 |
|
|
|
 Six Modern Plagues and How We Are Causing Them
"In a clear, engaging style, Dr. Walters tells the tale of each disease like a detective story. He allows each mystery to unfold as it did in reality, often slowly, through the lives of the plants and animals involved, the first human victims, the government officials who tried to respond, and the scientists who ultimately explained what... |  |  Dictionary of Medical Acronyms & Abbreviations (5th Edition)
This best-selling portable resource provides authoritative definitions for all of the medical acronyms and abbreviations you can expect to encounter in medicine today. The new, 5th Edition features 10,000 completely new entries reflecting the most recent developments in health careâincluding new clinical trials, new technologies, and new... |  |  Applied Network Security
Master the art of detecting and averting advanced network security attacks and techniques
About This Book
-
Deep dive into the advanced network security attacks and techniques by leveraging tools such as Kali Linux 2, MetaSploit, Nmap, and Wireshark
-
Become an expert in cracking WiFi...
|
|
 Peptide-Based Cancer Vaccines (Medical Intelligence Unit)
The field of peptide based cancer vaccines has evolved tremendously in the last decade of this century. The exploration on how to apply the peptide knowledge for vaccination purposes began when it was demonstrated that these peptides after being mixed into adjuvants actually induced T cell responses that could prevent virus infections and... |  |  Mucosal Immunology and Virology
An understanding of virus infection and the underlying role of the immune system in protection against these diseases is vital in today’s medical climate. Previously, only symptoms could be treated, as there were no antiviral therapies. The increasing amounts of research and the huge number of discoveries of immunologic agents and... |  |  Personal Cybersecurity: How to Avoid and Recover from Cybercrime
Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat.
Personal Cybersecurity addresses the needs of individual users at work and at home. This book... |
|
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 |