feed icon rss

Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
Filter
  • Charité  (75)
  • Hist. Museum Berlin  (6)
  • IGB Berlin  (3)
  • Moses Mendelssohn Zentrum  (1)
  • 2005-2009  (59)
  • 1995-1999  (26)
Medientyp
Sprache
Region
Bibliothek
Virtuelle Kataloge
Erscheinungszeitraum
Jahr
Zugriff
  • 1
    Online-Ressource
    Online-Ressource
    Totowa, NJ :Humana Press :
    UID:
    almahu_9949251375502882
    Umfang: 1 online resource (XII, 368 p.)
    Ausgabe: 1st ed. 2009.
    ISBN: 1-59745-396-X
    Serie: Methods in Molecular Biology, 531
    Inhalt: In light of the critical contributions of macrophages and dendritic cells to diverse inflammatory diseases and to immunity and host defense, state-of-the-art approaches to the investigation of their behavior are essential. In Macrophages and Dendritic Cells: Methods and Protocols, expert researchers contribute laboratory protocols involving these two vital cell types functioning at the junction of the innate and acquired immune systems. The volume delves first into isolation and cell culturing then continues with topics such as phagocytosis, genetic manipulation, macrophage activation, and lipid signaling. Written in the highly successful Methods in Molecular Biology™ series format, chapters include brief introductions to their respective subjects, lists of the necessary materials and reagents, step-by-step, readily reproducible protocols, and notes on troubleshooting and avoiding known pitfalls. Authoritative and cutting-edge, Macrophages and Dendritic Cells: Methods and Protocols provides a timely and useful guide for both seasoned investigators and neophytes pursuing this imperative field of study.
    Anmerkung: Bibliographic Level Mode of Issuance: Monograph , Generation of Retroviral Macrophage cDNA Expression Libraries and Functional Screening for Surface Receptors -- Generation of Murine Growth Factor-Dependent Long-Term Dendritic Cell Lines to Investigate Host-Parasite Interactions -- Macrophage Activation: Classical Vs. Alternative -- Analysis of Macrophage Phagocytosis: Quantitative Assays of Phagosome Formation and Maturation Using High-Throughput Fluorescence Microscopy -- Detection of Activated Rab7 GTPase with an Immobilized RILP Probe -- Probing In Vivo Origins of Mononuclear Phagocytes by Conditional Ablation and Reconstitution -- Multivalent Protein Probes for the Identification and Characterization of Cognate Cellular Ligands for Myeloid Cell Surface Receptors -- Exploiting Fc Chimaeric Proteins for the Identification of Ligands Specific for the Mannose Receptor -- The Expression of Exogenous Genes in Macrophages: Obstacles and Opportunities -- Genetic Modification of Murine Dendritic Cells by RNA Transfection -- Recording Phagosome Maturation Through the Real-Time, Spectrofluorometric Measurement of Hydrolytic Activities -- Derivation and Characterization of Murine Alternatively Activated (M2) Macrophages -- Isolation and Culture of Human Hematopoietic Progenitors for Studies of Dendritic Cell Biology -- Generation, Culture and Flow-Cytometric Characterization of Primary Mouse Macrophages -- Analyzing Classical and Alternative Macrophage Activation in Macrophage/Neutrophil-Specific IL-4 Receptor-Alpha-Deficient Mice -- Analysis of Matrix Metalloproteinase Secretion by Macrophages -- Identification of Pathogen Receptors on Dendritic Cells to Understand their Function and to Identify New Drug Targets -- Stable Lentiviral Vector-Mediated Gene Silencing in Human Monocytic Cell Lines -- Use of Fluorescent Probes to Detect Lipid Signaling Intermediates in Macrophages -- Large-Scale Phagosome Preparation -- Coordinate Regulation of Sphingosine Kinase and Actin Dynamics. , English
    Weitere Ausg.: ISBN 1-58829-972-4
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    Online-Ressource
    Online-Ressource
    London : Routledge
    UID:
    gbv_646766325
    Umfang: Online-Ressource (xiv, 230 p) , ill
    Ausgabe: Online-Ausg. 2009 Electronic reproduction; Available via World Wide Web
    ISBN: 0415146798 , 041514678X , 0203138449
    Inhalt: Examines the ways in which gender and ethnicity shape the diversity of experiences of dying and bereavement. Drawing on a range of detailed case studies, this collection seeks to develop a more sensitive theoretical approach
    Anmerkung: Includes bibliographical references and index , Electronic reproduction; Available via World Wide Web
    Weitere Ausg.: Erscheint auch als Druck-Ausgabe Death, Gender and Ethnicity
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    UID:
    almahu_9948026249502882
    Umfang: 1 online resource (472 p.)
