10/31/2011

Observation Oriented Modeling: Analysis of Cause in the Behavioral Sciences (Elsevier Science & Technology Books) Review

Observation Oriented Modeling: Analysis of Cause in the Behavioral Sciences (Elsevier Science and Technology Books)
Average Reviews:

(More customer reviews)
I am currently a first-year graduate student in the Experimental Psychology track, but I was still an undergrad when I started using Dr. Grice's program. I found it easy to understand and work with and have since used it for presentations in my advanced statistics class. I am currently working with my mentor on a paper which used Observation Oriented Modeling to analyze data from many experiments and create a new perspective on the topic.
I think that this book has been useful in allowing me as a growing student to expand my perspective on statistics, the way we view cause and effect, and the many different ways that are still to be seen.
I would recommend this book to anyone who wishes to further their knowledge of statistics, experience a novel view of cause in behavioral sciences, or even just run some interesting analyses and gain insight into their data.

Click Here to see more reviews about: Observation Oriented Modeling: Analysis of Cause in the Behavioral Sciences (Elsevier Science & Technology Books)



Buy NowGet 25% OFF

Click here for more information about Observation Oriented Modeling: Analysis of Cause in the Behavioral Sciences (Elsevier Science & Technology Books)

Read More...

10/30/2011

The Data Model Resource Book, Vol. 3: Universal Patterns for Data Modeling Review

The Data Model Resource Book, Vol. 3: Universal Patterns for Data Modeling
Average Reviews:

(More customer reviews)
As an analyst for a large manufacturing company's ERP implementation, I was responsible for a very complex and critical area called Classifications. Classifications was the place where all products, vendors, or customers were grouped into buckets based on similar behavior. For example, if this company manufactured vehicles, there could be classifications for hybrids, sports cars, SUVs, minivans, etc. To better understand classifications, I dived into screens, help files, and actual database tables and after several weeks, completed a classifications data model. The model I produced was very similar to the data model that appears on page 224 of "The Data Model Resource Book Volume 3: Universal Patterns for Data Modeling" by Len Silverston and Paul Agnew.
This book contains a collection of patterns, which are general building blocks that could be used as the basis for just about any type of data modeling within any industry. Classifications is one example, and there are a collection of others such as roles, statuses, and contact mechanisms. Whereas Volumes 1 and 2 in The Data Model Resource Book series contained models for common business processes or industries, this volume contains patterns that cross through all processes and industries. Consistent with the series however, the purpose of this text is to save the modeler time so instead of starting from scratch, the modeler can start from a reliable and proven foundation. Realizing these patterns exist and making them work for your particular modeling assignment can result in a higher quality data model and a greater level of consistency within your organization.
A majority of the book is dedicated to chapters which describe how to model a pattern at different levels of generalization. Level 1 is the most concrete and this is where terms and rules a business analyst are familiar with are shown, such as email address and telephone number. Level 2 through 4 go through increasingly more generized levels with Level 4 being the most generalized. The Classifications example I encountered in the ERP package for example was a Level 3 model, very generalized so that it can be leveraged by any industry. The book makes an important point that there are situations where one level is more appropriate than another, and sometimes the modeler must trade the familiarity and business rule enforcement of a Level 1 with the flexibility available in a Level 2, 3, or 4. For example, a phone number and email address from a Level 1 model would be generalized into contact mechanism data in a Level 2 model. This extra flexibility allows for accommodating other ways of contacting someone that may not have been specified (for example, via a person's "voice over IP" or Skype number). The book also makes the point that sometimes on a single model you can combine different levels for the same requirement (i.e. a hybrid approach).
