Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 4,217
- Història 1,082
- Política y gobierno 820
- History 507
- Asia 353
- Descripción y viajes 273
- Asma 258
- -Historia 248
- Relaciones 223
- Crítica e interpretación 221
- Politics and government 217
- Usos y costumbres 203
- Economic conditions 179
- Descripción 176
- Civilización romana 173
- Historia y crítica 169
- Política exterior 167
- Civilización 151
- Situación social 146
- Geografía 135
- Religión 132
- Emperadores 129
- Política 128
- Obras anteriores a 1800 127
- Descripcions i viatges 124
- Relaciones exteriores 122
- Foreign relations 121
- Història antiga 113
- Comunismo 108
- Restos arqueológicos 108
-
25361por Zając, BarbaraTabla de Contenidos: “…The coinage of Thrace -- X.2. The coinage of Asia -- X.3. The coinage of Galatia and Cappadocia -- Summary -- Plates -- References -- Historical Sources -- Abbreviations -- References -- Legends on the coins of Bithynia and Pontus during the reign of Trajan. -- APAMEA MYRLEA -- NICAEA -- PRUSA AD OLYMPUM -- BYZANTIUM -- CALCHEDON -- NICOMEDIA -- HERACLEA PONTICA -- IULIOPOLIS -- PRUSIAS AD HYPIUM -- TIUM -- ABONOTEICHOS -- AMASTRIS -- SINOPE -- AMISUS -- Coins without an ethnic with uncertain attribution…”
Publicado 2023
Libro electrónico -
25362Publicado 2020“…Coverage includes * Network security protocol and cryptography basics * Design considerations and techniques for secret key and hash algorithms (AES, DES, SHA-1, SHA-2, SHA-3) * First-generation public key algorithms (RSA, Diffie-Hellman, ECC) * How quantum computers work, and why they threaten the first-generation public key algorithms * Quantum computers: how they work, and why they threaten the first-generation public key algorithms * Multi-factor authentication of people * Real-time communication (SSL/TLS, SSH, IPsec) * New applications (electronic money, blockchains) * New cryptographic techniques (homomorphic encryption, secure multiparty computation)…”
Libro electrónico -
25363Publicado 2016Tabla de Contenidos: “…-- Summary -- Chapter 10: Attacks on Android Devices -- MitM attacks -- Dangers with apps that provide network level access -- Using existing exploits -- Malware -- Bypassing screen locks -- Bypassing pattern lock using adb -- Removing the gesture.key file -- Cracking SHA1 hashes from the gesture.key file -- Bypassing password/PIN using adb…”
Libro electrónico -
25364por Chapple, MikeTabla de Contenidos: “…Chapter 15 Threat Identification and Prevention: Objective 4.2 Understand Network Threats and Attacks -- Antivirus Software -- Intrusion Detection and Prevention -- Intrusion Detection -- Intrusion Prevention -- Environments Monitored -- Classification Errors -- Detection Techniques -- Firewalls -- Vulnerability Scanning -- Network Vulnerability Scanning -- Application Scanning -- Web Application Scanning -- Chapter 16 Network Security Infrastructure: Objective 4.3 Understand Network Security Infrastructure -- Data Center Protection -- Air Temperature -- Humidity -- Fire -- Network Security Zones -- Switches, WAPs, and Routers -- Switches -- WAPs -- Routers -- Network Segmentation -- Virtual Private Networks -- Network Access Control -- Role-Based Access Control -- Posture Checking -- Internet of Things -- IoT Security -- Chapter 17 Cloud Computing: Objective 4.3 Understand Network Security Infrastructure -- Cloud Computing -- Drivers for Cloud Computing -- Cloud Deployment Models -- Private Cloud -- Public Cloud -- Hybrid Cloud -- Community Cloud -- Cloud Service Categories -- Software as a Service (SaaS) -- Infrastructure as a Service (IaaS) -- Platform as a Service (PaaS) -- Desktop as a Service (DaaS) -- Security and the Shared Responsibility Model -- Automation and Orchestration -- Vendor Relationships -- Managed Service Providers -- Vendor Agreements -- Part V Domain 5: Security Operations -- Chapter 18 Encryption: Objective 5.1 Understand Data Security -- Cryptography -- Encrypting Data -- Decrypting Data -- Encryption Algorithms -- Symmetric Encryption -- Asymmetric Encryption -- Uses of Encryption -- Data at Rest -- Data in Transit -- Hash Functions -- MD5 -- SHA -- Chapter 19 Data Handling: Objective 5.1 Understand Data Security -- Data Life Cycle -- Create -- Store -- Use -- Share -- Archive -- Destroy -- Data Classification…”
