Blog Smith

Blog Smith is inspired by the myth of Hephaestus in the creation of blacksmith-like, forged materials: ideas. This blog analyzes topics that interest me: IT, politics, technology, history, education, music, and the history of religions.

Sunday, October 7, 2007

Calling for An Islamic State in Australia

Aqeedah is an Islamic term meaning creed. The term has taken a significant technical usage in Muslim history and theology, denoting those matters over which Muslims hold conviction.


A group in Australia has drafted a constitution in which Aqeedah will hold sway.


Article 1
The Islamic ‘Aqeedah constitutes the foundation of the State. Nothing is permitted to exist in the government’s structure, accountability, or any other aspect connected with the government, that does not take the ‘Aqeedah as its source. The ‘Aqeedah is also the source for the State’s constitution and shar’i canons. Nothing connected to the constitution or canons is permitted to exist unless it emanates from the Islamic ‘Aqeedah.


I find it fascinating that Islamic elements see fit to decry the central tenets of Western constitutional law--separation of church and state--for a celebration and a return to medieval Islamic law.


These well-meaning Muslims are the moderates with which Western governments will need to contend with. On the one hand, flourishing because of Western liberal constitutions, Islamic impulses are seeking to dismantle its central tenets.


And in these impulses, I see little difference between them and the Nazi glorification of the past, and how in Weimar Germany for example the Nazis worked to dismantle constitutionalism, in favor of their glorified view of the past, and their distorted vision of the future.

Saturday, October 6, 2007

Musharraf Wins in Pakistan But It Matters Little

Not that this election really means all that much but Pakistan's Pervez Musharraf was elected for a third term as president according to unofficial ballot results.


He still faces legal challenges because Pakistan's Supreme Court may rule Musharraf is ineligible to hold office as president. The second runner-up will take office instead, as the constitution stipulates.


Musharraf is facing a great deal of opposition. They demand that Musharraf abandon his position as Pakistan's military chief before seeking another presidential term.


90% of the overall votes are cast for Musharraf but there will be few people who can see it as a credible, normal election when a large number of his political opponents have said they do not want anything to do with it.


As on many points, Pakistan's national security depends on an Islamist, Pashtun-dominated régime according to Michael Scheuer's analysis (Imperial Hubris pp. 54-56) and I believe he is correct.

Friday, October 5, 2007

A Touch of Viagra with your Madera?

Graphic source: Sunbeltblog.


A touch of Viagra served with jurisprudence never hurt anyone I suppose. In a recent hack, the madera.courts.ca.gov site was hit with Viagra ads before it was taken down according to the Sunbeltblog.


There were no reports if the judges tarried before the site was changed back to its legitimate data.

Thursday, October 4, 2007

UC Berkeley Free on YouTube

The University of California, Berkeley began to offer free course lectures on YouTube and this seems like a helpful addition to free course programs offered by places like MIT.


There are more than 300 hours of videotaped courses.


Berkeley has used open-source video since 2001, when its Educational Technology Services division launched webcast.berkeley.edu, a local site that now provides course and event content via podcasts and streaming video.


The number of courses available by podcast has increased from 15 to 86.

DHS Spams Classified Data

A DHS email gaffe revealed information, including classified data, on thousands of security pros. A story makes you fell just a little less secure.


A Reply All to a daily news roundup emailed by the U.S. Department of Homeland Security was sent to around 7,500 people which overwhelmed government and business mail servers with over 2 million messages today.


Marcus Sachs, the director of the SANS Institute's Internet Storm Center (ISC), discovered that the DHS was not using a mail list manager, or listserv, such as the open-source Mailman or the free Majordomo, but instead was transmitting the daily report from an e-mail address on a Lotus Domino Release 7.0.2FP1 server hosted by a government contractor.


You can't imagine who would like to have access to American confidential information.


The disclosure issue is illustrated painfully when email recipients received this message: "Subject: Is this being a joke? why are so many messages today? Amir Ferdosi Sazeman-e Sana'et-e Defa' Qom Iran" In a follow-up message, Ferdosi identified himself as a researcher with Iran's Ministry of Defense.


The DHS snafu revealed sensitive contact data to `undesirables.'


Now all that needs to be done is for some nefarious ne'er do well to send a zero-day PDF or Word attachment to the names now available and blast gullible security professionals.


Hackers, phishers and other cybercriminals could not have done any better than revealing the kind of information that was disclosed by the DHS list.

Wednesday, October 3, 2007

Documented Incident at Hawr Rajab

By mashing YouTube and a text source, Terrorist Death Watch, a quite reliable account of at least this one incident is documented.


The text account states:


An al-Qaida in Iraq (AQI) effort to reestablish a position in the southern Baghdad province town of Hawr Rajab was repulsed when concerned local citizens engaged the terrorists with small-arms fire and called in U.S. forces for assistance, Oct. 2.

While two concerned citizens were wounded in fighting and treated at a nearby hospital, four enemy fighters were killed, an additional two wounded, and multiple insurgent weapons destroyed. U.S. forces detained one of the enemy wounded, and transported the other for medical treatment at Camp Cropper.

Events began mid-afternoon, when concerned citizens contacted Multi-National Division Center Soldiers after spotting suspected AQI vehicles in the vicinity of Hawr Rajab. A quick reaction force comprised of Paratroopers from 1st Squadron, 40th Cavalry Regiment, 4th Brigade Combat Team (Airborne), 25th Infantry Division, attached to the 2nd Brigade Combat Team, 3rd Infantry. Division responded to the call for assistance.

The U.S. Soldiers moved into town to find the concerned citizens already engaged in small-arms fire with AQI terrorists hiding in a boys’ school. After the brief engagement, the terrorists were observed fleeing the scene in a blue truck.

An air weapons team was called in to pursue the vehicle and later destroyed the truck and killed four terrorists. The engagement also destroyed two AK-47s and a 23 mm anti-aircraft machine gun in the back of the van.

Numerous calls to tips line by Iraqis in the wake of the incident confirmed the identity of the men as AQI.

Serbian Bomb Threat Thwarted

Graphic source: Herbert Pfarrhofer/EPA


The second of two men were held by Austrian authorities in a plot to bomb the U.S. Embassy in Vienna.


The pair are Bosnian suspects.


This possible accomplice of Asim C., a 42-year-old unemployed Bosnian, was arrested after he tried to enter the embassy with a backpack containing grenades, plastic explosives and bits of metal.


Next, the police nabbed Mehmed D., 34, and took him into custody.


Both men were citizens of Bosnia-Herzegovina who knew each other. Their identities are not fully released, the suspects' last names, because of Austrian privacy laws.


Asim C. was carrying a book which appeared to be a Muslim prayer manual.


I am confused by the position of Doris Edelbacher, chief spokeswoman for Austria's federal counterterrorism office, who played down speculation that the suspects were motivated by radical Islamic ideology.


What else?


Guenther Ahmed Rusznak, a spokesman for Vienna's Islamic community, issued a statement late Monday condemning the incident and rejecting radical Islam.


