100% found this document useful (1 vote)
15 views

Implementing Cryptography Using Python Shannon Bray - Quickly download the ebook in PDF format for unlimited reading

The document promotes the book 'Implementing Cryptography Using Python' by Shannon W. Bray, available for download along with other recommended ebooks on ebookmass.com. It provides an overview of the author's background and the contents of the book, which covers various aspects of cryptography and its implementation using Python. Additionally, it includes acknowledgments and information about the publisher, John Wiley & Sons, Inc.

Uploaded by

pavecjevoni
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
15 views

Implementing Cryptography Using Python Shannon Bray - Quickly download the ebook in PDF format for unlimited reading

The document promotes the book 'Implementing Cryptography Using Python' by Shannon W. Bray, available for download along with other recommended ebooks on ebookmass.com. It provides an overview of the author's background and the contents of the book, which covers various aspects of cryptography and its implementation using Python. Additionally, it includes acknowledgments and information about the publisher, John Wiley & Sons, Inc.

Uploaded by

pavecjevoni
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 53

Visit ebookmass.

com to download the full version and


explore more ebook or textbook

Implementing Cryptography Using Python Shannon


Bray

_____ Click the link below to download _____


https://ebookmass.com/product/implementing-cryptography-
using-python-shannon-bray/

Explore and download more ebook or textbook at ebookmass.com


Here are some recommended products that we believe you will be
interested in. You can click the link to download.

Bayesian Optimization: Theory and Practice Using Python


1st Edition Peng Liu

https://ebookmass.com/product/bayesian-optimization-theory-and-
practice-using-python-1st-edition-peng-liu/

Python Programming: Using Problem Solving Approach 1st


Edition Reema Thareja

https://ebookmass.com/product/python-programming-using-problem-
solving-approach-1st-edition-reema-thareja/

Machine Learning on Geographical Data Using Python 1st


Edition Joos Korstanje

https://ebookmass.com/product/machine-learning-on-geographical-data-
using-python-1st-edition-joos-korstanje/

Data-Driven SEO with Python: Solve SEO Challenges with


Data Science Using Python 1st Edition Andreas Voniatis

https://ebookmass.com/product/data-driven-seo-with-python-solve-seo-
challenges-with-data-science-using-python-1st-edition-andreas-
voniatis/
Introduction To Computing And Problem Solving Using Python
1st Edition E. Balaguruswamy

https://ebookmass.com/product/introduction-to-computing-and-problem-
solving-using-python-1st-edition-e-balaguruswamy/

Introduction to Responsible AI: Implement Ethical AI Using


Python 1st Edition Manure

https://ebookmass.com/product/introduction-to-responsible-ai-
implement-ethical-ai-using-python-1st-edition-manure/

Bayesian Optimization : Theory and Practice Using Python


Peng Liu

https://ebookmass.com/product/bayesian-optimization-theory-and-
practice-using-python-peng-liu/

eTextbook 978-0134379760 The Practice of Computing Using


Python (3rd Edition)

https://ebookmass.com/product/etextbook-978-0134379760-the-practice-
of-computing-using-python-3rd-edition/

Introduction to Computation and Programming Using Python,


Third Edition John V. Guttag

https://ebookmass.com/product/introduction-to-computation-and-
programming-using-python-third-edition-john-v-guttag/
Implementing
Cryptography Using
Python®
Shannon W. Bray
Published by
John Wiley & Sons, Inc.
10475 Crosspoint Boulevard
Indianapolis, IN 46256
www.wiley.com

Copyright © 2020 by John Wiley & Sons, Inc., Indianapolis, Indiana


Published simultaneously in Canada

ISBN: 978-1-119-61220-9

ISBN: 978-1-119-61222-3 (ebk)

ISBN: 978-1-119-61545-3 (ebk)

Manufactured in the United States of America

No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or
by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted
under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission
of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clear-
ance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the
Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111
River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/
go/permissions.

Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or war-
ranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all
warranties, including without limitation warranties of fitness for a particular purpose. No warranty may be
created or extended by sales or promotional materials. The advice and strategies contained herein may not
be suitable for every situation. This work is sold with the understanding that the publisher is not engaged in
rendering legal, accounting, or other professional services. If professional assistance is required, the services
of a competent professional person should be sought. Neither the publisher nor the author shall be liable for
damages arising herefrom. The fact that an organization or Web site is referred to in this work as a citation
and/or a potential source of further information does not mean that the author or the publisher endorses
the information the organization or website may provide or recommendations it may make. Further, readers
should be aware that Internet websites listed in this work may have changed or disappeared between when
this work was written and when it is read.

For general information on our other products and services please contact our Customer Care Department
within the United States at (877) 762-2974, outside the United States at (317) 572-3993 or fax (317) 572-4002.

Wiley publishes in a variety of print and electronic formats and by print-on-demand. Some material included
with standard print versions of this book may not be included in e-books or in print-on-demand. If this book
refers to media such as a CD or DVD that is not included in the version you purchased, you may down-
load this material at http://booksupport.wiley.com. For more information about Wiley products, visit
www.wiley.com.

Library of Congress Control Number: 2020940306

Trademarks: Wiley and the Wiley logo are trademarks or registered trademarks of John Wiley & Sons, Inc.
and/or its affiliates, in the United States and other countries, and may not be used without written permis-
sion. Python is a registered trademark of Python Software Foundation. All other trademarks are the property
of their respective owners. John Wiley & Sons, Inc. is not associated with any product or vendor mentioned
in this book.
To Stephanie, Eden, Hayden, and Kenna,
with all my love, for making each and every day special.
About the Author

Shannon W. Bray started his career in information technology in 1997 after


being honorably discharged from the United States Navy. He started his IT
career working on programmable logic controllers out in the Gulf of Mexico
and then started writing business applications using various technologies until
2000 when .NET was first released; since then, the languages of choice have
been C++, C#, Windows PowerShell, and Python. From there, Shannon worked
on writing software until he started working with Microsoft SharePoint. The
Microsoft stack of technologies forced Shannon out of just writing code into
building large secure solutions. Shannon’s career has taken him to engagements
all over the world where he has worked with a number of U.S. government
agencies. Shannon became interested in cryptography while pursuing a master’s
degree in cybersecurity, and he has continued to research cryptography and
cybersecurity as he pursues a PhD in computer science.
Shannon has earned the following certifications: Microsoft Certified Master,
Microsoft Certified Solutions Master, Certified Information Security Manager
(CISM), Security+ (Plus), the CompTIA Advanced Security Practitioner (CASP+),
and a number of other industry certifications. In addition to writing, Shannon
speaks nationally at technology conventions and works as a mentor teaching
technology to youth programs.
Shannon lives in the Raleigh, North Carolina, area with his wife, Stephanie,
two daughters, Eden and Kenna, and son, Hayden. During the dive season,
Shannon enjoys diving off the coast of North Carolina. During the rest of the
year, Shannon works on IT projects around the house that utilize single-board
computers and, most often, propellers. He is currently building a home security
system that uses Python, cryptography, and drones. As of the release of this

v
vi About the Author

book, Shannon is currently running for the U.S. Senate for the state of North
Carolina to help bring cybersecurity issues to the mainstream and to help people
understand the importance of end-to-end encryption.
Shannon can be contacted through LinkedIn at www.linkedin.com/in/
shannonbray.
Acknowledgments