    Ausgabe: 1st edition
    ISBN: 1-281-03592-0 , 9786611035921 , 0-08-048942-7 , 1-59749-988-9
    Serie: Jay Beale's open source security series
    Inhalt: This book will cover customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to "sniff? their network for malicious or unusual traffic. The book will also contain an appendix detailing "the best of the rest? open source security tools. Each of these tools is intentionally designed to be highly customizable so that users can torque the programs to suit their particular needs. Users can code their own custom rules, plug-ins, and filters that are tailor-made to fit their own networks and the threats which they most com
    Anmerkung: Includes index. , Cover; Contents; Foreword; Nessus Tools; The Inner Workings of NASL; Debugging NASLs; Extensions and Custom Tests; Understanding the Extended Capabilities of the Nessus Environment; Analyzing GetFileVersion and MySQL Passwordless Test; Automating the Creation of NASLs; The Inner Workings of Snort; Snort Rules; Plugins and Preprocessors; Modifying Snort; Capture File Formats; Protocol Dissectors; Reporting from Ethereal; Host Integrity Monitoring Using Osiris and Samhain; Index; Related Titles , English
    Weitere Ausg.: ISBN 1-59749-020-2
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 4
    Buch
    Buch
    Berlin : Berlin-Verl.
    UID:
    b3kat_BV012704520
    Umfang: 253 S.
    ISBN: 3827001714
    Originaltitel: A bridge to the eighteenth century
    Sprache: Deutsch
    Fachgebiete: Komparatistik. Außereuropäische Sprachen/Literaturen , Pädagogik , Allgemeines , Soziologie
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    Schlagwort(e): Aufklärung ; Rezeption ; Nachindustrielle Gesellschaft
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 5
    Online-Ressource
    Online-Ressource
    Philadelphia, PA :Saunders/Elsevier,
    UID:
    almahu_9949697283802882
    Umfang: 1 online resource (428 p.)
    ISBN: 1-4557-0410-5
    Serie: Gowned and Gloved
    Inhalt: Performing well and learning effectively during your clinical rotations in orthopaedic surgery are challenges you face everyday, and that are equally important in caring for patients and earning the grade. Time constraints and last minute assignments in the OR make reading the necessary material difficult and can jeopardize your evaluation by senior residents and attendings on your rotation. The Gowned and Gloved series provides a concise review of the most common orthopaedic procedures and relevant surgical anatomy to help you "shine? in the OR, without getting bogged down in theory and extra
