Tuesday, May 19, 2009

AVG AntiVirus Free 8.5.278a1439

AVG AntiVirus Free 8.5.278a1439

Easy-to-use, automated protection

AVG Internet Security gives you maximum protection with real-time scanning, automatic updates, low-impact background scanning for online threats, and instant quarantining or removal of infected files ensures maximum protection. Every interaction between your computer and the Internet is analyzed to ensure nothing can get onto your system without your knowledge.

AVG checks in real time:

* All files including documents, photos, music, and applications
* E-mails (all major email programs like Microsoft Outlook and Thunderbird supported)
* Instant messaging and P2P communications
* File downloads and online transactions such as shopping and banking
* Search results and any other web links you click on
With this free distribution version of the popular AVG Anti-Virus system, you will get a reliable tool for your computer protection against computer viruses.

Features:

* Automatic update functionality
* The AVG Resident Shield, which provides real-time protection as files are opened and programs are run
* The AVG E-mail Scanner, which protects your e-mail
* The AVG On-Demand Scanner, which allows the user to perform scheduled and manual tests
* Free Virus Database Updates for the lifetime of the product
* AVG Virus Vault for safe handling of infected files
* Great customer satisfaction!

Please note that any previous version of AVG Free will be un-installed automatically during the installation of the new AVG Free

CCleaner 2.17.853

CCleaner 2.17.853

CCleaner is a freeware system optimization, privacy and cleaning tool. It removes unused files from your system - allowing Windows to run faster and freeing up valuable hard disk space. It also cleans traces of your online activities such as your Internet history. Additionally it contains a fully featured registry cleaner. But the best part is that it’s fast (normally taking less than a second to run) and contains NO Spyware or Adware! :)

Cleans the following:

* Internet Explorer: Temporary files, URL history, cookies, Autocomplete form history, index.dat.
* Firefox: Temporary files, URL history, cookies, download history.
* Opera: Temporary files, URL history, cookies.
* Windows: Recycle Bin, Recent Documents, Temporary files and Log files.
* Registry cleaner: Advanced features to remove unused and old entries, including File Extensions, ActiveX Controls, ClassIDs, ProgIDs, Uninstallers, Shared DLLs, Fonts, Help Files, Application Paths, Icons, Invalid Shortcuts and more… also comes with a comprehensive backup feature.
* Third-party applications: Removes temp files and recent file lists (MRUs) from many apps including Media Player, eMule, Kazaa, Google Toolbar, Netscape, MS Office, Nero, Adobe Acrobat, WinRAR, WinAce, WinZip and many more…
* 100% Spyware FREE: This software does NOT contain any Spyware, Adware or Viruses.

What’s New in version 2.17.853:

* Added wiping of disk free space.
* Progress bar changed to go from 0 to 100%.
* Improved Apple Safari history cleaning.
* Improved speed of Uninstaller Tool.
* Interface string changes and fixes.
* Added Ukranian translation.
* Installer language tweaks.
* Minor architecture changes.
* Minor bug fixes.

Folder Protector 5.38

Folder Protector 5.38

Folder-Protector v5.36

KaKa Folder Protector is a powerful and easy-to-use program for File Encryption.It can hide/encrypt any folder including flash disk and removable hard disk.

* Three Methods: Lock,Scramble and Encrypt Folder. Depending on the security level you need.
* On the Fly Protection: Using the Strong protection technology that can effectively lock/encrypt all your files.
* Strong Encryption: A strong industry standard 256-bit BLOWFISH Encryption is used to encrypt your files.
* Portability: Folders can be protected on portable devices like USB flash disk and removable hard disk.
* Drive Firewall: Allows you to protect your data from virus and other bad software.
* Security: Protected files are totally hidden and locked, undeletable, unmovable and totally inaccessible.

Solutions for your personal privacy

KaKa Folder Protector is a file-security program allowing the user to hide, lock, encrypt and protect files and folders in the blink of an eye. When folders are password protected and locked, their contents cannot be read, copied, modified or deleted. To access the locked folders, you must supply the correct password.

KaKa Folder Protector has advanced features such as “Security-Level”, allowing the user to select the Strength. Other features of Folder Protector include: Security Level, Show Protected Signs, Password Hint, Change icon of the protected folder, File Filter system.

Folders can also be protected on portable devices like USB flash disk and removable hard disk. KaKa Folder Protector can also be used on Windows Vista/2003/XP/2000/NT/ME/98.

Ad-Aware 2007 Free 7.0.2.7

Ad-Aware 2007 Free 7.0.2.7

Ad-Aware 2007 Free is a popular anti-spyware product for computer users around the world, with nearly one million downloads every week. This free anti-spyware version provides you with advanced protection against spyware that secretly attaches and takes control of your computer, resulting in aggressive advertising pop-ups, sluggish computer activity, even identity theft through stolen bank details, passwords, and credit card account numbers.

