Mostrando 25,381 - 25,400 Resultados de 26,976 Para Buscar 'RSHA~', tiempo de consulta: 0.94s Limitar resultados
  1. 25381
    Publicado 2018
    Tabla de Contenidos: “…A real-world pen test scenario - the chatty printer -- Configuring our SMB listener -- Authentication capture -- Hash capture with LLMNR/NetBIOS NS spoofing -- Let it rip - cracking Windows hashes -- The two philosophies of password cracking -- John the Ripper cracking with a wordlist -- John the Ripper cracking with masking -- Reviewing your progress with the show flag -- Summary -- Questions -- Further reading -- Chapter 4: Advanced Network Attacks -- Technical requirements -- Binary injection with BetterCAP proxy modules -- The Ruby file injection proxy module - replace_file.rb -- Creating the payload and connect-back listener with Metasploit -- HTTP downgrading attacks with sslstrip -- Removing the need for a certificate - HTTP downgrading -- Understanding HSTS bypassing with DNS spoofing -- HTTP downgrade attacks with BetterCAP ARP/DNS spoofing -- The evil upgrade - attacking software update mechanisms -- Exploring ISR Evilgrade -- Configuring the payload and upgrade module -- Spoofing ARP/DNS and injecting the payload -- IPv6 for hackers -- IPv6 addressing basics -- Local IPv6 reconnaissance and the Neighbor Discovery Protocol -- IPv6 man-in-the-middle - attacking your neighbors -- Living in an IPv4 world - creating a local 4-to-6 proxy for your tools -- Summary -- Questions -- Further reading -- Chapter 5: Cryptography and the Penetration Tester -- Technical requirements -- Flipping the bit - integrity attacks against CBC algorithms -- Block ciphers and modes of operation -- Introducing block chaining -- Setting up your bit-flipping lab -- Manipulating the IV to generate predictable results -- Flipping to root - privilege escalation via CBC bit-flipping -- Sneaking your data in - hash length extension attacks -- Setting up your hash attack lab -- Understanding SHA-1's running state and compression function…”
    Libro electrónico
  2. 25382
    Publicado 2022
    Tabla de Contenidos: “…Where the Symmetric Key Is Just Protected by a Password -- Working with and Indexing Encrypted Columns -- Migrating or Restoring a Database with Column Encryption -- Temporary Keys -- Encryption by Passphrase -- Protection of Key Passwords Being Sent to SQL Server -- Summary -- Appendix A: Glossary of Terms -- A -- Advanced Encryption Standard -- AES -- Always Encrypted -- Always Encrypted Wizard -- Asymmetric Encryption -- Asymmetric Key -- At-Rest Data -- Attestation -- Authenticator -- Automated Key Management -- Azure Key Vault -- B -- Backup Encryption -- C -- CA -- CEK -- Certificate -- Certification Authority -- Certificate Store -- CMK -- Code Integrity Policy -- Column Encryption Key -- Column Master Key -- D -- Data Encryption Standard -- Database Encryption Key -- Database Master Key -- DEK -- DES -- Deterministic Encryption -- Diffie Hellman -- DMA Protection -- DMK -- DPAPI -- E -- EKM -- Enclave -- Encryption Scan -- Extensible Key Management -- H -- Hardware Security Module -- Hash -- HGS -- Host Guardian Service -- Host Health Certificate -- Host Key -- HSM -- I -- In-Transit Encryption -- K -- Key Rotation -- P -- Parameterization for Always Encrypted -- Private Key -- Public Key -- R -- Randomized Encryption -- S -- Salt -- Secure Boot -- Secure Hashing Algorithm -- Service Master Key -- SHA -- SMK -- Symmetric Encryption -- Symmetric Key -- T -- TDE -- TDS -- Temporary Key -- Thumbprint -- TLS -- TPM -- TPM Baseline -- TPM Endorsement Key -- Transport Layer Security -- Transparent Data Encryption -- Trusted Platform Module -- V -- VBS -- Virtualization Based Security -- W -- Windows Data Protection API -- Appendix B: Encryption in the Cloud -- Azure VM -- Azure SQL Database or Managed Instance -- TDE -- Backup Encryption -- Always Encrypted with Secure Enclaves -- TLS -- AWS VM (EC2) -- EKM -- Always Encrypted with Secure Enclaves…”