Chapter 1 introduces the concept of a universal pattern as well as the terms and symbols used throughout the book. The goals for the book are also clearly articulated, in addition to the intended audience and a summary of each chapter. There is a wonderful furniture analogy used to distinguish a universal data model from a universal pattern. Universal data models (the subject of the first two volumes of The Data Model Resource Book), are similar to already constructed standard tables and chairs. The consumer can obtain this furniture instead of build the tables and chairs from scratch. Similarly, the modeler can reuse an inventory or claims universal data model instead of building it from scratch. Universal patterns are similar to the dovetail joints of the furniture, common pieces that exist in already built tables and chairs as well as custom furniture. Universal patterns are the building blocks such as the roles and statuses behind any modeling project.
Chapters 2 through 8 each focus on a particular pattern. Chapters 2 and 3 focus on parties and roles; Chapter 2 on declaration roles and Chapter 3 on contextual roles. A party is a person or organization of importance to the business, and declaration roles are those roles that are independent of any business event while contextual roles are dependent on a particular business event. For example Bob the person can have a declarative role of `Doctor', yet when an insurance claim is filed, they can also have the contextual role of `Primary Care Physician'. Chapter 4 focuses on similar structures for relating data including hierarchies, aggregations, and peer-to-peer relationships. Chapter 5 focuses on taxonomies and classifications, and Chapter 6 on patterns for states that business concepts go through. Chapter 7 contains patterns for getting in touch with parties, such as those patterns for modeling telephone number and email address. Chapter 8 focuses on how to model business rules including the rule itself, the factors involved in the rule, and the outcomes of the rule.
I was impressed with the consistency and comprehensiveness of each of these chapters. These chapters follow a similar format of demonstrating each of the four levels of detail. Each chapter begins with an explanation of the pattern and a discussion of its importance. Then for each of the four levels, there is a section on the reason for the level, how the pattern works (with lots of examples), when the pattern should be used, and the weaknesses of the pattern. I found the charts and tables to be extremely useful in the text, especially the Summary of Patterns table at the end of each chapter.
Chapter 9 focuses on how to apply these patterns in many types of efforts including both relational and dimensional modeling efforts and both application and enterprise areas of scope. As with the other chapters, there is a great summary at the end on the strengths and weaknesses of patterns with each type of effort. Chapter 10 adds the human dynamics side to incorporating patterns, as success or failure is heavily connected with people's perception or trust. Four principles are discussed, that will help acceptance and usage of the patterns: Understand motivations and work toward meeting them, Develop a clear, common, compelling vision, Develop trust, and Manage conflict effectively.
To summarize, under every data model is a set of common building blocks, clearly explained in "Universal Patterns for Data Modeling". I would recommend this book for every analyst, modeler, or architect who is striving for a level of information consistency within their organization. Whether you are just starting your modeling adventure or have been in the modeling for decades, you will find these patterns invaluable tools for every modeling effort.