Publicado 2024
Libro electrónico -
25365Publicado 2023Tabla de Contenidos: “…Google Cloud Memorystore -- Google Cloud's big data services -- Google Cloud Pub/Sub -- Google Cloud BigQuery -- Google Cloud Dataflow -- Google Cloud Dataproc -- Google Cloud Looker -- Summary -- Practice questions -- Answers to the practice questions -- Further reading -- Chapter 10: Google Cloud AI Services -- Google Cloud Vertex AI -- Vertex AI datasets -- Dataset labeling -- Vertex AI Feature Store -- Workbench and notebooks -- Vertex AI custom models -- Vertex Explainable AI -- Vertex AI prediction -- Vertex AI Model Monitoring -- Vertex AI Pipelines -- Vertex AI TensorBoard and Metadata -- Vertex AI AutoML -- Google Cloud ML APIs -- Sight API -- Conversational API -- Google Cloud generative AI services -- Summary -- Practice questions -- Answers to the practice questions -- Further reading -- Chapter 11: Google Cloud Security Services -- Google Cloud IAM -- Google Cloud users and groups -- Google Cloud service accounts -- Google Cloud IAM roles -- Google Cloud endpoint security -- GCE VM security -- GCS security -- Google Cloud network security -- Google Cloud data security -- Data classification and data lineage -- Data encryption -- GCP DLP -- Google Cloud Monitoring and Logging -- Google Cloud Security Command Center (SCC) -- SCC asset discovery -- SCC scan findings -- SCC integration with Cloud DLP -- SHA -- The latest SCC features -- Summary -- Practice questions -- Answers to the practice questions -- Further reading -- Part 3: Mastering Azure Cloud Services -- Chapter 12: Microsoft Azure Cloud Foundation Services -- Azure cloud resource hierarchy -- Azure cloud compute -- Azure cloud VMs -- Azure cloud container services -- Azure serverless computing -- Azure cloud storage -- Object storage -- File storage -- Block storage -- Archive storage -- Azure cloud networking -- Azure Cloud Foundation service implementation -- Summary…”
Libro electrónico -
25366Publicado 2022“…What you will learn Write JavaScript code that uses cryptography running within a Node.js environment for the server-side or in frontend applications for web browsers Use modern, safe hashing functions for calculating digests and key derivation, including SHA-2 and Argon2 Practice encrypting messages and files with a symmetric key using AES and ChaCha20-Poly1305 Use asymmetric and hybrid encryption, leveraging RSA and Elliptic Curve Cryptography with ECDH and ECIES Calculate and verify digital signatures using RSA and ECDSA/EdDSA Manage passwords and encryption keys safely Who this book is for This cryptography book is an introductory guide for software developers who don't necessarily have a background in cryptography but are interested in learning how to integrate it in their solutions, correctly and safely. …”
Libro electrónico -
25367Publicado 2022Tabla de Contenidos: “…UN FACTOR CLAVE PARA COMPRENDER SU DIMENSIÓN COMO PATRIMONIO CULTURAL EN EL AULA -- CAPÍTULO 44 RETOS PARA LA ENSEÑANZA DE LA HISTORIA DE LAS RELACIONES ENTRE EL MUNDO HISPANO Y ASIA ORIENTAL A ESTUDIANTES UNIVERSITARIOS ESPAÑOLES, LATINOAMERICANOS Y ASIÁTICOS -- CAPÍTULO 45 INSTANDO UN APRENDIZAJE BASADO EN LAS ARTES -- CAPÍTULO 46 LA ENSEÑANZA DEL INTERIORISMO A TRAVÉS DEL CINE Y LA TELEVISIÓN: EJEMPLOS PRÁCTICOS -- CAPÍTULO 47 RAZÓN POÉTICA Y EDUCACIÓN SOCIAL: REFLEXIONES SOBRE EL PROYECTO PEDAGÓGICO DE MARÍA ZAMBRANO -- CAPÍTULO 48 PROPUESTA DIDÁCTICA EN EL AULA DE TRADUCCIÓN: APRENDIZAJE A TRAVÉS DE LA TRANSFERENCIA DE VIDEOJUEGOS, SUS HISTORIAS Y SUS UNIVERSOS IMAGINARIOS -- CAPÍTULO 49 PODCASTING: PROYECTO METODOLÓGICO INTERACTIVO PARA PRÁCTICAS PROFESIONALES ANTICIPADAS EN ALEMÁN E INGLÉS COMO LENGUAS EXTRANJERAS PARA LA TRADUCCIÓN, INTERPRETACIÓN Y EL TURISMO -- CAPÍTULO 50 USO DE CANCIONES EN LA ENSEÑANZA DEL CHINO MANDARÍN COMO LENGUA EXTRANJERA -- CAPÍTULO 51 EL SISTEMA DE LOS OBJETOS DE JEAN BAUDRILLARD COMO OBRA PARA REFLEXIONAR SOBRE EL HOGAR Y EL DISEÑO DESDE EL PUNTO DE VISTA PATRIMONIAL…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