Mr. Rusznak seems to be taking the reasonable conclusion here.


Last month, three suspected al-Qaida operatives — all Austrian citizens of Arab origin in their 20s — were arrested in connection with a video posted online in March that had threatened Austria and Germany with attacks if they did not withdraw their military personnel from Afghanistan.


One of the suspects was released several days later for lack of evidence. Authorities in Canada, meanwhile, arrested another suspect believed to be linked to the Internet threat.

Microsoft SP1 Update

Microsoft is updating Vista's speed and stability, or so they say, and the company has posted more fixes for the OS, even as SP1 enters beta testing for developers.

Tuesday, October 2, 2007

Microsoft Alters Search

Graphic Source: Computerworld.com


Microsoft has slowly been revealing the next move or two and it looks like for Vista SP1 beta the most important modification is the search option. Microsoft has not widely publicized the move, no doubt because it is in response to an anti-trust decision, but the updated search allows a user to specify which search, such as Google, they would like.

Silicon First, So Who Is On Second?

Silicon Valley is of course the number one tech oriented area in the U.S. but more of a surprise is considering who is number two.


A good guess would be Boston or Seattle but the U.S. Census Bureau's annual American Community Survey (ACS) reveals a metropolitan area's "TQ" (technology quotient). In fact the honor of the second highest concentration of IT professionals is the Washington metro area.


The annual average salary for computer and information systems managers in Silicon Valley as of May 2006 was $139,460, according to the Bureau of Labor Statistics. In the D.C. metro area, that figure was $122,950.

Monday, October 1, 2007

Three Socially Conscious Sites

A positive move in organizations is the micro-finance work of Muhammad Yunus at the Grameen Bank. This is a site which chronicles how more than 7 million people have received small loans, which they've used to build small businesses.


Also, many people can benefit financially via the Net, e.g., through kiva or prosper.com, which provide loans for people with little or no collateral.


Finally, the oversight that Internet-based tools allow are requiring governments to be more accountable. For example, the Sunlight Foundation documents the flows of money and contracts within the U.S. government.

50 Years Ago: An October Surprise

Graphic source: ComputerWorld.


The really amazing thing about the 183-pound aluminum sphere called Sputnik, Russian for "traveling companion" is the enlightened response and collaboration between the government, President Eisenhower specifically, the military, and private researchers. Fifty years ago on 4 October 1957, radio-transmitted beeps from the first man-made object to ever orbit the Earth propelled the U.S. into the Space Age once the "October surprise" woke the country up.


America was a distant second. On 6 December 1957 an American Vanguard rocket that was to be the first U.S. satellite exploded on the launch pad. Dubbed the "Kaputnik," the U.S. lagged behind.


Hence the creation of the Advanced Research Projects Agency (ARPA), a rambunctious Pentagon office quickly created by President Eisenhower on 7 February 1958. The mission was to "prevent technological surprises," and although dominated by concerns of space, the office also stimulated computer research.


As a boomer, my young life was dominated by nightmares of Soviet domination, a heavy-handed curriculum push towards math and science. Not surprisingly, I studied history instead.


I can hardly imagine a worst grade-school preparation in this regard, and today such an enlightened and unified governmental response would be unthinkable.

Sunday, September 30, 2007

I Still Have Checks, I Can't Be Overdrawn . . .

Bush announced that Social Security is facing a $13.6 trillion shortfall and that delaying reforms is not fair to younger workers.


Meanwhile, the Treasury Department is on record in stating that some combination of benefit cuts and tax increases will need to be considered to permanently fix the funding shortfall.


Bush would like to privatize Social Security for younger workers while cutting some benefits and he has remained opposed to a tax hike to make up for the shortfall.


Privatization is not popular with Bush's opponents but I believe there is little choice. Young people are not planning their finances any better than previous generations.

Saturday, September 29, 2007

Iran Does Not Like the U.S.

Should Americans really be upset now that the Iranian Parliament declared the U.S. Army and the CIA as terrorist organizations?


Hardly, the Parliament can now join American academics and commentators who noted that the Iranian President did not receive a warm welcome while in New York.


I guess that is what happens when you deny obvious and horrific events in history such as the Holocaust and continue to send state-sponsored terrorists to neighboring countries.

Friday, September 28, 2007

Lights Go Out

A disturbing story ran on CNN this week. A simulated attack points to just how vulnerable the U.S. power infrastructure really is.


Only a software vulnerability in a control system could be used to physically destroy power grid equipment.


A CNN segment demonstrated how a turbine was reduced to a smoking, shuddering, metal spewing mess as the result of malicious code execution on the computer controlling the system.


The Idaho National Laboratory prepared the demonstration for the U.S. Department of Homeland Security (DHS). The simulated attack re-visited an old issue, now rectified--in a Supervisory Control and Data Acquisition (SCADA) system.


The vulnerability points out how easily a well-executed digital attack could hit our critical infrastructure.


Since they run on proprietary systems, SCADA systems are less vulnerable than Internet accessible networks but they are not immune to the kinds of cyberattacks that can plague corporate information systems.


The present danger lies in an attacker who gains administrative access.


As utilities transition to connect with the Internet what has not happened is that the systems are secured and upgraded over time. The cost is prohibitive.


The move to Ethernet, TCP/IP and Web technologies will provide hackers and virus writers a number of backdoors and pathways to core control systems at utility companies, according to Eric Byres, CEO of Byres Security Inc., a consultancy that focuses on SCADA security.


The DHS and the North American Electric Reliability Council (NERC) have worked to address cybersecurity issues. NERC adopted eight new cybersecurity standards around asset identification, security management controls, personnel and training, perimeter security, systems security, incident reporting and response planning.


Although there are some helpful developments, I know locally that PECO Energy has enough difficulty supplying power when faced only with storms and trees. I'd hate to think how they could handle a malicious and determined attack.

Thursday, September 27, 2007

Fortune Cookies, Again?

China does not seem capable of keeping their hands out of the cookie jar as reports indicate that two who were charged with espionage sought funding in China.


A federal grand jury indicted the two men of conspiring to steal high-tech trade secrets and develop them with Chinese venture capital funding.


The two, Lan Lee, 42, of Palo Alto and Yuefei Ge, 34, of San Jose, are accused of trying to steal trade secrets from their employer, chip maker NetLogics Microsystems Inc. They allegedly sought funding from China's General Arms Department and the 863 program, which is a government-led project aimed at boosting technology research in China.


Lee is an American, while Ge is a Chinese national.


However, the original indictment makes no mention of possible involvement by the government of China.

Talk Back

I attended a conference of educators and you really have to consider how slow education changes in comparison with other fields. The media formerly was a thing to consume but now the direction is on reader feedback. Web 2.0 hit with Digg and StumbleUpon in a big way but this similar phenomenon has yet to really impact education. What if people have an opportunity to provide immediate feedback and a reciprocal conversation ensues? Education want responses and this would accomplish that end. The days of not knowing how people are responding to your message are over. In former days an academic could toil in isolation not knowing how their research was received but now they can have instantaneous feedback. This would liven up the educational process tremendously. I recall the demands of publishing online eLearning research in the pre-bubble phase of the Internet and it was exciting. The demand for high quality ideas were there but the demand of time were so much greater. Publish or perish, sabbaticals are optional.

