The Ghost of Our Beliefs

Chris J Mitchell
98

Is this stand alone short story, Joshua is a retired engineer, but was not just an engineer by trade; he was one by heart. Ever since he was a child he has been fascinated by the mechanisms and machines that the human race has created to further enhance their lives. His mind is methodical, pragmatic and his beliefs stand firm in facts and reason. What is observable, testable and measurable is what exists and everything else is simply myth or theory.
His heart felt understanding of the world though is disrupted and altered by the strange sighting of a unexplained figure or what is more commonly thought of as a ghost. Will this experience alter his beliefs or will the ghosts of his previous values stand firm?
Read more
4.3
98 total
Loading...

Additional Information

Publisher
Chris J Mitchell
Read more
Published on
Jun 17, 2017
Read more
Pages
44
Read more
ISBN
9781370590865
Read more
Language
English
Read more
Genres
Body, Mind & Spirit / Supernatural
Fiction / Ghost
Read more
Content Protection
This content is DRM protected.
Read more
Read Aloud
Available on Android devices
Read more
Eligible for Family Library

Reading information

Smartphones and Tablets

Install the Google Play Books app for Android and iPad/iPhone. It syncs automatically with your account and allows you to read online or offline wherever you are.

Laptops and Computers

You can read books purchased on Google Play using your computer's web browser.

eReaders and other devices

To read on e-ink devices like the Sony eReader or Barnes & Noble Nook, you'll need to download a file and transfer it to your device. Please follow the detailed Help center instructions to transfer the files to supported eReaders.
Ancient curses...family feuds...finding a happily ever after can be a real nightmare for the modern witch.

DARKANGEL:

As the future prima, or head witch of her clan, Angela McAllister is expected to bond with her consort, her soul mate, during her twenty-first year, thus ensuring that she will come into her full powers at the appointed time. The clock is ticking down, and her consort has yet to make an appearance. Instead, her dreams are haunted by a man she’s never seen, the one she believes must be her intended match.

But with time running out, and dark forces attempting to seize her powers for their own, Angela is faced with a terrible choice: give up her dreams of the man she may never meet and take the safer path, or risk leaving her clan and everyone in it at the mercy of those who seek their ruin.

DARKNIGHT:

Kidnapped by a rival witch clan, Angela McAllister envisions a dark future for herself until she discovers her captor’s brother is the unknown man who has haunted her dreams since she was a child.

Forced to re-evaluate everything she’s ever known about the Wilcox witches, Angela begins to explore the powerful connection that binds her to Connor Wilcox, despite the generations of hostility between their families and the disapproval of those closest to her.  And when a dark, malignant force arises, Angela knows she must draw on her growing powers as prima to protect enemies and allies alike...even if her choice threatens to tear her new and fragile love apart.

DARKMOON:

One hundred and fifty years ago, a terrible curse descended on the Wilcox clan, dooming generations of women to an early death should they bear a child to the bloodline of Jeremiah Wilcox. Now Angela McAllister is carrying Connor Wilcox’s child, and if she can’t find a way to break the curse, that same doom will fall upon her.

The solution to her dilemma lies somewhere in the past—her own, and that of the woman who cast the curse so many years before. Angela’s quest to find the answers she needs will transform the lives of everyone she knows, Wilcox and McAllister alike, and will forever change everything she has ever believed about herself.

The Witches of Cleopatra Hill is a paranormal romance series set in the ghost town of Jerome, Arizona.

This volume contains the 12 papers presented at the WISTP 2009 conference, held in Brussels, Belgium in September 2009. WISTP 2009 was the third int- national workshop devoted to information security theory and practice. WISTP 2009 built on the successful WISTP 2007 and 2008 conferences, held in Heraklion, Crete, Greece and Seville, Spain in May 2007 and May 2008, - spectively. The proceedings of WISTP 2007 and WISTP 2008 were published as volumes 4462 and 5019 of the Lecture Notes in Computer Science series. This workshop received the following support: – Co-sponsored by IFIP WG 11. 2 Small System Security – Co-sponsored by VDE ITG – Technical sponsorship of the IEEE Systems, Man & Cybernetics Society – Supported by the Technical Committee on Systems Safety and Security – Organized in cooperation with the ACM SIGSAC – Supported by ENISA – Supported by the Institute for Systems and Technologies of Information, Control and Communication (INSTICC) These proceedings contain 12 original papers covering a range of theoretical and practical topics in information security. For the purposes of the organi- tion of the WISTP program, the papers were divided into four main categories, namely: – Mobility – Attacks and Secure Implementations – Performance and Security – Cryptography The12papersincludedherewereselectedfromatotalof27submissions. The refereeing process was rigorous,involving at least three (and mostly four or ?ve) independent reports being prepared for each submission.
Thisvolumecontainsthe15paperspresentedinthetechnicalstrandoftheTrust 2009 conference, held in Oxford, UK in April 2009. Trust 2009 was the second international conference devoted to the technical and socio-economic aspects of trusted computing. The conference had two main strands, one devoted to technical aspects of trusted computing (addressed by these proceedings), and the other devoted to socio-economic aspects. Trust 2009 built on the successful Trust 2008 conference, held in Villach, Austria in March 2008. The proceedings of Trust 2008, containing 14 papers, were published in volume 4968 of the Lecture Notes in Computer Science series. ThetechnicalstrandofTrust2009contained15originalpapersonthedesign and application of trusted computing. For these proceedings the papers have been divided into four main categories, namely: – Implementation of trusted computing – Attestation – PKI for trusted computing – Applications of trusted computing The 15 papers included here were selected from a total of 33 submissions. The refereeing process was rigorous, involving at least three (and mostly more) independent reports being prepared for each submission. We are very grateful to our hard-working and distinguished Program Committee for doing such an excellent job in a timely fashion. We believe that the result is a high-quality set of papers, some of which have been signi?cantly improved as a result of the refereeing process. We would also like to thank all the authors who submitted their papers to the technical strand of the Trust 2009 conference, all external referees, and all the attendees of the conference.
©2018 GoogleSite Terms of ServicePrivacyDevelopersArtistsAbout Google
By purchasing this item, you are transacting with Google Payments and agreeing to the Google Payments Terms of Service and Privacy Notice.