25368por Capitel, Antón, 1947-Tabla de Contenidos: “…I: Andalucía, Aragón, Asturias, Canarias Cantabria, Castilla-La Mancha, Castilla y León, Cataluña -- II: Extremadura, Galicia, Islas Baleares, La Rioja, Madrid, Murcia, Navarra, Valencia, País Vasco, Ceuta y Melilla…”
Publicado 1996
Biblioteca Universidad Eclesiástica San Dámaso (Otras Fuentes: Red de Bibliotecas de la Archidiócesis de Granada, Biblioteca Universitat Ramon Llull, Red de Bibliotecas de la Diócesis de Córdoba, Bibliotecas de la Diócesis de Teruel y Albarracín, Biblioteca Central de Capuchinos de España, Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad de Navarra, Biblioteca del Seminario Diocesano de Vitoria-Gasteiz, Biblioteca Provicincial Misioneros Claretianos - Provincia de Santiago, Biblioteca Diocesana de Salamanca, Biblioteca del Instituto Superior de Teología de las Islas Canarias, Biblioteca Universidad de Deusto, Biblioteca de la Universidad Pontificia de Salamanca)Libro -
25369Publicado 2016Tabla de Contenidos: “…4.7.2 - Decongestants -- 4.7.3 - Weight loss pills -- 4.7.4 - Nicotine -- 4.7.5 - Alcohol -- 4.8 - Sleeping environment -- 4.9 - Pain -- 4.10 - Diet -- 4.11 - Naps -- 4.12 - Body posture -- 4.13 - Exercise -- 4.14 - Age -- References -- Chapter 5 - Sleep disorders -- 5.1 - Sleep apnea -- 5.2 - Insomnia -- 5.3 - Narcolepsy -- 5.4 - Restless leg syndrome (RLS)/Willis-Ekbom disease (WED) -- 5.5 - Shift work disorder -- 5.6 - Sleep-wake phase disorders -- 5.6.1 - Advanced sleep-wake phase disorder (ASWPD) -- 5.6.2 - Delayed sleep-wake phase disorder (DSWPD) -- 5.7 - Parasomnias -- 5.7.1 - Non-REM parasomnias: sleepwalking, sleep-related eating, sleep violence, sleep sex, night terrors -- 5.7.2 - REM behavior disorder -- 5.8 - Fatal familial insomnia -- 5.9 - Hypersomnias -- References -- Chapter 6 - Fatigue and human performance -- 6.1 - Fatigue and human error -- 6.2 - Fatigue and hand-eye coordination -- 6.3 - Fatigue and mood -- 6.4 - Fatigue and memory -- 6.5 - Fatigue and reaction time -- 6.6 - Fatigue and attention -- 6.7 - Fatigue and cognitive tunneling -- 6.8 - Fatigue and decision making -- 6.9 - Fatigue and working with others -- 6.10 - Fatigue and marital life -- References -- Chapter 7 - Fatigue and accidents -- 7.1 - Bhopal-fatigue and poor abnormal situation response -- 7.2 - American Airlines 1420-fatigue and decline in situation awareness -- 7.3 - NASA space shuttle-fatigue and decision making -- 7.4 - Exxon Valdez-fatigue and work schedules -- 7.5 - Three Mile Island and cognitive tunneling -- 7.6 - Metro-North train derailment fatigue caused by circadian rhythms and sleep apnea -- 7.7 - Fatigue's role in accidents -- References -- Chapter 8 - Fatigue-related regulations and guidelines -- 8.1 - OSHA and fatigue risk -- 8.2 - NIOSH sleep-related publications -- 8.3 - UK and EU regulations -- 8.4 - Transportation fatigue regulations…”
Libro electrónico -