While this is my third book, every book comes with its own set of challenges.
Completing a book is not always a fun project but does become a labor of love.
As soon as you start, life has a way of throwing changes at you, and it seems
that you never have the time that you thought you would have. Shortly after
starting this book, I started a PhD program with the Missouri University of
Science and Technology and transitioned through a number of government
contracts, ran for political office, and then became a work-from-home teacher
as the world battled a global pandemic. I knew that the editing team would be
earning their pay with whatever I put together. That team has been wonderful
with their feedback and responsiveness. Specifically, I’d like to thank the follow-
ing people on the Wiley team: Barath Kumar Rajasekaran, production editor;
Jim Minatel, acquisitions editor; Pete Gaughan, content enablement manager;
Brent Cook and James Langbridge, technical editors, and, most importantly,
Kim Wimpsett, the project editor. Kim did her best to keep me on schedule, but
I found new ways to miss a few deadlines.

vii
Visit https://ebookmass.com today to explore
a vast collection of ebooks across various
genres, available in popular formats like
PDF, EPUB, and MOBI, fully compatible with
all devices. Enjoy a seamless reading
experience and effortlessly download high-
quality materials in just a few simple steps.
Plus, don’t miss out on exciting offers that
let you access a wealth of knowledge at the
best prices!
Contents at a Glance

Introductionxvii
Chapter 1 Introduction to Cryptography and Python 1
Chapter 2 Cryptographic Protocols and Perfect Secrecy 31
Chapter 3 Classical Cryptography 65
Chapter 4 Cryptographic Math and Frequency Analysis 95
Chapter 5 Stream Ciphers and Block Ciphers 139
Chapter 6 Using Cryptography with Images 171
Chapter 7 Message Integrity 199
Chapter 8 Cryptographic Applications and PKI 223
Chapter 9 Mastering Cryptography Using Python 247
Index277

ix
Contents

Introductionxvii
Chapter 1 Introduction to Cryptography and Python 1
Exploring Algorithms 2
Why Use Python? 2
Downloading and Installing Python 3
Installing on Ubuntu 4
Installing on macOS 4
Installing on Windows 4
Installing on a Chromebook 4
Installing Additional Packages 5
Installing Pip, NumPy, and Matplotlib 6
Installing the Cryptography Package 7
Installing Additional Packages 8
Testing Your Install 9
Diving into Python Basics 9
Using Variables 10
Using Strings 11
Introducing Operators 11
Understanding Arithmetic Operators 11
Understanding Comparison Operators 13
Understanding Logical Operators 13
Understanding Assignment Operators 14
Understanding Bitwise Operators 15
Understanding Membership Operators 15
Understanding Identity Operators 16

xi
xii Contents

Using Conditionals 16
Using Loops 17
for17
while18
continue18
break18
else18
Using Files 19
Understanding Python Semantics 20
Sequence Types 20
Introducing Custom Functions 26
Downloading Files Using Python 27
Introducing Python Modules 28
Creating a Reverse Cipher 29
Summary30
Chapter 2 Cryptographic Protocols and Perfect Secrecy 31
The Study of Cryptology 32
Understanding Cryptography 32
Cryptography’s Famous Family: Alice and Bob 33
Diffie-Hellman34
Data Origin Authentication 34
Entity Authentication 35
Symmetric Algorithms 36
Asymmetric Algorithms 36
The Needham-Schroeder Protocols 36
The Otway-Rees Protocol 38
Kerberos39
Multiple-Domain Kerberos 40
X.50941
Formal Validation of Cryptographic Protocols 46
Configuring Your First Cryptographic Library 47
Understanding Cryptanalysis 47
Brute-Force Attacks 47
Side-Channel Attacks 48
Social Engineering 48
Analytical Attacks 48
Frequency Analysis 48
Attack Models 49
Shannon’s Theorem 50
One-Time Pad 51
XOR, AND, and OR 51
One-Time Pad Function 56
One-Way Hashes 58
Contents xiii

Cryptographic One-Way Hashes 59


Message Authentication Codes 60
Perfect Forward Secrecy 60
Published and Proprietary Encryption Algorithms 61
Summary62
References62
Chapter 3 Classical Cryptography 65
Password Best Practices 66
Password Storage 66
Hashing Passwords 67
Salting Passwords 67
Stretching Passwords 68
Password Tools 68
Obfuscating Data 69
ASCII Encoding 70
Base64 Encoding Text 70
Binary Data 72
Decoding72
Historical Ciphers 72
Scytale of Sparta 73
Substitution Ciphers 73
Caesar Cipher 74
ROT-1376
Atbash Cipher 77
Vigenère Cipher 77
Playfair79
Hill 2x2 83
Column Transposition 87
Affine Cipher 90
Summary93
Chapter 4 Cryptographic Math and Frequency Analysis 95
Modular Arithmetic and the Greatest Common Devisor 96
Prime Numbers 97
Prime Number Theorem 98
School Primality Test 98
Fermat’s Little Theorem 100
Miller-Rabin Primality Test 100
Generate Large Prime Numbers 104
Basic Group Theory 106
Orders of Elements 107
Modular Inverses 109
Fermat’s Little Theorem to Find the Inverse 110
Extending the GCD 111
Euler’s Theorem 111
xiv Contents

Pseudorandomness115
Breaking C’s rand() Function 116
Solving Systems of Linear Equations 117
Frequency Analysis 120
Cryptanalysis with Python 123
Using an Online Word List 125
Determining the Frequency 126
Breaking the Vigenère Cipher 129
Summary138
Chapter 5 Stream Ciphers and Block Ciphers 139
Convert between Hexdigest and Plaintext 140
Use Stream Ciphers 141
ARC4147
Vernam Cipher 148
Salsa20 Cipher 149
ChaCha Cipher 151
Use Block Ciphers 156
Block Modes of Operations 158
ECB Mode 158
CBC Mode 159
CFB Mode 160
OFB Mode 162
CTR Mode 163
Tricks with Stream Modes 164
DIY Block Cipher Using Feistel Networks 165
Advanced Encryption Standard (AES) 167
Using AES with Python 167
File Encryption Using AES 169
File Decryption Using AES 169
Summary169
Chapter 6 Using Cryptography with Images 171
Simple Image Cryptography 171
Images and Cryptography Libraries 174
Understanding the Cryptography Library 174
Understanding the Cryptosteganography Library 175
Image Cryptography 175
File Cryptography Using Fernet 176
Image Cryptography Using Fernet 179
AES and Block Modes of Operations 180
Exploring a Simple ECB Mode Example 181
Exploring a Simple CBC Mode Example 185
Applying the Examples 186
Steganography187
Storing a Message Inside an Image 188
Contents xv

