 |
|
|
 Moffet's Pediatric Infectious Diseases: A Problem-Oriented Approach
Unlike many texts, which are organized by disease or pathogen, this unique resource presents a problem-oriented approach to the diagnosis and management of infectious diseases in children.
All chapters are organized by anatomic syndrome and guide you through each step in the management process from classifying the... |  |  Infectious Diseases
The Third Edition of this definitive reference provides comprehensive guidelines on the diagnosis, treatment, and prevention of every infectious disease seen in current clinical practice. More than 300 world-class practitioners detail the full range of clinical infections, microbial agents, viruses, mycobacteria, fungi, and parasites... |  |  Personal Cybersecurity: How to Avoid and Recover from Cybercrime
Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat.
Personal Cybersecurity addresses the needs of individual users at work and at home. This book... |
|
|
 The InfoSec Handbook: An Introduction to Information Security
The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts.
It is intended mainly for beginners to the field of... |  |  Neuroviral Infections. General Principles and DNA Viruses
Viral infections of the central nervous system or neurotropic viruses are often lethal. Understanding of these diseases involves understanding the interaction between the nervous system and the immune system. This book provides in-depth information about each individual virus, the diseases they cause, and the mechanisms of spread of those... |  |  Intermediate Security Testing with Kali Linux 2
With computer hacking attacks making headline news on a frequent occasion, learning ethical hacking has become a priority for those tasked with defending their networks. But in the sea of training material it is hard to find effectual training using the latest tools and techniques. In “Intermediate Security Testing with Kali Linux... |
|
Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 |