/trump-netanyahu-davos

Obama Ordered Spying on Candidate Trump

proof-british-intelligence-spied-on-donald-trump-at-the-direct-request-of-president-barack-obama-and-a-later-renewed-request-by-susan-rice

Rod’s Podcast USciences eLearning

-usciences-elearning-30

FBI Mueller Cover Up of Florida Saudis on 9/11

/fbi-director-mueller-helped-cover-florida-9-11-probe-court-documents-say

Viking Myths

Vikings

Thursday, January 25, 2018

Wednesday, January 24, 2018

Instructional Design


Module References & Attributions

Supplementary Resources

Leftist Professor Fights Left


'DEPLORABLE' PROFESSOR FIGHTS BACK AGAINST CAMPUS TOTALITARIANS
An interview with the "Anti-PC NYU Prof." 


January 22, 2018 
Mark Tapson 

"In the fall of 2016," New York University professor Michael Rectenwald recently Click told The Daily Caller, "I was noting an increase of this social justice ideology on campuses, and it started to really alarm me. I saw it coming home to roost here at NYU, with the creation of the bias reporting hotline, and with the cancellation of the Milo Yiannopoulos talk because someone might walk past it and hear something which might 'trigger' them."  

Rectenwald, himself a leftist, created an initially anonymous Twitter account, @antipcnyuprof, to speak out against that ideology and the "absolutely anti-education and anti-intellectual" classroom indoctrination he was witnessing, as well as the collectivist surveillance state that the campus was becoming, as students were urged to report each other for the sin of committing microaggressions. 

In October of that year, he outed himself as the man behind the controversial Twitter account, and "all hell broke loose." He swiftly found himself the target of shunning and harassment from his colleagues and the NYU administration. In true Cultural Revolution fashion, several colleagues in his department in the Liberal Studies Diversity, Equity and Inclusion Working Group published an open letter declaring him guilty of incorrect thinking. "The thing that is interesting here is that they were saying that because I don't think like them, I am sick and mentally ill," Rectenwald said to the Daily Caller.  

Instead of kowtowing to the campus totalitarians, Rectenwald declared himself done with the Left in a February 2017 tweet ("The Left has utterly and completely lost its way and I no longer want anything to do with it.") and has gone on to become an even more fervent defender of free speech and academic freedom. He has appeared often in conservative media to discuss those issues and the harassment he has received from the Left. 



Recently Rectenwald even filed a lawsuit against NYU and four of his colleagues for defamation. He consented to answering some questions for FrontPage Mag about his conflict with the NYU ideologues.  

Mark Tapson: A year ago on Twitter you wrote, "Goodbye to the Left, goodbye." Can you describe your intellectual journey from "left-liberal activist" to outspoken "deplorable" and what drove that seemingly sudden transition? 

Michael Rectenwald: In hindsight, I think that the transition was less sudden than it might have appeared. I had gone from a left-liberal activist to a left communist before I became "deplorable." I narrate the history of the transition in my book, discussed below. But I'll tell something of the transition here.  

My public criticisms of "social justice" ideology and politically correct authoritarianism resonated with large swaths of the political right. I gained a sizeable new audience and support network — through Twitter, Facebook and via hundreds of supportive emails. I also drew backing from "cultural libertarians," as Paul Joseph Watson dubbed this newly-emergent "counterculture." It should come as no surprise that many Trumpists backed me, especially given Trump's regular (although non-specific) criticisms of political correctness.  

Criticism of political correctness was supposed to be the exclusive province of the rightwing. For most observers, it was almost inconceivable that an anti-P.C. critic could come from another political quarter. Unsurprisingly, then, the majority of people who discovered my case, including some reporters, simply assumed that I was a conservative. As one Twitter troll put it: "You're anti-P.C.? You must be a rightwing nut-job." But as I explained in numerous interviews and essays, I was not a Trump supporter; I was never a right-winger, or an alt-right-winger; I was never a conservative of any variety. I wasn't even a classical John Stuart Mill liberal.  

In fact, for several years, I had identified as a left or libertarian communist. My politics were to the left (and considerably critical of the authoritarianism) of Bolshevism! I published essays in socialist journals on several topics, including a Marxist critique of postmodern theory, analyses of identity politics and intersectionality theory (here and here), analyses of political economy (here and here), and an examination of the prospects for socialism in the context of transhumanism. I became a respected Marxist thinker and essayist. I had flirted with a Trotskyist sect, and later became affiliated with a loosely organized left or libertarian communist group.  

It wasn't only strangers who mistook me for rightwing or conservative. So too did many who knew better. An anti-Trump mania and reactionary fervor now gripped liberals and leftists of nearly all stripes. Previously unaffiliated and warring left and liberal factions consolidated and circled the wagons. Anyone who failed to signal complete fidelity to "the resistance" risked being savaged.  

After my appearance on Fox Business News, such rabid ideologues ambushed me. The social-justice-sympathetic members of the left communist group to which I belonged denounced me in a series of group emails. Several members conducted a preposterous cyber show-trial, bringing charges against me and calling for votes on a number of alleged transgressions. From what I could tell, my worst offences included appearing on Fox News, sounding remotely like a member of an opposing political tribe, receiving positive coverage in right-leaning media, and criticizing leftist milieus just as Trump became President.  

I denied that these self-appointed judges held any moral authority over me and declared their arbitrations null and void. Meanwhile, the elders of the group (one a supposed friend of mine) had remained silent, allowing the abuse to go on unabated for a day. When the elders finally chimed in, they called for my official expulsion. I told them not to bother as I wanted nothing further to do with them; I quit. In their collectivist zeal, they later stripped my name from three essays that I'd written for publication on their website, and assigned their authorship to someone else entirely. Upon discovering this fraudulence, I publicly berated them for plagiarism. A prominent member of the American Association of University Professors noticed my complaint and investigated the alleged breach of intellectual integrity. Verifying my authorship of the essays, he condemned the group's actions in a popular blog. Only then did the benevolent dictators return my name to the essays' mastheads.  

Friends and acquaintances from other communities also turned on me with a vengeance, joining in the groupthink repudiation. After my appearance on "The O'Reilly Factor" on Fox News, the Twitter attack was so fierce, vitriolic, and sustained that my associate Lori Price and I spent a whole night blocking and muting tweeters.  

But the worst banishment came from the NYU Liberal Studies community — to which I had contributed a great deal, and of which I had striven for years to be a well-regarded member. Soon after the open letter appeared, I recognized a virtual universal shunning by my faculty colleagues. One after another, colleagues unfriended and blocked me on Facebook. The few that didn't simply avoided me entirely, until I saved them the trouble and unfriended them. Most stinging were the betrayals of those who once relied on my generosity, some whose careers I had supported and considerably advanced.  

Despite the harsh treatment doled out to me by the social justice left and the warm reception I received from the right, I did not become a right-winger, or a conservative. But after the social-justice-infiltrated left showed me its gnarly fangs and drove me out, I could no longer identify as a leftist.  

