 |
|
 Human Genome Epidemiology, 2nd Edition
The first edition of Human Genome Epidemiology, published in 2004, discussed how the epidemiologic approach provides an important scientific foundation for studying the continuum from gene discovery to the development, applications and evaluation of human genome information in improving health and preventing disease. Since that time,... |  |  Trauma
The most trusted, widely used guide to managing the trauma patient--now in a 2-color format with added algorithms
A Doody's Core Title ESSENTIAL PURCHASE!
4 STAR DOODY'S REVIEW
"Practitioners at any level will benefit from this work originating from major trauma programs in the... |  |  Encyclopedia of Addictions [2 volumes]
This two volume set contains frank and factual information about symptoms, causes, effects, prevention, and treatment of substance abuse—alcohol, nicotine, and drugs—and of behavioral addictions such as eating disorders, pathological gambling, and compulsive sexual activity. Including the most up-to-date research, the addiction... |
|
|
 The Gale Encyclopedia of Children's Health: Infancy Through Adolescence
The safety of children is potentially at risk from accidents and injuries, as well as crime. Providing a safe environment, putting prevention measures into practice, and teaching children methods of self-protection are all ways to reduce the potential for harm to children.
Description
Accidents are the leading cause of... |  |  Managing Information Security
Managing Information Security offers focused coverage of how to protect mission critical systems, how to deploy security management systems, IT security, ID Management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth... |  |  Internet Lockdown: Internet Security Administrator's Handbook
Internet Lockdown: Internet Security Administrator's Handbook covers hot security technology including firewalls, intrusion detection and prevention, honeypots, network security on all operating systems. It explains confusing core concepts like certificates, cryptography, firewalls and encryption in a fashion anyone can understand.... |
|
|
| Result Page: 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 |