LEADER 07509nam 2200661Ia 450 001 9910208840803321 005 20200520144314.0 010 $a9786613408730 010 $a9781444397949 010 $a144439794X 010 $a9781444397925 010 $a1444397923 010 $a9781283408738 010 $a1283408732 010 $a9781444397932 010 $a1444397931 035 $a(CKB)4330000000002223 035 $a(MiAaPQ)EBC697932 035 $a(MiAaPQ)EBC4042052 035 $a(Au-PeEL)EBL697932 035 $a(CaPaEBR)ebr10510719 035 $a(OCoLC)774393982 035 $a(PPN)204253500 035 $a(Perlego)1011287 035 $a(EXLCZ)994330000000002223 100 $a20110121d2011 uy 0 101 0 $aeng 135 $aurcn||||||||| 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 04$aThe AST handbook of transplant infections /$fedited by Deepali Kumar, Atul Humar ; associate editors, Emily Blumberg, Marian Michaels, Kieren Marr ; on behalf of the American Society of Transplantation Infectious Diseases Community of Practice 205 $a1st ed. 210 $aChichester ;$aHoboken, NJ $cBlackwell Pub.$d2011 215 $axv, 171 p. $cill 311 08$a9780470658277 311 08$a0470658274 320 $aIncludes bibliographical references and index. 327 $aIntro -- The AST Handbook of Transplant Infections -- Contents -- List of Contributors -- Preface -- Acknowledgements -- Part I: General Issues and Infectious Syndromes -- 1 Timeline of Infections After Organ Transplant -- 2 Timeline of Infections After Hematopoietic Stem Cell Transplant -- 3 Immune Reconstitution After Myeloablative Stem Cell Transplant -- 4 Pre-transplant Infectious Disease Evaluation of the Organ Transplant Candidate -- 5 Pre-transplant Infectious Disease Evaluation of the Hematopoietic Stem Cell Transplant Candidate -- 6 Technical Complications after Organ Transplant and Associated Infections -- 7 Evaluation and Initial Treatment of Infectious Complications Among Organ Transplant Recipients -- 8 Management of Infections in Kidney Transplant Recipients -- 9 Management of Infections in Pancreas Transplant Recipients -- 10 Management of Infections in Liver Transplant Recipients -- 11 Management of Infections in Lung, Heart-Lung, and Heart Transplant Recipients -- 12 Management of Infections in Intestinal Transplant Recipients -- 13 Antimicrobial Management of Patients with Fever and Neutropenia Following Hematopoietic Stem Cell Transplantation -- Part II: Specific Pathogens -- 14 Cytomegalovirus -- 15 Epstein-Barr Virus and Post-transplant Lymphoproliferative Disorders -- 16 Management of herpes simplex virus -- 17 Management of Varicella Zoster Virus -- 18 Prevention and Treatment of Human Herpesvirus 6, 7 and 8 Infections in Transplant Recipients -- 19 BK Polyomavirus and Polyomavirus-associated Nephropathy -- 20 Respiratory Viruses -- 21 Human Papillomavirus -- 22 Hepatitis B -- 23 Hepatitis C Management in Transplant Candidates and Recipients -- 24 Management Algorithm for Transplantation in Patients with Human Immunodeficiency Virus -- 25 Management of Selected Fungal Infections After Transplantation. 327 $a26 Treatment of Nocardia Infections -- 27 Tuberculosis: Treatment and Prevention -- 28 Treatment of Non-tuberculous Mycobacterium Infections -- 29 Pneumocystis jiroveci Pneumonia: Prophylaxis and Therapy -- 30 Suggested Therapy of Clostridium difficile Colitis After Transplantation -- 31 Diagnosis and Treatment of Multidrug-Resistant Bacteria -- 32 Management of Selected Parasitic Infections After Transplant -- Part III: Donor Issues -- 33 Infectious Disease Evaluation of the Potential Organ Donor -- 34 Infectious Disease Evaluation of the Potential Hematopoietic Stem Cell Transplant Donor -- 35 Donor-derived Infections -- 36 Estimates of Window Period Length for Serology and Nucleic Acid Testing -- 37 Estimates of Residual Risk of HIV or HCV when using Selected Increased Risk Donor Categories -- 38 Management of Recipients of Hepatitis B Core Antibody-Positive Donor Organ -- 39 Donor Tuberculosis Issues: Potential Scenarios and Management -- Part IV: Prevention of Infections after Transplantation -- 40 Suggested Prophylaxis Regimens in Organ Transplant Recipients -- 41 Antimicrobial Prophylaxis Regimen for Allogeneic Hematopoietic Stem Cell Transplant Recipients -- 42 Antimicrobial Prophylaxis Regimen for Autologous Hematopoietic Stem Cell Transplant Recipients -- 43 Adult Vaccination Schedule After Solid Organ Transplant -- 44 Adult Vaccination Schedule After Allogeneic Stem Cell Transplant -- 45 Immunizations After Pediatric Solid Organ Transplant and Hematopoietic Stem Cell Transplant -- 46 Recommendations for Travel-related Vaccinations and Medications for Transplant Travelers -- 47 Safe Living Strategies for Transplant Patients -- Part V: Post-transplant Medications and Drug Interactions -- 48 Common Immunosuppressive Drugs, Mechanisms of Action, Side-effects, and Other Interactions. 