MT:  As a staunch First Amendment defender, do you think it is possible to reverse the culture of politically correct totalitarianism that seems to be dominating academia today, and how can we do that? 

MR: It is possible but reversing a forty-year trend that has finally resulted in what we have today — the complete takeover of academic pedagogy, philosophy, and policy by "social justice" ideology — will take a long, sustained effort, and the support of elements of the culture outside of academe, including media pundits, writers, independent scholars, public intellectuals, and a growing body of disaffected and vocal academic apostates and other renegades willing to take risks — as Bret Weinstein, Jordan Peterson, and others, including myself, have done. The way will be treacherous because the "social justice" left controls academic departments and administrations almost entirely, and everyone else within academia has been cowed into submission for fear of being "called out" as well. We are dealing with a Maoist-like Red Guard as we undergo a soft cultural revolution of our own. David Horowitz has been right all this time about the communists lurking in academia. Their impact has now been manifested through the "social justice" movement.  

I put "social justice" in scare quotes because this term is a misnomer if there ever was one. Although the movement trades on a euphemistic name and the good will that movements that have gone by the same name have earned, including the Civil Rights movement, contemporary "social justice" has nothing to do with justice and is anything but benevolent. It is a movement based on postmodernist theoretical notions and as I have pointed out (here and here), the postmodern adoption of Stalinist and Maoist disciplinary mechanisms, such as "autocritique" and "struggle sessions." It is totalitarian through and through. We must learn from and employ the tactics that served to defeat totalitarian leftism in the past.  

MT: Apart from personal vindication, of course, is there some larger objective you are hoping to accomplish through this defamation lawsuit against NYU? 

MR: I want to make clear that social justice activists cannot get away with replacing the First Amendment with their own speech codes. They are not the official arbiters of acceptable speech, despite their self-arrogation as such.  

The First Amendment does not protect all speech. It does not, for example, protect speech that leads to illegal activity and/or imminent violence. It does not protect defamation, slander, or libel. The First Amendment does not protect speakers from liability for the foreseeable consequences of their speech.  

The "social justice" leftists are now claiming that I am a hypocrite because I am suing over insults, and that I am seeking a safe space of my own. But they apparently do not understand the difference between an incidental differing of opinion, an insult, and the real damages of defamation. I never claimed to be a free speech absolutist. And my own exercise of free speech and so-called academic freedom amounted to criticism of the "social justice" ideology and the mechanisms prevalent in academia and beyond. I never once mentioned any individuals by name. I never once engaged in ad hominem argumentation.  

My attackers, however, showed no such restraint. In fact, they maliciously and mendaciously attacked me using official university email list servs, with the explicit aim of damaging my professional reputation and destroying my career.  

Meanwhile, irony, contradiction, and hypocrisy are all on their side. Based on the postmodern theoretical notion of "social and linguistic constructivism," the "social justice" left deems language use a material act. Thus, they excuse shutting down speech they disapprove of, "by any means necessary." Yet "social justice" leftists actually have no problem with truly damaging language use — as long as it's being undertaken by them, that is. While Antifa, the "social justice" extracurricular infantry, burns down campuses to prevent the airing of "dangerous" speech, the "social justice" leftists seek safe spaces — not as protection from the violence of their compeers, but from the so-called "discursive violence" of non-PC-left speakers. Yet "social justice" ideologues undertake the most virulent forms of libel and defamation when dealing with speakers who express views at variance with their own.  

Ironically, precisely while calling me a "racist," "sexist," "bully," and "Satan," I was bullied, abused and pelted with racist, sexist and other remarks that denigrated me on the basis of my race and sex or gender. The irony, double standard and hypocrisy are astounding. If the reverse had been the case, all hell would have broken loose. The defendants apparently thought that individual rights are not real and that because I am of a certain category they could make such statements with impunity. But the law doesn't agree. 

So, while this suit is not merely symbolic — I have actually suffered from defamation, from malicious and mendacious speech intended to destroy me professionally and otherwise — it is also meant as a symbolic case in point, as an example to demonstrate the intent and scope of the First Amendment, which differs markedly from "social justice" speech rules. The main "social justice" speech rule is this: "social justice" leftists can say (and do) whatever they want to say (and do). And they can shut down whatever they don't want said (or done) — "by any means possible." The only problem is that they are legally wrong.  

MT: You have a new book in the works about the postmodern roots of social justice ideology. Can you tell us a little about that and when we can expect it? 

MR: The book is a memoir whose central argument is that the contemporary "social justice" creed and movement is the child of postmodern theory, while also incorporating some of the methods of Stalinism and Maoism. Just as postmodern theory lay dying in the academy, it gave birth to a child: "social justice" ideology.  

I demonstrate the genealogy of "social justice" by recalling and retracing my own graduate education in Critical Theory (The Frankfurt School) and postmodern theory (deconstruction, poststructuralism, Lacanian psychoanalytic theory, third-wave feminist theory, Science Studies, gender and transgender theory, and so on). The book explains just how social justice derives from postmodern theoretical notions and how and why these notions are not only philosophically wrong but also extremely pernicious. I recall my own indoctrination into these schools of thought, as well my emergence from them. The book is 95% complete, so hopefully it will appear in matter of a few months. The tentative (and hopefully final) title is Springtime for Snowflakes: 'Social Justice' and Its Postmodern Parent. (I am currently on the market for a new publisher.)  

MT:  With a title like Springtime for Snowflakes, it's bound to be a great read. Thanks, Professor Rectenwald, and congratulations on your escape from the dark side into the light! 

Tuesday, January 23, 2018

Fourth Amendment and Section 702



"The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized."

Section 702 of the Foreign Intelligence Surveillance Act Amendments of 2008 (FAA) authorizes the government to seize and search the international communications of American citizens without probable cause or warrants in violation of the Fourth Amendment. Some thought that it should not be extended beyond December 31, 2017, its expiration date, unless Congress cured its constitutional infirmity.

It was not. 

Members of Congress are bound by oath or affirmation to uphold and defend the Constitution period; no commas, semicolons, or question marks. The murderous abominations of the 9/11 terror attacks changed nothing on that score.

The Supreme Court admonished in Ex Parte Milligan:

The Constitution of the United States is a law for rulers and people, equally in war and in peace, and covers with the shield of its protection all classes of men, at all times and under all circumstances. No doctrine involving more pernicious consequences was ever invented by the wit of man than that any of its provisions can be suspended during any of the great exigencies of government. Such a doctrine leads directly to anarchy or despotism…

As a cornerstone of our liberty-centered constitutional universe, the Fourth Amendment makes citizen privacy the rule and government encroachments the exception. Warrants issued by neutral magistrates based upon probable cause with particularized evidence that crime is afoot are ordinarily required to justify government invasions of privacy.

In the narrow circumstances that excuse warrants, a government search or seizure must still satisfy a standard of reasonableness.

Justice Louis D. Brandeis elaborated in Olmstead v. United States (dissenting):

The makers of our Constitution…sought to protect Americans in their beliefs, their thoughts, their emotions and their sensations. They conferred, as against the Government, the right to be let alone — the most comprehensive of rights, and the right most valued by civilized men. To protect that right, every unjustifiable intrusion by the Government upon the privacy of the individual, whatever the means employed, must be deemed a violation of the Fourth Amendment.

