Catálogo de publicaciones

Compartir en
redes sociales


Navegación

Tipo

Acceso

Plataformas

Temática

Mostrando 10 de 11.986 registro(s)

Filtros temática quitar todos

libros Acceso Abierto
Agregar a Mi catálogo

Mitogen Activated Protein Kinases: Functions in Signal Transduction and Human Diseases

Más información

978-3-03928-071-1 (en línea)

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No requiere Directory of Open access Books acceso abierto

Cobertura temática: Ciencias naturales - Ciencias biológicas - Ingenieria ambiental - Medios de comunicación  


Mitosis/Cytokinesis

Más información

978-0-12-781240-3 (en línea)

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 1981 ScienceDirect

Cobertura temática: Ciencias biológicas - Ciencias agrícolas y veterinarias  

Mitosis/Cytokinesis provides a comprehensive discussion of the various aspects of mitosis and cytokinesis, as studied from different points of view by various authors. The book summarizes work at different levels of organization, including phenomenological, molecular, genetic, and structural levels.

The book is divided into three sections that cover the premeiotic and premitotic events; mitotic mechanisms and approaches to the study of mitosis; and mechanisms of cytokinesis. The authors used a uniform style in presenting the concepts by including an overview of the field, a main theme, and a conclusion so that a broad range of biologists could understand the concepts. This volume also explores the potential developments in the study of mitosis and cytokinesis, providing a background and perspective into research on mitosis and cytokinesis that will be invaluable to scientists and advanced students in cell biology.

The book is an excellent reference for students, lecturers, and research professionals in cell biology, molecular biology, developmental biology, genetics, biochemistry, and physiology.

libros Acceso Abierto
Agregar a Mi catálogo

Mixotrophy in Protists: Mixotrophy in Protists

Más información

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No requiere Directory of Open access Books acceso abierto

Cobertura temática: Ciencias naturales - Ciencias de la tierra y ciencias ambientales relacionadas - Ciencias biológicas  


libros Acceso Abierto
Agregar a Mi catálogo

Mixotrophy in Protists: Mixotrophy in Protists

Más información

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No requiere Directory of Open access Books acceso abierto

Cobertura temática: Ciencias naturales - Ciencias de la tierra y ciencias ambientales relacionadas - Ciencias biológicas  


revistas Acceso Abierto
Agregar a Mi catálogo

ISSNs 2770-100X (en línea)

Disponibilidad
Institución detectada Período Navegá Descargá Solicitá
No requiere desde ene. 2022 / hasta ene. 2024 Wiley Online Library acceso abierto

Cobertura temática: Ciencias biológicas  


Mobile Agents: Basic Concepts, Mobility Models, and the Tracy Toolkit

Más información

978-1-55860-817-7 (en línea)

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2005 ScienceDirect

Cobertura temática: Ciencias de la computación e información - Ciencias biológicas - Ciencias agrícolas y veterinarias - Economía y negocios  

Mobile agents are software nomads that act as your personal representative, working autonomously through networks. They are able to visit network nodes directly using available computing power and are not limited by platform. This emerging field is now poised to become a cornerstone for new Web-based ubiquitous computing environments. Mobile Agents provides a practical introduction to mobile agent technology and surveys the state of the art in mobile agent research. Students and researchers can use the book as an introduction to the concepts and possibilities of this field and as an overview of ongoing research. Developers can use it to identify the capabilities of the technology to decide if mobile agents are the right solution for them. Practioners can also gain hands-on experience in programming mobile agents through exploration of the source code for a complete mobile agent environment available through the companion website.

*Summarizes the state of the art in mobile agent research
*Identifies the benefits and limitations of current mobile agent technology to help developers understand the possibilities of this new field
*Extensive mobile agents web portal (www.mobile-agents.org) with the Java source code for a complete industrial-quality environment for mobile agents, with significant parts of the system open source

Mobile Data Loss: Threats and Countermeasures

Más información

978-0-12-802864-3 (en línea)

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2015 ScienceDirect

Cobertura temática: Ciencias de la computación e información - Ciencias biológicas  

The mobile threat landscape is evolving bringing about new forms of data loss. No longer can organizations rely on security policies designed during the PC era. Mobile is different and therefore requires a revised approach to countermeasures to mitigate data loss. Understanding these differences is fundamental to creating a new defense-in-depth strategy designed for mobile. Mobile Data Loss: Threats & Countermeasures reviews the mobile threat landscape using a hacker mind-set to outline risks and attack vectors that include malware, risky apps, operating system compromises, network attacks, and user behaviours. This provides the basis for then outlining countermeasures for defining a holistic mobile security methodology that encompasses proactive protections, response mechanisms, live monitoring, and incident response. Designing a comprehensive mobile security strategy is key. Mobile Data Loss: Threats & Countermeasures outlines the threats and strategies for protecting devices from a plethora of data loss vectors.