Storing a Binary File Inside an Image 192


Working with large images 195
Summary197
Chapter 7 Message Integrity 199
Message Authentication Codes 200
Hash-based Message Authentication Code 201
Using HMAC to Sign Message 202
Message Digest with SHA 203
Binary Digests 204
NIST Compliance 205
CBC-MAC206
Birthday Attacks 207
Crafting Forgeries 209
The Length Extension Attack 209
Setting Up a Secure Channel 210
Communication Channels 211
Sending Secure Messages over IP Networks 212
Create a Server Socket 212
Create a Client Socket 213
Create a Threaded Server with TCP 214
Adding Symmetric Encryption 215
Concatenate Message and MAC 218
Summary221
References222
Chapter 8 Cryptographic Applications and PKI 223
The Public-Key Transformation 224
Exploring the Basics of RSA 226
Generating RSA Certificates 229
Constructing Simple Text Encryption and
Decryption with RSA Certificates 231
Constructing BLOB Encryption and
Decryption with RSA Certificates 232
The El-Gamal Cryptosystem 235
Elliptic Curve Cryptography 238
Generating ECC Keys 240
Key Lengths and Curves 241
Diffie-Hellman Key Exchange 242
Summary245
Chapter 9 Mastering Cryptography Using Python 247
Constructing a Plaintext Communications Application 248
Creating a Server 248
Creating the Client 250
Creating the Helper File 251
Execution252
xvi Contents

Installing and Testing Wireshark 253


Implementing PKI in the Application Using RSA Certificates 255
Modifying the Server 256
Modifying the Client 257
Modifying the Helper File 258
Execution259
Implementing Diffie-Hellman Key Exchange 261
Modifying the Server File 262
Modifying the Client File 264
Modifying the Helper File 266
Creating the Diffie-Hellman Class File 270
Execution275
Wrapping Up 276
Index277
Introduction

I initiated my journey into cryptography while studying for my undergrad. Most


of the cryptography concepts I learned were based on what one would need for
their CISSP or Security+ exams. Most of my understanding was at a high level,
and it was difficult to remember the more intricate aspects until cryptography
became a primary focus.
It wasn’t until I started my master’s in cybersecurity that I began applying
cryptographic features within a scripting environment. The concepts in this
book will help you advance your knowledge and experience as you dig deeper
into understanding the use of cryptography in Python.
Over the past few years, several governments have discussed legislation that
will ensure that any form of communication, whether it’s an email, text message, or
video chat, can always be read by the police or intelligence services if they have a
warrant. Governments are putting pressure on technology companies to give them
backdoor access or the keys to the kingdom so that they can keep the country safe.
The fight between lawmakers and encrypted messaging platforms has entered
new territory. Imagine a world where the government has seized the oppor-
tunity to scan every electronic message by government-approved scanning
software. The privacy and security of all users will suffer if law enforcement
agencies achieve their dream of breaking cryptosystems. Proponents of end-to-
end encryption, like Microsoft, Facebook, and Google, may lose their campaign
to maintain user security as a priority.
We have all heard of times when it would be beneficial for encrypted data
to magically become readable; this is often related to criminal cases. Should
criminals be allowed to plot their plans in secret? Where does the right to our
privacy start? In reality, there are technical and legal issues with allowing gov-
ernments to do this; this of course will be strongly opposed by technology and

xvii
xviii Introduction

privacy advocates. The world is at war on what can be encrypted, what should be
encrypted, and who should have the keys to unlock someone else’s encryption.
Whether you agree or disagree with what powers a nation-state should have
over encrypted communications in their country, you should understand what
encryption is, how to apply it when needed, and how to ensure that the data
you are receiving is authentic and confidential. Over the course of this book,
you will get a basic understanding of how to cryptographically secure your
messages, files, or Internet traffic using easy-to-understand Python recipes that
have been created or updated to support Python 3.