25370Publicado 2018Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Keep It Real - Firebase Realtime Database -- Firebase Realtime Database -- Setting up a development environment -- Prerequisites -- Configuring Firebase in Android projects -- Reading and writing to Realtime Database -- Database reference -- Writing into Realtime Database -- Reading from Realtime Database -- Structuring the data with objects -- Reading the objects from Firebase -- Reading value changes -- Parsing the DataSnapshot object -- Updating data -- Writing HashMaps to Realtime Database -- Realtime Database and lists -- Deleting data -- Offline capabilities -- Realtime Database rules -- Default security rules -- Database rules and types -- Customizing database rules -- Data security -- Custom variables -- Default variables -- RuleDataSnapshot and its methods -- Creating an Android application using Realtime Database -- User interface design -- Logic -- Summary -- Chapter 2: Safe and Sound - Firebase Authentication -- Firebase Authentication -- Setting up Firebase Authentication -- FirebaseUI Auth authentication -- Firebase SDK Authentication -- FirebaseUI Email Authentication -- Configuring for Email Authentication -- Enabling Email/Password Authentication in Console -- Initializing Firebase Authentication -- Finalizing the project -- Firebase SDK Email Authentication -- Sign up new users -- Sign in existing users -- Managing users -- Provider-specific user profile details -- Profile updating -- Sending a verification Email -- Forgot password -- Deleting a user -- Managing users through console -- Smart Lock -- FirebaseUI social networking site authentication -- Google Sign-in -- SHA-1 fingerprint -- Code for Google provider -- Facebook Login -- Facebook App ID and App secret -- Project configuration…”
Libro electrónico -
25371por Sobell, Mark G.Tabla de Contenidos: “…grep: Searches for a pattern in files -- gzip: Compresses or decompresses files -- head: Displays the beginning of a file -- kill: Terminates a process by PID -- killall: Terminates a process by name -- less: Displays text files, one screen at a time -- ln: Makes a link to a file -- lpr: Sends files to printers -- ls: Displays information about one or more files -- make: Keeps a set of programs current -- man: Displays documentation for commands -- mkdir: Creates a directory -- mkfs: Creates a filesystem on a device -- Mtools: Uses DOS-style commands on files and directories -- mv: Renames or moves a file -- nice: Changes the priority of a command -- nohup: Runs a command that keeps running after you log out -- od: Dumps the contents of a file -- paste: Joins corresponding lines from files -- pr: Paginates files for printing -- ps: Displays process status -- rcp: Copies one or more files to or from a remote system -- rlogin: Logs in on a remote system -- rm: Removes a file (deletes a link) -- rmdir: Removes a directory -- rsh: Executes commands on a remote system -- scp: Securely copies one or more files to or from a remote system -- sleep: Creates a process that sleeps for a specified interval -- sort: Sorts and/or merges files -- split: Divides a file in into sections -- ssh: Securely executes commands on a remote system -- strings: Displays strings of printable characters -- stty: Displays or sets terminal parameters -- tail: Displays the last part (tail) of a file -- tar: Stores or retrieves files to/from an archive file -- tee: Copies standard input to standard output and one or more files -- telnet: Connects to a remote system over a network -- test: Evaluates an expression -- top: Dynamically displays process status -- touch: Changes a file's access and/or modification time -- tr: Replaces specified characters…”
Publicado 2005
Libro electrónico -
25372por Forum, International TransportTabla de Contenidos: “…Mastering the pandemic: Challenges and opportunities for non-urban mobility after Covid-19 -- How Covid-19 has changed travel behaviour -- The impact of Covid-19 on the decarbonisation of non-urban passenger transport -- Recover, Reshape, Reshape+: Three possible futures for non-urban passenger transport -- Non-urban passenger transport in the Recover scenario -- Paradigm change: Non-urban transport in the Reshape scenario -- Reshape+: Reinforcing Reshape -- Demand for non-urban passenger transport: Quick recovery and continued growth -- Air travel will dominate intercity trips -- Global transport activity is shifting to Asia -- CO2 emissions from non-urban passenger transport: