Macrophages are an important part of the immune response and are characterized by their ability to phagocytose foreign matter. However the difficulties involved in macrophage isolation mean they are some of the body's least explored cells. Macrophage Methodology describes how to isolate moderate to high yields of viable cells...
Rutgers professor, Dr. Isaac Gottlieb demonstrates an array of advanced financial and accounting functions in this practical Excel modeling book. He shows how to quickly create models that deliver accurate, relevant information related to efficiency, forecasting, and a host of other business and reporting issues. This book describes how Excel...
There’s no question that we are undergoing a generational shift in computing. With the
massive adoption of social media, SaaS, and cloud computing, enterprises are relying
more and more on resources beyond the firewall. With this shift, we have seen an explosion
in the number of open APIs that are required to...
This book summarizes the keynote and plenary speeches and posters of the “Xth
International Nidovirus Symposium: Toward Control of SARS and Other Nidovirus
Diseases” that was held in Colorado Springs, Colorado, June 25–30, 2005. The nine
previous meetings of scientists investigating the molecular biology and...
When I first heard of NetLedger in an internal Oracle e-mail around the turn of the
century, it was one of those 'aha' moments that we all have in life. There was, at this
time, a fledgling industry of Application Service Providers (ASPs), who offered to
host enterprise software at a data center. But I was skeptical, since I...
In the preface to the text that preceded this edition, we predicted that the pace of change in the clinical practice of pediatric surgery, and in our understanding of the scientific principles that are the basis for that practice, would soon render the text obsolete. That expectation was more predictable than prescient,...
As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to...
The viruses belonging to the genus Orthopoxvirus of the family
Poxviridae are among the pathogens heading the list of microorganisms that
have had an important role in the interactions between the humankind and
infectious agents. Until recently, smallpox, caused by variola virus, was the
most dangerous epidemic disease of humans,...
Virtualization has proved that it can help organizations to reduce costs, and the Private Cloud has created a revolution in the way we manage and control our servers with centralization and elasticity. The new Windows Server 2012 Hyper-V release from Microsoft comes with a myriad of improvements in areas such as mobility, high availability...
Build HTML5-based hybrid applications for Android with a mix of native Java and JavaScript components, without using third-party libraries and wrappers such as PhoneGap or Titanium. This concise, hands-on book takes you through the entire process, from setting up your development environment to deploying your product to an app...
Optimize perioperative outcomes with Kaplan's Cardiac Anesthesia! Dr. Joel L. Kaplan and a host of other authorities help you make the best use of the latest techniques and navigate your toughest clinical challenges. Whether you are administering anesthesia to cardiac surgery patients or to cardiac patients undergoing...
If there's anything the recession of 2009 taught us, it was the importance of investing in our customers, but when was this any different? So says Joseph Jaffe, bestselling author of Life After the 30-Second Spot and Join the Conversation, and a leading expert and...