What This Book Covers


This book focuses on helping you pick the right Python environment for your
needs so that you can hit the ground running. You will get an understanding
of what algorithms are and explore the basics of Python.
Once you have an idea of where you are starting from, you will get an over-
view of what cryptography is, what perfect secrecy means, and the history of
cryptography and how its use changed our world.
To get a full understanding of some of the cryptographic concepts, a little
math is needed. You will get an understanding of how prime numbers, basic
group theory, and pseudorandom number generators help build cryptographic
solutions. This will build the foundation for understanding various stream and
block ciphers and highlight some of their encryption modes and weaknesses.
Every cryptographic discussion is better with pictures, so we will spend a
chapter focusing on how image cryptography and steganography work. We’ll also
highlight a few issues that you will need to be aware of while dealing with images.
Message integrity is just as important as message secrecy. Knowing who sent
the message to you directly relates to whether the message is credible. You will
learn how to generate message authentication codes to ensure integrity during
transit.
The strength of encryption will be shown at the end of the book when you
will learn about PKI schemes and explore how to implement elliptic curve cryp-
tography in an application. The application you build will exchange data in a
highly secure format over an unsecure channel, thus ensuring that you are able
to control your own end-to-end encryption scheme that no one will be able to
decrypt without the keys you create. I hope you find the journey as fun as I did.
Visit https://ebookmass.com today to explore
a vast collection of ebooks across various
genres, available in popular formats like
PDF, EPUB, and MOBI, fully compatible with
all devices. Enjoy a seamless reading
experience and effortlessly download high-
quality materials in just a few simple steps.
Plus, don’t miss out on exciting offers that
let you access a wealth of knowledge at the
best prices!
Other documents randomly have
different content
, p y, ,
Bismuth, affinity strength, viii, 128;
atomic weight and symbol, 383;
expansion on solidifying, iv, 150;
in Rose's fusible metal, 162;
melting point, viii, 384;
melting point, pressure effects on, iv, 163;
occurrence, viii, 131;
specific gravity, 384;
tests for, 287-8
Bisons, xii, 329-30;
formerly in Europe, xv, 76;
pictured in Cro-Magnon art, 114-18 (fig.)
Bitter, taste of, ix, 95, xi, 70, 71, 72
Bitterns, xii, 254-5
Bituminous Coal, beds in U.S., iii, 200-1, 346-7, 348;
elements, 345;
per cent carbon in, viii,
(see also Soft Coal)
Bituminous Strata, origin, iii, 249-50
Bivalves, xii, 58, 63
Black (color), absorption of light by, iv, 364, x, 309;
produced by interference of lights, iv, 377-8;
sensation of, ix, 115
Black, Joseph, chemical work, xvi, 119-20, 125, 177;
discovery of respiration physiology, x, 88-9
Black Beetles, xii, 107
Blackberry, aggregate fruit, xiii, 55;
in rose family, 197;
origin, 224;
running, 28
Blackbirds, xii, 269
Black Death, x, 163-4
"Black Earth," of Russia, xiv, 217
Blackfish, xii, 297
Black Forest, Germany, xiv, 238-9;
geology of, 87 (map), 90, 117, 128
g gy , ( p), , ,
Black Hills, xiv, 93, 227;
core of, 111;
former forests of, 373;
mineral springs of, 145
Black Hole of Calcutta, i, 321, ix, 268, x, 238
Black Lead, iii, 331, viii, 43 (see Graphite)
Black Lightning, i, 148
Black Powder, viii, 144-5, 260
Black Race, xv, 32;
brain and skull capacity, 41;
disease immunity and susceptibility, 48-9, 50-1;
facial angle in, 45;
fitted to tropics, 50;
jaw angle, 44;
nose index and nostril shape, 46;
peoples, 37;
separate origin theory, 69, 70;
skull shape, 42;
type characters of, 35
Black Sea, hanging valleys on shore of, xiv, 58;
importance of ports, 267;
salinity of, 296, viii, 139;
sturgeons of, xii, 152
Blacksnakes, xii, 218-19, 229
Blair, Henry, xvi, 187
Blanc, Mount, observatory on, ii, 142-9;
"resurrection," i, 168;
sound intensity on, 186
Blankets, warmth of, iv, 178
Blast Furnaces, v, 317-18;
air blast of, viii, 158;
ancient Egyptian, xvi, 74;
carbon uses, viii, 157;
cooling of air for, v, 347;
development of modern, 315-16, xvi, 174, 175, 176;
oxygen in, i, 33;
yg , , ;
potash from dust, viii, 279
Blasting, v, 261-2;
explosives for, viii, 260;
with compressed air, i, 27;
with water, v, 100
Blasting Powders, viii, 137-8
Bleaching, chemistry of, viii, 86;
chlorine, 85-6;
hydrogen peroxide, 41, 86;
ozone, vii, 354;
sulphur dioxide, viii, 78, 146;
of wool, 256
Bleaching Powder, viii, 86-7, 146, 153, 274
Bleeders, Bleeding Sickness, ix, 181;
transmission of, x, 234
Bleeding, from arteries and veins, x, 39;
leeches used for, xii, 55;
stopping of, ix, 179-81
Blended Inheritance, ix, 334, x, 230-1;
in animal and plant breeding, ix, 337
Blériot, flight of, i, 43
Blight, cause of, xiii, 71
Blind, optophone reading for, v, 332, 334-5, 384;
space perception by, xi, 168-9
Blindness, black seen in, ix, 116;
cause, xi, 96-7;
from brain disease, ix, 146;
from cataract, 112
Blind Spot, xi, 87-9
Blish, Commander, v, 367-8
Blizzards, i, 133-4, 368;
device against, 345
Block and Tackle, v, 34-5
Block Mountains, iii, 138-9, xiv, 117, 226
Block Signal Systems, v, 211, vii, 355-9
Block Tin, viii, 161
, ,
Blood, absorption of digested food by, ix, 226, 243-6;
adrenalin effects, 171-2, xi, 137-8;
aeration of, by lungs, x, 62, 331;
amount in circulation, 337;
anemia, 337;
arterial, ix, 260, 263, 264;
carbon dioxide in, 190, 262-3;
effects, 264-7, x, 339;
carbon monoxide effects, viii, 50-1;
circulation of (see Circulation of the Blood);
clotting of, ix, 180, x, 88, 337;
coagulation after emotion, xi, 138-9;
coloring matter related to Chlorophyll, xii, 14;
color of, in relation to oxygen, ix, 259-61;
composition, 173-90;
control of vital processes by changes in, 168-72;
conveyer system, 191, 225;
corpuscle-forming tissues, growth of, 287;
distribution efficiency, x, 238-9;
emergency emotion effects, ix, 166, 171, 293, xi, 136-7;