    Anmerkung: Description based upon print version of record. , Front cover; Gowned and Gloved Orthopaedics: Introduction to Common Procedures; Copyright page; DEDICATION; CONTRIBUTORS; PREFACE; ACKNOWLEDGMENTS; FOREWORD; Table of contents; CHAPTER 1: Basic Surgical Principles for Orthopaedic Procedures; SECTION I: SHOULDER AND ELBOW; CHAPTER 2: Arthroscopic Subacromial Decompression; BACKGROUND; TREATMENT PROTOCOLS; TREATMENT ALGORITHM; SURGICAL ALTERNATIVES AND INDICATIONS FOR ARTHROSCOPIC SUBACROMIAL DECOMPRESSION; RELATIVE CONTRAINDICATIONS; GENERAL PRINCIPLES OF SUBACROMIAL DECOMPRESSION; COMPONENTS OF THE PROCEDURE , POSTOPERATIVE CARE AND GENERAL REHABILITATIONCOMPLICATIONS; CHAPTER 3: Rotator Cuff Repair; BACKGROUND; TREATMENT ALGORITHM; TREATMENT PROTOCOLS; SURGICAL PROCEDURES COMMONLY PERFORMED WITH ROTATOR CUFF REPAIR AND SURGICAL ALTERNATIVES TO ROTATOR CUFF REPAIR; SURGICAL INDICATIONS FOR ROTATOR CUFF REPAIR; RELATIVE CONTRAINDICATIONS TO ROTATOR CUFF REPAIR; GENERAL PRINCIPLES OF ROTATOR CUFF REPAIR; COMPONENTS OF THE OPEN PROCEDURE; COMPONENTS OF THE ARTHROSCOPIC PROCEDURE; POSTOPERATIVE CARE AND GENERAL REHABILITATION; COMPLICATIONS; CHAPTER 4: Bankart Repair: Open and Arthroscopic; BACKGROUND , TREATMENT ALGORITHMTREATMENT PROTOCOLS; SURGICAL ALTERNATIVES; SURGICAL INDICATIONS FOR BANKART REPAIR; RELATIVE CONTRAINDICATIONS TO BANKART REPAIR; GENERAL PRINCIPLES OF BANKART REPAIR SURGERY; COMPONENTS OF OPEN BANKART REPAIR; COMPONENTS OF ARTHROSCOPIC BANKART REPAIR; POSTOPERATIVE CARE; COMPLICATIONS; CHAPTER 5: Arthroscopic Superior Labrum Anterior Posterior (SLAP) Repair; BACKGROUND; TREATMENT PROTOCOLS; TREATMENT ALGORITHM; SURGICAL INDICATIONS AND CONTRAINDICATIONS; GENERAL PRINCIPLES OF SLAP REPAIR; COMPONENTS OF THE PROCEDURE; POSTOPERATIVE MANAGEMENT; COMPLICATIONS , CHAPTER 6: Total Shoulder ArthroplastyBACKGROUND; TREATMENT ALGORITHM; TREATMENT PROTOCOLS; SURGICAL ALTERNATIVES TO TOTAL SHOULDER ARTHROPLASTY; SURGICAL INDICATIONS FOR TOTAL SHOULDER ARTHROPLASTY; RELATIVE CONTRAINDICATIONS TO TOTAL SHOULDER ARTHROPLASTY; GENERAL PRINCIPLES OF TOTAL SHOULDER ARTHROPLASTY; COMPONENTS OF THE PROCEDURE; POSTOPERATIVE CARE AND GENERAL REHABILITATION; COMPLICATIONS; CHAPTER 7: Cubital Tunnel Release and Ulnar Nerve Transposition; BACKGROUND; DIAGNOSIS; TREATMENT ALGORITHM; TREATMENT PROTOCOLS , GENERAL PRINCIPLES OF ULNAR NERVE DECOMPRESSION AND SUBCUTANEOUS NERVE TRANSPOSITIONCOMPONENTS OF THE PROCEDURE; POSTOPERATIVE REHABILITATION; COMPLICATIONS; CHAPTER 8: Open Reduction and Internal Fixation of Adult Distal Humerus Fractures; BACKGROUND; TREATMENT PROTOCOLS; SURGICAL ALTERNATIVES TO OPEN REDUCTION AND INTERNAL FIXATION OF DISTAL HUMERUS FRACTURES; TREATMENT ALGORITHM; SURGICAL INDICATIONS FOR OPEN REDUCTION AND INTERNAL FIXATION OF DISTAL HUMERUS FRACTURES; RELATIVE CONTRAINDICATIONS TO OPEN REDUCTION AND INTERNAL FIXATION OF DISTAL HUMERUS FRACTURES , GENERAL PRINCIPLES OF OPEN REDUCTION AND INTERNAL FIXATION OF DISTAL HUMERUS FRACTURES , English
    Weitere Ausg.: ISBN 1-4160-4820-0
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 6
    Online-Ressource
    Online-Ressource
    Burlington, MA :Syngress,
    UID:
    almahu_9949697554202882
    Umfang: 1 online resource (609 p.)