Features:

* Redesigned Engine – Benefit from superior program flexibility and more accurate scanning methods with all-new program architecture.
* Improved Code Sequence Identification (CSI) Technology – Boost your privacy protection with precise detection of embedded malware, including known and emerging threats.
* Incremental Definition File Updates – Save precious time and resources with smaller update files resulting in faster download times.
* TrackSweep - Control privacy by erasing tracks left behind while surfing the Web on Internet Explorer, Firefox, and Opera, with one easy click.
* Multiple Browser Support – Choose Internet Explorer, Firefox, or Opera with expanded browser support.
* New Straightforward User Interface – Effortlessly maneuver the complexities of malware detection and removal with our new user-friendly interface.
* User-Controlled Spyware Removal - Decide for yourself what to delete from your system and what to keep.
* Extensive Detection Database – Stay protected with regular updates from the extensive library of identified and analyzed spyware.
* System Restore Point – Easily revert back to your clean system to recover from a spyware attack.

Norton Antivirus Definition Updates (Windows All) 03-06-2009

Supports the following versions of Symantec antivirus software:

* Norton AntiVirus 2003 Professional Edition
* Norton AntiVirus 2003 for Windows 2000/XP Home/XP Pro
* Norton AntiVirus 2004 Professional Edition
* Norton AntiVirus 2004 for Windows 2000/XP Home/XP Pro
* Norton AntiVirus 2005 for Windows 2000/XP Home/XP Pro
* Norton AntiVirus 2006 for Windows 2000/XP Home/XP Pro
* Norton AntiVirus 2007 for Windows XP Home/XP Pro/Vista
* Norton 360 version 1.0 for Windows XP/Vista
* Norton AntiVirus for Microsoft Exchange (Intel)
* Norton SystemWorks (all versions)
* Symantec AntiVirus 3.0 for CacheFlow Security Gateway
* Symantec AntiVirus 3.0 for Inktomi Traffic Edge
* Symantec AntiVirus 3.0 for NetApp Filer/NetCache
* Symantec AntiVirus 9.0 Corporate Edition Client
* Symantec AntiVirus 10.0 Corporate Edition Client
* Symantec AntiVirus 10.1 Corporate Edition Client
* Symantec AntiVirus 10.2 Corporate Edition Client
* Symantec Mail Security for Domino v 5.x
* Symantec Mail Security for Microsoft Exchange v 5.x

NTFS4DOS 1.8 (read/write NTFS from DOS)

NTFS4DOS 1.8 (read/write NTFS from DOS)

NTFS4DOS Private is the only free for private usage tool that allows unrestricted full read and write access to NTFS volumes. Thereby it is the ideal solution for offline AV scanning, backups or it might be used as an ERD solution.

NTFS4DOS Private is loaded as a simple program like a CD-ROM extension and can coexist with any other tools like TCP/IP network, AV-Scanners or ghosting software.

As a bonus you get an NTFS checkdisk application for DOS as well as a defragmentation utility for any FAT/NTFS volume for DOS.
NTFS4DOS Private is from the same authors then the famous “CIA Commander 2″ and “CIA DRiVE.net” recovery tool.

McAfee SuperDAT Update 5546

McAfee SuperDAT Update will update your McAfee based scan engine and virus pattern to detect the latest viruses.

WHAT’S IN THIS FILE

- What are DAT Files?
- What is the SuperDAT Package Installer?
- What is an XDAT File?
- When to use the SuperDAT Package Installer
- Supported McAfee Products
- New Engine Features
- Using the SuperDAT Package Installer for
Updates and Upgrades
- About the Package Installer
- Installing DAT Files and Engine Files
- Running the SuperDAT Package Installer
- Command-Line Options
- Distributing SuperDAT Files Via Network
Management Software
- Modifying the SuperDAT Package to Work
with AutoUpgrade
- Files included with this SuperDAT
Package
- Testing your installation
- Known Issues
- New Viruses Detected and Removed
- Understanding Virus Names
- Prefix
- Prefix for Trojan-horse Classes
- Infix
- Suffix
- Generic Detections
- Heuristic Detections
- Application Detections
- Documentation
- Contacting McAfee Security & Network
Associates
- Copyright and Trademark Attributions
- Trademarks
- License Agreement

Zip Password Finder

Zip Password Finder

ZIP password finder is a completely free tool to recover zip archive passwords.

Features several functions/attacks, a nice, easy to use interface and $0 price which makes it the top choice for .zip password recover

ZoneAlarm 8.0.065.0

ZoneAlarm 8.0.065.0

ZoneAlarm®, a Check Point Software Technologies, Inc. Company, is one of the most secure brands in consumer Internet security. ZoneAlarm protects over 60 million PCs from viruses, spyware, hackers and identity theft. The award-winning Internet security product line is installed in consumer PCs and small businesses, protecting them from Internet threats. The ZoneAlarm family of products is among the most popular and successful Internet security products available on the market.

Keep hackers and data thieves out of your computer with ZoneAlarm, the PC firewall that protects against Internet-borne threats like worms, Trojan horses, and spyware. ZoneAlarm provides the basic protection individuals need to secure their PC and keep their valuable information private.

ZoneAlarm barricades your PC with immediate and complete port blocking. And, then runs in Stealth Mode to make your PC invisible on the Internet - if you can´t be seen, you can´t be attacked.

Includes a getting started tutorial which explains controls and alerts to get you up and running quickly. And, to keep you confident that you´re always protected, intuitive color-coded alerts rate security risks - in real time.
ZoneAlarm is free for individual and not-for-profit charitable entity use (excluding governmental entities and educational institutions).

Note: This new installer support Windows 2000/XP/Vista. Once you download the small installer, you will have to option to select “Windows 2000/XP” or “Vista”. The installer will then download the appropriate files for your Operating System. Total download size is 27MB.