    Libro electrónico
  3. 25383
    por Casamitjana, María
    Publicado 2019
    Tabla de Contenidos: “…Aspectos legales en Países de Asia central -- 6. Aspectos legales en la Federación Rusa -- 7. …”
    Libro electrónico
  4. 25384
    Publicado 2020
    Tabla de Contenidos: “…Setting the scene -- 4. Costa Rica as pioneer of a green social contract / Monica Araya -- 5. …”
    Libro electrónico
  5. 25385
    Tabla de Contenidos: “…Antonieta ; Mocedades de Napoleón Bonaparte ; La guerra de 1793 ; Caida de la Gironda ; El terror ; Constitución de 1793 ; Los vendeanos y los chouans -- Lyon ; Culto de la diosa razón ; Fin de los hebertistas y dantonistas ; Fiesta del ser supremo ; Caida de Robespierre (9 Thermidor) ; Campaña de los Paises Bajos : (1794) ; Reacción contra el terror ; Los hijos de Luis XVI ; Comienzos del directorio -- Desmembración de Polonia ; Pablo I de Rusia ; Paz de Basilea ; Napoleón en Italia ; Paz de Campo Formio ; La campaña de Egipto ; Congreso de Rastatt ; Suworow en Italia y Suiza ; El consulado ; Bonaparte primer cónsul -- Campaña de 1800 ; Paz de Amiens ; El Concordato ; El consulado vitalicio ; Pestalozzi ; Enghien ; El imperio Ulma y Trafalgar ; Austerlitz ; Jena ; La confederación del Rhin ; El bloque continental ; Eylau y Danzig ; La cuestión turca -- Friedland y Tilsit ; Portugal y España ; Bayona ; Guerra de la Independencia ; Congreso de Erfurt ; La gran guerra de 1809 ; Aspern y Wagram ; Paz de Schönbrunn ; El Tirol : Andres Hofer ; Divorcio y el segundo matrimonio de Napoleón ; Nacimiento del rey de Roma -- Napoleón y Pío VII ; La campaña de Rusia de 1812 ; La retirada del "grande ejército" ; La guerra en 1813 ; Batalla de Leipzig ; La guerra en España (1810-1813) ; Guerra en Francia en 1814 ; Abdicación de Napoleón en la isla de Elba ; Los cien días ; El Congreso de Viena ; Waterloo ; Hacia Santa Helena. …”
    991002663549706719
  6. 25386
    Publicado 2023
    Tabla de Contenidos: “…Case studies -- Case study 1: Systematic Observations Financing Facility (SOFF) -- Development (and public sector) partners -- Private sector partners -- Challenge and solution -- Case study 2: Asia-Pacific Climate Finance Fund (ACliFF)…”
    Libro electrónico
  7. 25387
    Publicado 2022
    Tabla de Contenidos: “…Transnational Legal Networks and the Reshaping of Legal Education in Latin America: The Case of SELA -- I. …”
    Libro electrónico
  8. 25388
    por Speece, R.E
    Publicado 1996
    Libro
  9. 25389
    Publicado 2017
    Tabla de Contenidos: “…-- Installing the vCSA PSC -- Installing the vCSA vCenter -- Summary -- Chapter 5: Configuring and Managing vSphere 6.5 -- VMware vSphere HTML5 client -- ESXi configuration -- Management console configuration -- Enabling SSH access -- Configuring NTP -- ESXi 6.5 partition layout -- Boot banks -- Scratch partition -- vCSA configuration -- Basic setup using vCenter Server Appliance Management Interface (VAMI) -- Modifying the IP address and DNS -- Exporting a support bundle…”
    Libro electrónico
  10. 25390
    Publicado 2018