Click Here to see more reviews about: The Data Model Resource Book, Vol. 3: Universal Patterns for Data Modeling



Buy NowGet 25% OFF

Click here for more information about The Data Model Resource Book, Vol. 3: Universal Patterns for Data Modeling

Read More...

10/29/2011

I Could Tell You But Then You Would Have to Be Destroyed By Me: Emblems from the Pentagon's Black World Review

I Could Tell You But Then You Would Have to Be Destroyed By Me: Emblems from the Pentagon's Black World
Average Reviews:

(More customer reviews)
When I first saw this book being offered to pre-order, I signed up immediately. I had read his previous book "Terror Taxi" about the U.S. Government's clandestine rendering program for terrorists and found it to be fascinating. I also am an enthusiast and fan of a lot of the U.S. military's aerospace "black projects"-especially black aircraft develpoment. I'm also into the patch insignia that a lot of these military organzations/units use to indirectly show the project they represent or support.
I think he has done a great job of research and packaging this project- from the cool patch emblazoned on the cover to the color pictures of each
patch described in the inside. A lot of effort went into this cool book!
Very tasty reading if you enjoy that sort of thing-which I do!


Click Here to see more reviews about: I Could Tell You But Then You Would Have to Be Destroyed By Me: Emblems from the Pentagon's Black World

Updated with New Information and Additional Patches They're on the shoulders of all military personnel: patches showing what a soldier's unit does. But what if that's top secret? "A glimpse of [the Pentagon's] dark world through a revealing lens—patches—the kind worn on military uniforms. . . The book offers not only clues into the nature of the secret programs, but also a glimpse of zealous male bonding among the presumed elite of the military-industrial complex. The patches often feel like fraternity pranks gone ballistic." —William Broad, The New York Times I COULD TELL YOU. . . is a bestselling collection of more than seventy military patches representing secret government projects. Here author/photographer/investigator Trevor Paglen explores classified weapons projects and intelligence operations by scrutinizing their own imagery and jargon, disclosing new facts about important military units, which are here known by peculiar names ("Goat Suckers," "Grim Reapers," "Tastes Like Chicken") and illustrated with occult symbols and ridiculous cartoons. The precisely photographed patches—worn by military personnel working on classified missions, such as those at the legendary Area 51—reveal much about a strange and eerie world about which little was previously known. "A fresh approach to secret government." —Steven Aftergood, The Federation of American Scientists "An impressive collection." —Justin Rood, ABC News "A fascinating set of shoulder patches." —Stephen Colbert, The Colbert Report "I was fascinated... [Paglen] has assembled about 40 colorful patch insignia from secret, military 'black' programs that are hardly ever discussed in public. He has plenty of regalia from the real denizens of Area 51." —Alex Beam, The Boston Globe

Buy NowGet 34% OFF

Click here for more information about I Could Tell You But Then You Would Have to Be Destroyed By Me: Emblems from the Pentagon's Black World

Read More...

10/27/2011

Underground Bases & Tunnels: What Is the Government Trying to Hide? Review

Underground Bases and Tunnels: What Is the Government Trying to Hide
Average Reviews:

(More customer reviews)
Sauder's book is the best and, as far as I know, only book on the rather important subject of high-tech, super-expensive bases, with their connecting tunnel systems. Sauder's specialty is researching and obtaining U.S. Government documents. What he found out under the subject of underground bases and tunnels is shocking! Packed with government diagrams and patents, this is a one-of-a-kind book!

Click Here to see more reviews about: Underground Bases & Tunnels: What Is the Government Trying to Hide

Go behind the scenes into little-known corners of the public record and discover how corporate America has worked hand-in-glove with the Pentagon for decades -- dreaming about, planning, and actually constructing secret underground bases. And newly-uncovered information indicates that the strangeness continues with bizarre, high-tech gadgets like portable, hand-held surgical lasers and injectable electronic IDs as small as a grain of rice!--This text refers to an out of print or unavailable edition of this title.

Buy Now

Click here for more information about Underground Bases & Tunnels: What Is the Government Trying to Hide

Read More...

10/26/2011

Hitler's Suppressed and Still-Secret Weapons, Science and Technology Review

Hitler's Suppressed and Still-Secret Weapons, Science and Technology
Average Reviews:

(More customer reviews)
from the publisher:
Now we know what spooked the Allies in the closing months of the war and why they were in such a panic to win quickly. The Allies assembled intelligence reports of supermetals, electric guns, and ray weapons able to stop the engines of Allied aircraft in addition to their worst fears of x-ray and laser weaponry.
Then there were the bombs. Contained in this book are reports of structured bombs of nipolit, N-stoff bombs, cold bombs, oxygen bombs which destroyed all life, atomic bombs and rumors of the mysterious molecular bomb. The true history of the fuel-air bomb is revealed by our own military. There is even a probability that the SS black alchemists of the 3rd Reich were experimenting with red mercury bomb technology.
This book documents very large mystery rockets under development in Germany, far beyond the V-2. Technological history is also examined. Guess who invented the computer, magnetic tape and computer programs? How about refining crude oil using sound waves or producing gasoline for 11 cents per gallon or the synthetic penicillin substitute, "3065"?
Very exotic technologies are also discussed including German experiments in time, sustained fusion reactions, zero point energy and travel in deep space.
Chapters include: The Kammler Group; German Flying Disc Update (Witness to a German Flying Disc); The Electromagnetic Vampire; Liquid Air; Synthetic Blood; German Free Energy Research; German Atomic Tests; "Project Hexenkessel" The Fuel-Air Bomb; Supermetals; Red Mercury; Means To Stop Engines; Magnetic Wave-Motorstoppmittel; "Death Rays"; Distillation of Crude Oil Using Sound Waves; What is Happening in Antarctica?; Large German Mystery Rockets; Experiments in Time; tons more.