Eraser v5.86a

Eraser v5.86a

Size: 8.53MB
Publisher: Visit Website
Release Date: 2008-01-09
Submit Date: 2008-01-09
OS: Win NT/2000/XP
Downloads: 77847
Popularity: Popularity:2/10

Eraser is an advanced security tool, which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns.

You can drag and drop files and folders to the on-demand eraser, use the convenient Explorer shell extension or use the integrated scheduler to program overwriting of unused disk space or, for example, browser cache files to happen regularly, at night, during your lunch break, at weekends or whenever you like.

The patterns used for overwriting are based on Peter Gutmann´s paper “Secure Deletion of Data from Magnetic and Solid-State Memory” and they are selected to effectively remove the magnetic remnants from the hard disk.

Other methods include the one defined in the National Industrial Security Program Operating Manual of the US Department of Defense and overwriting with pseudorandom data. You can also define your own overwriting methods

Microsoft Windows Defender 1593

Microsoft Windows Defender 1593

Windows Defender detects and removes spyware

Windows Defender is software that helps protect your computer against pop-ups, slow performance, and security threats caused by spyware and other unwanted software by detecting and removing known spyware from your computer. Windows Defender features Real-Time Protection, a monitoring system that recommends actions against spyware when it’s detected, minimizes interruptions, and helps you stay productive.

The benefits of installing Windows Defender include:

Spyware detection and removal

* Windows Defender quickly and easily finds spyware and other unwanted programs that can slow down your computer, display annoying pop-up ads, change Internet settings, or use your private information without your consent.
* Windows Defender eliminates detected spyware easily at your direction, and if you inadvertently remove programs that you actually want, it’s easy to get them back.
* Windows Defender allows you to schedule your scanning and removal times when it’s convenient for you, whether it’s on-demand or on a schedule that you set.

Improved Internet browsing safety

avast! Virus Cleaner 1.0.211

avast! Virus Cleaner 1.0.211

avast! Virus Cleaner is a free tool that will help you remove selected virus & worm infections from your computer - it doesn´t replace antivirus program!

When your computer gets infected by a virus or worm, the virus often schedule itself to be run automatically when you start your operating system; some of them even register themselves to be run when any other application is started.

Removing of it is not as simple as deleting it - after deleting the worm file, your operating system might not be able to start your applications (such as Explorer) any more. In order to properly remove the worm from your computer, it is often necessary to make additional fixes in your system registry, delete the links from your Startup Folder etc.

Here the avast! Virus Cleaner comes - it will find and remove selected worms from your computer, as well as fix the registry and startup items to make sure your system will work correctly after the disinfection.

Many worms - when activated - create additional working files on your hard disk. Even though these files alone are harmless, they are useless and they should not be there. When avast! Virus Cleaner detects and removes a known worm from your computer, its working/temporary files are removed as well. The same applies for worm-specific registry entries etc. avast! Virus Cleaner can also deactivate the virus present in memory. There is no need to start the tool from a Safe Mode - just start it and it will take care of the rest!

avast! Virus Cleaner removes the following worm families:

* Badtrans
* Beagle (aka Bagle) (A-L, U, W, X)
* Blaster (A-M)
* BugBear (A, B, E)
* Ganda
* Klez/Elkern, all variants
* MiMail, (A, C, E, I-N, Q, S-U)
* Mydoom (A,B,D,F including the Trojan horse)
* Nachi/Welchia (A-G)
* Netsky (aka Moodown) (A-Z)
* Nimda
* Opas (aka Opasoft, Opaserv)
* Scold
* Sircam
* Sober (A-F)
* Sobig (B-F)
* Swen, incl. UPX variant
* Yaha (aka Lentin) all vari

Norton Antivirus Definition Updates (Administrators) 03-08-2009

Supports the following versions of Symantec antivirus software:

* Norton AntiVirus 2003 Professional Edition
* Norton AntiVirus 2003 for Windows 2000/XP Home/XP Pro

* Norton AntiVirus 2004 Professional Edition
* Norton AntiVirus 2004 for Windows 2000/XP Home/XP Pro
* Norton AntiVirus 2005 for Windows 2000/XP Home/XP Pro
* Norton AntiVirus 2006 for Windows 2000/XP Home/XP Pro
* Norton AntiVirus 2007 for Windows XP Home/XP Pro/Vista
* Norton 360 version 1.0 for Windows XP/Vista
* Norton AntiVirus for Microsoft Exchange (Intel)
* Symantec AntiVirus 3.0 CacheFlow Security Gateway
* Symantec AntiVirus 3.0 for Inktomi Traffic Edge
* Symantec AntiVirus 3.0 for NetApp Filer/NetCache
* Symantec AntiVirus 9.0 Corporate Edition Client
* Symantec AntiVirus 10.0 Corporate Edition Client
* Symantec AntiVirus 10.1 Corporate Edition Client
* Symantec AntiVirus 10.2 Corporate Edition Client
* Symantec AntiVirus for Bluecoat Security Gateway for Windows 2000 Server/2003 Server
* Symantec AntiVirus for Clearswift MIMESweeper for Windows 2000 Server/2003 Server
* Symantec AntiVirus for Microsoft ISA Server for Windows 2000 Server/2003 Server
* Symantec Mail Security for Domino v 5.x
* Symantec Mail Security for Microsoft Exchange v 5.x
* Symantec Mail Security for SMTP v 5.x
* Symantec Web Security 3.0 for Windows
* Symantec AntiVirus Scan Engine for Windows

RogueRemover Free 1.24

RogueRemover Free 1.24

The Internet today is full of scam sites, otherwise known as phishing sites that try to sell you products. These products can be potenially harmful to your computer. They install malware, provide false feedback about your computer, and can slow down the computer drastically. These products are known as rogue applications and come in a variety of forms - from anti-malware applications to registry cleaners and even hard drive utilities.