fats in, ix, 289;
flow, how controlled, 215-16, 219-21;
functions, summarized, 50-1, x, 331-7;
germ destruction by white corpuscles, 197, 209-11;
in embryo, ix, 343;
interchange with tissue, fluids, 51 (fig.), 191, 193-5, 221-2;
iron and salts in, uses, viii, 354;
liver action on, x, 329;
maternal influences through, ix, 343-4;
mountain-sickness effects, i, 328;
neutrality or alkalinity of, x, 280-1;
oxygen supply and transportation, ix, 182-3, 198-9, 253-62,
x, 338-9;
platelets of, ix, 188-9;
proteins of, 176-7, 194-5, 262-3;
rate of passage through heart, 210, 211, 212;
p g g , , , ;
red corpuscles, 181-4 (see Red Corpuscles);
renewal of, 173;
sensations, effect on, xi, 68;
sleep effects, 283-5, 289;
soul in, Greek idea of, xv, 330;
sugar in, regulation and excess, ix, 290-3, x, 329, 330;
sugar increase in excitement, xi, 138;
temperature, v, 348-9;
temperature rise, effects, ix, 169, 315-16;
transfusion of, x, 337-8;
venous, ix, 263-4;
waste removal by and from, 271-6;
water absorption and supply, 247;
white corpuscles, 182 (fig.), 184-8
(see also White Corpuscles)
Blood-destroying Germ, x, 221
Blood Heat, i, 319
Blood Pressure, ix, 213-20, x, 334-6;
color effects, xi, 63, 96;
in sleep, 283-4
Blood Rains, i, 358
Blood Suckers, x, 91
Blood Vessels, ix, 191-3, 196-8;
classes and disorders of, x, 334-6;
climatic effects on efficiency, 238-9;
control of caliber of, ix, 161, 168, 215-16, 219-20, 311;
functions of, 50-1;
injuries, how mended, 180
Blooms, iron and steel, v, 317, 322
Blowers, electric, vii, 86
Blow Guns, xv, 216-17 (fig.)
Blowing Wells, i, 353-5, 368
Blowout, magnetic, vii, 37-9
Blue, complementary color of, iv, 367;
in birds' feathers, xii, 245;
in interior decoration, vi, 274;
, , ;
of sky, i, 165, penetration of ocean by, xii, 22;
wave length of, iv, 365
Blueberries, xiii, 202, 224
"Blue Coal," v, 174
Blue Columbine, xiii, 126-8
Blue-grass Region, xiv, 68
Blue Grotto of Capri, iii, 81
Blue Gum Trees, xiii, 26, 94, 350;
leaves of, 106;
swamp draining by, xiv, 379
(see also Eucalyptus)
Blue Ridge Mountains, metamorphism in, xiv, 234
Bluffs, formation of, xiv, 84
Blunderbuss, v, 361
Boa Constrictor, xii, 215
Boas, family of, xii, 213, 215-16
Boats, evolution of, xv, 261-3;
propulsion of, 265
Bobcats, xii, 364-5
Bode's Law, ii, 254-5
Bodies, of matter, defined, iv, 12, 381
Body, anatomy and physiology of, ix;
care of against fatigue, xi, 279-80;
care of, instruction in, x, 282-5;
changes in, untransmitted, ix, 326;
chemical composition, viii, 348, 349, 353, 354-5;
construction features and units, ix, 12, 13;
dissection of, x, 30, 41-2, 45, 81;
efficiency of, viii, 367, ix, 306, x, 238-9;
electrical conductivity, iv, 259;
electricity effects, vii, 246-9, xi, 117;
emergency responses of, ix, 166-7, 171-2, 209, 220, 221,
293;
exercise effects, x, 303-4;
fatigue conditions, xi, 270-4;
fatigue results on resistance, x, 248;
g , , ;
food needs and utilization, (see Food);
functional disorders, x, 318-65;
functional regulation, 346-7, 352-3;
functions, chemical explanation of, xvi, 142;
functions, close connection of, xi, 31;
growth of (see Growth);
hair on, xv, 38;
hardening processes, x, 240;
infection portals, 198, 201-2;
kinetic system, xi, 57, 60-1;
living and nonliving parts, ix, 12, 13, 31;
machine parts suggested by, v, 20;
mechanisms of, 248;
metabolism (see Metabolism);
mind and, relations, xi, 13, 14, 61, 369-75;
motions, different kinds, ix, 82-3;
mutilations among savages, xv, 257-60;
painting of, 255-6;
poisonous effluvia of, ix, 269-70;
positions of, in relation to health, x, 241-2
(see also Postures);
pressures, xi, 53;
pressure of atmosphere on, i, 23;
proper clothing of, x, 306-10;
regulation to environment, 249-51;
reproduction from cells, ix, 324-5, 332-3;
resistance to disease germs, 177-9, 185-6, x, 203-12, 240,
248, 289, 292;
salt requirements, ix, 174;
seat of life in, 11, 12, 17;
shame of, xv, 254-5;
temperature, v, 348-9, ix, 306-7, 312, x, 250-1, 306;
temperature after hard work, ix, 317;
temperature equality, advantages of, 78-9;
temperature in different scales, iv, 137 (fig.);
temperature in fever, ix, 317-19;
p , , ;
temperature regulation, i, 316-17, 320-1, 322, v, 348-9, viii,
331, ix, 169, 305-23, x, 310;
temperature rise from excitement, xi, 140;
temperature rise in dense atmosphere, iv, 31;
tissues (see Tissues);
unstable chemical organization, xi, 134;
wastage and repair of, ix, 278-86;
waste elimination in tropics and cold climates, xv, 49, 50;
water functions in, viii, 355-6, wonders of, vi, 272;
X-ray effects, vii, 250
(see also particular parts and functions)
Body Cells, ix, 13, 41-3, xi, 15, 17, 49;
development of, ix, 43-8, 324-5, 332-3;
different kinds, 13, 39, 42-3, 277, 329;
living and nonliving, 12-17;
maintenance and growth, 34-6, 38-9, 189, 278-84, 287-9;
metabolism of (see Cell Metabolism);
oxygen needs and supply, 182, 199, 253, 254, 260;
power development in, 16, 17, 22, 36, 40;
salt needs, 174;
size of, 12;
sugar and fat supplies, 289-91;
supply and renewal system, 49-52, 193-5, 221-2, 262, 271;
supporting tissue, 71-2;
waste of, in starvation, 298;
X-ray effects on, vii, 253
(see also Muscle Cells, Nerve Cells, Germ Cells, etc.)
Body Fluids, ix, 50-1, 173-90;
in connective tissues, 59;
sugar in, 290, 291
(see also Blood, Tissue Fluids)
Boë, Francis de la, x, 69, 70, xvi, 108
Boerhaave, Hermann, x, 76-7, 87, xvi, 112, 178
Boer War, kopjes in, xiv, 82
Boethius, xvi, 101
Bog Iron Ore, iii, 13, viii, 156
g , , , ,
Bog Mosses, xiii, 68-9
Bogoslof Islands, xiv, 319
Bog Plants, xiii, 104, 381-2
Bogs, formed from filling lakes, xiv, 210-12
Bohemian Glass, viii, 281
Boiler Explosions, caused by electrolytic corrosion, vi, 64-6;
due to scale, xiv, 147;
violence, v, 140
Boilers, Steam, v, 139-42;
boiling point of water in, viii, 303;
hard water in, 151-2, 323, xiv, 147;
heat loss, v, 155;
pressure in, iv, 119, 170
Boiling, of foods, xv, 233;
of liquids, iv, 167-75
Boiling Point, iv, 168;
chemical composition and, viii, 298, 301;
in various thermometers, i, 73, iv, 136, 137, 141, viii, 27;
of various substances, iv, 173;
