| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910784231703321 |
|
|
Autore |
Richardson M. D |
|
|
Titolo |
Fungal infection [[electronic resource] ] : diagnosis and management / / Malcolm D. Richardson, David W. Warnock |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Malden, Mass., : Blackwell, 2003 |
|
|
|
|
|
|
|
ISBN |
|
1-280-19832-X |
9786610198320 |
0-470-79836-X |
0-470-75525-3 |
1-4051-4607-9 |
|
|
|
|
|
|
|
|
Edizione |
[3rd ed.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (394 p.) |
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
""Fungal Infection: Diagnosis and Management""; ""Contents""; ""Preface to the third edition""; ""Preface to the first edition""; ""Acknowledgements""; ""1 Introduction""; ""1.1 The nature of fungi""; ""1.2 Classification and nomenclature of fungi and fungal diseases""; ""1.3 Fungi as human pathogens""; ""1.3.1 The superficial mycoses""; ""1.3.2 The subcutaneous mycoses""; ""1.3.3 The systemic mycoses""; ""1.4 The changing pattern of fungal infection""; ""1.5 New directions in diagnosis""; ""1.6 New directions in treatment and prevention""; ""2 Laboratory diagnosis of fungal infection"" |
""2.1 Introduction""""2.2 Collection of specimens""; ""2.2.1 Skin, nails and hair""; ""2.2.2 Mucous membranes""; ""2.2.3 Ear""; ""2.2.4 Eye""; ""2.2.5 Blood""; ""2.2.6 Cerebrospinal fluid""; ""2.2.7 Urine""; ""2.2.8 Other fluids""; ""2.2.9 Lower respiratory tract specimens""; ""2.2.10 Pus""; ""2.2.11 Bone marrow""; ""2.2.12 Tissue""; ""2.3 Specimens for serological tests""; ""2.4 Specimens for antifungal drug level determinations""; ""2.5 Transport of specimens""; ""2.6 Interpretation of laboratory test result""; ""2.6.1 Direct microscopic examination"" |
""2.6.2 Histopathological examination""""2.6.3 Culture""; ""2.6.4 Serological tests""; ""2.7 Molecular diagnosis of fungal infection""; ""3 |
|
|
|
|
|
|
|
|
|
|
|
Antifungal drugs""; ""3.1 Introduction""; ""3.2 Amphotericin B""; ""3.2.1 Mechanism of action""; ""3.2.2 Spectrum of action""; ""3.2.3 Acquired resistance""; ""3.2.4 Pharmacokinetics""; ""3.2.5 Pharmaceutics""; ""3.2.6 Therapeutic use""; ""3.2.7 Mode of administration""; ""3.2.8 Adverse reactions,""; ""3.2.9 Drug interactions""; ""3.3 Other polyene compounds for topical administration""; ""3.3.1 Natamycin""; ""3.3.2 Nystatin""; ""3.4 Fluconazole"" |
""3.4.1 Mechanism of action""""3.4.2 Spectrum of action""; ""3.4.3 Acquired resistance""; ""3.4.4 Pharmacokinetics""; ""3.4.5 Pharmaceutics""; ""3.4.6 Therapeutic use""; ""3.4.7 Mode of administration""; ""3.4.8 Adverse reactions""; ""3.4.9 Drug interactions""; ""3.5 Itraconazole""; ""3.5.1 Mechanism of action""; ""3.5.2 Spectrum of action""; ""3.5.3 Acquired resistance""; ""3.5.4 Pharmacokinetics""; ""3.5.5 Pharmaceutics""; ""3.5.6 Therapeutic use""; ""3.5.7 Mode of administration""; ""3.5.8 Adverse reactions""; ""3.5.9 Drug interactions""; ""3.6 Ketoconazole""; ""3.6.1 Mechanism of action"" |
""3.6.2 Spectrum of action""""3.6.3 Acquired resistance""; ""3.6.4 Pharmacokinetics""; ""3.6.5 Pharmaceutics""; ""3.6.6 Therapeutic use""; ""3.6.7 Mode of administration""; ""3.6.8 Adverse reactions""; ""3.6.9 Drug interactions""; ""3.7 Voriconazole""; ""3.7.1 Mechanism of action""; ""3.7.2 Spectrum of action""; ""3.7.3 Acquired resistance""; ""3.7.4 Pharmacokinetics""; ""3.7.5 Pharmaceutics""; ""3.7.6 Therapeutic use""; ""3.7.7 Mode of administration""; ""3.7.8 Adverse reactions""; ""3.7.9 Drug interactions""; ""3.8 Other imidazole compounds for topical administration""; ""3.8.1 Bifonazole"" |
""3.8.2 Butoconazole"" |
|
|
|
|
|
|
Sommario/riassunto |
|
Concise, up-to-date guide to the clinical manifestations, laboratory diagnosis and management of superficial, subcutaneous and systemic fungal infections ""I would recommend this book to all microbiologists and clinicians regularly dealing with patients suffering from fungal infections."" Journal of Medical Microbiology WHY BUY THIS BOOK? Thorough update of significant developments in the diagnosis and management of fungal infections Up-to-date drug and dosage recommendations updated in line with current guidelines New feature: epidemiology and prevention section in each chapter plu |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910781479003321 |
|
|
Autore |
Gibson Darril |
|
|
Titolo |