We at Malwarebytes realize this is becoming a more prevalent issue, and have created a free application to help keep you safe and secure - RogueRemover FREE.

RogueRemover FREE is an application that can remove rogue antispyware, antivirus, and hard drive cleaning applications with ease. Rogue applications provide false information about the safety of your computer as well as, give erroneous scan results or put their own malware on your computer.
RogueRemover FREE has the ability to completely remove WinAntiSpyware/WinAntiVirus, SpyAxe, VirusBlast, VirusBursters, as well as a number of other rogue applications. In addition, we have implemented a threats center which will allow you to keep up to date with the latest rogue threats.

Usage

Simply download RogueRemover FREE from the one of the links below. Double click the downloaded file to install the application on your computer. Once the application is installed, double click on the RogueRemover FREE icon to start the program. When the application is open, select Scan and the application will guide you through the remaining step

SUPERAntiSpyware Free 4.25.1014

SUPERAntiSpyware Free 4.25.1014

SUPERAntiSpyware Free Edition is a free and useful software that will detect and remove thousands of Spyware, Adware, Malware, Trojans, KeyLoggers, Dialers, Hi-Jackers, and Worms. SUPERAntiSpyware features many unique and powerful technologies and removes spyware threats that other applications fail to remove.

Features:

* Quick, Complete and Custom Scanning of Hard Drives, Removable Drives, Memory, Registry, Individual Folders and More! Includes Trusting Items and Excluding Folders for complete customization of scanning!
* Detect and Remove Spyware, Adware, Malware, Trojans, Dialers, Worms, KeyLoggers, HiJackers and many other types of threats.
* Repair broken Internet Connections, Desktops, Registry Editing, Task Manager and more with our unique Repair System! Spyware application often disable system components to prevent removal - SUPERAntiSpyware resets and restores these items in seconds!
* Quarantine items detected and removed for complete protection. Items in the quarantine may be restored to your computer if desired.
* Detailed scan logs with complete information about detected and removed threats and their locations within your computer. Scan logs allow you to review scheduled scan results at anytime.

The Cambridge Companion to Virgil (Cambridge Companions to Literature)

Charles Martindale, “The Cambridge Companion to Virgil (Cambridge Companions to Literature)”
Cambridge University Press | 1997-11-13 | ISBN: 0521498856 | 388 pages | PDF | 23,1 MB
This ground-breaking and authoritative volume is an indispensable reference book to accompany the study of Virgil. It is a multi-authored guide aimed at students and anyone with an interest in great literature and the classical heritage. The chapters contain essential information while also offering fresh and original insights into the poems and their author. Emphasis is given to the responses to Virgil over the centuries, particularly by other creative artists.

Around the Tuscan Table: Food, Family, and Gender in Twentieth Century Florence

Around the Tuscan Table: Food, Family, and Gender in Twentieth Century Florence
Publisher: Routledge | ISBN: 0415946735 | edition 2004 | PDF | 264 pages | 4,50 mb
Renowned food scholar Carole Counihan serves up a delicious narrative about family and food in twentieth-century Florence. By looking at how family, and especially gender relations, have changed in Florence since the ending of World War II and continuing on to an examination of current food practices today, Around the Tuscan Table offers a portrait of the changing nature of modern life as exemplified through food. How food is produced, distributed, and consumed speaks volumes about a given culture, and this compelling and artfully narrated book aims to preserve, propagate, and interpret Florentines’ world-renowned cuisine and cultur

8 Development of Auditory and Vestibular Systems-3: Molecular Development of the Inner Ear, Volume 57

Raymond Romand, Isabel Varela-Nieto
“Development of Auditory and Vestibular Systems-3: Molecular Development of the Inner Ear, Volume 57″

Academic Press | 2003-11-26 | ISBN: 0121531570 | 490 pages | PDF | 5 MB

Thanks to advances in genetics and genomics, research on inner ear development has flourished. Better approaches and experimental models have shed light on the function of a variety of vertebrate genes and their related proteins. This latest volume of Current Topics in Developmental Biology delves into this new research to show how the discovery of more genes involved in the development of the inner ear leads to the generation of new models that examine a wealth of issues — from the origins of human deafness to the roles of genes during inner ear induction, development and differentiation. The wide variety of experimental approaches will help readers to understand the broad range of issues related to inner ear morphogenesis and other concepts from complementary areas of investigation. This state-of-the-art overview will be essential reading for researchers, clinicians and students alike.