Decoupling emissions from demand -- Well-to-tank emissions become more important -- OECD countries have the greatest potential to decarbonise -- Fair decarbonisation: Reducing non-urban passenger emissions in equitable ways -- Environmental equity of transport decisions -- Carbon taxes must not harm the less well-off -- Quantifying the equitability of non-urban transport -- Policy recommendations -- Increase the price of high-carbon non-urban transport to encourage clean alternatives -- Create Covid-19 recovery packages that boost sustainable non-urban transport -- Align decarbonisation policies across the transport and energy sectors to reflect the reliance of zero-carbon transport on clean energy -- Mandate the use of alternative fuels in aviation to encourage long-term innovation -- Incentivise the transition to low-emission non-urban road transport by making it more affordable and through measures that increase consumer confidence in cleaner options -- Invest proactively in technological developments beyond the transport sector to ensure wide-scale availability of new technologies for a comprehensive decarbonisation roll out -- References -- Note…”
Publicado 2021
Libro electrónico -
25373por Elsevier B.V.Tabla de Contenidos: “…Canine and feline vector-borne diseases of zoonotic concern in Southeast Asia -- Helminth lipidomics: Technical aspects and future prospects -- Perspectives on intestinal tapeworm infections: An evaluation of direct and indirect life-cycles with a special emphasis on species of Hymenolepis -- Leishmania infection in cats and feline leishmaniosis: An updated review with a proposal of a diagnosis algorithm and prevention guidelines -- Current debates and advances in tick microbiome research -- Comparative studies on faecal egg counting techniques used for the detection of gastrointestinal parasites of equines: A systematic review -- Systematic review of the entomological impact of insecticide-treated nets evaluated using experimental hut trials in Africa -- Ecological and evolutionary perspectives on tick-borne pathogen co-infections -- Protecting dogs and cats against the Australian paralysis tick, Ixodes holocyclus (Acari: Ixodidae): A review of the Australian acaricide registration process -- The controversies surrounding Giardia intestinalis assemblages A and B -- Variability in human attractiveness to mosquitoes -- Cystic echinococcosis in humans and animals in Egypt: An epidemiological overview -- Seroprevalence of Neospora caninum in dogs from greater Sydney, Australia unchanged from 1997 to 2019 and worldwide review of adult-onset of canine neosporosis -- Whole-genome reference of Dirofilaria immitis from Australia to determine single nucleotide polymorphisms associated with macrocyclic lactone resistance in the USA -- Not gone but forgotten: Tritrichomonas foetus in extensively-managed bulls from Australia's Northern Territory -- Recent trends in the use of social media in parasitology and the application of alternative metrics -- Modeling the association between Aedes aegypti ovitrap egg counts, multi-scale remotely sensed environmental data and arboviral cases at Puntarenas, Costa Rica (2017-2018) -- Bulinus truncatus transcriptome - a resource to enable molecular studies of snail and schistosome biology -- Mitochondrial genome of Bulinus truncatus (Gastropoda: Lymnaeoidea): Implications for snail systematics and schistosome epidemiology -- Molecular characterization of novel Ehrlichia genotypes in Ixodes auritulus from Uruguay -- Four polyopisthocotyleans (Platyhelminthes: Monogenea) from carangid fishes in the Mediterranean, off the Algerian coasts -- Genetic diversity and shedding profiles for Cryptosporidium parvum in adult cattle and their calves -- What the fox? …”
Publicado 2021
Revista digital -
25374Publicado 2016Tabla de Contenidos: “…-- Speech at PFI Best Asia Infrastructure Citation Awards -- If You are Not Committed, Don't Do It! …”