The American Revolution was ignited by opposition to hated British Writs of Assistance, general search warrants that empowered every petty colonial official to rummage through homes or businesses in search of smuggled goods. 

An address by William Pitt the Elder to the British Parliament thundered throughout the colonies, and epitomized the spirit of the Amendment:

The poorest man may in his cottage bid defiance to all the forces of the Crown. It may be frail, its roof may shake; the wind may blow through it; the storms may enter, the rain may enter, —but the King of England cannot enter; all his forces dare not cross the threshold of the ruined tenement.

Speaking through Justice Antonin Scalia, the Supreme Court decreed in Kyllo v. United States that the Fourth Amendment today should be interpreted should be adapted to secure “that degree of privacy against government that existed when the Fourth Amendment was adopted” notwithstanding staggering advances in technology. 

At that time, government encroachments on privacy were minimal. Federal criminal laws were few. Investigations were minimal. And no intelligence community existed to snoop on Americans to gather foreign intelligence.

Section 702 authorizes invasions of citizen privacy orders of magnitude beyond the degree of privacy that existed when the Fourth Amendment was ratified in 1791. It empowers the National Security Agency singly or in conjunction with sister intelligence agencies to intercept, store and search the international communications of U.S. persons with a targeted communicant reasonably thought to be located outside the United States and in possession of foreign intelligence information.

The Foreign Intelligence Surveillance Court (FISC) does not review each discrete NSA interception to insure the target is a foreigner outside the United States or that the communications intercepted relate to foreign intelligence, including international terrorism. 

Instead, the FISC simply approves annually surveillance procedures that the Attorney General and Director of National Intelligence certify are calculated to target only foreigners located abroad for foreign intelligence purposes. 

The latter is broadly defined to include any information that relates to the foreign affairs of the United States.

The government has employed section 702 to collect more than 250 million internet transactions annually as of 2011, which includes communications between two foreigners as well as those involving a U.S. person. 

According to an affidavit of Bill Binney, former high-level NSA official and perhaps the foremost expert in the world on electronic surveillance:

When I was at the NSA, each analyst was theoretically required to review 40,000 to 50,000 questionable records each day. The analyst gets overwhelmed, and the actual known targets — from the metadata analysis — get ignored…The NSA cannot identify future terrorism because 99.9999% of what it collects and analyzes is foreseeably irrelevant.

The intelligence community is clueless as to how many of the 250 million annual internet warrantless interceptions under section 702 involve the international communications of U.S. persons. 

But the Fourth Amendment vice does not cease after the seizures. The communications are typically stored for at least five years and searched without warrants or probable cause for either to discover foreign intelligence or evidence of crime— a second Fourth Amendment transgression.

Supreme Court decisions establish that the government must obtain a warrant that satisfies the Fourth Amendment to intercept or search the contents of communications of U.S. persons for either criminal justice or domestic security purposes. The high court has not approved an exception when the communications are seized and searched pursuant to section 702 for law enforcement or foreign intelligence purposes.

Title III wiretap orders under the Omnibus Crime Control Act are vastly less intrusive on privacy. They require a warrant that satisfies the Fourth Amendment by specifying the phone line to be tapped, the conversations to be seized, and the crime under investigation. 

Moreover, reasonable measures must be taken by the government to avoid recording “innocent” conversations. And the targets of the warrants and their communicants are typically notified of the wiretap within 90 days of its termination to enable them to challenge its legality.

In contrast, surveillance under section 702 does not require a warrant. It does not require probable cause. It does not require suspicion of criminality. It is not confined to communications involving only foreign powers or their agents. There is no mechanism for monitoring the seizure of the communications to exclude those portions irrelevant to foreign intelligence. And the communicants whose conversations are intercepted, stored, and searched are not notified of the invasions of privacy unless they are lead to a criminal prosecution.

In the vast majority of cases, U.S. persons will never learn that the privacy of their international communications had been compromised.

Even if no warrant were required under the Fourth Amendment for the seizure, storage and search of the international communications of U.S. persons under section 702, it would still fail the reasonableness test.

While the government interest in national security is of the highest order, Section 702 sweeps far more broadly to include anything relevant to the foreign policy of the United States, for example, the emission of greenhouse gases or free trade agreements. 

It also authorizes searches of citizen communications for crimes unrelated to national security and not based on probable cause. And as Bill Binney’s affidavit underscored, the stupendous volume of communications capture by section 702 cripples the NSA’s ability to separate the wheat from the chaff.

Proponents of extending Section 702 argue that government officials have refrained from using its alarming powers to oppress U.S. persons. But as Thomas Jefferson advised, “In questions of power, then, let no more be heard of confidence in man, but bind him down from mischief by the chains of the Constitution.”

Moreover, Justice Brandeis correctly taught that, “every unjustifiable intrusion by the Government upon the privacy of the individual, whatever the means employed, must be deemed a violation of the Fourth Amendment.”

In sum, Section 702 should not be extended unless it requires a warrant to seize or search international communications of U.S. persons based upon probable cause to believe they contain evidence of international terrorism and with particularity describe the means of seizing or searching the communications. Further, U.S. persons should be notified within 90 days of any interception or search.

The Fourth Amendment is too important to be left to the intelligence community.

Total Pageviews

Popular Posts

FEEDJIT Live Traffic Feed/Site Meter

FEEDJIT Live Traffic Map

Where From?

site statistics

Search This Blog

Reading since summer 2006 (some of the classics are re-reads): including magazine subscriptions