Click Here to see more reviews about: Hitler's Suppressed and Still-Secret Weapons, Science and Technology

Nazi technology extended far further than has generally been acknowledged, in fact to almost unfathomable levels. Yet conventional historians have absolutely failed to provide an adequate picture of the technology, and weaponry of the Third Reich. Was it government intervention, peer scepticism or just plain intellectual laziness which caused these historians to stop digging? Henry Stevens takes the story to the mat, providing a glimpse into German research of those times relying mostly on the governments own reports. Some were declassified just or this book. Stevens also uses direct Nazi sources, summarised and translated in this book. Now we know what spooked the Allies in the closing months of World War II and why they were in such a panic to win quickly - they had assembled mind-blowing intelligence reports of Nazi development of supermetals, electric guns, and ray weapons that could stop the engines of Allied aircraft - in addition to highly feared X-ray and laser weaponry. Then there were the bombs.Contained in this book are reports of structured bombs of nipolit, N-stoff bombs, cold bombs, oxygen bombs which could destroy all life, atomic bombs and rumours of the mysterious molecular bomb. The true history of the fuel-air bomb is revealed by our own military. There is even a probability that the SS black alchemists of the Third Reich were experimenting with red mercury bomb technology. Very exotic technologies are also discussed including German experiments in time, Very fusion reactions, zero point energy and travel in deep space. The reasons for the scientific flowering in Germany during this period are discussed in terms of a completely different scientific paradigm shared by these scientists and how it relates to a unified view of gravity, matter and energy.

Buy NowGet 33% OFF

Click here for more information about Hitler's Suppressed and Still-Secret Weapons, Science and Technology

Read More...

10/25/2011

Power Girl Review

Power Girl
Average Reviews:

(More customer reviews)
When I started reading comics Power Girl was a member of Justice League Europe. I fell in love with the character immediately, not because of the way she looks, but because she was fallible. She was insecure, had problems with men, was unsure of the history of her life. I could identify with her more than with any other character.
(Spider-Man, the character most people associate as the character with real-life problems was Marvel's biggest character, guest starred in everybody's books, and was married to a red-headed supermodel by the time I started reading comics)
Power Girl's history is complicated. When the DC Universe consisted of a number of alternate Earths, Power Girl was an alternate version of Supergirl. For some reason, after the Crisis on Infinite Earths, DC kept the character active, but in order to do so they gave her a new origin in which she was actually from ancient Atlantis sent forward into the future with her memory altered for her protection.
Over the last few years Power Girl has been appearing in JSA, written by Geoff Johns, who has been dropping hints that Power Girl isn't actually from Atlantis. Then in JSA Classified # 1-4 (part of this collection) he finally explains her origin. But first he messes with us. Not only is there the possible Kryptonian and Atlantean origins, but added to the mix is a possible connection to the Legion of Superheroes!
Being a Power Girl fan, I read the monthly issues as they came out, and I was taken on a roller-coaster ride of possibilities. The writing is good, but it definately helps to know Power Girl's background in order to follow the story. Amanda Conner's artwork is excellent, beautifully capturing character and action and drama. There are no generic drawings here (you know, how some artists draw the same pose over and over?). Every panel has a feeling of life to it, even when the characters are just sitting there talking.
Possibly because Power Girl's background is so complex, this volume also collects some of her past exploits and origin stories. Still, it helps if you know about DC's multiple Earth history, and if you've read Crisis on Infinite Earths. This story is also a good prelude to Infinite Crisis, a sort-of sequal to Crisis also written by Johns.
If you love Power Girl like I do, this is a must have. If you don't love her like I do, this is still a good read.

Click Here to see more reviews about: Power Girl



Buy NowGet 27% OFF

Click here for more information about Power Girl

Read More...

