You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Darcy Scott, 50-something, and trying to maintain her high standard of network television journalism, finds herself being forced to fight the natural aging process for women by the "good ol' boys' club," as she investigates her old college classmates, Congressman Elliott Lodge and Dr. Raymond Miller. Congressman Lodge is campaigning for the Vice Presidency of the United States. He has convinced himself, by spinning the facts to suit his own reality, that he can purify this nation through gene control. Dr. Miller assist by using uneducated, poor, Mexican girls as surrogate mothers; inseminating them with sperm and eggs from Aryan looking college students, and then selling their babies to uppe...
Includes subject section, name section, and 1968-1970, technical reports.
This is the fifth volume of Dr. Justin Glenn’s comprehensive history that traces the “Presidential line” of the Washingtons. Volume One began with the immigrant John Washington, who settled in Westmoreland Co., Va., in 1657, married Anne Pope, and became the great-grandfather of President George Washington. It continued the record of their descendants for a total of seven generations. Volume Two highlighted notable family members in the next eight generations of John and Anne Washington’s descendants, including such luminaries as General George S. Patton, the author Shelby Foote, and the actor Lee Marvin. Volume Three traced the ancestry of the early Virginia members of this “Presi...
None
None
None
None
We live in a wired society, with computers containing and passing around vital information on both personal and public matters. Keeping this data safe is of paramount concern to all. Yet, not a day seems able to pass without some new threat to our computers. Unfortunately, the march of technology has given us the benefits of computers and electronic tools, while also opening us to unforeseen dangers. Identity theft, electronic spying, and the like are now standard worries. In the effort to defend both personal privacy and crucial databases, computer security has become a key industry. A vast array of companies devoted to defending computers from hackers and viruses have cropped up. Research ...