  • Abbot, Edwin A., Flatland;
  • Accelerate: Technology Driving Business Performance;
  • ACM Queue: Architecting Tomorrow's Computing;
  • Adkins, Lesley and Roy A. Adkins, Handbook to Life in Ancient Rome;
  • Ali, Ayaan Hirsi, Nomad: From Islam to America: A Personal Journey Through the Clash of Civilizations;
  • Ali, Tariq, The Clash of Fundamentalisms: Crusades, Jihads, and Modernity;
  • Allawi, Ali A., The Crisis of Islamic Civilization;
  • Alperovitz, Gar, The Decision To Use the Atomic Bomb;
  • American School & University: Shaping Facilities & Business Decisions;
  • Angelich, Jane, What's a Mother (in-Law) to Do?: 5 Essential Steps to Building a Loving Relationship with Your Son's New Wife;
  • Arad, Yitzchak, In the Shadow of the Red Banner: Soviet Jews in the War Against Nazi Germany;
  • Aristotle, Athenian Constitution. Eudemian Ethics. Virtues and Vices. (Loeb Classical Library No. 285);
  • Aristotle, Metaphysics: Books X-XIV, Oeconomica, Magna Moralia (The Loeb classical library);
  • Armstrong, Karen, A History of God;
  • Arrian: Anabasis of Alexander, Books I-IV (Loeb Classical Library No. 236);
  • Atkinson, Rick, The Guns at Last Light: The War in Western Europe, 1944-1945 (Liberation Trilogy);
  • Auletta, Ken, Googled: The End of the World As We Know It;
  • Austen, Jane, Pride and Prejudice;
  • Bacevich, Andrew, The Limits of Power: The End of American Exceptionalism;
  • Baker, James A. III, and Lee H. Hamilton, The Iraq Study Group Report: The Way Forward - A New Approach;
  • Barber, Benjamin R., Jihad vs. McWorld: Terrorism's Challenge to Democracy;
  • Barnett, Thomas P.M., Blueprint for Action: A Future Worth Creating;
  • Barnett, Thomas P.M., The Pentagon's New Map: War and Peace in the Twenty-First Century;
  • Barron, Robert, Catholicism: A Journey to the Heart of the Faith;
  • Baseline: Where Leadership Meets Technology;
  • Baur, Michael, Bauer, Stephen, eds., The Beatles and Philosophy;
  • Beard, Charles Austin, An Economic Interpretation of the Constitution of the United States (Sony Reader);
  • Benjamin, Daniel & Steven Simon, The Age of Sacred Terror: Radical Islam's War Against America;
  • Bergen, Peter, The Osama bin Laden I Know: An Oral History of al Qaeda's Leader;
  • Berman, Paul, Terror and Liberalism;
  • Berman, Paul, The Flight of the Intellectuals: The Controversy Over Islamism and the Press;
  • Better Software: The Print Companion to StickyMinds.com;
  • Bleyer, Kevin, Me the People: One Man's Selfless Quest to Rewrite the Constitution of the United States of America;
  • Boardman, Griffin, and Murray, The Oxford Illustrated History of the Roman World;
  • Bracken, Paul, The Second Nuclear Age: Strategy, Danger, and the New Power Politics;
  • Bradley, James, with Ron Powers, Flags of Our Fathers;
  • Bronte, Charlotte, Jane Eyre;
  • Bronte, Emily, Wuthering Heights;
  • Brown, Ashley, War in Peace Volume 10 1974-1984: The Marshall Cavendish Encyclopedia of Postwar Conflict;
  • Brown, Ashley, War in Peace Volume 8 The Marshall Cavendish Illustrated Encyclopedia of Postwar Conflict;
  • Brown, Nathan J., When Victory Is Not an Option: Islamist Movements in Arab Politics;
  • Bryce, Robert, Gusher of Lies: The Dangerous Delusions of "Energy Independence";
  • Bush, George W., Decision Points;
  • Bzdek, Vincent, The Kennedy Legacy: Jack, Bobby and Ted and a Family Dream Fulfilled;
  • Cahill, Thomas, Sailing the Wine-Dark Sea: Why the Greeks Matter;
  • Campus Facility Maintenance: Promoting a Healthy & Productive Learning Environment;
  • Campus Technology: Empowering the World of Higher Education;
  • Certification: Tools and Techniques for the IT Professional;
  • Channel Advisor: Business Insights for Solution Providers;
  • Chariton, Callirhoe (Loeb Classical Library);
  • Chief Learning Officer: Solutions for Enterprise Productivity;
  • Christ, Karl, The Romans: An Introduction to Their History and Civilization;
  • Cicero, De Senectute;
  • Cicero, The Republic, The Laws;
  • Cicero, The Verrine Orations I: Against Caecilius. Against Verres, Part I; Part II, Book 1 (Loeb Classical Library);
  • Cicero, The Verrine Orations I: Against Caecilius. Against Verres, Part I; Part II, Book 2 (Loeb Classical Library);
  • CIO Decisions: Aligning I.T. and Business in the MidMarket Enterprise;
  • CIO Insight: Best Practices for IT Business Leaders;
  • CIO: Business Technology Leadership;
  • Clay, Lucius Du Bignon, Decision in Germany;
  • Cohen, William S., Dragon Fire;
  • Colacello, Bob, Ronnie and Nancy: Their Path to the White House, 1911 to 1980;
  • Coll, Steve, The Bin Ladens: An Arabian Family in the American Century;
  • Collins, Francis S., The Language of God: A Scientist Presents Evidence for Belief ;
  • Colorni, Angelo, Israel for Beginners: A Field Guide for Encountering the Israelis in Their Natural Habitat;
  • Compliance & Technology;
  • Computerworld: The Voice of IT Management;
  • Connolly, Peter & Hazel Dodge, The Ancient City: Life in Classical Athens & Rome;
  • Conti, Greg, Googling Security: How Much Does Google Know About You?;
  • Converge: Strategy and Leadership for Technology in Education;
  • Cowan, Ross, Roman Legionary 58 BC - AD 69;
  • Cowell, F. R., Life in Ancient Rome;
  • Creel, Richard, Religion and Doubt: Toward a Faith of Your Own;
  • Cross, Robin, General Editor, The Encyclopedia of Warfare: The Changing Nature of Warfare from Prehistory to Modern-day Armed Conflicts;
  • CSO: The Resource for Security Executives:
  • Cummins, Joseph, History's Greatest Wars: The Epic Conflicts that Shaped the Modern World;
  • D'Amato, Raffaele, Imperial Roman Naval Forces 31 BC-AD 500;
  • Dallek, Robert, An Unfinished Life: John F. Kennedy 1917-1963;
  • Daly, Dennis, Sophocles' Ajax;
  • Dando-Collins, Stephen, Caesar's Legion: The Epic Saga of Julius Caesar's Elite Tenth Legion and the Armies of Rome;
  • Darwish, Nonie, Now They Call Me Infidel: Why I Renounced Jihad for America, Israel, and the War on Terror;
  • Davis Hanson, Victor, Makers of Ancient Strategy: From the Persian Wars to the Fall of Rome;
  • Dawkins, Richard, The Blind Watchmaker;
  • Dawkins, Richard, The God Delusion;
  • Dawkins, Richard, The Selfish Gene;
  • de Blij, Harm, Why Geography Matters: Three Challenges Facing America, Climate Change, The Rise of China, and Global Terrorism;
  • Defense Systems: Information Technology and Net-Centric Warfare;
  • Defense Systems: Strategic Intelligence for Info Centric Operations;
  • Defense Tech Briefs: Engineering Solutions for Military and Aerospace;
  • Dennett, Daniel C., Breaking the Spell: Religion as a Natural Phenomenon;
  • Dennett, Daniel C., Consciousness Explained;
  • Dennett, Daniel C., Darwin's Dangerous Idea;
  • Devries, Kelly, et. al., Battles of the Ancient World 1285 BC - AD 451 : From Kadesh to Catalaunian Field;
  • Dickens, Charles, Great Expectations;
  • Digital Communities: Building Twenty-First Century Communities;
  • Doctorow, E.L., Homer & Langley;
  • Dodds, E. R., The Greeks and the Irrational;
  • Dostoevsky, Fyodor, The House of the Dead (Google Books, Sony e-Reader);
  • Dostoevsky, Fyodor, The Idiot;
  • Douglass, Elisha P., Rebels and Democrats: The Struggle for Equal Political Rights and Majority Role During the American Revolution;
  • Doyle, Sir Arthur Conan, The Hound of the Baskervilles & The Valley of Fear;
  • Dr. Dobb's Journal: The World of Software Development;
  • Drug Discovery News: Discovery/Development/Diagnostics/Delivery;
  • DT: Defense Technology International;