    Tabla de Contenidos: “…6.6.1.4 Natjam-R: Deadline-Based Eviction 215 -- 6.6.1.5 Microbenchmarks 216 -- 6.6.1.6 Natjam-R Evaluation 221 -- 6.7 Summary 223 -- 6.8 The Future 224 -- 7 Theoretical Considerations: Inferring and Enforcing Use Patterns for Mobile Cloud Assurance 237 /Gul Agha, Minas Charalambides, Kirill Mechitov, Karl Palmskog,Atul Sandur, and Reza Shiftehfar -- 7.1 Introduction 237 -- 7.2 Vision 239 -- 7.3 State of the Art 240 -- 7.3.1 Code Offloading 241 -- 7.3.2 Coordination Constraints 241 -- 7.3.3 Session Types 242 -- 7.4 Code Offloading and the IMCM Framework 243 -- 7.4.1 IMCM Framework: Overview 244 -- 7.4.2 Cloud Application and Infrastructure Models 244 -- 7.4.3 Cloud Application Model 245 -- 7.4.4 Defining Privacy for Mobile Hybrid Cloud Applications 247 -- 7.4.5 A Face Recognition Application 247 -- 7.4.6 The Design of an Authorization System 249 -- 7.4.7 Mobile Hybrid Cloud Authorization Language 250 -- 7.4.7.1 Grouping, Selection, and Binding 252 -- 7.4.7.2 Policy Description 252 -- 7.4.7.3 Policy Evaluation 253 -- 7.4.8 Performance- and Energy-Usage-Based Code Offloading 254 -- 7.4.8.1 Offloading for Sequential Execution on a Single Server 254 -- 7.4.8.2 Offloading for Parallel Execution on Hybrid Clouds 255 -- 7.4.8.3 Maximizing Performance 255 -- 7.4.8.4 Minimizing Energy Consumption 256 -- 7.4.8.5 Energy Monitoring 257 -- 7.4.8.6 Security Policies and Energy Monitoring 258 -- 7.5 Coordinating Actors 259 -- 7.5.1 Expressing Coordination 259 -- 7.5.1.1 Synchronizers 260 -- 7.5.1.2 Security Issues in Synchronizers 260 -- 7.6 Session Types 264 -- 7.6.1 Session Types for Actors 265 -- 7.6.1.1 Example: Sliding Window Protocol 265 -- 7.6.2 Global Types 266 -- 7.6.3 Programming Language 268 -- 7.6.4 Local Types and Type Checking 269 -- 7.6.5 Realization of Global Types 270 -- 7.7 The Future 271 -- Acknowledgments 272 -- 8 Certifications Past and Future: A Future Model for Assigning Certifications that Incorporate Lessons Learned from Past Practices 277 /Masooda Bashir, Carlo Di Giulio, and Charles A. …”
    Libro electrónico
  11. 25391
    Publicado 2012
    Tabla de Contenidos: “…Instrumentation & Techniques-III Future Projects x -- X-RAY AND GAMMA-RAY POLARIMETRY OF GRBS -- GRBS AND LOBSTER EYE X-RAY TELESCOPES -- OBSERVING GRBS WITH THE LOFT WIDE FIELD MONITOR -- A-STAR: THE ALL-SKY TRANSIENT ASTROPHYSICS REPORTER -- FEASIBILITY OF A SMALL, RAPID OPTICAL/IR RESPONSE, NEXT GENERATION GAMMA-RAY BURST MISSION -- GRB POTENTIAL OF ESA GAIA -- Chapter XIV. Non Electromagnetics, VHE and UHE Emission -- CONSTRAINING GRB AS SOURCE FOR UHE COSMIC RAYS THROUGH NEUTRINO OBSERVATIONS -- FERMI GBM CAPABILITIES FOR MULTI-MESSENGER TIME-DOMAIN ASTRONOMY -- COSMIC-RAYS AND GAMMA RAY BURSTS -- CONCLUDING REMARKS -- Index…”
    Libro electrónico
  12. 25392
    Publicado 2018
    Tabla de Contenidos: “…16.5 Example: A Corporate Physical Security Policy -- 16.6 Integration of Physical and Logical Security -- 16.7 Key Terms, Review Questions, and Problems -- Chapter 17 Human Resources Security -- 17.1 Security Awareness, Training, and Education -- 17.2 Employment Practices and Policies -- 17.3 E-mail and Internet Use Policies -- 17.4 Computer Security Incident Response Teams -- 17.5 Key Terms, Review Questions, and Problems -- Chapter 18 Security Auditing -- 18.1 Security Auditing Architecture -- 18.2 Security Audit Trail -- 18.3 Implementing the Logging Function -- 18.4 Audit Trail Analysis -- 18.5 Security Information and Event Management -- 18.6 Key Terms, Review Questions, and Problems -- Chapter 19 Legal and Ethical Aspects -- 19.1 Cybercrime and Computer Crime -- 19.2 Intellectual Property -- 19.3 Privacy -- 19.4 Ethical Issues -- 19.5 Key Terms, Review Questions, and Problems -- Part Four Cryptographic Algorithms -- Chapter 20 Symmetric Encryption and Message Confidentiality -- 20.1 Symmetric Encryption Principles -- 20.2 Data Encryption Standard -- 20.3 Advanced Encryption Standard -- 20.4 Stream Ciphers and RC4 -- 20.5 Cipher Block Modes of