American Battle Monuments Commission |
2010 |
1230 |
Review of website American Battle Monuments Commission. Access: www.abmc.gov The American Battle Monuments Commission (ABMC) administers and maintains American military cemeteries and battle monuments located overseas. |
Australian War Memorial |
2006 |
376 |
Review of website Australian War Memorial. Access: www.awm.gov.au Australians participated heavily in both world wars and have fought more recently in Korea, Vietnam, and Iraq. The Australian War Memorial in Canberra offers a wealth of information “t... |
British History Online |
2007 |
522 |
Review of website British History Online. Access: www.british-history.ac.uk/ British History Online is the “digital library containing some of the core printed primary and secondary sources for the medieval and modern history of the British Isles.” A... |
Chasing Moore’s Law: Information Technology Policy in the United States |
2005 |
563 |
Review of book: Chasing Moore’s Law: Information Technology Policy in the United States. Moore’s Law is the name given to the historical trend that the number of switches that may be placed on a computer microchip doubles every eighteen months. |
Chefs of the Mountains |
2013 |
731 |
Review of book "Chefs of the Mountains." By John E. Batchelor. |
Department of Homeland Security |
2014 |
1109 |
Review of website Department of Homeland Security. Access: www.dhs.gov The U.S. Department of Homeland Security (DHS) has broad responsibility for overseeing national security affairs. Its official website has many resources for users including K–1... |
HistoryCentral.com |
2003 |
727 |
Review of website History Central. Access: previously www.multied.com is now www.historycentral.com |
Jamestown Rediscovery |
2004 |
427 |
Review of website Jamestown Rediscovery which is now Historic Jamestowne. Access: www.historicjamestowne.org The site contains a history of the Jamestown settlement with information on key figures and events, including a historical timeline. |
John F. Kennedy Library and Museum |
2011 |
372 |
Review of website John F. Kennedy Presidential Library and Museum. Access: www.jfklibrary.org/ The site contains a wealth of information on John F. Kennedy as well as the times in which he lived. |
Moving Here: 200 Years of Migration in England |
2008 |
569 |
Review of website Moving Here: 200 years of migration in England. Website is now archived and no longer active. Access: webarchive.nationalarchives.gov.uk/+/http://www.movinghere.org.uk/; The site was a joint project of 30 museums, archives, and lib... |
Nixon Presidential Library and Museum |
2012 |
550 |
Review of the website Nixon presidential Library and Museum. Access: nixonlibPary.gov Extensive background information on the 37th president and his wife is available. Online exhibits offer a mix of textual, visual and audio files, including the famo... |
Returning Classification to the Library Catalog |
2008 |
595 |
The concept of a classified catalog, or using classification as a form of subject access,has been almost forgotten by contemporary librarians. Recent developments indicate that this is changing as libraries seek to enhance the capabilities of their o... |
So You Think You Know Gettysburg? Volume 2 |
2014 |
634 |
Review of the book "So You Think You Know Gettysburg? Volume 2.” By James and Suzanne Gindlesperger. |
U.S. Army Center for Military History |
2002 |
694 |
Review of website U.S. Army Center of Military History. Access: www.history.army.mil While mainly focused toward the education of military personnel, the center provides much material ofinterest to a wider audience. |
User Authentication in the Public Areas of Academic Libraries in North Carolina |
2015 |
1583 |
The clash of principles between protecting privacy and protecting security can create an impasse between libraries, campus IT departments, and academic administration over authentication issues with the public area PCs in the library. This research t... |
User authentication in the public area of academic libraries in North Carolina |
2015 |
220 |
The clash of principles between protecting privacy and protecting security can create an impasse between libraries, campus IT departments, and academic administration over authentication issues with the public area PCs in the library. This research t... |