  • Dunbar, Richard, Alcatraz;
  • Education Channel Partner: News, Trends, and Analysis for K-20 Sales Professionals;
  • Edwards, Aton, Preparedness Now!;
  • EGM: Electronic Gaming Monthly, the No. 1 Videogame Magazine;
  • Ehrman, Bart D., Lost Christianities: The Battles for Scriptures and the Faiths We Never Knew;
  • Ehrman, Bart D., Misquoting Jesus: The Story Behind Who Changed the Bible and Why;
  • Electronic Engineering Times: The Industry Newsweekly for the Creators of Technology;
  • Ellis, Joseph J., American Sphinx: The Character of Thomas Jefferson;
  • Ellis, Joseph J., His Excellency: George Washington;
  • Emergency Management: Strategy & Leadership in Critical Times;
  • Emerson, Steven, American Jihad: The Terrorists Living Among Us;
  • Erlewine, Robert, Monotheism and Tolerance: Recovering a Religion of Reason (Indiana Series in the Philosophy of Religion);
  • ESD: Embedded Systems Design;
  • Everitt, Anthony, Augustus: The Life of Rome's First Emperor;
  • Everitt, Anthony, Cicero: The Life and Times of Rome's Greatest Politician;
  • eWeek: The Enterprise Newsweekly;
  • Federal Computer Week: Powering the Business of Government;
  • Ferguson, Niall, Civilization: The West and the Rest;
  • Ferguson, Niall, Empire: The Rise and Demise of the British World Order and the Lessons for Global Power;
  • Ferguson, Niall, The Cash Nexus: Money and Power in the Modern World, 1700-2000;
  • Ferguson, Niall, The War of the World: Twentieth-Century Conflict and the Decline of the West;
  • Feuerbach, Ludwig, The Essence of Christianity (Sony eReader);
  • Fields, Nic, The Roman Army of the Principate 27 BC-AD 117;
  • Fields, Nic, The Roman Army of the Punic Wars 264-146 BC;
  • Fields, Nic, The Roman Army: the Civil Wars 88-31 BC;
  • Finkel, Caroline, Osman's Dream: The History of the Ottoman Empire;
  • Fisk, Robert, The Great War For Civilization: The Conquest of the Middle East;
  • Forstchen, William R., One Second After;
  • Fox, Robin Lane, The Classical World: An Epic History from Homer to Hadrian;
  • Frazer, James George, The Golden Bough (Volume 3): A Study in Magic and Religion (Sony eReader);
  • Freeh, Louis J., My FBI: Bringing Down the Mafia, Investigating Bill Clinton, and Fighting the War on Terror;
  • Freeman, Charles, The Greek Achievement: The Foundations of the Western World;
  • Friedman, Thomas L. The World Is Flat: A Brief History of the Twenty-First Century Further Updated and Expanded/Release 3.0;
  • Friedman, Thomas L., The Lexus and the Olive Tree: Understanding Globalization;
  • Frontinus: Stratagems. Aqueducts of Rome. (Loeb Classical Library No. 174);
  • Fuller Focus: Fuller Theological Seminary;
  • Fuller, Graham E., A World Without Islam;
  • Gaubatz, P. David and Paul Sperry, Muslim Mafia: Inside the Secret Underworld That's Conspiring to Islamize America;
  • Ghattas, Kim, The Secretary: A Journey with Hillary Clinton from Beirut to the Heart of American Power;
  • Gibson, William, Neuromancer;
  • Gilmour, Michael J., Gods and Guitars: Seeking the Sacred in Post-1960s Popular Music;
  • Global Services: Strategies for Sourcing People, Processes, and Technologies;
  • Glucklich, Ariel, Dying for Heaven: Holy Pleasure and Suicide Bombers-Why the Best Qualities of Religion Are Also It's Most Dangerous;
  • Goldberg, Jonah, Liberal Fascism: The Secret History of the American Left, From Mussolini to the Politics of Meaning;
  • Goldin, Shmuel, Unlocking the Torah Text Vayikra (Leviticus);
  • Goldsworthy, Adrian, Caesar: Life of a Colossus;
  • Goldsworthy, Adrian, How Rome Fell: Death of a Superpower;
  • Goodman, Lenn E., Creation and Evolution;
  • Goodwin, Doris Kearns, Team of Rivals: The Political Genius of Abraham Lincoln;
  • Gopp, Amy, et.al., Split Ticket: Independent Faith in a Time of Partisan Politics (WTF: Where's the Faith?);
  • Gordon, Michael R., and Bernard E. Trainor, Cobra II: The Inside Story of the Invasion and Occupation of Iraq;
  • Government Health IT: The Magazine of Public/private Health Care Convergence;
  • Government Technology's Emergency Management: Strategy & Leadership in Critical Times;
  • Government Technology: Solutions for State and Local Government in the Information Age;
  • Grant , Michael, The Climax of Rome: The Final Achievements of the Ancient World, AD 161 - 337;
  • Grant, Michael, The Classical Greeks;
  • Grumberg, Orna, and Helmut Veith, 25 Years of Model Checking: History, Achievements, Perspectives;
  • Halberstam, David, War in a Time of Peace: Bush, Clinton, and the Generals;
  • Hammer, Reuven, Entering Torah Prefaces to the Weekly Torah Portion;
  • Hanson, Victor Davis, An Autumn of War: What America Learned from September 11 and the War on Terrorism;
  • Hanson, Victor Davis, Between War and Peace: Lessons from Afghanistan to Iraq;
  • Hanson, Victor Davis, Carnage and Culture: Landmark Battles in the Rise of Western Power;
  • Hanson, Victor Davis, How The Obama Administration Threatens Our National Security (Encounter Broadsides);
  • Hanson, Victor Davis, Makers of Ancient Strategy: From the Persian Wars to the Fall of Rome;
  • Hanson, Victor Davis, Ripples of Battle: How Wars of the Past Still Determine How We Fight, How We Live, and How We Think;
  • Hanson, Victor Davis, The End of Sparta: A Novel;
  • Hanson, Victor Davis, The Soul of Battle: From Ancient Times to the Present Day, How Three Great Liberators Vanquished Tyranny;
  • Hanson, Victor Davis, Wars of the Ancient Greeks;
  • Harnack, Adolf Von, History of Dogma, Volume 3 (Sony Reader);
  • Harris, Alex, Reputation At Risk: Reputation Report;
  • Harris, Sam, Letter to a Christian Nation;
  • Harris, Sam, The End of Faith: Religion, Terror, and the Future of Reason;
  • Hayek, F. A., The Road to Serfdom;
  • Heilbroner, Robert L., and Lester Thurow, Economics Explained: Everything You Need to Know About How the Economy Works and Where It's Going;
  • Hempel, Sandra, The Strange Case of The Broad Street Pump: John Snow and the Mystery of Cholera;
  • Hinnells, John R., A Handbook of Ancient Religions;
  • Hitchens, Christopher, God Is Not Great: How Religion Poisons Everything;
  • Hogg, Ian V., The Encyclopedia of Weaponry: The Development of Weaponry from Prehistory to 21st Century Warfare;
  • Hugo, Victor, The Hunchback of Notre Dame;
  • Humphrey, Caroline & Vitebsky, Piers, Sacred Architecture;
  • Huntington, Samuel P., The Clash of Civilizations and the Remaking of World Order;
  • Info World: Information Technology News, Computer Networking & Security;
  • Information Week: Business Innovation Powered by Technology:
  • Infostor: The Leading Source for Enterprise Storage Professionals;
  • Infrastructure Insite: Bringing IT Together;
  • Insurance Technology: Business Innovation Powered by Technology;
  • Integrated Solutions: For Enterprise Content Management;
  • Intel Premier IT: Sharing Best Practices with the Information Technology Community;
  • Irwin, Robert, Dangerous Knowledge: Orientalism and Its Discontents;
  • Jeffrey, Grant R., The Global-Warming Deception: How a Secret Elite Plans to Bankrupt America and Steal Your Freedom;
  • Jewkes, Yvonne, and Majid Yar, Handbook of Internet Crime;
  • Johnson, Chalmers, Blowback: The Costs and Consequences of American Empire;
  • Journal, The: Transforming Education Through Technology;
  • Judd, Denis, The Lion and the Tiger: The Rise and Fall of the British Raj, 1600-1947;
  • Kagan, Donald, The Peloponnesian War;
  • Kansas, Dave, The Wall Street Journal Guide to the End of Wall Street as We Know It: What You Need to Know About the Greatest Financial Crisis of Our Time--and How to Survive It;
