2.cs.cmu
This book contains 209 tales collected by the brothers Grimm. The exact print source is unknown. The etext appears to be based on the translation by Margaret Hunt called Grimm's Household Tales, but it is not identical to her edition. (Some of the translations are slightly different, the arrangement also differs, and the Grimm's scholarly notes are not included.) The etext received by the Universal Library did not include story titles. Note that these tales are presented more or less as the Grimms collected and edited them (and as Hunt saw fit to translate them). NEW: There is now a more accurate version of the Hunt translation posted by William Barker.
maps
home page Down to: 6th to 15th Centuries | 16th and 19th Centuries | 1901 to World War Two | 1946 to 21st Century The Ancient World ... index of places Aegean Region, to 300 BCE Aegean Region, 185 BCE Africa, 2500 to 1500 BCE Africa to 500 CE African Language Families Alexander in the East (334 to 323 BCE) Ashoka, Empire of (269 to 232 BCE) Athenian Empire (431 BCE) China, Korea and Japan (1st to 5th century CE) China's Warring States (245 to 235 BCE) Cyrus II, Empire of (559 to 530 BCE) Delian League, 431 BCE Egyptian and Hittite Empires, 1279 BCE Europe Fertile Crescent, 9000-4500 BCE Germania (120 CE) Greece (600s to 400s BCE) Gupta Empire (320 to 550 CE) Han China, circa 100 BCE Hellespont (Battle of Granicus River, 334 BCE) India to 500 BCE Israel and Judah to 733 BCE Italy and Sicily (400 to 200 BCE) Judea, Galilee, Idumea (1st Century BCE) Mesopotamia to 2500 BCE Mesoamerica and the Maya (250 to 500 CE) Oceania Power divisions across Eurasia, 301 BCE Roman Empire, CE 12 Roman Empire, CE 150 Roman Empire, CE 500
An Overview of Cryptography
As an aside, the AES selection process managed by NIST was very public. A similar project, the New European Schemes for Signatures, Integrity and Encryption (NESSIE), was designed as an independent project meant to augment the work of NIST by putting out an open call for new cryptographic primitives. NESSIE ran from about 2000-2003. While several new algorithms were found during the NESSIE process, no new stream cipher survived cryptanalysis. As a result, the ECRYPT Stream Cipher Project (eSTREAM) was created, which has approved a number of new stream ciphers for both software and hardware implementation. Similar — but different — is the Japanese Government Cryptography Research and Evaluation Committees (CRYPTREC) efforts to evaluate algorithms submitted for government and industry applications. CAST-128/256: CAST-128, described in Request for Comments (RFC) 2144, is a DES-like substitution-permutation crypto algorithm, employing a 128-bit key operating on a 64-bit block. 3.3.
Adam Smith, Wealth of Nations, Contents
Introduction Chapter 1. Of the Division of Stock Chapter 2. Chapter 3. Chapter 4. Chapter 5. Introduction Chapter 1. Chapter 2. Chapter 3. Part 1. PART 2. CHAPTER 4. CHAPTER 5. CHAPTER VI Of Treaties of Commerce CHAPTER VII Of Colonies PART 1 Of the Motives for establishing new Colonies PART 2 Causes of Prosperity of New Colonies PART 3 Of the Advantages which Europe has derived from the Discovery of America, and from that of a Passage to the East Indies by the Cape of Good Hope CHAPTER VIII Conclusion of the Mercantile System CHAPTER IX Of the Agricultural Systems, or of those Systems of Political Economy which represent the Produce of Land as either the sole or the principal Source of the Revenue and Wealth every Country
Wisdom and Humor: The Suslick Research Group
The Three Laws of Thermodynamics (mathematically precise version) You can't win. You can break even only on a very cold day. Murphy's Seven Original Laws: In any field of scientific endeavor, anything that can go wrong, will go wrong. Levy's Nine Laws of the Disillusionment of the True Liberal —Marion J. Large numbers of things are determined, and therefore not subject to change. Aigner's Axiom: No matter how well you perform your job, a superior will seek to modify the results. The Airplane Law: When the plane you are on is late, the plane you want to transfer to is on time. Baruch's Observation: If all you have is a hammer, everything looks like a nail. Bedfellow's Rule: The one who snores will always fall asleep first. Berra's Second Law: Anyone who is popular is bound to be disliked. Blair's Observation: The best laid plans of mice and men are usually about equal. Bucy's Law: Nothing is ever accomplished by a reasonable man. The Bureaucracy Principle: Only a bureaucracy can fight a bureaucracy. 1.