* Scores of high-quality, full- color figures
* Detailed schemes on the structure and timing of ear development
* Current Topics in Developmental Biology is the longest-running forum for contemporary issues in developmental biology

ActiveState Tcl Dev Kit 5.0.2.290359 MacOSX | 21,6 MB

Published by e-man | Filed under Software

ActiveState Tcl Dev Kit 5.0.2.290359 MacOSX | 21,6 MB
The Tcl Dev Kit (TDK) provides essential tools for Tcl programmers, making it easy to create, build and deploy applications. Rapidly deploy Tcl applications to a broad range of platforms, as ready-to-run executables, starkits or starpacks. Simplify development with tools for finding and fixing bugs, managing complex code bases, and optimizing your programs. Take control and work the way you want with a choice of GUIs or command line interfaces for most tools.

Rapidshare

TM 10734 - Religious Web Templates

TM 10734 - Religious Web Templates
Sources Available: .PSD; .HTML;.FLA;.SWF | 19 Mb

Download

Uploading

Obscurity - V?rar (2009)

Obscurity - V?rar (2009)
Melodic Black Metal | Mp3 320 Kbps | 94 MB | Germany

Their previous album ‘Schlachten Und Legenden’ was already a fine album which displayed the potential of these “Bergische L?wen” pretty good. Now, two years later, Obscurity release, with a minor delay, their new album ‘V?rar’, this sympathical band’s fourth album. Don’t expect happy pagan power metal to clap along, but rough metal which is just as well played east of our national borders, with of course a link to the Scandinavian sound. Drums, bass, guitars and no furthers frills. All that Obscurity add are the guest vocals of Arkadius (Suidakra) and Path Of Golgonda’s Manuel, whom I believe to participate on ‘Battle Metal’.

Track List:
1. Nach Asgard wir reiten
2. Battle Metal
3. Varusschlacht
4. Wer Wind s?ht…
5. V?rar
6. Im Herzen des Eises
7. Nordm?nne
8. Worringen
9. Schutt und Asche
10. Blut und Feuer

Piracy - The East Africa / Somalia Situation

Piracy - The East Africa / Somalia Situation
Publisher: Oil Companies International Marine Forum | ASIN: R20090515B | edition 2009 | PDF | 42 pages | 1,16 mb

Introduction
Piracy is a term used to describe acts of armed robbery, hijacking and other malicious acts against ships in international waters. They are carried out with the intent of stealing valuables onboard and/or extorting money from ship owners and/or other third party interests by holding the ship or crew to ransom. The International Maritime Bureau (IMB) defines piracy as “the act of boarding any vessel with an intent to commit theft or any other crime, and with an intent or capacity to use force in furtherance of that act”. Since this definition reflects the popular understanding of the word ‘piracy’, this term will be used throughout this booklet to describe any such act against a ship.
Armed attacks on merchant vessels transiting the Gulf of Aden, and other waters near the Horn of Africa, have increased in frequency over the past months. There were 140 approaches and at least 39 vessels actually detained by pirates in 2008 (Source: UKMTO). Such acts have usually been conducted with the use or threat of violence, which can be particularly traumatic for those directly involved, as well as their families

War of Kings - Ascension #2

War of Kings - Ascension #2
English | May 2009 | CBR | 19 MB
+ The Previous Issue


http://uploading.com/files/B9YVKHEM/War_of_Kings_Ascension_02.cbr.html

Mirror

Mirror

Mirror

Mirror

Talking about Race: Community Dialogues and the Politics of Difference

Talking about Race: Community Dialogues and the Politics of Difference (Studies in Communication, Media, and Public Opinion)
Publisher: University Of Chicago Press | ISBN: 0226869075 | edition 2007 | PDF | 317 pages | 1,81 mb

“An important and original work, Talking about Race provides a unique and critical contribution to research on deliberation. It is a major empirical study of inter-personal communication and is of great importance not only to specialists in political deliberation but also to the wider community of scholars interested in political communication.”

Monday, May 18, 2009

Book information

Content Strategy for the Web

This book is the key to delivering useful, usable content to your online audiences, when and where they need it most. - Delivers the knowledge to plan for and implement a successful online content strategy - Shows which tools are available and how to use them to plan for, create and govern online content - The only book that gives practical advice on staffing and resource allocation for web editorial roles and responsibilities Summary Companies and agencies spend months and millions of dollars on how they'll deliver content online, yet allocate very few resources toward planning for, creating, and governing the content itself. The Content Strategy Handbook can help in delivering useful, usable content to online audiences, when and where they need it most. Focusing on the user experience as it relates to content strategy, this book defines content strategy, its business value, and why so many web projects implode in the content development phase. It provides simple ways to introduce content strategy into the user experience design process. Readers get solid, practical advice on staffing and resource allocation for content-related roles and responsibilities and learn about the easy-to-use tools that are necessary to plan for, create, and govern online content.

Friday, May 15, 2009

Togas Tulandi and Roger Gordon Gosden,”Preservation of Fertility

Togas Tulandi and Roger Gordon Gosden,”Preservation of Fertility “
Informa HealthCare | May 15, 2004 | ISBN: 1842142429 | 300 pages | PDF | 2.7 mb
In September 2004, a woman from Belgium gave birth to a child after receiving an ovarian-tissue transplant. This was a culmination of several efforts to preserve fertility in women who undergo treatment for cancer. Radiotherapy and chemotherapy are particularly toxic to eggs and sperm, and to the trauma of the diagnosis of cancer and its subsequent treatment is added the tragedy of subsequent infertility. For young women in whom ovarian damage is likely to result from treatment for cancer, there are various possibilities, including the freezing of eggs, the creation of embryos that can be subsequently frozen, the storage of ovarian tissue, and the transplantation of ovaries. All of these procedures are associated with considerable practical, scientific, ethical, and legal problems that involve a range of medical and health professionals as well as the patient. Tulandi and Gosden take on these issues in Preservation of Fertility, which is largely dedicated to the subject of the protection of male and female fertility in situations in which cancer needs to be treated rapidly.