  • Karsh, Efraim, Islamic Imperialism: A History;
  • Kasser, Rodolphe, The Gospel of Judas;
  • Katz, Solomon, The Decline of Rome and the Rise of Medieval Europe: (The Development of Western Civilization);
  • Keegan, John, Intelligence in War: The Value--and Limitations--of What the Military Can Learn About the Enemy;
  • Kenis, Leo, et. al., The Transformation of the Christian Churches in Western Europe 1945-2000 (Kadoc Studies on Religion, Culture and Society 6);
  • Kepel, Gilles, Jihad: The Trail of Political Islam;
  • Kiplinger's: Personal Finance;
  • Klein, Naomi, The Shock Doctrine: The Rise of Disaster Capitalism;
  • KM World: Content, Document, and Knowledge Management;
  • Koestler, Arthur, Darkness at Noon: A Novel;
  • Kostova, Elizabeth, The Historian;
  • Kuttner, Robert, The Squandering of America: How the Failure of Our Politics Undermines Our Prosperity;
  • Lake, Kirsopp, The Text of the New Testament, Sony Reader;
  • Laur, Timothy M., Encyclopedia of Modern US Military Weapons ;
  • Leffler, Melvyn P., and Jeffrey W. Legro, To Lead the World: American Strategy After the Bush Doctrine;
  • Lendon, J. E., Soldiers and Ghosts: A History of Battle in Classical Antiquity;
  • Lenin, V. I., Imperialism the Highest Stage of Capitalism;
  • Lennon, John J., There is Absolutely No Reason to Pay Too Much for College!;
  • Lewis, Bernard, The Crisis of Islam: Holy War and Unholy Terror;
  • Lewis, Bernard, What Went Wrong?: The Clash Between Islam and Modernity in the Middle East;
  • Lifton, Robert J., Greg Mitchell, Hiroshima in America;
  • Limberis, Vasiliki M., Architects of Piety: The Cappadocian Fathers and the Cult of the Martyrs;
  • Lipsett, B. Diane, Desiring Conversion: Hermas, Thecla, Aseneth;
  • Livingston, Jessica, Founders At Work: Stories of Startups' Early Days;
  • Livy, Rome and the Mediterranean: Books XXXI-XLV of the History of Rome from its Foundation (Penguin Classics);
  • Louis J., Freeh, My FBI: Bringing Down the Mafia, Investigating Bill Clinton, and Fighting the War on Terror;
  • Mackay, Christopher S., Ancient Rome: A Military and Political History;
  • Majno, Guido, The Healing Hand: Man and Wound in the Ancient World;
  • Marcus, Greil,Invisible Republic: Bob Dylan's Basement Tapes;
  • Marshall-Cornwall, James, Napoleon as Military Commander;
  • Maughm, W. Somerset, Of Human Bondage;
  • McCluskey, Neal P., Feds in the Classroom: How Big Government Corrupts, Cripples, and Compromises American Education;
  • McCullough, David, 1776;
  • McCullough, David, John Adams;
  • McCullough, David, Mornings on Horseback: The Story of an Extraordinary Family, a Vanished Way of Life and the Unique Child Who Became Theodore Roosevelt;
  • McLynn, Frank, Marcus Aurelius: A Life;
  • McManus, John, Deadly Brotherhood, The: The American Combat Soldier in World War II ;
  • McMaster, H. R., Dereliction of Duty: Johnson, McNamara, the Joint Chiefs of Staff, and the Lies That Led to Vietnam;
  • McNamara, Patrick, Science and the World's Religions Volume 1: Origins and Destinies (Brain, Behavior, and Evolution);
  • McNamara, Patrick, Science and the World's Religions Volume 2: Persons and Groups (Brain, Behavior, and Evolution);
  • McNamara, Patrick, Science and the World's Religions Volume 3: Religions and Controversies (Brain, Behavior, and Evolution);
  • Meacham, Jon, American Lion: Andrew Jackson in the White House;
  • Mearsheimer, John J., and Stephen M. Walt, The Israel Lobby and U.S. Foreign Policy;
  • Meier, Christian, Caesar: A Biography;
  • Menzies, Gaven, 1421: The Year China Discovered America;
  • Metaxas, Eric, Bonhoeffer: Pastor, Martyr, Prophet, Spy;
  • Michael, Katina and M.G. Michael, Innovative Automatic Identification and Location-Based Services: From Barcodes to Chip Implants;
  • Migliore, Daniel L., Faith Seeking Understanding: An Introduction to Christian Theology;
  • Military & Aerospace Electronics: The Magazine of Transformation in Electronic and Optical Technology;
  • Millard, Candice, Theodore Roosevelt's Darkest Journey: The River of Doubt;
  • Mommsen, Theodor, The History of the Roman Republic, Sony Reader;
  • Muller, F. Max, Chips From A German Workshop: Volume III: Essays On Language And Literature;
  • Murray, Janet, H., Hamlet On the Holodeck: The Future of Narrative in Cyberspace;
  • Murray, Williamson, War in the Air 1914-45;
  • Müller, F. Max, Chips From A German Workshop;
  • Nader, Ralph, Crashing the Party: Taking on the Corporate Government in an Age of Surrender;
  • Nagl, John A., Learning to Eat Soup with a Knife: Counterinsurgency Lessons from Malaya and Vietnam;
  • Napoleoni, Loretta, Terrorism and the Economy: How the War on Terror is Bankrupting the World;
  • Nature: The International Weekly Journal of Science;
  • Negus, Christopher, Fedora 6 and Red Hat Enterprise Linux;
  • Network Computing: For IT by IT:
  • Network World: The Leader in Network Knowledge;
  • Network-centric Security: Where Physical Security & IT Worlds Converge;
  • Newman, Paul B., Travel and Trade in the Middle Ages;
  • Nietzsche, Friedrich Wilhelm, The Nietzsche-Wagner Correspondence;
  • Nixon, Ed, The Nixons: A Family Portrait;
  • O'Brien, Johnny, Day of the Assassins: A Jack Christie Novel;
  • O'Donnell, James J., Augustine: A New Biography;
  • OH & S: Occupational Health & Safety
  • Okakura, Kakuzo, The Book of Tea;
  • Optimize: Business Strategy & Execution for CIOs;
  • Ostler, Nicholas, Ad Infinitum: A Biography of Latin;
  • Parry, Jay A., The Real George Washington (American Classic Series);
  • Paton, W.R., The Greek Anthology, Volume V, Loeb Classical Library, No. 86;
  • Pausanius, Guide to Greece 1: Central Greece;
  • Perrett, Bryan, Cassell Military Classics: Iron Fist: Classic Armoured Warfare;
  • Perrottet, Tony, The Naked Olympics: The True Story of the Olympic Games;
  • Peters, Ralph, New Glory: Expanding America's Global Supremacy;
  • Phillips, Kevin, American Dynasty: Aristocracy, Fortune, and the Politics of Deceit in the House of Bush;
  • Pick, Bernhard; Paralipomena; Remains of Gospels and Sayings of Christ (Sony Reader);
  • Pimlott, John, The Elite: The Special Forces of the World Volume 1;
  • Pitre, Brant, Jesus and the Jewish Roots of the Eucharist: Unlocking the Secrets of the Last Supper;
  • Plutarch's Lives, X: Agis and Cleomenes. Tiberius and Gaius Gracchus. Philopoemen and Flamininus (Loeb Classical Library®);
  • Podhoretz, Norman, World War IV: The Long Struggle Against Islamofascism;
  • Posner, Gerald, Case Closed: Lee Harvey Oswald and the Assassination of JFK;
  • Potter, Wendell, Deadly Spin: An Insurance Company Insider Speaks Out on How Corporate PR Is Killing Health Care and Deceiving Americans;
  • Pouesi, Daniel, Akua;
  • Premier IT Magazine: Sharing Best Practices with the Information Technology Community;
  • Price, Monroe E. & Daniel Dayan, eds., Owning the Olympics: Narratives of the New China;
  • Profit: The Executive's Guide to Oracle Applications;
  • Public CIO: Technology Leadership in the Public Sector;
  • Putnam, Robert D., Bowling Alone : The Collapse and Revival of American Community;
  • Quintus of Smyrna, The Fall of Troy;
  • Rawles, James Wesley, Patriots: A Novel of Survival in the Coming Collapse;
  • Red Herring: The Business of Technology;
  • Redmond Channel Partner: Driving Success in the Microsoft Partner Community;
  • Redmond Magazine: The Independent Voice of the Microsoft IT Community;
  • Renan, Ernest, The life of Jesus (Sony eReader);