    Ausgabe: 1st edition
    ISBN: 1-281-11268-2 , 9786611112684 , 0-08-055663-9
    Inhalt: Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. As a system administrator or security professional, this comprehensive configuration guide will allow you to configure these appliances to allow remote and mobile access for employees. If you manage and secure a larger enterprise, this book will help you to provide remote and/or extranet access, for employees, partners, and customers from a single platform.* Complete coverage of the Juniper Networks Secure Access SSL VPN
    Anmerkung: Includes index. , Front Cover; Juniper(r) Networks Secure Access SSL VPN Configuration Guide; Copyright Page; Technical Editor and Contributing Author; Contents; Introduction; Chapter 1 : Defining a Firewall; Introduction; Why Have Different Types of Firewalls?; Physical Security; Back to Basics: Transmission Control Protocol/Internet Protocol; TCP/IP Header; Firewall Types; Application Proxy; Pros; Cons; Gateway; Packet Filters; Stateful Inspection; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2 : Setup; Introduction; Initial CLI Setup; IVE Console Setup; Initial Web Setup , Accessing the IVE through the WebUIConfiguring Date and Time; Configuring Licensing on the IVE; Network Settings in the AdminUI; Certificates; Generating a CSR; Other Certificates; Security and System Settings; Security Settings; System Options; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3 : Realms, Roles, and Resources; Introducing Realms, Roles, and Resources; Configuring Realms; Selecting and Configuring General Settings; Selecting and Configuring Authentication Policies; Selecting and Configuring Role Mapping; Optimizing User Attributes; Admin Realms , Configuring RolesUser Roles; General Settings; Standard Options; Meeting Options; Admin Roles; Configuring Resources; Introducing Resource Profiles; Introducing Resource Policies; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4 : Authentication Servers; Introduction; Local Authentication; LDAP; NIS; ACE; Radius; AD/NT; Anonymous; SiteMinder; Certificate; SAML; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5 : Secure Application Manager; Introduction; Why Use SAM?; Feature Availability; Chapter Overview; Secure Application Manager; SAM Versions , How to Deploy the SAM Applet to Connecting Computers?Secure Application Manager Implementation; Enabling SAM and Configuring Role Options; Configuring SAM on a Role; Configuring SAM Resource Policies; Configuring SAM Resource Profiles; Secure Application Manager User Experience; Troubleshooting; Secure Application Manager Troubleshooting; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 6 : Terminal Services and Citrix; Introduction; Why Use the Juniper Citrix Terminal Services Proxy?; Feature Availability; Chapter Overview; Terminal Services , Terminal Services ImplementationConfiguring Terminal Services Resource Policies; Configuring Terminal Services Resource Profiles; Configuring Terminal Services and Citrix Using a Hosted Java Applet; Terminal Services User Experience; Citrix; Citrix Client Types; Citrix Implementation; Citrix User Experience; Launching Terminal Services Sessions and Java Applets from an External Site; Terminal Services and Citrix Troubleshooting; IVE-Side Troubleshooting; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7 : Network Connect; Introduction; Why Use Network Connect? , Feature Availability , English
    Weitere Ausg.: ISBN 1-59749-200-0
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 7
    Online-Ressource
    Online-Ressource
    San Diego :Academic Press,
    UID:
    almahu_9948026228802882
    Umfang: 1 online resource (361 p.)
    ISBN: 1-281-07088-2 , 9786611070885 , 0-08-053572-0
    Serie: International geophysics series ; v. 64
    Inhalt: Magnetic Stratigraphy is the most comprehensive book written in the English language on the subject of magnetic polarity stratigraphy and time scales. This volume presents the entirety of the known geomagneticrecord, which now extends back about 300 million years. The book includes the results of current research on sea floor spreading, magnetic stratigraphy of the Pliocene and Pleistocene, and postulations on the Paleozoic. Also included are both historicalbackground and applications of magnetostratigraphy. Individual chapters on correlation are presented, using changes in magnetic pro