327 $a49 Infectious Risks Associated with Anti-thymocyte Globulin (ATG, Thymoglobulin) -- 50 Infectious Risks Associated with Alemtuzumab (Campath) -- 51 Infectious Risks Associated with IL-2R Antagonist [Basiliximab (Simulect) and Daclizumab (Zenapax)] -- 52 Infectious Risks Associated With Rituximab (Rituxan) -- 53 Drug Interactions Between Antimicrobial Agents and Common Immunosuppressive Drugs Used in Transplantation -- 54 Antiviral Agents for Adult Transplant Recipients -- 55 Antifungal Agents in Adult Transplant Recipients -- 56 Antiviral Agents for Pediatric Transplant Recipients -- 57 Antifungal Agents for Pediatric Transplant Recipients -- Index -- A -- B -- C -- D -- E -- F -- G -- H -- I -- L -- M -- N -- O -- P -- Q -- R -- S -- T -- U -- V -- W -- Y -- Z. 330 8 $aWhether you need to manage a post-transplant infection or reduce the possibility of infection, you will find effective guidance in this handbook. The work of the American Society of Transplantation Infectious Diseases Community of Practice, this reference exclusively uses tables and flowcharts to speed up decision making. This distinguished group of investigators and teachers provide point of care information on optimum management of infection in adult and pediatric organ and stem cell transplant patients. The unique tables and flowcharts are devised by the authors, backed up with extensive references, making the book a fully researched yet easy to use guide. The fast growing specialty of transplantation will be well served by this book as increasing numbers of successful procedures mean transplant teams have to be ever more alert to the possibility of and need for action in the event of ensuing infection. 517 3 $aHandbook of transplant infections 606 $aCommunicable diseases$vHandbooks, manuals, etc 606 $aTransplantation of organs, tissues, etc$xComplications$vHandbooks, manuals, etc 615 0$aCommunicable diseases 615 0$aTransplantation of organs, tissues, etc.$xComplications 676 $a616.9/8 701 $aKumar$b Deepali$0980444 701 $aHumar$b Atul$0980445 712 02$aAmerican Society of Transplantation.$bInfectious Diseases Community of Practice. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910208840803321 996 $aThe AST handbook of transplant infections$92237116 997 $aUNINA LEADER 04603nam 22008295 450 001 9910483281003321 005 20251226195133.0 010 $a3-642-17714-X 024 7 $a10.1007/978-3-642-17714-9 035 $a(CKB)2670000000064729 035 $a(SSID)ssj0000476292 035 $a(PQKBManifestationID)11305741 035 $a(PQKBTitleCode)TC0000476292 035 $a(PQKBWorkID)10479357 035 $a(PQKB)11485488 035 $a(DE-He213)978-3-642-17714-9 035 $a(MiAaPQ)EBC3066216 035 $a(PPN)149902700 035 $a(BIP)32617487 035 $a(EXLCZ)992670000000064729 100 $a20101207d2010 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aInformation Systems Security $e6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010 /$fedited by Somesh Jha, Anish Mathuria 205 $a1st ed. 2010. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2010. 215 $a1 online resource (XIV, 261 p. 60 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v6503 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-642-17713-1 320 $aIncludes bibliographical references and index. 330 $a2.1 Web Application Vulnerabilities Many web application vulnerabilities havebeenwell documented andthemi- gation methods havealso beenintroduced [1]. The most common cause ofthose vulnerabilities isthe insu'cient input validation. Any data originated from o- side of the program code, forexample input data provided by user through a web form, shouldalwaysbeconsidered malicious andmustbesanitized before use.SQLInjection, Remote code execution orCross-site Scriptingarethe very common vulnerabilities ofthattype [3]. Below isabrief introduction toSQL- jection vulnerability though the security testingmethodpresented in thispaper is not limited toit. SQLinjectionvulnerabilityallowsanattackertoillegallymanipulatedatabase byinjectingmalicious SQL codes into the values of input parameters of http requests sentto the victim web site. 1: Fig.1. An example of a program written in PHP which contains SQL Injection v- nerability Figure 1 showsaprogram that uses the database query function mysql query togetuserinformationcorrespondingtothe userspeci'edby the GETinput- rameterusername andthen printtheresultto the clientbrowser.Anormalhttp request with the input parameter username looks like "http://example.com/ index.php'username=bob". The dynamically created database query at line2 is "SELECT * FROM users WHERE username='bob' AND usertype='user'". Thisprogram is vulnerabletoSQLInjection attacks because mysql query uses the input value of username without sanitizingmalicious codes. A malicious code can be a stringthatcontains SQL symbols ork- words.Ifan attacker sendarequest with SQL code ('alice'-') - jected "http://example.com/index.php'username=alice'-", the query becomes "SELECT* FROM users WHERE username='alice'--' AND usertype='user'". 410 0$aSecurity and Cryptology,$x2946-1863 ;$v6503 606 $aComputer networks 606 $aUser interfaces (Computer systems) 606 $aHuman-computer interaction 606 $aData protection 606 $aInformation storage and retrieval systems 606 $aElectronic data processing$xManagement 606 $aBiometric identification 606 $aComputer Communication Networks 606 $aUser Interfaces and Human Computer Interaction 606 $aData and Information Security 606 $aInformation Storage and Retrieval 606 $aIT Operations 606 $aBiometrics 615 0$aComputer networks. 615 0$aUser interfaces (Computer systems). 615 0$aHuman-computer interaction. 615 0$aData protection. 615 0$aInformation storage and retrieval systems. 615 0$aElectronic data processing$xManagement. 615 0$aBiometric identification. 615 14$aComputer Communication Networks. 615 24$aUser Interfaces and Human Computer Interaction. 615 24$aData and Information Security. 615 24$aInformation Storage and Retrieval. 615 24$aIT Operations. 615 24$aBiometrics. 676 $a004.6 701 $aJha$b Somesh$0117620 701 $aMathuria$b Anish$f1967-$01757081 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483281003321 996 $aInformation Systems Security$94194722 997 $aUNINA