01060nam0-22003611i-450-99000544192020331620010829120000.0000544192USA01000544192(ALEPH)000544192USA0100054419220010829d1986-------|0enac50------baengGB||||Z 1||||<<An>> introduction to development economicsSubrata GhatakLondonAllen & Unwin1986. 397 p. ; 24 cm.Sviluppo economicoFILondon338.9Sviluppo economico21GHATAK,Subrata613508Allen & UnwinITSOL20120104990005441920203316DIP.TO SCIENZE ECONOMICHE - (SA)DS 300 338.9 GHA2476 DISES300 338.9 GHA2476 DISESBKDISES20121027USA01153220121027USA011613Introduction to development economics1143945UNISAUSA376902226nam 2200421Ia 450 99638979230331620221108002729.0(CKB)4940000000096138(EEBO)2240856271(OCoLC)857313548(EXLCZ)99494000000009613820130830f16701677 uy 0engurbn||||a|bb|A looking-glass for a bad husband, or, A caveat for a spend-thrift[electronic resource] You that are guilty of that sinful crime of drunkenness, strive for to leave it off in time, lay up your money, do not it vainly spend, for in your greatest need, it will be your best friend, endeavour in your youth, lest in old age you want; for when that poverty doth come, friends will be scant, to the tune of, The poor man's comfort, or, Digby /by T.LLondon Printed for W[illiam] Thackeray, T[homas] Passenger, and W[illiam] Whitwood[between 1670 and 1677]1 sheet ([1 p.) illT.L = Thomas Lanfiere. Cf. Wing (2nd ed.).Date range and publisher's names suggested by Wing (2nd ed., 1994).Verse: "You that are bad husbands."Printed chiefly in black letter in five columns.In this edition there is one larger woodcut above the last two columns and the 'L' of 'London' in the imprint is under the 'mp' of 'company'. Another edition has a woodcut above each column of text and the 'L' of 'London' is under the 'H' of 'Harlots'.Reproduction of original in: National Library of Scotland--Crawford Collections.eebo-0097AlcoholismEnglandPoetryEarly works to 1800BalladsEnglandLondon17th century.rbgenrBroadside poemsEnglandLondon17th century.rbgenrAlcoholismLanfiere Thomas1001731Thackeray Williamactive 1664-1693,Passinger Thomas-1688,Whitwood WilliamUMIUMIBOOK996389792303316A looking-glass for a bad husband, or, A caveat for a spend-thrift2299101UNISA01364oas 2200433 a 450 991069825230332120190531110617.0(CKB)4330000001828488(OCoLC)72053475(OCoLC)839748448(EXLCZ)99433000000182848820061006auuuu9999 ua engur|||||||||||txtrdacontentcrdamediacrrdacarrierEnvironmental report /prepared by Environment, Safety & Health OfficeGolden, Colo. Environment, Safety & Health Office, National Renewable Energy Laboratory1 online resource (volumes)<2006- > :NREL/MPEnvironmental report Renewable energy sourcesEnvironmental aspectsUnited StatesPeriodicalsPeriodicals.fastPeriodicals.lcgftRenewable energy sourcesEnvironmental aspectsNational Renewable Energy Laboratory (U.S.).Environment, Health, and Safety Office.GPOGPOGPOOCLCQOCLCFOCLCQGILDSOCLCOGPODOCUMENT9910698252303321Environmental report3211905UNINA01408oam 2200397 450 991071390440332120201029135313.0(CKB)5470000002506623(OCoLC)1202266457(OCoLC)995470000002506623(EXLCZ)99547000000250662320201029d2019 ua 0engurmn|||||||||txtrdacontentcrdamediacrrdacarrierPlanning considerations: evacuation and shelter-in-place guidance for state, local, tribal, and territorial partners[Washington, D.C.] :Homeland Security,2019.1 online resource (ii, 60 pages) color illustrations"July 2019."Includes bibliographical references.Planning considerationsEmergency managementUnited StatesHandbooks, manuals, etcEvacuation of civiliansUnited StatesPlanningHandbooks, manuals, etcHandbooks and