Microsoft Windows Security [[electronic resource] ] : Essentials / / Darril Gibson |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Hoboken, : Wiley, 2011 |
|
Indiana, : Wiley, 2011 |
|
|
|
|
|
|
|
|
|
ISBN |
|
1-283-17725-0 |
9786613177254 |
1-118-11454-X |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (374 p.) |
|
|
|
|
|
|
Collana |
|
Sybex serious skills |
Essentials (Indianapolis, Ind.) |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
|
|
Soggetti |
|
Electronic data processing personnel - Certification |
Computer networks - Examinations |
Computer networks -- Examinations -- Study guides |
Computer security - Examinations |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di contenuto |
|
Microsoft Windows Security Essentials; Introduction; Who Should Read This Book; What You Will Learn; Prerequisites; What You Need; What Is Covered in This Book; Chapter 1: Understanding Core Security Principles; Understanding Risk; Exploring the Security Triad; Protecting Against Loss of Confidentiality; Protecting Against Loss of Availability; Protecting Against Loss of Integrity; Implementing a Defense-in-Depth Security Strategy; Enforcing the Principle of Least Privilege; Hardening a Server; Reducing the Attack Surface; Keeping a System Updated; Enabling the Firewall |
Installing Antivirus Software Chapter 2: Understanding Malware and Social Engineering; Comparing Malware; Viruses; Worms; Trojan Horses; Buffer-Overflow Attacks; Spyware; Understanding the Threat; Protecting Against Malware; Using Antivirus Software; Using Microsoft Security Essentials on Desktops; Thwarting Social-Engineering Attacks; Social Engineering in Person; Social Engineering with a Phone Call; |
|
|
|
|
|
|
|
|
|
|
|
Recognizing Phishing Attempts; Recognizing Pharming; Protecting Email; Chapter 3: Understanding User Authentication; Comparing the Three Factors of Authentication |
Using Passwords for Authentication Comparing Password Attack Methods; Creating Strong Passwords; Enforcing Strong Passwords; Exploring Account Lockout Policies; Unlocking an Account; Resetting a Password; Changing a Password; Creating a Password-Reset Disk; Using Smart Cards and Token Devices for Authentication; Using Biometrics for Authentication; Starting Applications with Run As Administrator; Preventing Time Skew with Kerberos; Identifying RADIUS Capabilities; Identifying Unsecure Authentication Protocols; LM; NTLM (NTLMv1); Chapter 4: Securing Access with Permissions |
Comparing NTFS Permissions Identifying Basic NTFS Permissions; Identifying Advanced NTFS Permissions; Combining Permissions; Enabling and Disabling Permission Inheritance; Moving and Copying Files; Comparing NTFS and FAT; Exploring Share Permissions; Identifying Share Permissions; Combining NTFS and Share Permissions; Identifying Active Directory Permissions; Viewing Active Directory Users and Computers; Comparing NTFS and Active Directory Permissions; Viewing Active Directory Permissions; Assigning Registry Permissions; Chapter 5: Using Audit Policies and Network Auditing |
Exploring Audit Policies Exploring Object Access Auditing; Comparing Account Logon and Logon Events; Exploring Directory Service Access Auditing; Understanding Account Management Auditing; Understanding System Events Auditing; Understanding Privilege Use Auditing; Understanding Policy Change Auditing; Understanding Process Tracking; Enabling Auditing; Enabling Object Access Auditing; Enabling Directory Service Access Auditing; Viewing Audit Information; Managing Security Logs; Saving Audit Information; Securing Audit Information; Auditing a Network with MBSA; Installing MBSA; Running MBSA |
Chapter 6: Protecting Clients and Servers |
|
|
|
|
|
|
Sommario/riassunto |
|
Windows security concepts and technologies for IT beginners IT security can be a complex topic, especially for those new to the field of IT. This full-color book, with a focus on the Microsoft Technology Associate (MTA) program, offers a clear and easy-to-understand approach to Windows security risks and attacks for newcomers to the world of IT. By paring down to just the essentials, beginners gain a solid foundation of security concepts upon which more advanced topics and technologies can be built. This straightforward guide begins each chapter by laying out a list of topics to be |
|
|
|
|
|
|
|
| |