Wednesday, September 26, 2007

Al-Maliki on Iraq at the U.N.

Al-Maliki is asking that the flow of arms must stop pouring into Iraq and he is correct on this point.


Regions such as Anbar province are quieter but he did claim that there has been a drop in sectarian killings which is difficult to believe. There has been a wave of bombings and shootings which swept Iraq on Wednesday, killing at least 50 people.


The success in Anbar is a result of a coalition of Sunni sheiks and the U.S. military.

Tuesday, September 25, 2007

The Text of Comments by Columbia President Lee Bollinger

Graphic source: Getty Image File


I thought it proper, in order to fully understand the discussion, to provide the full text--according to CNN--of President Bollinger's comments about President Ahmadinejad. Thus, I reproduce the CNN story here. I'd like to see this text studied and commented about since there are very few American academics who seem to take Middle Eastern spokespersons to task, or to school as the case may be. Ahmadinjad claims to be an academic, and appeals to audiences as such, thus, he should be able to interact with the world community, and fellow academics, as one.

==NEW YORK (CNN) -- Columbia University president Lee Bollinger took Iran's president to task Monday, bluntly criticizing his record and saying he exhibits "all the signs of a petty and cruel dictator."

Columbia University president, Lee Bollinger, excoriated Iran's leader Monday.

Bollinger's assessment came as he introduced Mahmoud Ahmadinejad to an audience of students and faculty.

As he read a long list of documented actions and remarks by the firebrand Iranian leader and his government, the crowd of 600 applauded.

Ahmadinejad was at the university to give a speech and take part in a question-and-answer session.

During the introduction, Bollinger cited the Iranian government's "brutal crackdown" on dissidents, public executions, executions of minors and other actions.

He assailed Ahmadinejad's denial of the Holocaust as "ridiculous."

"For the illiterate and ignorant, this is dangerous propaganda," he said. He called the Iranian leader "either brazenly provocative or astonishingly uneducated."

"The truth is that the Holocaust is the most documented event in human history," he said.

"Will you cease this outrage?" he demanded.

Bollinger said he doubted Ahmadinejad would show the intellectual courage to answer questions posed to him.

Ahmadinejad opened his remarks by saying Bollinger's introduction was discourteous, intellectually dishonest and inaccurate.

He said academic freedom should prohibit the "vaccination" of the audience with negative comments about a guest speaker and his ideas.

"I think the text read by the dear gentleman here, more than addressing me, was an insult to information and the knowledge of the audience here, present here," Ahmadinejad said through a translator.
Don't Miss

* Candidates question university's invitation to Iranian leader
* Iran: 'We are not building A-bomb'
* Brzezinski: U.S. in danger of 'stampeding' into war with Iran
* Iran: Missing American's family can visit
* Ahmadinejad eager to teach Americans

"In a university environment we must allow people to speak their mind, to allow everyone to talk so that the truth is eventually revealed by all," he said.

During his introductory remarks, Bollinger said Columbia would offer a faculty position to Kian Tajbakhsh, an Iranian-American social scientist who was released last week after having been held in Iran since May.

Tajbakhsh, a Columbia graduate, will be offered a position as visiting professor of urban planning as soon as Iran lets him leave the country, he said.

Bollinger asked Ahmadinejad to allow Tajbakhsh to lead a university delegation to address collegiate audiences in Iran on the subject of freedom of speech.

During a question-and-answer period after his remarks, Ahmadinejad invited Columbia students to visit Iran and promised to provide a list of universities for them. The audience applauded.
advertisement

"I am only a professor who is also a university president, and today I feel the weight of all the civilized world yearning to express the revulsion at what you stand for," Bollinger told Ahmadinejad. "I only wish I could do better."

After the session, Bollinger said Ahmadinejad left without properly answering many of the questions that were posed to him.

Monday, September 24, 2007

FBI Questions Unisys After Chinese Hack

IT systems integrator Unisys Corp. failed to detect the hacking of U.S. Department of Homeland Security computers; thereafter, data was sent to a Chinese-language Web site.


DHS had 844 "cybersecurity incidents" during the government's 2005 and 2006 fiscal years, and it described that number as "high and unacceptable."


The data breach adds to countries such as France, Germany and the U.K. that hackers in China have attacked them for sensitive information on government computer systems.


In 2002, Unisys won a $1 billion contract to manage U.S. government computer systems created after the Sept. 11, 2001, terrorist attacks to shore up the nation's defense. Unisys received a $750 million contract in early 2006 to continue the work.


Three months passed before clues emerged that malicious software capable of copying and transferring files had been installed on 150 DHS computers. In 1997-1998 I monitored a network that featured the same type of shenanigans. In the DHS case, the software led to the transfer of unclassified data late at night or early in the morning to a Chinese-language Web site. This is Security 101.

Total Pageviews

Popular Posts

FEEDJIT Live Traffic Feed/Site Meter

FEEDJIT Live Traffic Map

Where From?

site statistics

Search This Blog

Reading since summer 2006 (some of the classics are re-reads): including magazine subscriptions

