Mark A. Stoffan

There are 16 included publications by Mark A. Stoffan :

TitleDateViewsBrief Description
American Battle Monuments Commission 2010 1060 Review of website American Battle Monuments Commission. Access: www.abmc.gov The American Battle Monuments Commission (ABMC) administers and maintains American military cemeteries and battle monuments located overseas.
Australian War Memorial 2006 343 Review of website Australian War Memorial. Access: www.awm.gov.au Australians participated heavily in both world wars and have fought more recently in Korea, Vietnam, and Iraq. The Australian War Memorial in Canberra offers a wealth of information “t...
British History Online 2007 489 Review of website British History Online. Access: www.british-history.ac.uk/ British History Online is the “digital library containing some of the core printed primary and secondary sources for the medieval and modern history of the British Isles.” A...
Chasing Moore’s Law: Information Technology Policy in the United States 2005 530 Review of book: Chasing Moore’s Law: Information Technology Policy in the United States. Moore’s Law is the name given to the historical trend that the number of switches that may be placed on a computer microchip doubles every eighteen months.
Chefs of the Mountains 2013 693 Review of book "Chefs of the Mountains." By John E. Batchelor.
Department of Homeland Security 2014 1059 Review of website Department of Homeland Security. Access: www.dhs.gov The U.S. Department of Homeland Security (DHS) has broad responsibility for overseeing national security affairs. Its official website has many resources for users including K–1...
HistoryCentral.com 2003 679 Review of website History Central. Access: previously www.multied.com is now www.historycentral.com
Jamestown Rediscovery 2004 395 Review of website Jamestown Rediscovery which is now Historic Jamestowne. Access: www.historicjamestowne.org The site contains a history of the Jamestown settlement with information on key figures and events, including a historical timeline.
John F. Kennedy Library and Museum 2011 347 Review of website John F. Kennedy Presidential Library and Museum. Access: www.jfklibrary.org/ The site contains a wealth of information on John F. Kennedy as well as the times in which he lived.
Moving Here: 200 Years of Migration in England 2008 520 Review of website Moving Here: 200 years of migration in England. Website is now archived and no longer active. Access: webarchive.nationalarchives.gov.uk/+/http://www.movinghere.org.uk/; The site was a joint project of 30 museums, archives, and lib...
Nixon Presidential Library and Museum 2012 503 Review of the website Nixon presidential Library and Museum. Access: nixonlibPary.gov Extensive background information on the 37th president and his wife is available. Online exhibits offer a mix of textual, visual and audio files, including the famo...
Returning Classification to the Library Catalog 2008 551 The concept of a classified catalog, or using classification as a form of subject access,has been almost forgotten by contemporary librarians. Recent developments indicate that this is changing as libraries seek to enhance the capabilities of their o...
So You Think You Know Gettysburg? Volume 2 2014 592 Review of the book "So You Think You Know Gettysburg? Volume 2.” By James and Suzanne Gindlesperger.
U.S. Army Center for Military History 2002 658 Review of website U.S. Army Center of Military History. Access: www.history.army.mil While mainly focused toward the education of military personnel, the center provides much material ofinterest to a wider audience.
User Authentication in the Public Areas of Academic Libraries in North Carolina 2015 1404 The clash of principles between protecting privacy and protecting security can create an impasse between libraries, campus IT departments, and academic administration over authentication issues with the public area PCs in the library. This research t...
User authentication in the public area of academic libraries in North Carolina 2015 151 The clash of principles between protecting privacy and protecting security can create an impasse between libraries, campus IT departments, and academic administration over authentication issues with the public area PCs in the library. This research t...