  • Richler, Mordecai (editor), Writers on World War II: An Anthology;
  • Roberts, Ian, The Energy Glut: Climate Change and the Politics of Fatness in an Overheating World;
  • Rocca, Samuel, The Army of Herod the Great;
  • Rodgers, Nigel, A Military History of Ancient Greece: An Authoritative Account of the Politics, Armies and Wars During the Golden Age of Ancient Greece, shown in over 200 color photographs, diagrams, maps and plans;
  • Rodoreda, Merce, Death in Spring: A Novel;
  • Romerstein, Herbert and Breindel, Eric,The Venona Secrets, Exposing Soviet Espionage and America's Traitors;
  • Ross, Dennis, Statecraft: And How to Restore America's Standing in the World;
  • Roth, Jonathan P., Roman Warfare (Cambridge Introduction to Roman Civilization);
  • SC Magazine: For IT Security Professionals;
  • Scahill, Jeremy, Blackwater: The Rise of the World's Most Powerful Mercenary Army [Revised and Updated];
  • Schama, Simon, A History of Britain, At the Edge of the World 3500 B.C. - 1603 A.D.;
  • Scheuer, Michael, Imperial Hubris: Why the West Is Losing the War On Terror;
  • Scheuer, Michael, Marching Toward Hell: America and Islam After Iraq;
  • Scheuer, Michael, Osama Bin Laden;
  • Scheuer, Michael, Through Our Enemies Eyes: Osama Bin Laden, Radical Islam, and the Future of America;
  • Scholastic Instructor
  • Scholastic Parent & Child: The Joy of Family Living and Learning;
  • Schopenhauer, Arthur, The World As Will And Idea (Sony eReader);
  • Schug-Wille, Art of the Byzantine World;
  • Schulze, Hagen, Germany: A New History;
  • Schweizer, Peter, Architects of Ruin: How Big Government Liberals Wrecked the Global Economy---and How They Will Do It Again If No One Stops Them;
  • Scott, Sir Walter, Ivanhoe;
  • Seagren, Eric, Secure Your Network for Free: Using Nmap, Wireshark, Snort, Nessus, and MRTG;
  • Security Technology & Design: The Security Executive's Resource for Systems Integration and Convergence;
  • Seibel, Peter, Coders at Work;
  • Sekunda N., & S. Northwood, Early Roman Armies;
  • Seneca: Naturales Quaestiones, Books II (Loeb Classical Library No. 450);
  • Sewall, Sarah, The U.S. Army/Marine Corps Counterinsurgency Field Manual;
  • Sheppard, Ruth, Alexander the Great at War: His Army - His Battles - His Enemies;
  • Shinder, Jason, ed., The Poem That Changed America: "Howl" Fifty Years Later;
  • Sidebottom, Harry, Ancient Warfare: A Very Short Introduction;
  • Sides, Hampton, Blood and Thunder: The Epic Story of Kit Carson and the Conquest of the American West;
  • Simkins, Michael, The Roman Army from Caesar to Trajan;
  • Sinchak, Steve, Hacking Windows Vista;
  • Smith, RJ, The One: The Life and Music of James Brown;
  • Software Development Times: The Industry Newspaper for Software Development Managers;
  • Software Test Performance;
  • Solomon, Norman, War Made Easy: How Presidents and Pundits Keep Spinning Us to Death;
  • Song, Lolan, Innovation Together: Microsoft Research Asia Academic Research Collaboration;
  • Sophocles, The Three Theban Plays, tr. Robert Fagles;
  • Sound & Vision: The Consumer Electronics Authority;
  • Southern, Pat, The Roman Army: A Social and Institutional History;
  • Sri, Edward, A Biblical Walk Through the Mass: Understanding What We Say and Do In The Liturgy;
  • Sri, Edward, Men, Women and the Mystery of Love: Practical Insights from John Paul II's Love and Responsibility;
  • Stair, John Bettridge, Old Samoa; Or, Flotsam and Jetsam From the Pacific Ocean;
  • Starr, Chester G., The Roman Empire, 27 B.C.-A.D. 476: A Study in Survival;
  • Starr, John Bryan, Understanding China: A Guide to China's Economy, History, and Political Culture;
  • Stauffer, John, Giants: The Parallel Lives of Frederick Douglass and Abraham Lincoln;
  • Steyn, Mark, America Alone: The End of the World As We Know It;
  • Strassler, Robert B., The Landmark Herodotus: The Histories;
  • Strassler, Robert B., The Landmark Thucydides: A Comprehensive Guide to the Peloponnesian War;
  • Strassler, Robert B., The Landmark Xenophon's Hellenika;
  • Strategy + Business;
  • Streete, Gail, Redeemed Bodies: Women Martyrs in Early Christianity;
  • Sullivan, James, The Hardest Working Man: How James Brown Saved the Soul of America;
  • Sumner, Graham, Roman Military Clothing (1) 100 BC-AD 200;
  • Sumner, Graham, Roman Military Clothing (2) AD 200-400;
  • Suskind, Ron, The One Percent Doctrine: Deep Inside America's Pursuit of Its Enemies Since 9/11:
  • Swanston, Malcolm, Mapping History Battles and Campaigns;
  • Swiderski, Richard M., Quicksilver: A History of the Use, Lore, and Effects of Mercury;
  • Swiderski, Richard M., Quicksilver: A History of the Use, Lore, and Effects of Mercury;
  • Swift, Jonathan, Gulliver's Travels;
  • Syme, Ronald, The Roman Revolution;
  • Talley, Colin L., A History of Multiple Sclerosis;
  • Tawil, Camille, Brothers In Arms: The Story of al-Qa'ida and the Arab Jihadists;
  • Tech Briefs: Engineering Solutions for Design & Manufacturing;
  • Tech Net: The Microsoft Journal for IT Professionals;
  • Tech Partner: Gain a Competitive Edge Through Solutions Providers;
  • Technology & Learning: Ideas and Tools for Ed Tech Leaders;
  • Tenet, George, At the Center of the Storm: The CIA During America's Time of Crisis;
  • Thackeray, W. M., Vanity Fair;
  • Thompson, Derrick & William Martin, Have Guitars ... Will Travel: A Journey Through the Beat Music Scene in Northampton 1957-66;
  • Tolstoy, Leo, Anna Karenina;
  • Trento, Joseph J., The Secret History of the CIA;
  • Twain, Mark, The Gilded Age: a Tale of Today;
  • Ungar, Craig, House of Bush House of Saud;
  • Unterberger, Richie, The Unreleased Beatles Music & Film;
  • VAR Business: Strategic Insight for Technology Integrators:
  • Virgil, The Aeneid
  • Virtualization Review: Powering the New IT Generation;
  • Visual Studio: Enterprise Solutions for .Net Development;
  • VON Magazine: Voice, Video & Vision;
  • Wall Street Technology: Business Innovation Powered by Technology;
  • Wallace, Robert, Spycraft: The Secret History of the CIA's Spytechs, from Communism to al-Qaeda;
  • Wang, Wallace, Steal This Computer Book 4.0: What They Won’t Tell You About the Internet;
  • Ward-Perkins, The Fall of Rome and the End of Civilization;
  • Warren, Robert Penn, All the King's Men;
  • Wasik, John F., Cul-de-Sac Syndrome: Turning Around the Unsustainable American Dream;
  • Weber, Karl, Editor, Lincoln: A President for the Ages;
  • Website Magazine: The Magazine for Website Success;
  • Weiner, Tim, Enemies: A History of the FBI;
  • Weiner, Tim, Legacy of Ashes: The History of the CIA;
  • West, Bing, The Strongest Tribe: War, Politics, and the Endgame in Iraq;
  • Wharton, Edith, The Age of Innocence;
  • Wilcox, Peter, Rome's Enemies (1) Germanics and Dacians;
  • Wise, Terence, Armies of the Carthaginian Wars 265 - 146 BC;
  • Wissner-Gross, What Colleges Don't Tell You (And Other Parents Don't Want You To Know) 272 Secrets For Getting Your Kid Into the Top Schools;
  • Wissner-Gross, What High Schools Don't Tell You;
  • Wolf, Naomi, Give Me Liberty: A Handbook for American Revolutionaries;
  • Wolf, Naomi, The End of America: Letter of Warning to a Young Patriot;
  • Woodward, Bob, Plan of Attack;
  • Woodward, Bob, The Agenda: Inside the Clinton White House;
  • Wright, Lawrence, The Looming Tower: Al-Qaeda and the Road to 9/11;
  • Wright-Porto, Heather, Beginning Google Blogger;
  • Xenophon, The Anabasis of Cyrus;
  • Yergin, Daniel, The Prize: The Epic Quest for Oil, Money, & Power;