  • Abbot, Edwin A., Flatland;
  • Accelerate: Technology Driving Business Performance;
  • ACM Queue: Architecting Tomorrow's Computing;
  • Adkins, Lesley and Roy A. Adkins, Handbook to Life in Ancient Rome;
  • Ali, Ayaan Hirsi, Nomad: From Islam to America: A Personal Journey Through the Clash of Civilizations;
  • Ali, Tariq, The Clash of Fundamentalisms: Crusades, Jihads, and Modernity;
  • Allawi, Ali A., The Crisis of Islamic Civilization;
  • Alperovitz, Gar, The Decision To Use the Atomic Bomb;
  • American School & University: Shaping Facilities & Business Decisions;
  • Angelich, Jane, What's a Mother (in-Law) to Do?: 5 Essential Steps to Building a Loving Relationship with Your Son's New Wife;
  • Arad, Yitzchak, In the Shadow of the Red Banner: Soviet Jews in the War Against Nazi Germany;
  • Aristotle, Athenian Constitution. Eudemian Ethics. Virtues and Vices. (Loeb Classical Library No. 285);
  • Aristotle, Metaphysics: Books X-XIV, Oeconomica, Magna Moralia (The Loeb classical library);
  • Armstrong, Karen, A History of God;
  • Arrian: Anabasis of Alexander, Books I-IV (Loeb Classical Library No. 236);
  • Atkinson, Rick, The Guns at Last Light: The War in Western Europe, 1944-1945 (Liberation Trilogy);
  • Auletta, Ken, Googled: The End of the World As We Know It;
  • Austen, Jane, Pride and Prejudice;
  • Bacevich, Andrew, The Limits of Power: The End of American Exceptionalism;
  • Baker, James A. III, and Lee H. Hamilton, The Iraq Study Group Report: The Way Forward - A New Approach;
  • Barber, Benjamin R., Jihad vs. McWorld: Terrorism's Challenge to Democracy;
  • Barnett, Thomas P.M., Blueprint for Action: A Future Worth Creating;
  • Barnett, Thomas P.M., The Pentagon's New Map: War and Peace in the Twenty-First Century;
  • Barron, Robert, Catholicism: A Journey to the Heart of the Faith;
  • Baseline: Where Leadership Meets Technology;
  • Baur, Michael, Bauer, Stephen, eds., The Beatles and Philosophy;
  • Beard, Charles Austin, An Economic Interpretation of the Constitution of the United States (Sony Reader);
  • Benjamin, Daniel & Steven Simon, The Age of Sacred Terror: Radical Islam's War Against America;
  • Bergen, Peter, The Osama bin Laden I Know: An Oral History of al Qaeda's Leader;
  • Berman, Paul, Terror and Liberalism;
  • Berman, Paul, The Flight of the Intellectuals: The Controversy Over Islamism and the Press;
  • Better Software: The Print Companion to StickyMinds.com;
  • Bleyer, Kevin, Me the People: One Man's Selfless Quest to Rewrite the Constitution of the United States of America;
  • Boardman, Griffin, and Murray, The Oxford Illustrated History of the Roman World;
  • Bracken, Paul, The Second Nuclear Age: Strategy, Danger, and the New Power Politics;
  • Bradley, James, with Ron Powers, Flags of Our Fathers;
  • Bronte, Charlotte, Jane Eyre;
  • Bronte, Emily, Wuthering Heights;
  • Brown, Ashley, War in Peace Volume 10 1974-1984: The Marshall Cavendish Encyclopedia of Postwar Conflict;
  • Brown, Ashley, War in Peace Volume 8 The Marshall Cavendish Illustrated Encyclopedia of Postwar Conflict;
  • Brown, Nathan J., When Victory Is Not an Option: Islamist Movements in Arab Politics;
  • Bryce, Robert, Gusher of Lies: The Dangerous Delusions of "Energy Independence";
  • Bush, George W., Decision Points;
  • Bzdek, Vincent, The Kennedy Legacy: Jack, Bobby and Ted and a Family Dream Fulfilled;
  • Cahill, Thomas, Sailing the Wine-Dark Sea: Why the Greeks Matter;
  • Campus Facility Maintenance: Promoting a Healthy & Productive Learning Environment;
  • Campus Technology: Empowering the World of Higher Education;
  • Certification: Tools and Techniques for the IT Professional;
  • Channel Advisor: Business Insights for Solution Providers;
  • Chariton, Callirhoe (Loeb Classical Library);
  • Chief Learning Officer: Solutions for Enterprise Productivity;
  • Christ, Karl, The Romans: An Introduction to Their History and Civilization;
  • Cicero, De Senectute;
  • Cicero, The Republic, The Laws;
  • Cicero, The Verrine Orations I: Against Caecilius. Against Verres, Part I; Part II, Book 1 (Loeb Classical Library);
  • Cicero, The Verrine Orations I: Against Caecilius. Against Verres, Part I; Part II, Book 2 (Loeb Classical Library);
  • CIO Decisions: Aligning I.T. and Business in the MidMarket Enterprise;
  • CIO Insight: Best Practices for IT Business Leaders;
  • CIO: Business Technology Leadership;
  • Clay, Lucius Du Bignon, Decision in Germany;
  • Cohen, William S., Dragon Fire;
  • Colacello, Bob, Ronnie and Nancy: Their Path to the White House, 1911 to 1980;
  • Coll, Steve, The Bin Ladens: An Arabian Family in the American Century;
  • Collins, Francis S., The Language of God: A Scientist Presents Evidence for Belief ;
  • Colorni, Angelo, Israel for Beginners: A Field Guide for Encountering the Israelis in Their Natural Habitat;
  • Compliance & Technology;
  • Computerworld: The Voice of IT Management;
  • Connolly, Peter & Hazel Dodge, The Ancient City: Life in Classical Athens & Rome;
  • Conti, Greg, Googling Security: How Much Does Google Know About You?;
  • Converge: Strategy and Leadership for Technology in Education;
  • Cowan, Ross, Roman Legionary 58 BC - AD 69;
  • Cowell, F. R., Life in Ancient Rome;
  • Creel, Richard, Religion and Doubt: Toward a Faith of Your Own;
  • Cross, Robin, General Editor, The Encyclopedia of Warfare: The Changing Nature of Warfare from Prehistory to Modern-day Armed Conflicts;
  • CSO: The Resource for Security Executives:
  • Cummins, Joseph, History's Greatest Wars: The Epic Conflicts that Shaped the Modern World;
  • D'Amato, Raffaele, Imperial Roman Naval Forces 31 BC-AD 500;
  • Dallek, Robert, An Unfinished Life: John F. Kennedy 1917-1963;
  • Daly, Dennis, Sophocles' Ajax;
  • Dando-Collins, Stephen, Caesar's Legion: The Epic Saga of Julius Caesar's Elite Tenth Legion and the Armies of Rome;
  • Darwish, Nonie, Now They Call Me Infidel: Why I Renounced Jihad for America, Israel, and the War on Terror;
  • Davis Hanson, Victor, Makers of Ancient Strategy: From the Persian Wars to the Fall of Rome;
  • Dawkins, Richard, The Blind Watchmaker;
  • Dawkins, Richard, The God Delusion;
  • Dawkins, Richard, The Selfish Gene;
  • de Blij, Harm, Why Geography Matters: Three Challenges Facing America, Climate Change, The Rise of China, and Global Terrorism;
  • Defense Systems: Information Technology and Net-Centric Warfare;
  • Defense Systems: Strategic Intelligence for Info Centric Operations;
  • Defense Tech Briefs: Engineering Solutions for Military and Aerospace;
  • Dennett, Daniel C., Breaking the Spell: Religion as a Natural Phenomenon;
  • Dennett, Daniel C., Consciousness Explained;
  • Dennett, Daniel C., Darwin's Dangerous Idea;
  • Devries, Kelly, et. al., Battles of the Ancient World 1285 BC - AD 451 : From Kadesh to Catalaunian Field;
  • Dickens, Charles, Great Expectations;
  • Digital Communities: Building Twenty-First Century Communities;
  • Doctorow, E.L., Homer & Langley;
  • Dodds, E. R., The Greeks and the Irrational;
  • Dostoevsky, Fyodor, The House of the Dead (Google Books, Sony e-Reader);
  • Dostoevsky, Fyodor, The Idiot;
  • Douglass, Elisha P., Rebels and Democrats: The Struggle for Equal Political Rights and Majority Role During the American Revolution;
  • Doyle, Sir Arthur Conan, The Hound of the Baskervilles & The Valley of Fear;
  • Dr. Dobb's Journal: The World of Software Development;
  • Drug Discovery News: Discovery/Development/Diagnostics/Delivery;
  • DT: Defense Technology International;