10/24/2011

The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Review

The Cuckoo's Egg:  Tracking a Spy Through the Maze of Computer Espionage
Average Reviews:

(More customer reviews)
This was the second computer security book I read and it was like adding flame to a fire because it increased my curiosity and prompted me to want to know more about it, so I ended up reading Cyberpunk by Katie Hafner and John Markoff to get a more inside look. If you start reading it then you'll probably finish it the same day. It talks a scientist that stumbles on a mistake in the accounting part of his job as a scientist at Lawrence Berkely Lab and he makes the mistake into a chase through cyberspace. In the book the author takes on the role as a modern day Sherlock Holmes and in the end he realizes that it was only elementary.
Dealing with the CCC (Chaos Computer Club), Hunter (the main hacker), and the different networks will really make you think and keep you on your toes. Read it and see for yourself just how intense the experience will be. I advise you to get some sleep before you start because you probably won't be getting any anytime soon.

Click Here to see more reviews about: The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage



Buy Now

Click here for more information about The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage

Read More...

10/23/2011

Blank Spots on the Map: The Dark Geography of the Pentagon's Secret World Review

Blank Spots on the Map: The Dark Geography of the Pentagon's Secret World
Average Reviews:

(More customer reviews)
The U.S. National Security Act of 1947 established a national security structure which was felt to be necessary to protect the U.S. from what was perceived as serious threats from foreign and domestic enemies. Almost immediately a parallel structure, invisible to public, was created as a compliment to the public national security establishment. This parallel structure is what this absolutely fascinating book refers to as the "black world."
According to Trevor Paglen, a geographer by trade, this black world can bounded by adroit compilation of blank areas on official maps, deleted passages from official documents, and acute observations of restricted areas and activities. Well he has certainly done a very thorough job of it. He begins with the secret and unacknowledged government test sites scattered throughout the country, but especially in the South Western U.S. that actually employ an astonishingly large number military and civilian workers yet still are literarily off the map. He subsequently tackles such arcane topics as black operations, black funding, and a host of other unacknowledged, often denied, U.S. activities including questionable and even illegal programs and operations. Perhaps the most discouraging information he provides is how easily it is for officials of the black world to hoodwink congress and the media, both nominal guards against government excesses. Certainly the most astonishing thing he reveals is that the black world in total may employ as many as 4 million military and civilians who carry secret or higher clearances. The fact that this many people can be involved and yet so many black activities remain completely off the gird is pretty scary in itself.
This reviewer has tremendous respect for the academic discipline of geography. It combines some of the best features of social and physical science and perhaps is the most effective system for understanding the phenomenon of Globalization. Some 60 years ago one branch of geography that was called "cultural geography" sought to describe the relationship between societies and the environment in which they lived. The term may no longer be used, but Paglen is a cultural geographer in the best sense of the term.


Click Here to see more reviews about: Blank Spots on the Map: The Dark Geography of the Pentagon's Secret World



Buy Now

Click here for more information about Blank Spots on the Map: The Dark Geography of the Pentagon's Secret World

Read More...

10/22/2011

Black Coffee (Hercule Poirot Mysteries) Review

Black Coffee (Hercule Poirot Mysteries)
Average Reviews:

(More customer reviews)
Like a personal friend, our favorite authors have a voice we instinctively identify. We continue to read their books because we want to hear that voice again. Sadly, many of the voices we love are gone forever, and that includes Agatha Christie's. I found Black Coffee made me sad; it contained all the elements of a Christie -- the people, the place, the puzzle -- but it just wasn't right. I found myself mentally correcting the narrative to make it more "Christie-ish," the way I remember her.
I won't read The Unexpected Guest, just as I didn't continue to read Robert Goldsborough's game imitation of the Nero Wolfe books by Rex Stout. Rex's voice, too, is gone forever.
Whether or not you'll enjoy this book depends on what you read a book for. If you find yourself reading phrases over a second time, savoring the way the author used precisely the right words to speak right to you, you won't like this book. If you like a neat little puzzle, especially in the lightweight style of the drawing-room mysteries of the '30s and '40s, Black Coffee will satisfy you, though like others, I did wonder why the author chose to focus in on the murderer's hand at that crucial moment. Mrs. Christie would be appalled.