Uploading

Depositfiles

Megaupload

Hazardous Chemicals: Control and Regulation in the European Market

Herbert F. Bender and Philipp Eisenbarth,”Hazardous Chemicals: Control and Regulation in the European Market”
Wiley-VCH | March 30, 2007 | ISBN: 3527315411 | 409 pages | PDF | 7.04 mb
This practice-oriented guide covers the handling and use of hazardous chemicals at the workplace, including labelling and storage, transportation, occupational safety and proper registration with the European authorities. Current European Union legislation and directives are cited throughout the text, making this a valuable reference for companies and institutions both inside and outside of the EU common market.


Uploading

Rapidshare

Principles of Biochemical Toxicology, Fourth Edition

Principles of Biochemical Toxicology

Principles of Biochemical Toxicology, Fourth Edition
Informa HealthCare | ISBN:0849373026 | 2008-11-18 | PDF | 520 pages | 8 MB | PDF | Rapidshare & Megaupload
This leading textbook in the field examines the mechanisms underlying toxicity, particularly the events at the molecular level and the factors that determine and affect toxicity. The new edition is updated to reflect the latest research into the biochemical basis of toxicology and the growing concerns over the adverse effects of drugs, environmental pollution, and occupational hazards. Principles of Biochemical Toxicology, Fourth Edition thoroughly explains dose-response relationships, disposition and metabolism, and toxic responses to foreign compounds, and presents detailed examples to make the mechanisms of toxicity more accessible to students encountering the subject for the first time. Comprehensive in scope with a clear and concise approach, the text includes summary sections, questions and model answers, and thoroughly revised artwork that serves as an essential aid to learning and teaching. New to the Fourth Edition:
reorganized sections that cover basic principles followed by sections on different types of toxicity extensive use of examples throughout and numerous explanatory diagrams new material on risk assessment, export systems, oxidative stress, Thalidomide, Tamoxifen and asbestos proliferators, domoic acid, bone marrow (benzene), heart (adriamycin), blood (primaquine), biomarkers, cytochrome P450 and other enzymes, receptor mediated effects, endocrine disruption, ethanol, botox, arsenic, and more questions with answers for each chapter for review and self-checking expanded and updated chapter bibliographiesd
Get Subscribe and have access to all VIP Stuff
...

Login/Register to Become VIP Member

Real Functions in One Variable

Real Functions in One Variable
Publisher: Leif Mejlbro | ISBN: 8776811174 | edition 2006 | PDF | 146 pages | 5,41 mb
Most students already have assigned textbooks when studying Calculus I, therefore this free book takes a different approach to Calculus. It focuses primarily on explaining the central theories and warns students of the areas where mistakes are traditionally made.

My Links

uploading.com

depositfiles.com

filefactory.com

Research Funding in Neuroscience: A Profile of the McKnight Endowment Fund

Research Funding in Neuroscience: A Profile of the McKnight Endowment Fund
Publisher: Academic Press | ISBN: 0123736455 | edition 2006 | PDF | 192 pages | 8,65 mb
The book is a history of the McKnight Endowment Fund for Neuroscience and an assessment of its effectiveness in advancing neuroscience. The book discusses the Fund’s early and steady commitment to basic science as well as it’s tradition of leveraging relatively modest dollars to make a big difference in careers and the field overall.

The fund exists strictly to give awards and create a community of peers through an annual conference dedicated to research. In near unison, scientists who have received awards say they were able to test a risky idea, get their career off the ground, or make a significant change in their career because of McKnight’s flexible dollars.

The book consists of three parts: (1) origins–including both the funder and the scientists who shaped the program; (2) a review of the science to show how McKnight awardees have advanced the field; and (3) 10 keys to success. We also have an interview with Julius Axelrod (one of the early advisors, done shortly before his death in 2004) and stories of how awardees used their McKnight grants, plus other information.

My Links

uploading.com

depositfiles.com

uploadbox.com

megaupload.com

A Theory of Distributed Objects

A Theory of Distributed Objects
Publisher: Springer | Pages: 300 | June 2005 | ISBN 3540208666 | PDF | 6 MB
Distributed and communicating objects are becoming ubiquitous. In global, Grid and Peer-to-Peer computing environments, extensive use is made of objects interacting through method calls. So far, no general formalism has been proposed for the foundation of such systems. Caromel and Henrio are the first to define a calculus for distributed objects interacting using asynchronous method calls with generalized futures, i.e., wait-by-necessity — a must in large-scale systems, providing both high structuring and low coupling, and thus scalability. The authors provide very generic results on expressiveness and determinism, and the potential of their approach is further demonstrated by its capacity to cope with advanced issues such as mobility, groups, and components. Researchers and graduate students will find here an extensive review of concurrent languages and calculi, with comprehensive figures and summaries. Developers of distributed systems can adopt the many implementation strategies that are presented and analyzed in detail. Preface by Luca Cardelli

