An Introduction to the Mathematics of Finance: A Deterministic Approach, 2e, offers a highly illustrated introduction to mathematical finance, with a special emphasis on interest rates. This revision of the McCutcheon-Scott classic follows the core subjects covered by the first professional exam required of UK actuaries,...
CUDA Fortran for Scientists and Engineers shows how high-performance application developers can leverage the power of GPUs using Fortran, the familiar language of scientific computing and supercomputer performance benchmarking. The authors presume no prior parallel computing experience, and cover the basics along with best practices...
"I honestly didn't believe I'd learn much from the book because I've been working on Android security for many years. This belief could not have been more wrong. Android Security Internals has earned a permanent spot on my office bookshelf."—Jon "jcase" Sawyer, from the Foreword
The topic of this book is the development of automated and inexpensive tools that transfer medical tests from a specialized clinical laboratory directly to the point of care, using biochip technology. Immediate access to medically relevant biochemical information for doctors and nurses promises to revolutionize patient care and dramatically...
This book encompasses the different technologies employed in thermal ablation, its indications and the results achieved in various clinical conditions. It clearly explains the basics of thermal ablative techniques. In the main part of the book, techniques of guiding the applicators to the target structures by use of different imaging tools...
Chemogenomics brings together the most powerful concepts in modern chemistry and biology, linking combinatorial chemistry with genomics and proteomics. The first reference devoted to the topic, this up-to-date resource covers all stages of the early drug discovery process, from target selection to compound library and lead design. With the...
Hackers exploit browser vulnerabilities to attack deep within networks
The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security...
Research over the past decades has firmly established the genetic basis of cancer. In particular, studies on animal tumour viruses and chromosome rearrangements in human tumours have concurred to identify so-called ‘proto-oncogenes’ and ‘tumour suppressor genes’, whose deregulation promotes carcinogenesis. These...
Many bacterial ADP-ribosyltransferases are potent bacterial protein toxins and important
virulence factors. After cellular uptake caused by highly efficient cell entry mechanisms,
they modify eukaryotic target proteins with great specificity and often grossly affect biological
functions of their targets. These properties of the...
MSC (mesenchymal stem cells) have been reported to initiate revascularization after injury, to facilitate engraftment of blood-forming stem cells, and to reduce the incidence of graft-vs. host disease through their immune-suppressive qualities. Finally, bone marrow-derived MSC have been reported to home to areas of solid tumor...
This volume reviews advances in cancer chemotherapy research over the last 10 years. Chapters written by leading experts in their field reflect a range of current medicinal chemistry approaches to small molecule drugs. Each chapter covers the drug target and biological rationale, chemotypes, clinical status and future prospects in this...
This monograph examines the contribution of imaging modalities to the stages of drug discovery and development, from early target validation to their use in clinical development programs. Chapters are devoted to the description of the drug discovery process, to the various imaging modalities preclinically and clinically, to applications of...