Operation -- 20.6 Key Distribution -- 20.7 Key Terms, Review Questions, and Problems -- Chapter 21 Public-Key Cryptography and Message Authentication -- 21.1 Secure Hash Functions -- 21.2 HMAC -- 21.3 Authenticated Encryption -- 21.4 The RSA Public-Key Encryption Algorithm -- 21.5 Diffie-Hellman and Other Asymmetric Algorithms -- 21.6 Key Terms, Review Questions, and Problems -- Part Five Network Security -- Chapter 22 Internet Security Protocols and Standards -- 22.1 Secure E-mail and S/Mime -- 22.2 Domainkeys Identified Mail -- 22.3 Secure Sockets Layer (SSL) and Transport Layer Security (TLS) -- 22.4 HTTPS -- 22.5 IPv4 and IPv6 Security -- 22.6 Key Terms, Review Questions, and Problems…”
    Libro electrónico
  13. 25393
    Publicado 2018
    Tabla de Contenidos: “…Chapter 4: Security layer 2: protecting cloud infrastructures -- 4.1 Securing and testing cloud infrastructure: the deployer -- 4.1.1 Setting up the deployer -- 4.1.2 Configuration notifications between Docker Hub and the deployer -- 4.1.3 Running tests against the infrastructure -- 4.1.4 Updating the invoicer environment -- 4.2 Restricting network access -- 4.2.1 Testing security groups -- 4.2.2 Opening access between security groups -- 4.3 Building a secure entry point -- 4.3.1 Generating SSH keys -- 4.3.2 Creating a bastion host in EC2 -- 4.3.3 Enabling two-factor authentication with SSH -- 4.3.4 Sending notifications on accesses -- 4.3.5 General security considerations -- 4.3.6 Opening access between security groups -- 4.4 Controlling access to the database -- 4.4.1 Analyzing the database structure -- 4.4.2 Roles and permissions in PostgreSQL -- 4.4.3 Defining fine-grained permissions for the invoicer application -- 4.4.4 Asserting permissions in the deployer -- Summary -- Chapter 5: Security layer 3: securing communications -- 5.1 What does it mean to secure communications? …”
    Libro electrónico
  14. 25394
    Publicado 2019
    Tabla de Contenidos: “…-- INTRODUCTION -- STATUS AND PERSPECTIVES OF NUCLEAR POWER -- RENEWABLE ENERGIES -- CONCLUSION -- REFERENCES -- FURTHER READING -- Part II Perspectives on Grids -- Chapter 8 Smart-Grid Policies: An International Review -- INTRODUCTION -- BARRIERS AND DRIVERS IMPACTING THE DEPLOYMENT OF SMART GRIDS -- SMART-GRID POLICIES OF THE UNITED STATES -- SMART-GRID POLICIES OF THE EUROPEAN UNION -- SMART-GRID POLICIES OF EAST ASIA -- INTERNATIONAL COLLABORATION -- CONCLUSIONS AND RECOMMENDED FUTURE POLICY DIRECTIONS -- ACKNOWLEDGMENTS -- REFERENCES -- Chapter 9 A View of Microgrids -- INTRODUCTION -- DISTRIBUTED ENERGY RESOURCES -- ACTIVE DISTRIBUTION NETWORKS -- TECHNICAL REQUIREMENTS FOR MICROGRID OPERATION -- MICROGRID DEPLOYMENT ROADMAP -- CONCLUSIONS -- REFERENCES -- Chapter 10 New Electricity Distribution Network Planning Approaches for Integrating Renewables -- INTRODUCTION -- DISTRIBUTION PLANNING IN THE SG ERA -- MODERN DISTRIBUTION PLANNING TOOLS FOR RES INTEGRATION -- APPLICATIONS OF PLANNING TOOLS FOR RES INTEGRATION -- CONCLUSIONS -- REFERENCES -- FURTHER READING -- Chapter 11 Transmission Planning for Wind Energy in the United States and Europe: Status and Prospects -- INTRODUCTION -- TRANSMISSION PLANNING FOR ENERGY RESOURCES -- REGIONAL PLANNING EFFORTS - STATUS AND PROSPECTS -- LOOKING INTO THE FUTURE -- CONCLUSIONS -- ACKNOWLEDGMENTS -- REFERENCES -- FURTHER READING…”
    Libro electrónico
  15. 25395
    por Carbonnier, Gilles
    Publicado 2024