Click Here to see more reviews about: Black Coffee (Hercule Poirot Mysteries)



Buy Now

Click here for more information about Black Coffee (Hercule Poirot Mysteries)

Read More...

10/21/2011

Dark Eagles Review

Dark Eagles
Average Reviews:

(More customer reviews)
I had picked up "Dark Eagles" primarly because it was one of very few books to present information on "Have Donut" and similar projects in which the United States tested captured MiGs and other Soviet aircraft. I was pleasantly suprised to find that the rest of this book is as superbly researched and detailed as Peebles' glimpse into the testing of foreign equipment.
Peebles discusses, in amazing detail, the developments of such famous aircraft as the U-2, A-12, SR-71, F-117, "Have Blue" and "Tacit Blue." Peebles also delves into the history of the less-glamarous unmanned platforms such as the trisonic D-21 ("Tagboard") and various models of the Model 147 Firebee, used extensively in Vietnam.
This book is a must for anyone interested in black project aviation. It is well written and thoroughly researched, and is engaging to both the causal and technical reader.

Click Here to see more reviews about: Dark Eagles



Buy Now

Click here for more information about Dark Eagles

Read More...

10/20/2011

Tiger Trap: America's Secret Spy War with China Review

Tiger Trap: America's Secret Spy War with China
Average Reviews:

(More customer reviews)
David Wise writes with direct, swiftly moving prose and adds new information to the record; however, the analysis of Chinese intelligence activities is flawed and readers will not be able to place Chinese intelligence activity into context after studying this book.
Wise contributes new information in a couple of areas. He adds more detail about Gwo-Bao Min (Tiger Trap) than was previously available and weaves together the disparate threads connecting Chinese espionage allegations on West Coast. Wise fills in some of the gaps left in previous treatments. Wise also pulls together a good deal of information on the recent espionage cases in the last five years, which would only be available to a lay reader after several hours of research.
Unfortunately, Wise chooses not to take a step and look at the information he so assiduously collected. Instead, he relies on retired FBI agents, who repeat old platitudes about Chinese intelligence methods----platitudes that may never have been true to begin with. This might be tolerable if Wise himself had not collected a lot of data contradicting his opening chapter. Most Western observers believe Chinese intelligence methods are wildly different than Western or Russian models. They think, among other points, China relies on amateur collectors rather than professional intelligence officers, does not pay for secret information, and does not develop formal intelligence relationships.
Yet Wise charts the tale of the Chinese intelligence officer at the heart of recent espionage cases, involving Chi Mak, Kuo Tai-shen, James Fondren, and Gregg Bergersen. Chinese intelligence recruited these sources and paid them in exchange for US defense secrets. Why did they spy? Greed. Venality. One might be tempted to forgive Wise's reliance on out-dated analysis if these were new developments. However, Wise also provides a short summary of the Larry Wu-Tai Chin case, who spied from the 1940s to 1985. The Chin case looks and feels like one of the many cases run across the NATO-Warsaw Pact divide.
No coverage of Chinese intelligence today would be complete without a section on cyber (hacking), but there is little in Wise's treatment to commend. The cyber chapter is a summary of news clippings and official commentary. For better analyses of Chinese cyber activity, academic and policy journals, like Survival (IISS) and International Affairs, offer accessible (jargon-free) and thoughtful treatments that put Chinese cyber in perspective.
Ultimately, Tiger Trap is a good read with some new information about Chinese espionage cases; however, it is unsatisfying for anyone looking for anything that goes beyond the headlines. If there were more choices for reading about Chinese intelligence, this book would probably only rate 2/5 stars. There are, unfortunately, few alternatives to Wise's book and he should be recognized for mostly sticking to facts in the espionage cases. This redeeming feature makes Tiger Trap a useful reference guide and the clean writing makes it an easy read.