  • Dunbar, Richard, Alcatraz;
  • Education Channel Partner: News, Trends, and Analysis for K-20 Sales Professionals;
  • Edwards, Aton, Preparedness Now!;
  • EGM: Electronic Gaming Monthly, the No. 1 Videogame Magazine;
  • Ehrman, Bart D., Lost Christianities: The Battles for Scriptures and the Faiths We Never Knew;
  • Ehrman, Bart D., Misquoting Jesus: The Story Behind Who Changed the Bible and Why;
  • Electronic Engineering Times: The Industry Newsweekly for the Creators of Technology;
  • Ellis, Joseph J., American Sphinx: The Character of Thomas Jefferson;
  • Ellis, Joseph J., His Excellency: George Washington;
  • Emergency Management: Strategy & Leadership in Critical Times;
  • Emerson, Steven, American Jihad: The Terrorists Living Among Us;
  • Erlewine, Robert, Monotheism and Tolerance: Recovering a Religion of Reason (Indiana Series in the Philosophy of Religion);
  • ESD: Embedded Systems Design;
  • Everitt, Anthony, Augustus: The Life of Rome's First Emperor;
  • Everitt, Anthony, Cicero: The Life and Times of Rome's Greatest Politician;
  • eWeek: The Enterprise Newsweekly;
  • Federal Computer Week: Powering the Business of Government;
  • Ferguson, Niall, Civilization: The West and the Rest;
  • Ferguson, Niall, Empire: The Rise and Demise of the British World Order and the Lessons for Global Power;
  • Ferguson, Niall, The Cash Nexus: Money and Power in the Modern World, 1700-2000;
  • Ferguson, Niall, The War of the World: Twentieth-Century Conflict and the Decline of the West;
  • Feuerbach, Ludwig, The Essence of Christianity (Sony eReader);
  • Fields, Nic, The Roman Army of the Principate 27 BC-AD 117;
  • Fields, Nic, The Roman Army of the Punic Wars 264-146 BC;
  • Fields, Nic, The Roman Army: the Civil Wars 88-31 BC;
  • Finkel, Caroline, Osman's Dream: The History of the Ottoman Empire;
  • Fisk, Robert, The Great War For Civilization: The Conquest of the Middle East;
  • Forstchen, William R., One Second After;
  • Fox, Robin Lane, The Classical World: An Epic History from Homer to Hadrian;
  • Frazer, James George, The Golden Bough (Volume 3): A Study in Magic and Religion (Sony eReader);
  • Freeh, Louis J., My FBI: Bringing Down the Mafia, Investigating Bill Clinton, and Fighting the War on Terror;
  • Freeman, Charles, The Greek Achievement: The Foundations of the Western World;
  • Friedman, Thomas L. The World Is Flat: A Brief History of the Twenty-First Century Further Updated and Expanded/Release 3.0;
  • Friedman, Thomas L., The Lexus and the Olive Tree: Understanding Globalization;
  • Frontinus: Stratagems. Aqueducts of Rome. (Loeb Classical Library No. 174);
  • Fuller Focus: Fuller Theological Seminary;
  • Fuller, Graham E., A World Without Islam;
  • Gaubatz, P. David and Paul Sperry, Muslim Mafia: Inside the Secret Underworld That's Conspiring to Islamize America;
  • Ghattas, Kim, The Secretary: A Journey with Hillary Clinton from Beirut to the Heart of American Power;
  • Gibson, William, Neuromancer;
  • Gilmour, Michael J., Gods and Guitars: Seeking the Sacred in Post-1960s Popular Music;
  • Global Services: Strategies for Sourcing People, Processes, and Technologies;
  • Glucklich, Ariel, Dying for Heaven: Holy Pleasure and Suicide Bombers-Why the Best Qualities of Religion Are Also It's Most Dangerous;
  • Goldberg, Jonah, Liberal Fascism: The Secret History of the American Left, From Mussolini to the Politics of Meaning;
  • Goldin, Shmuel, Unlocking the Torah Text Vayikra (Leviticus);
  • Goldsworthy, Adrian, Caesar: Life of a Colossus;
  • Goldsworthy, Adrian, How Rome Fell: Death of a Superpower;
  • Goodman, Lenn E., Creation and Evolution;
  • Goodwin, Doris Kearns, Team of Rivals: The Political Genius of Abraham Lincoln;
  • Gopp, Amy, et.al., Split Ticket: Independent Faith in a Time of Partisan Politics (WTF: Where's the Faith?);
  • Gordon, Michael R., and Bernard E. Trainor, Cobra II: The Inside Story of the Invasion and Occupation of Iraq;
  • Government Health IT: The Magazine of Public/private Health Care Convergence;
  • Government Technology's Emergency Management: Strategy & Leadership in Critical Times;
  • Government Technology: Solutions for State and Local Government in the Information Age;
  • Grant , Michael, The Climax of Rome: The Final Achievements of the Ancient World, AD 161 - 337;
  • Grant, Michael, The Classical Greeks;
  • Grumberg, Orna, and Helmut Veith, 25 Years of Model Checking: History, Achievements, Perspectives;
  • Halberstam, David, War in a Time of Peace: Bush, Clinton, and the Generals;
  • Hammer, Reuven, Entering Torah Prefaces to the Weekly Torah Portion;
  • Hanson, Victor Davis, An Autumn of War: What America Learned from September 11 and the War on Terrorism;
  • Hanson, Victor Davis, Between War and Peace: Lessons from Afghanistan to Iraq;
  • Hanson, Victor Davis, Carnage and Culture: Landmark Battles in the Rise of Western Power;
  • Hanson, Victor Davis, How The Obama Administration Threatens Our National Security (Encounter Broadsides);
  • Hanson, Victor Davis, Makers of Ancient Strategy: From the Persian Wars to the Fall of Rome;
  • Hanson, Victor Davis, Ripples of Battle: How Wars of the Past Still Determine How We Fight, How We Live, and How We Think;
  • Hanson, Victor Davis, The End of Sparta: A Novel;
  • Hanson, Victor Davis, The Soul of Battle: From Ancient Times to the Present Day, How Three Great Liberators Vanquished Tyranny;
  • Hanson, Victor Davis, Wars of the Ancient Greeks;
  • Harnack, Adolf Von, History of Dogma, Volume 3 (Sony Reader);
  • Harris, Alex, Reputation At Risk: Reputation Report;
  • Harris, Sam, Letter to a Christian Nation;
  • Harris, Sam, The End of Faith: Religion, Terror, and the Future of Reason;
  • Hayek, F. A., The Road to Serfdom;
  • Heilbroner, Robert L., and Lester Thurow, Economics Explained: Everything You Need to Know About How the Economy Works and Where It's Going;
  • Hempel, Sandra, The Strange Case of The Broad Street Pump: John Snow and the Mystery of Cholera;
  • Hinnells, John R., A Handbook of Ancient Religions;
  • Hitchens, Christopher, God Is Not Great: How Religion Poisons Everything;
  • Hogg, Ian V., The Encyclopedia of Weaponry: The Development of Weaponry from Prehistory to 21st Century Warfare;
  • Hugo, Victor, The Hunchback of Notre Dame;
  • Humphrey, Caroline & Vitebsky, Piers, Sacred Architecture;
  • Huntington, Samuel P., The Clash of Civilizations and the Remaking of World Order;
  • Info World: Information Technology News, Computer Networking & Security;
  • Information Week: Business Innovation Powered by Technology:
  • Infostor: The Leading Source for Enterprise Storage Professionals;
  • Infrastructure Insite: Bringing IT Together;
  • Insurance Technology: Business Innovation Powered by Technology;
  • Integrated Solutions: For Enterprise Content Management;
  • Intel Premier IT: Sharing Best Practices with the Information Technology Community;
  • Irwin, Robert, Dangerous Knowledge: Orientalism and Its Discontents;
  • Jeffrey, Grant R., The Global-Warming Deception: How a Secret Elite Plans to Bankrupt America and Steal Your Freedom;
  • Jewkes, Yvonne, and Majid Yar, Handbook of Internet Crime;
  • Johnson, Chalmers, Blowback: The Costs and Consequences of American Empire;
  • Journal, The: Transforming Education Through Technology;
  • Judd, Denis, The Lion and the Tiger: The Rise and Fall of the British Raj, 1600-1947;
  • Kagan, Donald, The Peloponnesian War;
  • Kansas, Dave, The Wall Street Journal Guide to the End of Wall Street as We Know It: What You Need to Know About the Greatest Financial Crisis of Our Time--and How to Survive It;