Libro electrónico -
25375Publicado 2023Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Foreword -- What the experts say -- Contributors -- Table of Contents -- Preface -- Part 1- Introduction -- Chapter 1: Malware Science Life Cycle Overview -- Combining malware -- Worms and Trojans combination -- Ransomware and spyware combination -- Macro malware and ransomware -- Managing malware -- Collection -- Analysis -- Detection -- Prevention -- Mitigation -- Reporting -- Summary -- Chapter 2: An Overview of the International History of Cyber Malware Impacts -- The evolution of cyber threats and malware -- Impacts on international relations and security -- Impacts on the economy and cybercrime -- The future of malware -- Expanded viewpoint on the impacts on international relations and security -- Expansion on cybercrime impacts on the general economy -- Direct financial impacts of malware - a global overview -- Ransomware's global economic impact - a continental overview -- Ransomware's economic impact in North America - a deeper look -- Ransomware's economic impact in Asia - a detailed examination -- Ransomware's economic impact in Africa - an in-depth analysis -- Ransomware's economic impact in South America - an extensive exploration -- Economic impacts versus socio-economic impacts -- Ransomware attacks and their impact on employment - an in-depth perspective -- Ransomware attacks and their impact on public services - an elaborate examination -- Ransomware and inequality - a closer look at the impact on small businesses -- Policy, regulations, and their downstream impact on smaller businesses and public services -- Regulatory changes due to malware impacts on small and mid-scale businesses -- A deeper dive into the operational challenges -- Translating operational challenges into increased cost -- Expansion of economic and socio-economic impacts on key industries globally…”
Libro electrónico -
25376Publicado 2023Tabla de Contenidos: “…Una aproximación al Tercer Evangelio a través de siete palabras / Ricard Lázaro Barceló -- Pablo y la isla en el episodio de Malta (Hch 28, 1-10). Algunos tópicos helenísticos / Enrique Mena Salas -- Sentido cristológico de los tres ritos de la fiesta judía de las Tiendas en el signo de la curación del ciego de nacimiento (Jn 9, 1-41) / Jesús Girón Izquierdo -- De la muerte a la confesión de fe en el Resucitado. …”
Biblioteca Universidad Eclesiástica San Dámaso (Otras Fuentes: Biblioteca del Instituto Superior de Teología de las Islas Canarias, Biblioteca Pública Episcopal del Seminario de Barcelona, Biblioteca Universitat Ramon Llull, Biblioteca de la Universidad de Navarra, Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca Universidad de Deusto, Universidad Loyola - Universidad Loyola Granada, Biblioteca del Instituto Diocesano de Teología y Pastoral de Bilbao)Libro -
25377
-
25378por Torres Fumero, Constantino O.Tabla de Contenidos: “…LAS CIVILIZACIONES DEL SUR Y EL ESTE DE ASIA EN LA ANTIGÜEDAD -- ORIENTACIONES DE LA UNIDAD IV -- COMPETENCIAS DE LA UNIDAD -- ESQUEMA DE CONTENIDO DE LA UNIDAD IV -- DESARROLLO DE LOS CONTENIDOS DE LA UNIDAD -- LA INDIA ANTIGUA -- EL ESPACIO GEOGRÁFICO -- PERIODIZACIÓN Y PRIMERAS SOCIEDADES -- LA CIVILIZACIÓN DEL VALLE DEL INDO (C. 3300-1700 A.N.E.) -- PRINCIPALES ACTIVIDADES ECONÓMICAS -- ORGANIZACIÓN POLÍTICA Y SOCIAL -- CAUSAS DEL DECLIVE Y FIN DE LA CIVILIZACIÓN -- LAS INVASIONES ARIAS (C. 1700-1200 A.N.E.) …”
Publicado 2020
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
25379Publicado 2016Tabla de Contenidos: “…PIB per cápita para una selección de economías de América Latina, Asía y países de la OCDE…”
Libro electrónico -
25380Publicado 2014Tabla de Contenidos: “…Proporción de la mano de obra agrícola y agricultores en la población india -- Tierra -- Agua -- Formación del capital -- El crecimiento de la productividad ha sido clave para una mayor producción -- Figura 2.6. …”
Libro electrónico