    Tabla de Contenidos: “…Front Cover -- Half Title -- Series Information -- Title Page -- Copyright Page -- Contents -- Foreword -- Preface -- Figures and Tables -- Abbreviations -- Notes on Contributors -- Part 1 Introducing the Thematic Volume: Key Findings and Recommendations -- Chapter 1 Curbing Illicit Financial Flows in Commodity Trade and Beyond -- 1 Introduction -- 2 Why Trade-Related IFF s Matter -- 3 Policy Context and Scholarly Debate -- 3.1 Global Tax Governance Reform -- 3.2 Assessing Trade Mispricing -- 4 'Curbing IFF s in Commodity Trade': Research Project Set-Up and Findings -- 4.1 Analytical Frameworks -- 4.2 Specific Findings and Policy Recommendations for Home and Host States -- 4.2.1 Recommendations for Host States -- 4.2.2 Recommendations for Home States -- 4.3 Implications for Future Research -- 5 Introducing the Thematic Volume -- 6 Concluding Reflections -- References -- Part 2 Definition, Measurement, and Drivers of Trade-Related IFFs -- Chapter 2 Measuring Illicit Financial Flows: New Data and Methods -- 1 Introduction -- 2 Evolving IFF Definitions -- 3 New Data and Methods -- 3.1 Trade-Based IFF s -- 3.2 Profit Shifting -- 3.3 Offshore Wealth -- 4 Concluding Remarks: Policies to Measure and Reduce IFFs -- References -- Chapter 3 Trade-Related Illicit Financial Flows in Southeast Asia: Evidence from Extractive and Agricultural Commodities in Laos -- 1 Introduction -- 2 Trade Mispricing Values in ASEAN -- 3 Laws and Regulatory Frameworks Combating IFFs in ASEAN -- 3.1 The General Legal Environment for Addressing Trade-Related IFF s in ASEAN -- 3.2 The Implementation of Transfer Pricing Rules in ASEAN -- 4 Production of Extractive and Agricultural Commodities in Lao PDR: Measuring Export Mispricing -- 4.1 The Extractive and Agricultural Sectors -- 4.1.1 Gold and Copper -- 4.1.2 Rubber and Coffee -- 4.2 Measuring Export Mispricing in Lao PDR…”
    Libro electrónico
  16. 25396
    por Zoja, Luigi
    Publicado 2022
    Tabla de Contenidos: “…Del renacimiento cultural a la paranoia -- Vigilar y desconfiar -- Orgullo y sospechas de las naciones -- Las fantasías en los orígenes del derecho nacional -- La raza imaginaria -- El lugar de los judíos -- El affaire Dreyfus -- IV. …”
    Libro electrónico
  17. 25397
    por Joshua Goldstein
    Publicado 2021
    Tabla de Contenidos: “…-- Chapter 4 Foreign Policy -- Making Foreign Policy -- Models of Decision Making -- Individual Decision Makers -- Group Psychology -- Crisis Management -- Domestic Influences -- Bureaucracies -- Interest Groups -- Seeking the Collective Good Israeli-Palestinian Peace Talks -- The Military-Industrial Complex -- Public Opinion -- Public Opinion and International Relations The National Interest and Foreign Policy -- Policy Perspectives Prime Minister of Japan, Shinzo Abe -- Legislatures -- Making Foreign Policy -- Careers in International Relations: Government and Diplomacy -- Chapter Review -- Let's Debate the Issue Should Legislatures Play a Role in Deciding Whether to Use Military Force? …”
    Libro electrónico
  18. 25398
    Publicado 2016
    Tabla de Contenidos: “…Managing Operational Risk -- Risk Logs/Incident Reports -- Subjective versus Quantitative Analyses in Identifying Risks -- Self-assessment and measuring risk -- Risk scenario analysis -- Conflict resolution exercise -- Background -- Exercise -- Risk of fraud in finance -- Risk terminology -- Glossary of risk terminology -- Summary -- Possible Future Changes and Challenges in the Fund Administration and Custody Environment -- Summary -- Part 5 - Introduction to derivatives -- Introduction -- Exchange traded futures and options -- Definitions -- Derivatives -- Forwards -- Futures Contracts -- Swaps -- Options -- In-the-Money -- At-the-Money -- Out-of-the-Money -- Long and Short Options -- Options on Futures -- History of Exchange Development and Growth -- First Traded Futures Exchange -- Emergence of Financial