  • Karsh, Efraim, Islamic Imperialism: A History;
  • Kasser, Rodolphe, The Gospel of Judas;
  • Katz, Solomon, The Decline of Rome and the Rise of Medieval Europe: (The Development of Western Civilization);
  • Keegan, John, Intelligence in War: The Value--and Limitations--of What the Military Can Learn About the Enemy;
  • Kenis, Leo, et. al., The Transformation of the Christian Churches in Western Europe 1945-2000 (Kadoc Studies on Religion, Culture and Society 6);
  • Kepel, Gilles, Jihad: The Trail of Political Islam;
  • Kiplinger's: Personal Finance;
  • Klein, Naomi, The Shock Doctrine: The Rise of Disaster Capitalism;
  • KM World: Content, Document, and Knowledge Management;
  • Koestler, Arthur, Darkness at Noon: A Novel;
  • Kostova, Elizabeth, The Historian;
  • Kuttner, Robert, The Squandering of America: How the Failure of Our Politics Undermines Our Prosperity;
  • Lake, Kirsopp, The Text of the New Testament, Sony Reader;
  • Laur, Timothy M., Encyclopedia of Modern US Military Weapons ;
  • Leffler, Melvyn P., and Jeffrey W. Legro, To Lead the World: American Strategy After the Bush Doctrine;
  • Lendon, J. E., Soldiers and Ghosts: A History of Battle in Classical Antiquity;
  • Lenin, V. I., Imperialism the Highest Stage of Capitalism;
  • Lennon, John J., There is Absolutely No Reason to Pay Too Much for College!;
  • Lewis, Bernard, The Crisis of Islam: Holy War and Unholy Terror;
  • Lewis, Bernard, What Went Wrong?: The Clash Between Islam and Modernity in the Middle East;
  • Lifton, Robert J., Greg Mitchell, Hiroshima in America;
  • Limberis, Vasiliki M., Architects of Piety: The Cappadocian Fathers and the Cult of the Martyrs;
  • Lipsett, B. Diane, Desiring Conversion: Hermas, Thecla, Aseneth;
  • Livingston, Jessica, Founders At Work: Stories of Startups' Early Days;
  • Livy, Rome and the Mediterranean: Books XXXI-XLV of the History of Rome from its Foundation (Penguin Classics);
  • Louis J., Freeh, My FBI: Bringing Down the Mafia, Investigating Bill Clinton, and Fighting the War on Terror;
  • Mackay, Christopher S., Ancient Rome: A Military and Political History;
  • Majno, Guido, The Healing Hand: Man and Wound in the Ancient World;
  • Marcus, Greil,Invisible Republic: Bob Dylan's Basement Tapes;
  • Marshall-Cornwall, James, Napoleon as Military Commander;
  • Maughm, W. Somerset, Of Human Bondage;
  • McCluskey, Neal P., Feds in the Classroom: How Big Government Corrupts, Cripples, and Compromises American Education;
  • McCullough, David, 1776;
  • McCullough, David, John Adams;
  • McCullough, David, Mornings on Horseback: The Story of an Extraordinary Family, a Vanished Way of Life and the Unique Child Who Became Theodore Roosevelt;
  • McLynn, Frank, Marcus Aurelius: A Life;
  • McManus, John, Deadly Brotherhood, The: The American Combat Soldier in World War II ;
  • McMaster, H. R., Dereliction of Duty: Johnson, McNamara, the Joint Chiefs of Staff, and the Lies That Led to Vietnam;
  • McNamara, Patrick, Science and the World's Religions Volume 1: Origins and Destinies (Brain, Behavior, and Evolution);
  • McNamara, Patrick, Science and the World's Religions Volume 2: Persons and Groups (Brain, Behavior, and Evolution);
  • McNamara, Patrick, Science and the World's Religions Volume 3: Religions and Controversies (Brain, Behavior, and Evolution);
  • Meacham, Jon, American Lion: Andrew Jackson in the White House;
  • Mearsheimer, John J., and Stephen M. Walt, The Israel Lobby and U.S. Foreign Policy;
  • Meier, Christian, Caesar: A Biography;
  • Menzies, Gaven, 1421: The Year China Discovered America;
  • Metaxas, Eric, Bonhoeffer: Pastor, Martyr, Prophet, Spy;
  • Michael, Katina and M.G. Michael, Innovative Automatic Identification and Location-Based Services: From Barcodes to Chip Implants;
  • Migliore, Daniel L., Faith Seeking Understanding: An Introduction to Christian Theology;
  • Military & Aerospace Electronics: The Magazine of Transformation in Electronic and Optical Technology;
  • Millard, Candice, Theodore Roosevelt's Darkest Journey: The River of Doubt;
  • Mommsen, Theodor, The History of the Roman Republic, Sony Reader;
  • Muller, F. Max, Chips From A German Workshop: Volume III: Essays On Language And Literature;
  • Murray, Janet, H., Hamlet On the Holodeck: The Future of Narrative in Cyberspace;
  • Murray, Williamson, War in the Air 1914-45;
  • MĂ¼ller, F. Max, Chips From A German Workshop;
  • Nader, Ralph, Crashing the Party: Taking on the Corporate Government in an Age of Surrender;
  • Nagl, John A., Learning to Eat Soup with a Knife: Counterinsurgency Lessons from Malaya and Vietnam;
  • Napoleoni, Loretta, Terrorism and the Economy: How the War on Terror is Bankrupting the World;
  • Nature: The International Weekly Journal of Science;
  • Negus, Christopher, Fedora 6 and Red Hat Enterprise Linux;
  • Network Computing: For IT by IT:
  • Network World: The Leader in Network Knowledge;
  • Network-centric Security: Where Physical Security & IT Worlds Converge;
  • Newman, Paul B., Travel and Trade in the Middle Ages;
  • Nietzsche, Friedrich Wilhelm, The Nietzsche-Wagner Correspondence;
  • Nixon, Ed, The Nixons: A Family Portrait;
  • O'Brien, Johnny, Day of the Assassins: A Jack Christie Novel;
  • O'Donnell, James J., Augustine: A New Biography;
  • OH & S: Occupational Health & Safety
  • Okakura, Kakuzo, The Book of Tea;
  • Optimize: Business Strategy & Execution for CIOs;
  • Ostler, Nicholas, Ad Infinitum: A Biography of Latin;
  • Parry, Jay A., The Real George Washington (American Classic Series);
  • Paton, W.R., The Greek Anthology, Volume V, Loeb Classical Library, No. 86;
  • Pausanius, Guide to Greece 1: Central Greece;
  • Perrett, Bryan, Cassell Military Classics: Iron Fist: Classic Armoured Warfare;
  • Perrottet, Tony, The Naked Olympics: The True Story of the Olympic Games;
  • Peters, Ralph, New Glory: Expanding America's Global Supremacy;
  • Phillips, Kevin, American Dynasty: Aristocracy, Fortune, and the Politics of Deceit in the House of Bush;
  • Pick, Bernhard; Paralipomena; Remains of Gospels and Sayings of Christ (Sony Reader);
  • Pimlott, John, The Elite: The Special Forces of the World Volume 1;
  • Pitre, Brant, Jesus and the Jewish Roots of the Eucharist: Unlocking the Secrets of the Last Supper;
  • Plutarch's Lives, X: Agis and Cleomenes. Tiberius and Gaius Gracchus. Philopoemen and Flamininus (Loeb Classical Library®);
  • Podhoretz, Norman, World War IV: The Long Struggle Against Islamofascism;
  • Posner, Gerald, Case Closed: Lee Harvey Oswald and the Assassination of JFK;
  • Potter, Wendell, Deadly Spin: An Insurance Company Insider Speaks Out on How Corporate PR Is Killing Health Care and Deceiving Americans;
  • Pouesi, Daniel, Akua;
  • Premier IT Magazine: Sharing Best Practices with the Information Technology Community;
  • Price, Monroe E. & Daniel Dayan, eds., Owning the Olympics: Narratives of the New China;
  • Profit: The Executive's Guide to Oracle Applications;
  • Public CIO: Technology Leadership in the Public Sector;
  • Putnam, Robert D., Bowling Alone : The Collapse and Revival of American Community;
  • Quintus of Smyrna, The Fall of Troy;
  • Rawles, James Wesley, Patriots: A Novel of Survival in the Coming Collapse;
  • Red Herring: The Business of Technology;
  • Redmond Channel Partner: Driving Success in the Microsoft Partner Community;
  • Redmond Magazine: The Independent Voice of the Microsoft IT Community;
  • Renan, Ernest, The life of Jesus (Sony eReader);