Click Here to see more reviews about: Tiger Trap: America's Secret Spy War with China



Buy NowGet 41% OFF

Click here for more information about Tiger Trap: America's Secret Spy War with China

Read More...

10/18/2011

How to Tell a Secret: Tips, Tricks & Techniques for Breaking Codes & Conveying Covert Information Review

How to Tell a Secret: Tips, Tricks and Techniques for Breaking Codes and Conveying Covert Information
Average Reviews:

(More customer reviews)
As a historian, I can appreciate this book. However, I purchased it as a gift for a 10 year old boy. The cover and title are EXTREMELY misleading. There is far more historical application of the process than actual how-to information. A better title would be "Secrets of history and how they weren't told"....

Click Here to see more reviews about: How to Tell a Secret: Tips, Tricks & Techniques for Breaking Codes & Conveying Covert Information



Buy Now

Click here for more information about How to Tell a Secret: Tips, Tricks & Techniques for Breaking Codes & Conveying Covert Information

Read More...

10/17/2011

Ufo Revelation: The Secret Technology Exposed? Review

Ufo Revelation: The Secret Technology Exposed
Average Reviews:

(More customer reviews)
It's about time that this book graced our bookcases - every home should have one (or more - give one to a nice friend)! Tim Matthews - what a writer,what a researcher. His omnipotent theorizing gives rise to the completion of this, the ultimate millennial Ufological hypothesis, flying triangles a-plenty with a superb conjecturalizational analysis of disk shaped aircraft. What more could anyone want?
The informative literature contained within these pages makes this the most convincing literary companion for those who reject the extraterrestrial hypothesis that has been in such abominable proliferation in recent living memory.
If you believed in extraterrestrial colonization of adjacent galactic clusters, then give Mr Matthews a try - and I'm confident that your views will be changed forever.
Well done Tim, and whencan we expect to see Volume 2?

Click Here to see more reviews about: Ufo Revelation: The Secret Technology Exposed

This title which claims that the majority of UFO sightings are due to secret projects conducted by US and UK governments, kept secret from the public.

Buy Now

Click here for more information about Ufo Revelation: The Secret Technology Exposed

Read More...

10/16/2011

Freedom of Expression in the American Military: A Communication Modeling Analysis Review

Freedom of Expression in the American Military: A Communication Modeling Analysis
Average Reviews:

(More customer reviews)
Cathy Packer is one of my professors at the University of North Carolina at Chapel Hill. There's no one that knows media law like she does. This book is just another example of how brilliant she is with her subject matter. Buy this book today. You won't regret it. A+

Click Here to see more reviews about: Freedom of Expression in the American Military: A Communication Modeling Analysis



Buy Now

Click here for more information about Freedom of Expression in the American Military: A Communication Modeling Analysis

Read More...

10/15/2011

The Woman from Mossad: The Story of Mordechai Vanunu and the Israeli Nuclear Program Review

The Woman from Mossad: The Story of Mordechai Vanunu and the Israeli Nuclear Program
Average Reviews:

