EMBID IRUJO, ANTONIO (Dir.), La Seguridad Hídrica. Desafíos y Contenido, Thomson Reuters Aranzadi, Cizur Menor, Navarra, 2021, 427 pp. ISBN 978-84-1391-229-5
نویسندگان
چکیده
EMBID IRUJO, ANTONIO (Dir.), La Seguridad Hídrica. Desafíos y Contenido, Thomson Reuters Aranzadi, Cizur Menor, Navarra, 2021, 427 pp. ISBN 978-84-1391-229-5
منابع مشابه
Fernando Serrano Larráyoz, Léxico médico y farmacológico en lengua vulgar y latina de la documentación cortesana navarra (siglos XIV-XV) (Arre, Navarra: Pamiela, 2015), pp. 304, 21€, paperback, ISBN: 978-84-7681-910-4.
Over the course of numerous articles and three well-received books, Fernando Serrano Larráyoz has established himself as an important voice in discussions of the history of Navarra. Serrano Larráyoz’s particular interest is in the medieval period, while the topics to which he returns most frequently pertain to questions of diet, medicine, and health. Given the nature of his research, it comes a...
متن کاملJosé María Borrás Llop (ed.), El trabajo infantil en España (1700-1950) (Barcelona: Publicacions i Edicions de la Universitat de Barcelona, 2014), pp. 511, €25, paperback, ISBN: 978-84-475-3797-6; ISBN: 978-84-9888-550-7.Peter Kirby, Child Workers and Industrial Health in Britain, 1780-1850 (Woodbridge: Boydell Press, 2013), pp. 224, £17.99, paperback, ISBN: 978-18-438-3884-5.
as those on deschi da parto (Italian trays given as birth gifts), or in frescoes of the birth of the Virgin Mary or of John the Baptist. One wonders whether late medieval artists knew of similar ancient Roman scenes, like those included by Berg in nicely presented black and white images. Or is it possible that medieval basins just continued to play crucial yet often overlooked roles in the huma...
متن کاملU . K . Isbn : 978 - 988 - 98671 - 9 - 5 Wce 2008
algorithms are worthy of considering and efficiently to be utilized in the network topological deployment and keeping the network integrity, (2) the Partial Swarm Optimization is much algorithmically easier and reliable, (3) Intelligent computation is a kind of optimal methodology to improve the network integrity.
متن کامل, U . K . Isbn : 978 - 988 - 98671 - 9 - 5 Wce 2008
techniques that provide firewall-level authentication to ensure authorized access to potentially vulnerable network services. Although these techniques serve as powerful protection mechanism against the intruders, they still suffer from a major problem. The lack of association between the authentication process and the follow-on TCP connection to be established is the most crucial problem still...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Revista Catalana de Dret Ambiental
سال: 2022
ISSN: ['2014-038X']
DOI: https://doi.org/10.17345/rcda3275