Thanks to original uploader

DOWNLOAD

MIRROR 1

mirror 2

Contemporary Cultural Theory: An Introduction

Contemporary Cultural Theory: An Introduction
Publisher: UCL Press | ISBN: 1857281276 | edition 1994 | PDF | 208 pages | 1 mb
This and concise introduction to cultural theory aims to bring a sense of historical and theoretical scale to cultural studies in Britain. As a comprehensive and accessible guide to the often tricky manoeuverings of social and cultural theory in recent years, it should serve as a guide to students studying the many disciplines now informed by cultural theory. “Contemporary Cultural Theory” identifies six alternative paradigms in cultural studies - utilitarianism, culturalism, marxism, structuralism, feminism and postmodernism - and explores the socio-discursive contexts within which each of these have developed. Andrew Milner is the author of “John Milton and the English Revolution”, and co-editor of “Postmodern Conditions” and “Discourse and Difference”. This book is intended for undergraduate courses in cultural studies, sociology, media and communication and literary criticism.

uploading.com

depositfiles.com

uploadbox.com

megaupload.com

imon Adams, David Lambert, “Earth Science: An Illustrated Guide to Science (Science Visual Resources)”

Simon Adams, David Lambert, “Earth Science: An Illustrated Guide to Science (Science Visual Resources)”
Chelsea House Publications | 2006 | ISBN: 0816061645 | 208 pages | PDF | 22,6 MB
“Earth Science: An Illustrated Guide to Science” is one of eight volumes of “Facts On File’s” new “Science Visual Resources” set. Containing six sections, a comprehensive glossary, a Web site guide, and an index, Biology is an ideal learning tool for students and teachers of science. Full-colour diagrams, graphs, charts, and maps on every page illustrate the essential elements of the subject, while parallel text provides key definitions and step-by-step explanations. The six sections include: “Planet Earth” - considers Earth’s place in the Solar System and its relationship to the Sun, the Moon, and the environment of interplanetary space. Topics covered in this section include solar and lunar eclipses, tides, seasons, and Earth’s magnetic field. “Earth’s History” - examines the basic principles used by geologists to determine the age of rocks and the use of fossil evidence in determining the sequence of geological events. There is a comprehensive survey of the history of life on Earth and a general description of each of the geological eons. A sequence of pages traces the history of the North American continent through each geological period, showing the prevailing conditions and the kind of life forms that have flourished there. “Earth’s Rocks” - is concerned with the processes that create and modify Earth’s geology. The relative abundance of minerals on our planet; the formation of igneous, sedimentary, and metamorphic rocks; and the processes of plate tectonics are examined in this section. “Air and Oceans” - is an overview of the shallow but complex layer of gas and water that surrounds our planet and supports all animal and plant life. The types and causes of all significant weather phenomena are covered here, as well as the intimate connections between the oceans and the atmosphere. Heat transfer between air and oceans and the planet-wide systems of circulation driven by solar energy are also explained here. “Erosion and Weathering” - looks at the constant wearing down of the Earth’s rocks by the combined actions of the atmosphere and the oceans. Mechanical and chemical weathering, the formation and movement of soil, and the geological forms produced by the actions of rivers and glaciers are all featured in this section. Wind erosion and the formation and spread of desert landscapes are also covered. “Comparisons” - gives the relative scales of major planetary features, such as oceans, rivers, continents, and mountain ranges.

uploading.com

depositfiles.com

mirror

Tammy D. Allen, Lillian T. Eby - The Blackwell Handbook of Mentoring: A Multiple Perspectives Approach

Tammy D. Allen, Lillian T. Eby - The Blackwell Handbook of Mentoring: A Multiple Perspectives Approach
Wiley-Blackwell | 2007 | ISBN: 1405133732 | Pages: 520 | PDF | 5.79 MB
Cutting across the fields of psychology, management, education, counseling, social work, and sociology, The Blackwell Handbook of Mentoring reveals an innovative, multi-disciplinary approach to the practice and theory of mentoring.

* Provides a complete, multi-disciplinary look at the practice and theory of mentoring and demonstrates its advantages
* Brings together, for the first time, expert researchers from the three primary areas of mentoring: workplace, academy, and community
* Leading scholars provide critical analysis on important literature concerning theoretical approaches and methodological issues in the field
* Final section presents an integrated perspective on mentoring relationships and projects a future agenda for the field

HotFile

Uploading

RapidShare

James Waller - Becoming Evil: How Ordinary People Commit Genocide and Mass Killing

James Waller - Becoming Evil: How Ordinary People Commit Genocide and Mass Killing
Oxford University Press | 2002 | ISBN: 0195148681 | Pages: 336 | PDF | 8.66 MB
Political or social groups wanting to commit mass murder on the basis of racial, ethnic or religious differences are never hindered by a lack of willing executioners. In Becoming Evil, social psychologist James Waller uncovers the internal and external factors that can lead ordinary people to commit extraordinary acts of evil.
Waller debunks the common explanations for genocide- group think, psychopathology, unique cultures- and offers a more sophisticated and comprehensive psychological view of how anyone can potentially participate in heinous crimes against humanity. He outlines the evolutionary forces that shape human nature, the individual dispositions that are more likely to engage in acts of evil, and the context of cruelty in which these extraordinary acts can emerge. Illustrative eyewitness accounts are presented at the end of each chapter. An important new look at how evil develops, Becoming Evil will help us understand such tragedies as the Holocaust and recent terrorist events. Waller argues that by becoming more aware of the things that lead to extraordinary evil, we will be less likely to be surprised by it and less likely to be unwitting accomplices through our passivity.

