File:The Production of Security.pdf
Size of this JPG preview of this PDF file: 374 × 599 pixels. Other resolutions: 150 × 240 pixels | 300 × 480 pixels | 679 × 1,087 pixels.
Original file (679 × 1,087 pixels, file size: 1.25 MB, MIME type: application/pdf, 66 pages)
File information
Structured data
Captions
Summary edit
Author |
author QS:P50,Q468473 |
||||||||||||||||||||
Translator |
J. Huston McCulloch |
||||||||||||||||||||
Description |
A translation of « De la production de la sécurité » |
||||||||||||||||||||
Publication date |
1849 publication_date QS:P577,+1849-00-00T00:00:00Z/9 |
||||||||||||||||||||
Source | https://mises.org/library/production-security-0 |
Licensing edit
This file is licensed under the Creative Commons Attribution 3.0 Unported license.
- You are free:
- to share – to copy, distribute and transmit the work
- to remix – to adapt the work
- Under the following conditions:
- attribution – You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
File history
Click on a date/time to view the file as it appeared at that time.
Date/Time | Thumbnail | Dimensions | User | Comment | |
---|---|---|---|---|---|
current | 19:16, 15 July 2016 | 679 × 1,087, 66 pages (1.25 MB) | Allixpeeke (talk | contribs) | {{Information |description=A translation of « De la production de la sécurité » |author=Gustave de Molinari |translator=J. Huston McCulloch |date=1849 |source=https://mises.org/library/prod... |
You cannot overwrite this file.
File usage on Commons
The following page uses this file:
File usage on other wikis
The following other wikis use this file:
- Usage on en.wikisource.org
- The Production of Security
- Index:The Production of Security.pdf
- Page:The Production of Security.pdf/64
- Page:The Production of Security.pdf/65
- Page:The Production of Security.pdf/3
- Page:The Production of Security.pdf/7
- Page:The Production of Security.pdf/9
- Page:The Production of Security.pdf/15
- Page:The Production of Security.pdf/1
- Page:The Production of Security.pdf/2
- Page:The Production of Security.pdf/4
- Page:The Production of Security.pdf/5
- Page:The Production of Security.pdf/6
- Page:The Production of Security.pdf/8
- Page:The Production of Security.pdf/63
- Page:The Production of Security.pdf/62
- Page:The Production of Security.pdf/61
- Page:The Production of Security.pdf/60
- Page:The Production of Security.pdf/59
- Page:The Production of Security.pdf/58
- Page:The Production of Security.pdf/57
- Page:The Production of Security.pdf/56
- Page:The Production of Security.pdf/55
- Page:The Production of Security.pdf/54
- Page:The Production of Security.pdf/53
- Page:The Production of Security.pdf/52
- Page:The Production of Security.pdf/51
- Page:The Production of Security.pdf/50
- Page:The Production of Security.pdf/49
- Page:The Production of Security.pdf/48
- Page:The Production of Security.pdf/47
- Page:The Production of Security.pdf/46
- Page:The Production of Security.pdf/45
- Page:The Production of Security.pdf/44
- Page:The Production of Security.pdf/43
- Page:The Production of Security.pdf/42
- Page:The Production of Security.pdf/41
- Page:The Production of Security.pdf/40
- Page:The Production of Security.pdf/39
- Page:The Production of Security.pdf/38
- Page:The Production of Security.pdf/37
- Page:The Production of Security.pdf/36
- Page:The Production of Security.pdf/35
- Page:The Production of Security.pdf/34
- Page:The Production of Security.pdf/33
- Page:The Production of Security.pdf/32
- Page:The Production of Security.pdf/31
- Page:The Production of Security.pdf/30
- Page:The Production of Security.pdf/29
- Page:The Production of Security.pdf/28
View more global usage of this file.
Metadata
This file contains additional information such as Exif metadata which may have been added by the digital camera, scanner, or software program used to create or digitize it. If the file has been modified from its original state, some details such as the timestamp may not fully reflect those of the original file. The timestamp is only as accurate as the clock in the camera, and it may be completely wrong.
Short title | The Production of Security |
---|---|
Author | Gustave de Molinari |
Keywords |
|
Software used | Adobe InDesign CS2 (4.0.5) |
Conversion program | Adobe PDF Library 7.0 |
Encrypted | no |
Page size |
|
Version of PDF format | 1.6 |