Futures Markets -- Futures Exchanges in Europe -- Futures Exchanges in Asia -- First Options Exchanges -- Futures and Options Exchanges Today -- Futures and Option Contract Specifications and Diversity -- Tick Size -- Product Range -- Equity Index Futures -- Commodity Futures -- Basic Trading and Hedging Strategies -- Trading -- Trading Strategy 1: Market Direction (Using Futures) -- Trading Strategy 2: Speculating (Using Options) -- Trading Strategy 3: Gearing -- Trading Strategy 4: Arbitrage Trading -- Hedging -- Hedging Example 1: Potato Farmers -- Hedging Example 2: Fixed Rate Mortgages -- Market Structure -- Role of an Exchange -- Role of the Clearing House -- Basics of Futures Fair Pricing Theory -- Equity Index Futures Fair Pricing -- Settlement and Margining -- Initial Margin -- Interest -- Intraday Margin -- Spot Month Margin -- SPAN Margin System -- Margin Offsets -- Variation Margin (Settlements) -- Collateral -- Margining Customers -- Single Currency Margining and Settlement -- Treasury Management -- Interest Rate Calculations…”
    Libro electrónico
  19. 25399
    Publicado 2014
    Tabla de Contenidos: “…SOVEREIGN SUKUK -- SUKUK -- DEBT CAPITAL MARKETS -- REGULATORY ISSUES -- CROSS-BORDER FINANCING -- CONCLUSION -- ABOUT THE AUTHORS -- Chapter 8: Hong Kong -- ASSET MANAGEMENT -- TAX -- RETAIL AND MICROFINANCE -- ISLAMIC BANKING -- Risk Management -- Adherence to Islamic Law -- Binding Documentation -- Disclosure of Risk and Return to Depositors -- SUKUK AND RENMINBI BUSINESS -- DEBT CAPITAL MARKETS AND EQUITY CAPITAL MARKETS -- REGULATORY ISSUES -- CROSS-BORDER FINANCING -- CONCLUSION -- ABOUT THE AUTHORS -- Chapter 9: India -- ASSET MANAGEMENT -- Alternative Investment Funds -- Real Estate Investment Trusts -- Structured Products -- TAX AND ACCOUNTING -- RETAIL AND MICROFINANCE -- TAKAFUL AND RE- TAKAFUL -- SOVEREIGN SUKUK -- DEBT CAPITAL MARKETS -- Tax and Stamp Duties -- Investor Perception and Documentation Challenge -- REGULATORY ISSUES -- CROSS-BORDER FINANCING -- CONCLUSION -- ABOUT THE AUTHOR -- Chapter 10: Indonesia -- MACROECONOMIC PERFORMANCE AND ASSET MANAGEMENT -- Public Response As Indicated by Liquidity Behavior -- Monetary Policy and Interest Rate Responses -- The Indonesian Islamic Banking Industry: Funding Activities -- The Indonesian Islamic Banking Industry: Financing Activities -- MICROFINANCE -- TAKAFUL AND RE- TAKAFUL -- SUKUK -- REGULATORY ISSUES -- CONCLUSION -- NOTES -- REFERENCES -- ABOUT THE AUTHOR -- Chapter 11: Iran -- THE HISTORY OF IRANIAN BANKING -- Modern Banking: 1887-1925 -- Establishment of Iranian Banks and the Central Bank: 1925-1979 -- Nationalization and Merger of Iranian Banks: 1979-1981 -- Demand for Riba-Free Banking: 1981-1983 -- Development of the Banking System Since 1983 -- THE RIBA-FREE BANKING ACT -- Objectives and Duties -- Mobilization of Financial Resources -- DEPOSITS -- Qard Hasan Deposits -- Current Accounts -- Savings Accounts -- Term Investment Deposits ( Wakalah Accounts)…”
    Libro electrónico
  20. 25400
    Publicado 2017
    Tabla de Contenidos: “…. -- Winners and Losers: Impacts on Livelihoods -- Features of this Agroforestry Approach to Rural Development -- Policy Guidelines -- Development Issues for the Future -- 14 Tree Domestication in Agroforestry: Progress in the Second Decade (2003-2012) -- Summary -- Introduction -- The First Decade (1992-2002) -- The Second Decade (2003-12) -- The Humid Lowlands of West and Central Africa -- The Drylands of the Sahel -- Woody Savannah of Southern Africa -- East Africa -- Latin America -- Asia -- Oceania -- Recent Developments in Agroforestry Tree Improvement -- Molecular Genetics…”
    Libro electrónico