pressure effects on, 168, 169-70, v, 354, viii, 303-5
Boils, causes of, ix, 186, 187, x, 195, 201, 311
Bolivia, Chilean control of, xiv, 306
Bologna, University of, xvi, 100;
medical school of, x, 38
Bolometers, iv, 301, vii, 363;
in corona studies, ii, 212, 225
Bombay Duck, xii, 163
Bombing Machines, v, 233
Bombs, aerial, v, 372-3
Bombs, volcanic, xiv, 323
Bond, Dr. A. R., author Mechanics, Vol. v
Bonds (chemistry), defined, viii, 374
Bone Black, viii, 47
Bone Fertilizers, viii, 153, 280, 343
Bones, of body, ix, 59, 71;
cartilage beginnings of, 58;
g g g , ;
condition of, in infants, 345-6;
food needed for, 33;
formation, structure, and growth, 54-7, 58;
inflammations of, x, 224;
lime salts in, ix, 57;
red marrow of, 183;
used in hearing, iv, 204;
X-ray pictures of, iv, 320, vii, 253-4, 255
Bonneville, Lake, iii, 153
Books, ancient making of, xv, 178-9;
printing and binding of, v, 306
Book Scorpions, xii, 90
Boomerangs, xv, 194, 208;
principle of, iv, 42
Bora Winds, i, 133, 368
Boracic Acid, viii, 89, 90, 372
Borates, preparation, viii, 117;
test, 290
Borax, composition, viii, 141;
deposits, 89, 90, 197, 275;
uses, 89, 141, 146, 333, 372
Boredom, in work, xi, 275-6, 277-8, 280
Borelli, Giovanni Alfonso, x, 70, 71-2, 83
Boric Acid, natural sources, viii, 90, 118;
preservative, 89, 333, 372;
solid, 114
Boring Machines, v, 44, 376
Boring, deep, xiv, 11, 12
(see also Wells)
Borneo, continental island, xiv, 274;
coconut gathering in, xii, 378;
orang-utan of, 381;
rhinoceros of, 306;
sun bear, 337;
tattooing in, xv, 259;
tribal morality in, 374
y ,
Boron, viii, 19, 89, 90;
atomic weight and symbol, 383;
in silicates, 193
Bosphorus, importance to Russia, xiv, 267
Boston, drumlins near, xiv, 60;
harbor of, 269;
sewage disposal, viii, 326;
water supply, 317, xiv, 140
Boston Ivy, xiii, 28
Botany, Volume xiii
Botany, xvi, 36;
binomial nomenclature in, x, 84;
daily interest, xvi, 20-2;
discovery of America, effects, x, 45;
history of development, xvi, 112, 116, 165-7;
public education in (France), 22
Bothnia, Gulf of, salinity, xiv, 296
Bow-and-Arrow, evolution of, xv, 213-15;
fish-shooting with, 227;
stringed instruments developed from, 317-18
Bowditch, Henry Pickering, x, 131
Bowels, care of, x, 316-17;
"yearning of," xi, 64, 131, 160 (see Intestines)
Bowfin, xii, 152;
nests of, 154
Bowlder Clay, iii, 67, xiv, 59
Bowlders, glacial, iii, 70, 237, 352 (pl. 20), xiv, 69, 70
Boyle, Robert, air pressure experiments, iv, 29, 125;
chemical work, xvi, 110, 111, 112, 115, 119, 177;
"Sceptical Chemist," quoted, 159
Boyle's Law, iv, 125-6, 133, 143, 156, viii, 106-7
Boys, education of, xi, 266-7;
food consumption by, viii, 367
Brachiopods, iii, 259, 263, 270-2, xii, 47-8;
deep sea 23;
illustration, iii, 256 (Pl. 14)
, , ( )
Bracken Fern, xiii, 350
Bracts, xiii, 43, 45, 206
Bradley, James, astronomical work, ii, 90-2, xvi, 124
Brahe, Tycho (see Tycho Brahe)
Braided Goods, v, 276-7
Brain, ix, 131, 144-7, xi, 15-32, 60;
areas for different functions, xv, 89-90;
as seat of life, ix, 11, 14, 17;
association fibers, xi, 200;
association region of, ix, 151;
auditory area, xi, 108;
blood supply of, ix, 197, 216-17;
cells of, 14;
changes caused by shock xi, 59;
condition of, at birth, ix, 351;
connections in nervous system, 142-4, 147-51;
convolutions of, xv, 62-3;
delayed nervous impulses in, ix, 140, 141-2, 145, 146-7;
diseases, results of, 146;
emotional processes in, 154, 200;
gray matter of, xv, 63;
in dreams, xi, 301;
in sleep, ix, 218, xi, 285, 286, 287, 289;
inflammation of, cause, x, 224;
insensitive to pain, xi, 118;
intellectual processes, ix, 147-53, 154;
magnetism effects, vii, 247;
mental incapacity from defects, xi, 13;
motor area, ix, 147;
of insects, xii, 103;
of men and lower animals, compared, xv, 62-3, 96;
of primitive men, iii, 302-3, 304, xv, 89-91, 96;
various animals of past, iii, 289, 290, 292, 298, 299;
overuse effects, xi, 288-9;
protection of, in infants ix, 345;
Sherrington on, xi, 12;
g , , ;
skull capacity in relation to, xv, 41;
stomach and, relations, xi, 370;
storehouse of past environment, 58;
tissues unaffected in starvation, ix, 298;
visual area, xi, 96-7;
waste of energy of, 377;
weight in man and apes, xv, 62;
weight in various men and races, 39-41;
wounds of, early treatment, x, 55, 56
(see also Brain Stem, Cerebellum, Cerebrum)
Brain Case, ix, 61;
face and, xv, 43, 62
Brain Power, development of, in man, xv, 190-1;
racial expressions and, 39, 63-4
Brain Stem, ix, 144-5, 146 (fig.);
vital process centers of, 167-9, 257, 315
Brain Work, energy consumed by, viii, 367;
fatigue from, ix, 138, x, 247
Brain Workers, ailments, xi, 371;
attractive foods for, ix, 242;
exercise needs, x, 304
Brakes, air (see Air Brakes);
electromagnetic, vi, 92, 94;
friction, iv, 93-4;
regenerative, vii, 200
Bramah, Joseph, hydraulic press, v, 98-9, 376;
planer, 377
Bran, in diet, x, vitamines in, 261, 266
Branches of Trees, as leaves, xiii, 378, 379;
why clear of ground, 86
Brandes, H. W., i, 215
Brasher, Philip, v, 124-5
Brass, alloy of copper, viii, 156, 164, 273;
electrical conductivity, iv, 283;
electric welding of, 312;
expansion and contraction of, 145-6, v, 72
p , , ,
Brave West Winds, i, 128, 368
Brazil, bushmaster snake of, xii, 234;
butterfly orchid of, xiii, 145;
coasts, xiv, 257;
coffee production, xiii, 232, 233;
coral reefs on coast, xiv, 305;
forests, xiii, 365, xiv, 366;
frogs of, xii, 178, 179;
glacial and coal deposits, iii, 203, 204;
interior unexplored, xiv, 26, 250;
jaguarundi of, xii, 364;
lizards of, 208;
matamata of, 193;
public health scholarships, x, 172;
rubber production, xiii, 246-7, 248;
shirt tree of, xv, 256;
soil depths, iii, 26;
tea cultivation, xiii, 228;
wolf of, vii, 342;
yellow fever in, x, 163
Brazilian Basin, xiv, 289
Brazilian Current, xiv, 304
Brazil Nut, source, xiii, 266
Bread, chemistry of, viii, 368-9;
digestion of, x, 326;
food value of, viii, 364, ix, 34-5, 299, x, 267, 268, 269, 273;
rising of, due to bacteria, 194;
yeast action in, ix, 248
Breadfruit, origin, xiii, 224
Breadfruit Trees, xv, 124
Breakwaters, pneumatic, v, 125;
strength of, xiv, 300, 301
Breath, holding of, ix, 256-7, 266;