Computing Reviews

Handy Tools, Links, etc.

This Website is a Belligerent Act

Share |

SmileyCentral.com

Radical Christian

My secure contact form

Choice Reviews Online

techLEARNING.com

CIO and Strategy & Business magazines

Mil-aero info

Defense Systems

Nature: International Weekly Journal of Science

CIO

Choice Reviews Online

SD Times: Software Development News

KMworld

SC Magazine for Security Professionals

Bloggers' Rights at EFF

The Scientist


Missile Defense
33 Minutes

Government Technology: Solutions for State and Local Government in the Information Age

Insurance & Technology

What's Running is a great tool so that you can see what is running on your desktop.

Process Lasso lets you view your processor and its responsiveness.

Online Armor lets you view your firewall status.

CCleaner - Freeware Windows Optimization

Avast is a terrific scrubber of all virus miscreants.

ClamWin is an effective deterrent for the little nasty things that can crop into your machine.

Ad-Aware is a sound anti-virus tool.

Blog Directory & Search engine

For all your electronic appliance needs research products on this terrific site.

Creative Commons License
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 Unported License.

Recent Comments

Note: Opinions expressed in comments are those of the authors alone and not necessarily those of this blogger. Comments are screened for relevance, substance, and tone, and in some cases edited, before posting. Reasoned disagreement is welcome, but not hostile, libelous, or otherwise objectionable statements. Original writing only, please. Thank you. Subscribe with Bloglines

Blog Smith Headline Animator

Library Thing: Chicks Dig Readers

Blog Archive

National Debt Clock

"Congress: I'm Watching"

A tax on toilet paper; I kid you not. According to the sponsor, "the Water Protection and Reinvestment Act will be financed broadly by small fees on such things as . . . products disposed of in waste water." Congress wants to tax what you do in the privacy of your bathroom.

The Religion of Peace

Portrait of Thinking Hero

Portrait of Thinking Hero
1844-1900

Check out:

Check out:
Chicks dig readers.
@ Blog Smith. Powered by Blogger.