    Anmerkung: Description based upon print version of record. , Front Cover; Magnetic Stratigraphy; Copyright Page; Contents; Preface; Table Key; Chapter 1. Introduction and History; 1.1 Introduction; 1.2 Early Developments; 1.3 Evidence for Field Reversal; Chapter 2. The Earth's Magnetic Field; 2.1 Introduction; 2.2 The Dipole Hypothesis; 2.3 Models of Field Reversal; 2.4 Polarity Transition Records and VGP Paths; 2.5 Statistical Structure of the Geomagnetic Polarity Pattern; Chapter 3. Magnetization Processes and Magnetic Properties of Sediments; 3.1 Basic Principle; 3.2 Magnetic Minerals; 3.3 Magnetization Processes , 3.4 Magnetic Properties of Marine Sediments3.5 Magnetic Properties of Terrestrial Sediments; Chapter 4. Laboratory Techniques; 4.1 Introduction; 4.2 Resolving Magnetization Components; 4.3 Statistics; 4.4 Practical Guide to the Identification of Magnetic Minerals; Chapter 5. Fundamentals of Magnetic Stratigraphy; 5.1 Principles and Definitions; 5.2 Polarity Zone and Polarity Chron Nomenclature; 5.3 Field Tests for Timing of Remanence Acquisition; 5.4 Field Sampling for Magnetic Polarity Stratigraphy; 5.5 Presentation of Magnetostratigraphic Data; 5.6 Correlation of Polarity Zones to the GPTS , 5.7 Quality Criteria for Magnetostratigraphic DataChapter 6. The Pliocene-Pleistocene Polarity Record; 6.1 Early Development of the Plio-Pleistocene GPTS; 6.2 Subchrons within the Matuyama Chron; 6.3 Magnetic Stratigraphy in Plio-Pleistocene Sediments; 6.4 Astrochronologic Calibration of the Plio-Pleistocene GPTS; 6.5 40Ar/39Ar Age Calibration of the Plio-Pleistocene GPTS; Chapter 7. Late Cretaceous-Cenozoic GPTS; 7.1 Oceanic Magnetic Anomaly Record; 7.2 Numerical Age Control; Chapter 8. Paleogene and Miocene Marine Magnetic Stratigraphy; 8.1 Miocene Magnetic Stratigraphy , 8.2 Paleogene Magnetic Stratigraphy8.3 Integration of Chemostratigraphy and Magnetic Stratigraphy; Chapter 9. Cenozoic Terrestrial Magnetic Stratigraphy; 9.1 Introduction; 9.2 North American Neogene and Quaternary; 9.3 Eurasian Neogene; 9.4 African and South American Neogene; 9.5 North American and Eurasian Paleogene; 9.6 Mammal Dispersal in the Northern Hemisphere; Chapter 10. Jurassic-Early Cretaceous GPTS; 10.1 Oceanic Magnetic Anomaly Record; 10.2 Numerical Age Control; 10.3 Oxfordian-Aptian Time Scales; 10.4 Hettangian-Oxfordian Time Scales , Chapter 11. Jurassic and Cretaceous Magnetic Stratigraphy11.1 Cretaceous Magnetic Stratigraphy; 11.2 Jurassic Magnetic Stratigraphy; 11.3 Correlation of Late Jurassic-Cretaceous Stage Boundaries to the GPTS; Chapter 12. Triassic and Paleozoic Magnetic Stratigraphy; 12.1 Introduction; 12.2 Triassic; 12.3 Permian; 12.4 Carboniferous; 12.5 Pre-Carboniferous; 12.6 Polarity Bias in the Phanerozoic; Chapter 13. Secular Variation and Brunhes Chron Excursions; 13.1 Introduction; 13.2 Sediment Records of Secular Variation; 13.3 Geomagnetic Excursions in the Brunhes Chron , Chapter 14. Rock Magnetic Stratigraphy and Paleointensities , English
    Weitere Ausg.: ISBN 0-12-527470-X
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 8
    Online-Ressource
    Online-Ressource
    San Diego :Academic Press :
    UID:
    almahu_9948025914102882
    Umfang: 1 online resource (viii, 613 pages) : , illustrations
    Ausgabe: 2nd ed.
    ISBN: 1-281-07675-9 , 9786611076757 , 0-08-053543-7
    Serie: Factsbook series
    Inhalt: A volume in the popular FactsBook Series, the First Edition of The Leucocyte Antigen FactsBook was hugely successful. The new Second Edition has been completely revised, updated, and expanded by 65% to include new findings and up-to-date key references. The introductory chapters have also been updated, especially in terms of nomenclature, the role of the World Wide Web, and new structural data. The Leucocyte Antigen FactsBook, Second Edition contains more than 200 entries, with approximately 70 new entries, on all the molecules specifically expressed in the surface of cells of the haematopoietic system, including all characterized CD antigens, antigen receptors, MHC antigens, adhesion molecules, and cytokine receptors. This FactsBook will be of enormous value to immunologists, cell biologists, biochemists, and endocrinologists.