holding of, in infants, 348;
shortness of, in heart failure, x, 340-1;
smell of, ix, 97;
, , ;
soul in, savage idea of, xv, 330
Breathing, action and control of, ix, 256-8, 263-6, x, 339;
body heat regulation by, 251;
color effects on, xi, 96;
deep, value of, ix, 259;
deep, sensations from, 266-7;
how learned, xi, 36-7;
in fatigue, 272;
in sleep, 283;
muscles of, in voice production, ix, 83;
of insects, xii, 103;
periodic, x, 339-40;
quickened by exercise, 303;
rate of, in infants, ix, 347-8;
rib cage movements in, 65;
through mouth, effects, x, 341-2
(see also Respiration)
Breeding (animal and plant), blended inheritance and pure
breeds, ix, 337;
in ancient Egypt, xvi, 72;
in captivity, xv, 197;
selective, ix, 327, xvi, 157-8
Brennan, Louis, v, 342
Brenner Pass, xiv, 240-1
Bretonneau, Pierre, x, 106, 110
Brewing, chemistry of, viii, 249
Bricks, invention of, xv, 268;
making of, in Egypt, 267 (fig.)
Bridges, steel, electrolysis in, vi, 64, 66;
strains on, v, 194;
sympathetic vibration of, iv, 225
Briggs, Henry, xvi, 104
Bright's Disease, x, 112, 225, 335, 340-1, 345, 346
Bristol Channel, tides of, xiv, 293
British Columbia, fjord coasts, xiv, 258;
no volcanoes or earthquakes in, 315, 331
q , ,
British Gum, viii, 243
British Meteorological Office, i, 222;
aeronautical service, 230, 286;
forecasts, 241;
in World War, 310
British System of Units, iv, 46, 69-70, 79, 80
British Thermal Unit, iv, 154, v, 350-1;
erg and calorie equivalents, vii, 382
Brittle-stars, xii, 23, 49
Broadway, N. Y., display lighting vii, 340-1
Broca, Paul, x, 130
Brocken Specter, i, 184, 185, 382
Bromine, a halogen, viii, 18, 84;
atomic weight and symbol, 383;
manufacture, 274;
properties and uses, 84-5, 86, 181, 297-8, 333;
test, 290
Bronchial Tubes, as infection center, x, 220, 224;
defence against germs, 202;
subdivisions of, ix, 255
Bronchitis, causes, x, 253, 295
Brongniart, Adolphe, 167, 169
Brontides, i, 195-6, 368
Brontosaurus, xii, 195
Brooklyn, water supply of, xiv, 140
Brooklyn Bridge, completion, v, 382;
corrosion of, vi, 66
Brooks Comet, ii, 134, 275, 286
Brook Trout, xii, 159
Broths, viii, 362, 369
Brounov, Prof. P., i, 249
Brown, John, medical work of, x, 89-90
Brown, Robert, xvi, 166
Brownian Movements, viii, 314, xvi, 166
Browning John M., v, 363, 366-7
Browning Machine Gun, v, 366-7, 384
g , , ,
Brown Paper, making of, v, 294;
source, xiii, 240
Brown Race, xv, 32;
diseases of, 51;
peoples of, 37;
separate origin theory, 70
Bruce, James, xvi, 123
Bruce Telescope, ii, 136, 302
Brush Discharge, vii, 10-11, 363
Brushes, dynamo, vi, 178, vii, 363
Brussels Sprouts, xiii, 197, 222;
mutant nature, 333-4
Buansuah, xii, 345
Bubonic Plague, x, 163-7;
native immunity to, xiv, 357;
Paré and, x, 153;
prevention of, 171;
spread by lice, 311
Buckwheat, xiii, 56;
family, 194;
flower, 46;
food, viii, 364;
life of, xiii, 53
Budapest, deep drilling, iii, 120-1
Buddhism, development of, xv, 199;
Nirvana of, 334
Buds, never on roots, xiii, 22, 23, 29;
of perennials, 53
Buenos Aires, harbor of, xiv, 270
Buffalo, N. Y., electric power system, vi, 377-8
Buffalo Bugs, xii, 123
Buffalo Dance, xv, 305-6
Buffaloes, xii, 328-9;
of Great Plains, xiv, 383
Buffalo Grass, xiii, 374
Buffalo Hot Springs, xiv, 145
p g , ,
Buffon, founder of modern natural history, xvi, 128;
lightning experiments, vi, 15;
"Natural History," xvi, 116;
on evolution of species, 139-40, 148
Bugles, sounding of, iv, 231
Bugs, xii, 110-14;
jaws and maxillæ in, 100
Buildings, development of, xv, 266-72;
dryness of air in American, i, 322, 323;
earthquake construction, xiv, 342, 343;
electric wiring, vii, 55-65;
weathering effects, iii, 22, 24
Building Stones, iii, 370-2
Bulgaria, long life of peasants, xiii, 172
Bull Durham Sign, Broadway, vii, 341
Bullets, form and flight, v, 362, 365
Bullfrogs, xii, 180-1
Bumps, in aeronautics, i, 293, 298, 368
Bunch Grass, xiv, 380
Bunsen, carbon arc, xvi, 189;
chemical work, 163;
solution of spectrum lines, ii, 112
Bunsen Burner, viii, 60-1
Buoyancy, law of, iv, 103-4, 105;
of air, 107, 108
Burbank, Luther, xvi, 167
Burdock, seed dispersal, xiii, 58
Burette, viii, 294, 295 (fig.)
Burma, elephant of, xii, 302;
rivers of, xiv, 195-6;
viper of, xii, 230
Burning Oils, viii, 209
Burns, of body tissues, x, 252;
from X-rays, vii, 250, x, 254
Burrels, xii, 326
Burs, chestnut and beech, xiii, 193;
, , , ;
seed dispersal by, 343
Bus Bars, vi, 358-9
Bushland, xiv, 378-9, 380, 381
Bushmen (African), xv, 133-5;
art of, 119 (fig.), 120-1, 298-300;
civilization at collection stage, 196;
hair of, 38;
height of, 39;
ostrich-hunting of, 212, 222;
use of baboons, in water searching, xii, 380
Bushmen (Australian), iii, 304
Bushnell, David, v, 197
Butane, derivatives, viii, 210
Butcher's Broom Plant, xiii, 29-30
Butte Mining District, iii, 361, 368
Butter, calory value, ix, 299, x, 269, 273;
composition, viii, 364;
digestion of, x, 326;
made by electricity, vii, 226, 227, 228;
pure food, ix, 300;
substitutes for, viii, 363, 364, x, 262, 267, 268;
vitamines in, 259, 261, 267
Buttercup Family, xiii, 196
Buttercups, double, xiii, 51;
petal arrangement, 190
Butter Fat, viii, 245, 246, 364;
in milk, 363;
vitamines in, 369
Butterflies, xii, 114-18;
antennæ of, 101;
earliest appearance, iii, 279, xii, 104;
evolution of, xii, 106-7;
jaws and maxillæ in, 100;
number of species in N. Y., 99, origin of name, xv, 157;
plant fertilization by, xiii, 123-4, 133-5, 142-3
Butterfly Orchid, xiii, 145
y , ,
Buttes, made by erosion, iii, 140
Buttonball Tree, xiii, 343-4
Buttonhole Machine, invention, v, 382
Butyric Acid, viii, 220, 248
Buys Ballot's Law, i, 125, 134
Buzzards, xii, 261
Buzzards Bay, oysters of, xii, 61;
tidal race at, xiv, 294
Byron, skull capacity, xv, 40
Byssus, xii, 64
Cabbage, calories in, ix, 299;
in mustard family, xiii, 197;
origin and antiquity, 222;
sport plant, 333-4;
vitamines in, x, 261, 262
Cabbage Bug, xii, 114
Cables (ocean), breaks in, xiv, 284;
laying of, 283,
(See also Atlantic Cables)
Cables, underground, vii, 12-13, 27
Cabot, John, birth and training, xiv, 310
Cacao, xiii, 234, 235
Cachalot, xii, 298-9
Cactus, characteristics of, xiii, 378, xv, 19;
