gather up one's tools

  • 111Enhanced interrogation techniques — or alternative set of procedures are terms adopted by the George W. Bush administration in the United States to describe certain severe interrogation methods, often described as torture.[1] These techniques were authorized by the Bush… …

    Wikipedia

  • 112Privacy-invasive software — is a category of computer software that ignores users’ privacy and that is distributed with a specific intent, often of a commercial nature. Three typical examples of privacy invasive software are adware, spyware and content hijacking programs.… …

    Wikipedia

  • 113Races and creatures in His Dark Materials — This is a list of fictional races and creatures in the His Dark Materials series by Philip Pullman. Contents 1 Armoured Bears (panserbjørne) 1.1 Description 1.2 Society 1.3 …

    Wikipedia

  • 114Health and Disease — ▪ 2009 Introduction Food and Drug Safety.       In 2008 the contamination of infant formula and related dairy products with melamine in China led to widespread health problems in children, including urinary problems and possible renal tube… …

    Universalium

  • 1152011 Egyptian revolution — For other revolutions, see Egyptian revolution. 2011 Egyptian revolution Part of the Arab Spring …

    Wikipedia

  • 116Wizard101 — Wizard 101 Wizard 101 Developer(s) KingsIsle Entertainment Publisher(s) KingsIsle Entertainment …

    Wikipedia

  • 117BIBLE — THE CANON, TEXT, AND EDITIONS canon general titles the canon the significance of the canon the process of canonization contents and titles of the books the tripartite canon …

    Encyclopedia of Judaism

  • 118JEWISH AND ISLAMIC LAW, A COMPARATIVE REVIEW — The Relationship between Jewish and Islamic Law Comparative studies in the field of Jewish and Islamic Law began more than 150 years ago with the publication of Abraham Geiger s Was hat Mohammed aus dem Judenthum aufgenommen (1833, rev. 1902).… …

    Encyclopedia of Judaism

  • 119Chiapas — Estado Libre y Soberano de Chiapas   State   …

    Wikipedia

  • 120Honeypot (computing) — In computer terminology, a honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer, data, or a network site that appears to be part of a… …

    Wikipedia