    Anmerkung: Accompanied by: 1 wall chart : col. , Front Cover; The Leucocyte Antigen: Factsbook; Copyright Page; Contents; Preface; Abbreviations; Dedication; Section I: THE INTRODUCTORY CHAPTERS; Chapter 1. Introduction; Chapter 2. The Discovery and Biochemical Analysis of Leucocyte Surface Antigens; Chapter 3. Protein Superfamilies and Cell Surface Molecules; Chapter 4. The Architecture and Interactions of Leucocyte Surface Molecules; Section II: THE LEUCOCYTE ANTIGENS; CD1; CD2; CD3/TCR; CD4; CD5; CD6; CD7; CD8; CD9; CD10; CD11a; CD11b; CD11c; Integrin aD subunit; CDw12; CD13; CD14; CD15; CD15s; CD16; CDw17; CD18; CD19; CD20; CD21; CD22 , CD23 CD24; CD26; CD27; CD28; CD29; CD30; CD31; CD32; CD33; CD34; CD35; CD36; CD37; CD38; CD39; CD40; CD41; CD42a,b; CD43; CD44; CD45; CD46; CD47; CD48; CD49a; CD49b; CD49c; CD49d; CD49e; CD49f; CD50; CD51; CD52; CD53; CD54; CD55; CD56; CD57; CD58; CD59; CD60; CD61; CD62E; CD62L; CD62P; CD63; CD64; CD65; CD66; CD68; CD69; CD70; CD71; CD72; CD73; CD74; CDw75; CDw76; CD77; CD79/BCR; CD80; CD81; CD82; CD83; CDw84; CD85; CD86; CD87; CD88; CD89; CD90; CD91; CDw92; CD93; CD94; CD95; CD96; CD97; CD98; CD99; CD100; CD101; CD102; CD103; CD104; CD105; CD106; CD107a, CD107b; CDw108; CD109; CD117 , CD120a, CD120bCD134; CD135; CDw137; CD138; CD147; CD148; CDw150; CD151; CD152; CD153; CD154; CD161; CD162; CD163; CD166; 114/A10; 2B4; 4-1BBL; Aminopeptidase A; B-G; Chemokine receptors; c-kitL; CMRF35 antigen; DEC-205; DNAM-1; ESL-1; F4/80; FasL; FceRI; FLT3 ligand; FPR; Galectin 3; G-CSFR; GM-CSFR; GlyCAM-1; gp42; gp49; HTm4; IFN?R; IL-1R; IL-2R; IL-3R; IL-4R; IL-5R; IL-6R; IL-7R; IL-8R; IL-9R; IL-10R; IL-11R; IL-12R; IL-13R; IL-14R; IL-15R; IL-17R; Integrin ß7 subunit; KIR family; L1; LAG-3; LDLR; LPAP; ltk; Ly-6; Ly-9; Ly-49; Mac-2-BP; Macrophage lectin; MAdCAM-1; Mannose receptor; MARCO , M-CSFRMDR1; MHC Class I; MHC Class II; MS2; NKG2 family; OX2; OX40L; PC-1; PD-1; RT6; Sca-2; Scavenger RI and II; Sialoadhesin; Thrombopoietin receptor; WC1; Index; CD antigen expression of haemopoietic cells , English
    Weitere Ausg.: ISBN 0-12-078185-9
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 9
    Online-Ressource
    Online-Ressource
    Rockland, MA :Syngress Publishing,
    UID:
    almahu_9948026103902882
    Umfang: 1 online resource (417 p.)
    Ausgabe: 1st edition
    ISBN: 1-281-03580-7 , 9786611035808 , 0-08-048829-3 , 1-59749-029-6
    Inhalt: Over the past year there has been a shift within the computer security world away from passive, reactive defense towards more aggressive, proactive countermeasures. Although such tactics are extremely controversial, many security professionals are reaching into the dark side of their tool box to identify, target, and suppress their adversaries. This book will provide a detailed analysis of the most timely and dangerous attack vectors targeted at operating systems, applications, and critical infrastructure and the cutting-edge counter-measures used to nullify the actions of an attacking, crimin
    Anmerkung: Description based upon print version of record. , Cover; Contents; Foreword; Fictionalized Cases of Network Strike-Back, Self-Defense, and Revenge; PDA Perils: Revenge from the Palm of Your Hand; The Case of a WLAN Attacker: In the Booth; MD5: Exploiting the Generous; A VPN Victim's Story: Jack's Smirking Revenge; Network Protection: Cyber-Attacks Meet Physical Response; Network Insecurity: Taking Patch Management to the Masses; The Fight for the Primulus Network: Yaseen vs Nathan; Undermining the Network: A Breach of Trust; ADAM: Active Defense Algorithm and Model; Defending Your Right to Defend; MD5 to Be Considered Harmful Someday , When the Tables Turn: Passive Strike-BackIndex; Related Titles , English
    Weitere Ausg.: ISBN 1-931836-20-5
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 10
    Buch
    Buch
    Heidelberg :Spektrum,
    UID:
    kobvindex_IGB0009746
    Umfang: XXXV, 1440 S. : , Abb.
    ISBN: 3-8274-0032-5
    Inhalt: Standort: Abt. III
    Schlagwort(e): Lehrbuch ; Lehrbuch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie auf den KOBV Seiten zum Datenschutz