leafless forms, xiii, 15;
leaves of, 378, xiv, 378;
prickly pear, xiii, 29 (fig.);
regions of dominance, 355;
stems of, 31;
water-storage by, 28, 106, 379
Cactus Family, xiii, 200;
restricted area, 320
Caddis Flies, xii, 106
Cadmium, symbol and atomic weight, viii, 383;
test for, 287, 288
Cæsar Julius scientific reforms xvi 98
Cæsar, Julius, scientific reforms, xvi, 98
Cæsarian Section, ancient practice of, x, 14, 27
Cæsium, chemical properties, viii, 128, 132, 133, 383;
spectrum, 302
Caffeine, composition, viii, 230;
polyuria induced by, x, 344
Caffre, xii, 355
Caimans, xii, 198
"Cain," picture, xv, 69
Caissons (pneumatic), iv, 30-2, v, 116-21;
pressure in, i, 329, iv, 129
Cake Urchins, xii, 50
Caladium, leaves of, xiii, 79
Calamus, of India, xiii, 361
Calamus Root, xiii, 188, 255
Calcite, iii, 325-6;
gangue mineral, viii, 199;
light polarization by, iii, 319, iv, 354
Calcium, viii, 148-9;
affinities, 31-2, 101-2, 128;
atomic weight and
symbol, 383;
compounds, 130, 138, 149-53, 195;
compounds in hard water, 318, 322-4;
electrolytic production, vii, 320-1;
fusibility, viii, 384;
in body tissues, 354;
in earth's crust, iii, 308, viii, 19, 129, 192, 195, 196;
in light metal group, 17, 127;
plant needs of, viii, 337, 341, 344;
specific gravity, 384;
test for, 287, 289
Calcium Carbide, viii, 153;
acetylene prepared from, 231;
in nitrogen fixation, 74, i, 36;
production and uses, vii, 312, xvi, 191
Calcium Carbonate viii 151 2;
Calcium Carbonate, viii, 151-2;
composition, 117;
deposits of, 195;
lime from, 149, 150;
in soil sweetening, 150, 347;
in water, 40, 151, 322.
(See also Limestone)
Calcium Chloride, viii, 152-3, 322-3;
mixture with snow, iv, 175
Calcium Group, viii, 148-53;
spectra, 302
Calcium Hydroxide, viii, 150, 347
Calcium Light, compared with sun's, ii, 169
Calcium Oxide, viii, 149-51. (See Lime)
Calcium Pentasulphide, viii, 333
Calcium Phosphate, viii, 89, 153, 279-80, 354
Calcium Stearate, viii, 143, 323
Calcium Sulphate, viii, 117, 149, 153;
in water, 40, 322-3
Calcium Sulphite, viii, 153, 372
Calcium Tungstate, color in X-rays, iv, 378
Calc Spar, iii, 325
Calculations, mathematical, development of, xv, 181-4, xvi, 61
Caldwell, Kansas, region, iii, 34
Calendar, Babylonian, xvi, 57-8;
Bacon's work, 101;
clothing in relation to, x, 309;
Egyptian, xvi, 70;
reforms of Cæsar, 98
Calibration, vii, 158, 363;
of condensers, 293-4
California, aerial fish patrol, i, 48;
Big Trees (see Big Trees);
borax deposits, viii, 89-90;
climate, xiv, 348-9, 358;
climatic changes in, 361, 362;
cretaceous deposits iii 216;
cretaceous deposits, iii, 216;
crustal movements in southern, 81-2, 225;
earthquakes and volcanoes, xiv, 331;
forests and trees, 374;
geese of, xii, 258;
gold production, iii, 226, 365, 367;
hot springs, xiv, 143;
live oaks of, 370;
lemon trees of, xv, 22;
mercury production, iii, 370;
ocean waves used for power, v, 174;
oil fields, iii, 350;
rainfall, i, 112;
raisin-drying industry, v, 257;
record temperature, 209;
redwood forests, fog drip, 351;
"road-runners" of, xii, 265;
sea elephant of, 335;
sea lions, 334;
southern, xiv, 42;
"Sunshine State," 86;
tin production, iii, 368;
valley of, xiv, 215
Callao, harbor of, xiv, 265
Callina of Spain, i, 96, 368
Calms of Cancer and Capricorn, i, 129, 368
Calomel, viii, 170
Caloric, iv, 47, 154, xvi, 125
Calories, definition and value, iv, 154, 312, vii, 369, viii, 361,
374, ix, 295, x, 269;
electrical equivalents, vii, 382;
food requirements in, ix, 296-7;
in various foods, viii, 361, 366-7, ix, 299, x, 269;
major, viii, 361;
mechanical equivalent, ix, 295;
use of, in rating food values, iv, 48
Calorimeter viii 360 1 x 269
Calorimeter, viii, 360-1, x, 269
Calumet Copper Mine, heat increase in, xiv, 12
Calyx, xiii, 44, 45;
absent in some plants, 46, 182;
incorporated in fruits, 54
Camber, of aeroplanes, i, 288
Cambium, xiii, 24, 26, 177 (fig.)
Cambrian Period, iii, 181-4, 377;
animals of, 263, 267, 268, 272, 273, 277;
climate, 184-5;
first life in, xv, 71;
fossils from, iii, 174;
metamorphism of rocks in, 189
Cambridge University, founding of, xvi, 100
Cambyses, burial of army of, iii, 73
Camels, xii, 313-15;
hoofs of, iii, 300;
trypanosome in, x, 168
Camera, iv, 339-40, ix, 106-9;
Langley on the, ii, 221;
power to pierce water, i, 47
Camphor, viii, 240, 252;
in celluloid, 255;
smell, xi, 80;
source, xiii, 255, 263
Cams, v. 39-40
Canada, animals of, xii, 287, 318, 320, 336, 348, 350, 351, 365;
Atlantic ports closed by ice, xiv, 267;
forests of, 371, 372;
French colonization of, 191;
geology, iii, 165, 167, 219, 231-2;
Glacial Epoch effects, xiv, 56, 61-2, 170;
Indian summer, i, 361;
lakes of, xiv, 200;
mining products, iii, 360, 365, 368, 376;
plains of, xiv, 217;
plutonic formations 111;
plutonic formations, 111;
rainfall of, 360;
tobacco production, xiii, 258
Canadian Rockies, formations in, xiv, 229;
glaciers of, 55
Canals, lift locks, v, 103
Canaries Current, xiv, 304
Canary Islands, xiv, 252, 289;
dragon tree of, xiii, 183-4
Cancer, cause, nature, and treatment, x, 119-20, 382, 383-4;
early knowledge of, 39, 41;
racial immunity and susceptibility to, xv, 48-9, 50, 51;
spread and cure by surgery, ix, 255
Candle, Candlepower, iv, 351-2;
compared with sun, ii, 169
Candles, blowing out of, viii, 57;
burning of, in caissons, iv, 31;
flame of, viii, 58, 59;
materials of, 247
Candy, boiling point, viii, 299;
dextrin in, 243;
glucose uses, 225
Cane Sugar, xiii, 83, 214-15;
chemical properties, occurrence, and use, viii, 226-7;
extraction and refining, 242;
fermentation, 225, 227;
large molecules, 356;
making of, by plant, 335;
solutions, freezing point, 299;
sweetness of, ix, 230;
testing of, by polarized light, iv, 356
Canned foods, vitamines lacking in, x, 262, 263, 266, 267-8
Cannel Coal, iii, 344, viii, 202
Cannibalism, remarks on, ix, 280-1
Cannon, Dr., medical work, x, 295, 327;
quoted, xi, 137-9
Canoes primitive xv 262 4;
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade

Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.

Let us accompany you on the journey of exploring knowledge and


personal growth!

ebookmass.com

You might also like