  • Richler, Mordecai (editor), Writers on World War II: An Anthology;
  • Roberts, Ian, The Energy Glut: Climate Change and the Politics of Fatness in an Overheating World;
  • Rocca, Samuel, The Army of Herod the Great;
  • Rodgers, Nigel, A Military History of Ancient Greece: An Authoritative Account of the Politics, Armies and Wars During the Golden Age of Ancient Greece, shown in over 200 color photographs, diagrams, maps and plans;
  • Rodoreda, Merce, Death in Spring: A Novel;
  • Romerstein, Herbert and Breindel, Eric,The Venona Secrets, Exposing Soviet Espionage and America's Traitors;
  • Ross, Dennis, Statecraft: And How to Restore America's Standing in the World;
  • Roth, Jonathan P., Roman Warfare (Cambridge Introduction to Roman Civilization);
  • SC Magazine: For IT Security Professionals;
  • Scahill, Jeremy, Blackwater: The Rise of the World's Most Powerful Mercenary Army [Revised and Updated];
  • Schama, Simon, A History of Britain, At the Edge of the World 3500 B.C. - 1603 A.D.;
  • Scheuer, Michael, Imperial Hubris: Why the West Is Losing the War On Terror;
  • Scheuer, Michael, Marching Toward Hell: America and Islam After Iraq;
  • Scheuer, Michael, Osama Bin Laden;
  • Scheuer, Michael, Through Our Enemies Eyes: Osama Bin Laden, Radical Islam, and the Future of America;
  • Scholastic Instructor
  • Scholastic Parent & Child: The Joy of Family Living and Learning;
  • Schopenhauer, Arthur, The World As Will And Idea (Sony eReader);
  • Schug-Wille, Art of the Byzantine World;
  • Schulze, Hagen, Germany: A New History;
  • Schweizer, Peter, Architects of Ruin: How Big Government Liberals Wrecked the Global Economy---and How They Will Do It Again If No One Stops Them;
  • Scott, Sir Walter, Ivanhoe;
  • Seagren, Eric, Secure Your Network for Free: Using Nmap, Wireshark, Snort, Nessus, and MRTG;
  • Security Technology & Design: The Security Executive's Resource for Systems Integration and Convergence;
  • Seibel, Peter, Coders at Work;
  • Sekunda N., & S. Northwood, Early Roman Armies;
  • Seneca: Naturales Quaestiones, Books II (Loeb Classical Library No. 450);
  • Sewall, Sarah, The U.S. Army/Marine Corps Counterinsurgency Field Manual;
  • Sheppard, Ruth, Alexander the Great at War: His Army - His Battles - His Enemies;
  • Shinder, Jason, ed., The Poem That Changed America: "Howl" Fifty Years Later;
  • Sidebottom, Harry, Ancient Warfare: A Very Short Introduction;
  • Sides, Hampton, Blood and Thunder: The Epic Story of Kit Carson and the Conquest of the American West;
  • Simkins, Michael, The Roman Army from Caesar to Trajan;
  • Sinchak, Steve, Hacking Windows Vista;
  • Smith, RJ, The One: The Life and Music of James Brown;
  • Software Development Times: The Industry Newspaper for Software Development Managers;
  • Software Test Performance;
  • Solomon, Norman, War Made Easy: How Presidents and Pundits Keep Spinning Us to Death;
  • Song, Lolan, Innovation Together: Microsoft Research Asia Academic Research Collaboration;
  • Sophocles, The Three Theban Plays, tr. Robert Fagles;
  • Sound & Vision: The Consumer Electronics Authority;
  • Southern, Pat, The Roman Army: A Social and Institutional History;
  • Sri, Edward, A Biblical Walk Through the Mass: Understanding What We Say and Do In The Liturgy;
  • Sri, Edward, Men, Women and the Mystery of Love: Practical Insights from John Paul II's Love and Responsibility;
  • Stair, John Bettridge, Old Samoa; Or, Flotsam and Jetsam From the Pacific Ocean;
  • Starr, Chester G., The Roman Empire, 27 B.C.-A.D. 476: A Study in Survival;
  • Starr, John Bryan, Understanding China: A Guide to China's Economy, History, and Political Culture;
  • Stauffer, John, Giants: The Parallel Lives of Frederick Douglass and Abraham Lincoln;
  • Steyn, Mark, America Alone: The End of the World As We Know It;
  • Strassler, Robert B., The Landmark Herodotus: The Histories;
  • Strassler, Robert B., The Landmark Thucydides: A Comprehensive Guide to the Peloponnesian War;
  • Strassler, Robert B., The Landmark Xenophon's Hellenika;
  • Strategy + Business;
  • Streete, Gail, Redeemed Bodies: Women Martyrs in Early Christianity;
  • Sullivan, James, The Hardest Working Man: How James Brown Saved the Soul of America;
  • Sumner, Graham, Roman Military Clothing (1) 100 BC-AD 200;
  • Sumner, Graham, Roman Military Clothing (2) AD 200-400;
  • Suskind, Ron, The One Percent Doctrine: Deep Inside America's Pursuit of Its Enemies Since 9/11:
  • Swanston, Malcolm, Mapping History Battles and Campaigns;
  • Swiderski, Richard M., Quicksilver: A History of the Use, Lore, and Effects of Mercury;
  • Swiderski, Richard M., Quicksilver: A History of the Use, Lore, and Effects of Mercury;
  • Swift, Jonathan, Gulliver's Travels;
  • Syme, Ronald, The Roman Revolution;
  • Talley, Colin L., A History of Multiple Sclerosis;
  • Tawil, Camille, Brothers In Arms: The Story of al-Qa'ida and the Arab Jihadists;
  • Tech Briefs: Engineering Solutions for Design & Manufacturing;
  • Tech Net: The Microsoft Journal for IT Professionals;
  • Tech Partner: Gain a Competitive Edge Through Solutions Providers;
  • Technology & Learning: Ideas and Tools for Ed Tech Leaders;
  • Tenet, George, At the Center of the Storm: The CIA During America's Time of Crisis;
  • Thackeray, W. M., Vanity Fair;
  • Thompson, Derrick & William Martin, Have Guitars ... Will Travel: A Journey Through the Beat Music Scene in Northampton 1957-66;
  • Tolstoy, Leo, Anna Karenina;
  • Trento, Joseph J., The Secret History of the CIA;
  • Twain, Mark, The Gilded Age: a Tale of Today;
  • Ungar, Craig, House of Bush House of Saud;
  • Unterberger, Richie, The Unreleased Beatles Music & Film;
  • VAR Business: Strategic Insight for Technology Integrators:
  • Virgil, The Aeneid
  • Virtualization Review: Powering the New IT Generation;
  • Visual Studio: Enterprise Solutions for .Net Development;
  • VON Magazine: Voice, Video & Vision;
  • Wall Street Technology: Business Innovation Powered by Technology;
  • Wallace, Robert, Spycraft: The Secret History of the CIA's Spytechs, from Communism to al-Qaeda;
  • Wang, Wallace, Steal This Computer Book 4.0: What They Won’t Tell You About the Internet;
  • Ward-Perkins, The Fall of Rome and the End of Civilization;
  • Warren, Robert Penn, All the King's Men;
  • Wasik, John F., Cul-de-Sac Syndrome: Turning Around the Unsustainable American Dream;
  • Weber, Karl, Editor, Lincoln: A President for the Ages;
  • Website Magazine: The Magazine for Website Success;
  • Weiner, Tim, Enemies: A History of the FBI;
  • Weiner, Tim, Legacy of Ashes: The History of the CIA;
  • West, Bing, The Strongest Tribe: War, Politics, and the Endgame in Iraq;
  • Wharton, Edith, The Age of Innocence;
  • Wilcox, Peter, Rome's Enemies (1) Germanics and Dacians;
  • Wise, Terence, Armies of the Carthaginian Wars 265 - 146 BC;
  • Wissner-Gross, What Colleges Don't Tell You (And Other Parents Don't Want You To Know) 272 Secrets For Getting Your Kid Into the Top Schools;
  • Wissner-Gross, What High Schools Don't Tell You;
  • Wolf, Naomi, Give Me Liberty: A Handbook for American Revolutionaries;
  • Wolf, Naomi, The End of America: Letter of Warning to a Young Patriot;
  • Woodward, Bob, Plan of Attack;
  • Woodward, Bob, The Agenda: Inside the Clinton White House;
  • Wright, Lawrence, The Looming Tower: Al-Qaeda and the Road to 9/11;
  • Wright-Porto, Heather, Beginning Google Blogger;
  • Xenophon, The Anabasis of Cyrus;
  • Yergin, Daniel, The Prize: The Epic Quest for Oil, Money, & Power;

