Unlimited Access


Book Description

A former FBI agent discusses his time in the Clinton White House including the absence of security checks, Vince Foster's suicide, Travelgate, corrupt staffers, and more.
















Bioterrorism and Biocrimes


Book Description

The working paper is divided into two main parts. The first part is a descriptive analysis of the illicit use of biological agents by criminals and terrorists. It draws on a series of case studies documented in the second part. The case studies describe every instance identifiable in open source materials in which a perpetrator used, acquired, or threatened to use a biological agent. While the inventory of cases is clearly incomplete, it provides an empirical basis for addressing a number of important questions relating to both biocrimes and bioterrorism. This material should enable policymakers concerned with bioterrorism to make more informed decisions. In the course of this project, the author has researched over 270 alleged cases involving biological agents. This includes all incidents found in open sources that allegedly occurred during the 20th Century. While the list is certainly not complete, it provides the most comprehensive existing unclassified coverage of instances of illicit use of biological agents.




Entrepreneurship


Book Description

For junior/senior/graduate-level courses in Entrepreneurship, New Venture Creation, and Small Business Strategy. Based on the premise that entrepreneurship can be studied systematically, this text offers a comprehensive presentation of the best current theory and practice. It takes a resource-based point-of-view, showing how to acquire and use resources and assets for competitive advantage. FOCUS ON THE NEW ECONOMY * NEW-Use of the Internet-Integrated throughout with special treatment in Ch. 6. * Demonstrates to students how the new economy still follows many of the rigorous rules of economics, and gives them examples of business-to-business and business-to-customer firms so that they can build better business models. * NEW-2 added chapters on e-entrepreneurship-Covers value pricing; market segmentation; lock-in; protection of intellectual property; and network externalities. * Examines the new economy and the types of resources, capabilities, and strategies that are needed for success in the Internet world. * Resource-based theory-Introduced in Ch. 2 and revisited in each subsequent chapter to help tie concepts together. * Presents an overarching framework, and helps students focu




Congress's Constitution


Book Description

Cover -- Half Title -- Title -- Copyright -- Dedication -- Contents -- Acknowledgments -- Introduction -- PART ONE: SEPARATION-OF-POWERS MULTIPLICITY -- Prelude -- 1 Political Institutions in the Public Sphere -- 2 The Role of Congress -- PART TWO: CONGRESSIONAL HARD POWERS -- 3 The Power of the Purse -- 4 The Personnel Power -- 5 Contempt of Congress -- PART THREE: CONGRESSIONAL SOFT POWERS -- 6 The Freedom of Speech or Debate -- 7 Internal Discipline -- 8 Cameral Rules -- Conclusion: Toward a Normative Evaluation -- Notes -- Index -- A -- B -- C -- D -- E -- F -- G -- H -- I -- J -- K -- L -- M -- N -- O -- P -- Q -- R -- S -- T -- U -- V -- W -- Y -- Z