  • Outlines differences in mobile devices versus PCs
  • Reviews mobile threat landscape using a hacker mind-set to outline risks and attack vectors
  • Summarizes the tools and techniques for implementing enterprise countermeasures
  • Maps mobile to common security compliances including PCI, HIPAA, and CJIS
  • Provides a defense-in-depth methodology and strategy for enterprises to minimize data loss

revistas Acceso Abierto
Agregar a Mi catálogo

Mobile DNA

Más información

ISSNs 1759-8753 (impreso)

Disponibilidad
Institución detectada Período Navegá Descargá Solicitá
No requiere desde ene. 2010 / hasta ene. 2024 BioMedCentral.com acceso abierto
No requiere desde ene. 2010 / hasta ene. 2024 Directory of Open Access Journals acceso abierto
No requiere desde ene. 2010 / hasta ene. 2024 PubMed Central acceso abierto

Cobertura temática: Ciencias biológicas  


Mobile Genetic Elements

Más información

978-0-12-638680-6 (en línea)

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 1983 ScienceDirect

Cobertura temática: Ciencias biológicas - Ciencias agrícolas y veterinarias  

Mobile Genetic Elements introduces the nonspecialist to the biology and genetics of mobile elements. It attempts to make the biochemistry of DNA rearrangements more accessible to embryologists and evolutionists, and to illuminate the related developmental cycles to the biochemist. The book also shows how natural the activity of mobile elements can be in diverse biological situations. The chapters describe several well-studied cases in which genetic determinants—often identified as specific nucleic acid sequences—repeatedly change their positions within or between cellular genomes. Because their genomic positions are not fixed, these determinants may conveniently be classed together under the rubric of mobile genetic elements.
The book begins with a discussion of maize controlling elements. This is followed by separate chapters on the bacteriophages λ and Mu; nonviral mobile elements in bacteria; transposable Ty elements in brewer's yeast; Drosophila transposable element; and hybrid dysgenesis. Subsequent chapters cover vertebrate retroviruses; Agrobacterium oncogenesis in plants; flagellar phase variation in Salmonella; yeast mating type; and surface antigenic variation in trypanosomes.

Mobile Malware Attacks and Defense

Más información

978-1-59749-298-0 (en línea)

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2009 ScienceDirect

Cobertura temática: Ciencias de la computación e información - Ciencias biológicas - Ciencias agrícolas y veterinarias  

Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new devices like the iPhone. Examining code in past, current, and future risks, protect your banking, auctioning, and other activities performed on mobile devices.
* Visual Payloads
View attacks as visible to the end user, including notation of variants.
* Timeline of Mobile Hoaxes and Threats
Understand the history of major attacks and horizon for emerging threates.
* Overview of Mobile Malware Families
Identify and understand groups of mobile malicious code and their variations.
* Taxonomy of Mobile Malware
Bring order to known samples based on infection, distribution, and payload strategies.
* Phishing, SMishing, and Vishing Attacks
Detect and mitigate phone-based phishing (vishing) and SMS phishing (SMishing) techniques.
* Operating System and Device Vulnerabilities
Analyze unique OS security issues and examine offensive mobile device threats.
* Analyze Mobile Malware
Design a sandbox for dynamic software analysis and use MobileSandbox to analyze mobile malware.
* Forensic Analysis of Mobile Malware
Conduct forensic analysis of mobile devices and learn key differences in mobile forensics.
* Debugging and Disassembling Mobile Malware
Use IDA and other tools to reverse-engineer samples of malicious code for analysis.
* Mobile Malware Mitigation Measures
Qualify risk, understand threats to mobile assets, defend against attacks, and remediate incidents.

* Understand the History and Threat Landscape of Rapidly Emerging Mobile Attacks
* Analyze Mobile Device/Platform Vulnerabilities and Exploits
* Mitigate Current and Future Mobile Malware Threats