Computing Reviews

Handy Tools, Links, etc.

This Website is a Belligerent Act

Share |

SmileyCentral.com

Radical Christian

My secure contact form

Choice Reviews Online

techLEARNING.com

CIO and Strategy & Business magazines

Mil-aero info

Defense Systems

Nature: International Weekly Journal of Science

CIO

Choice Reviews Online

SD Times: Software Development News

KMworld

SC Magazine for Security Professionals

Bloggers' Rights at EFF

The Scientist


Missile Defense
33 Minutes

Government Technology: Solutions for State and Local Government in the Information Age

Insurance & Technology

What's Running is a great tool so that you can see what is running on your desktop.

Process Lasso lets you view your processor and its responsiveness.

Online Armor lets you view your firewall status.

CCleaner - Freeware Windows Optimization

Avast is a terrific scrubber of all virus miscreants.

ClamWin is an effective deterrent for the little nasty things that can crop into your machine.

Ad-Aware is a sound anti-virus tool.

Blog Directory & Search engine

For all your electronic appliance needs research products on this terrific site.

Creative Commons License
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 Unported License.

Recent Comments

Note: Opinions expressed in comments are those of the authors alone and not necessarily those of this blogger. Comments are screened for relevance, substance, and tone, and in some cases edited, before posting. Reasoned disagreement is welcome, but not hostile, libelous, or otherwise objectionable statements. Original writing only, please. Thank you. Subscribe with Bloglines

Blog Smith Headline Animator

Library Thing: Chicks Dig Readers

Blog Archive

National Debt Clock

"Congress: I'm Watching"

A tax on toilet paper; I kid you not. According to the sponsor, "the Water Protection and Reinvestment Act will be financed broadly by small fees on such things as . . . products disposed of in waste water." Congress wants to tax what you do in the privacy of your bathroom.

The Religion of Peace

Portrait of Thinking Hero

Portrait of Thinking Hero
1844-1900

Check out:

Check out:
Chicks dig readers.
@ Blog Smith. Powered by Blogger.