(More customer reviews)
I preface my comments below by saying I truly enjoyed reading this book.
However, the editing in this book is terrible. I wouldn't attribute this to the author, as he seems like a phenomenal writer, but the typos are just annoying and sometimes led me to think I should discount the credibility of the book.
As for the substance, I think the author clearly writes this book from a viewpoint sympathetic to Vanunu; he writes as an advocate and not as an impartial objective journalist. To his credit though, he does make this agenda subtly but painstakingly clear on page one.
One thing I don't think is well-established is the author's assertion that Vanunu was acting purely for humanitarian reasons. This is taken as fact and without scrutiny by the author. He does not critically or sufficiently analyze Vanunu's alternative options in arriving at the conclusion that Vanunu had altruistic motives. Why DIDN'T he go to the IAEA first?? To me this would have been an obvious option, which even if it wasn't, the reason for discarding this option is not spelled out well enough other than for a lone short paragraph in the book. Given that this is the international body/watchdog set up specifically for the purpose of nuclear monitoring, I thought more analysis of the purported futility of this option was required.
Which brings me to my next point. One of the author's main criticisms of the treason charge was that Vanunu did not disclose the sensitive information to a foreign country, which is an element of that crime. Au contrare. While that claim is technically accurate, by publishing in a major international newspaper, the author glosses over the fact that in doing this Vanunu enabled disclosure of that information to EVERY (not just one) enemy of his country and that was a despicable, nation-abandoning act that deserves an even harsher punishment than he actually received (because he in fact committed **countless** acts of treason - one for every Arab and other enemy of Israel that benefited from this information). To me, that is the very definition of treason - a criminal charge whose purpose is intended to prevent individuals from harming the national security of the country to which the offender is a citizen. Vanunu did just that, and by the worst means possible, not only harming Israel's national security, but also damaging it diplomatically with its major allies.
To those who claim Israel was skirting international agreements by pursuing these weapons, that is in fact true. But you need look no further than a map of the Middle East and history books of that period describing bellicose declarations of the hostile Arab countries surrounding this small Jewish state to understand Israel's need for these weapons as a deterrent force, and know that their intended purpose was and still is defensive. This was the only way Israel could get them, and I think it speaks volumes, as an implied acknowledgement of this assertion as well as an attestation to the trust placed in Israel, that the civilized world's then-superpowers willingly turned a blind eye while having overt knowledge that these weapons were being developed by Israel. These countries welcomed Israel in The Nuclear Club because they knew it could be trusted as a responsible partner in harmonizing the Middle East's balance of power and serve as a long-term deterrent for other nations to think about seeking, producing and possibly detonating a nuclear bomb in the Middle East. Just look at what's happening today with Iran and you can clearly see the different attitudes expressed to their pursuit of the same, in light of that country's long and conceded history of terrorism-sponsoring (Hezbollah) and declarations of their pursued destruction of the Jewish State. To think that "equal opportunity" is the proper framework in which to analyze the propriety of a given country's pursuit of nuclear weapons is, I think, not only naive but incredibly outrageous.
I agree, if the author's assertions are in fact true, that Vanunu did not seem to be looking for money. But he damned well wanted notoriety, another human vice that unfortunately escapes an in-depth analysis by the author. (I think Vanunu knew full well that his offer to remain anonymous would have been a non-starter, for the reasons the author articulates very well.) He had revenge on his mind, too.
Those criticisms aside, I think this book has a fantastic discussion of the shocking game that is nuclear politics.
Last, I agree with the author that the later shameless decision by The Sunday Times to abandon Vanunu by not covering his legal defense costs is unequivocally an outright stab in the back and a black eye on this paper's otherwise internationally credible reputation. When someone gives you a scoop like this, as a paper I think you must undertake to unqualifiedly attempt to exonerate that individual no matter what the legal cost, and no matter how long that legal process may drag on and no matter what technicalities may not legally require you to do so. The fact that a contract was never signed to this effect also seems a little suspect to me, perhaps the result of deliberate oversight (a possibility not even remotely entertained by the author) rather than innocent scheduling conflicts as the author suggests, for the very reasons cited above.


Click Here to see more reviews about: The Woman from Mossad: The Story of Mordechai Vanunu and the Israeli Nuclear Program

After three years' military service, Mordechai Vanunu answered an ad for a control room job at the nuclear research center near Dimona. In 1976 he was assigned to Mochon 2, where he discovered the nuclear weapons program that he later divulged to Peter Hounam. Before his story could be published however, Vanunu met Cindy, a beautiful American woman who lured him to Rome. Caught in a trap, he was attacked by agents from Mossad (the Israeli secret service), drugged, and smuggled to Israel to stand trial for treason. Since then, Vanunu has spent more than 12 years in solitary confinement.In The Woman from Mossad, Hounam details the kidnap and what happened to Cindy when she was exposed by the author. He also names governments that secretly helped Israel.

Buy Now

Click here for more information about The Woman from Mossad: The Story of Mordechai Vanunu and the Israeli Nuclear Program

Read More...