manuals.lcgftEmergency managementEvacuation of civiliansPlanningUnited States.Department of Homeland Security,GPOGPOGPOBOOK9910713904403321Planning considerations: evacuation and shelter-in-place3514639UNINA00919nam0 22002411i 450 UON0009596520231205102533.37220020107d1971 |0itac50 bagerDE|||| 1||||Meister roemischer Prosa von Cato bis ApuleiusInterpretationenMichael von AlbrechtHeidelbergL. Stiehm1971 p. cmDEHeidelbergUONL000174ALBRECHTMichael : vonUONV058425169399StiehmUONV259883650ITSOL20240220RICASIBA - SISTEMA BIBLIOTECARIO DI ATENEOUONSIUON00095965SIBA - SISTEMA BIBLIOTECARIO DI ATENEOSI Q 3 135 SI MC 417 5 Meister roemischer Prosa von Cato bis Apuleius1302290UNIOR03807nam 2200625 a 450 991048493790332120200520144314.03-540-68800-510.1007/11958239(CKB)1000000000283976(SSID)ssj0000319627(PQKBManifestationID)11250180(PQKBTitleCode)TC0000319627(PQKBWorkID)10354523(PQKB)11002589(DE-He213)978-3-540-68800-6(MiAaPQ)EBC3068642(PPN)123140137(EXLCZ)99100000000028397620061113d2006 uy 0engurnn#008mamaatxtccrProgress in cryptology VIETCRYPT 2006 : First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006 : revised selected papers /Phong Q. Nguyen (ed.)1st ed. 2006.Berlin ;New York Springerc20061 online resource (XI, 388 p.)Lecture notes in computer science,0302-9743 ;4341LNCS sublibrary. SL 4, Security and cryptologyBibliographic Level Mode of Issuance: Monograph3-540-68799-8 Includes bibliographical references and index.Signatures and Lightweight Cryptography -- Probabilistic Multivariate Cryptography -- Short 2-Move Undeniable Signatures -- Searching for Compact Algorithms: cgen -- Invited Talk -- On Pairing-Based Cryptosystems -- Pairing-Based Cryptography -- A New Signature Scheme Without Random Oracles from Bilinear Pairings -- Efficient Dynamic k-Times Anonymous Authentication -- Side Channel Analysis of Practical Pairing Implementations: Which Path Is More Secure? -- Algorithmic Number Theory -- Factorization of Square-Free Integers with High Bits Known -- Scalar Multiplication on Koblitz Curves Using Double Bases -- Compressed Jacobian Coordinates for OEF -- Ring Signatures and Group Signatures -- On the Definition of Anonymity for Ring Signatures -- Escrowed Linkability of Ring Signatures and Its Applications -- Dynamic Fully Anonymous Short Group Signatures -- Hash Functions -- Formalizing Human Ignorance -- Discrete Logarithm Variants of VSH -- How to Construct Sufficient Conditions for Hash Functions -- Cryptanalysis -- Improved Fast Correlation Attack on the Shrinking and Self-shrinking Generators -- On the Internal Structure of Alpha-MAC -- A Weak Key Class of XTEA for a Related-Key Rectangle Attack -- Key Agreement and Threshold Cryptography -- Deniable Group Key Agreement -- An Ideal and Robust Threshold RSA -- Towards Provably Secure Group Key Agreement Building on Group Theory -- Public-Key Encryption -- Universally Composable Identity-Based Encryption -- Traitor Tracing for Stateful Pirate Decoders with Constant Ciphertext Rate -- Reducing the Spread of Damage of Key Exposures in Key-Insulated Encryption.Lecture notes in computer science ;4341.LNCS sublibrary.SL 4,Security and cryptology.VIETCRYPT 2006First International Conference on Cryptology in VietnamInternational Conference on Cryptology in VietnamComputer securityVietnamCongressesComputer systemsAccess controlCongressesCryptographyVietnamCongressesComputer securityComputer systemsAccess controlCryptography005.8Nguyen Phong, Q(Phong Quang)1751912MiAaPQMiAaPQMiAaPQBOOK9910484937903321Progress in cryptology4187054UNINA