From the Turks’ massacre of Armenians in 1915 through the Serbians’ slaughter of Bosnian and Albanian Muslims during the 1990s, the 20th century was an era of mass killing. Social psychologist Waller (Face to Face: The Changing State of Racism Across America) develops a four-layered theory of how everyday citizens became involved. First considering factors in evolutionary psychology such as humans’ instinctive xenophobia and desire for social dominance Waller examines psychosocial influences on the killers, from people’s willingness to obey authority even when causing others physical pain (the famous Milgram experiments of the early 1960s play a role here) to elements of rational self-interest (subscribing to, or at least not dissenting from, the norms of a military or other group). Waller’s third element focuses on how some groups can create a “culture of cruelty,” in which initially reluctant individuals ultimately commit heinous acts. In his last and most interesting section, Waller shows how a perpetrator learns to see his victim as a less-than-human “other,” so that, in some cases, the victim is even blamed for his or her death. There is no new research here, and Waller’s theory is quite complex. But he clearly and effectively synthesizes a wide range of studies to develop an original and persuasive model of the processes by which people can become evil.

HotFile

Uploading

RapidShare

DNA Topology

DNA Topology
Publisher: Oxford University Press | ISBN: 019856709X | edition 2005 | PDF | 216 pages | 2,23 mb
‘DNA’ has become a familiar part of everyday life, with the excitement surrounding the sequencing of the human genome and forensic advances through DNA fingerprinting. A key aspect of DNA is its ability to form a variety of structures. This book explains the origins and importance of such structures in an easily accessible way that will be of great value to students and researchers alike.

My Links

uploading.com

filefactory.com

“The Cervical and Thoracic Spine - Mechanical Diagnosis & Therapy” by Robin A McKenzie, 1st Edition

“The Cervical and Thoracic Spine - Mechanical Diagnosis & Therapy” by Robin A McKenzie, 1st Edition

Robin A McKenzie | ISBN: 095977467X | 1st Edition | PDF | 334 pages | 19 MB | Rapidshare

Robin McKenzie has devoted over 30 years developing a system of examination and treatment of mechanical neck and back pain that is recognized internationally and taught to thousands of clinicians worldwide. Robin McKenzie is an Honorary Life Member of the APTA.

Download Link:

Werner Platzer, “Coem”lor Atlas and Textbook of Human Anatomy (vol.1) Locomotor Syst

Werner Platzer, “Coem”lor Atlas and Textbook of Human Anatomy (vol.1) Locomotor Syst
Thieme | ISBN: 3135333035 | 1986 | DJVU | 436 Pages | 9 Mb
A well-balanced combination of a clinical text, reference material and multicolor illustrations make this three-volume set eminently useful for students and practitioners alike. Skillful visual approach to anatomy, which is a must in every physician’s education, is happily wedded to a lucid text juxtaposed page by page with magnificent multicolor illustrations in such a manner that the concise description of the functional aspects of anatomy provides a useful guide for the perceptive student.Aspects of physiology and biochemistry are included to the extent they have a bearing on the material presented.

LINKS

uploading

megauploa

Dinesh Nagi “Exercise and Sport in Diabetes (Practical Diabetes)

Dinesh Nagi “Exercise and Sport in Diabetes (Practical Diabetes)”
Wiley | 2006-02-10 | ISBN: 047002206X | 236 pages | PDF | 2,8 MB

The new edition of this acclaimed title provides a practical guide to the risks and benefits of undertaking sport and general exercise for patients with diabetes.

Fully updated to reflect the progress and understanding in the field, the book features new chapters and material on insulin pump therapy and exercise, physical activity and prevention of type 2 diabetes, dietary advice for exercise and sport in type 1diabetes, and fluid and electrolyte replacement.

To start download click HERE:

Get Subscribe and have access to all VIP Stuff
...

Login/Register to Become VIP Member

Probability and Computing: Randomized Algorithms and Probabilistic Analysis

Probability and Computing: Randomized Algorithms and Probabilistic Analysis
Publisher: Cambridge University | Pages: 368 | 2005-01-31 | ISBN 0521835402 | DJVU | 2 MB
Assuming only an elementary background in discrete mathematics, this textbook is an excellent introduction to the probabilistic techniques and paradigms used in the development of probabilistic algorithms and analyses. It includes random sampling, expectations, Markov’s and Chevyshev’s inequalities, Chernoff bounds, balls and bins models, the probabilistic method, Markov chains, MCMC, martingales, entropy, and other topics. The book is designed to accompany a one- or two-semester course for graduate students in computer science and applied mathematics.

Get Subscribe and have access to all VIP Stuff
...

Login/Register to Become VIP Member

Yuri Balashov, “Philosophy of Science: Contemporary Readings”

Yuri Balashov, “Philosophy of Science: Contemporary Readings”
Routledge | 2002 | ISBN: 0415257816 | 456 pages | PDF | 22,4 MB
Philosophy of Science: Contemporary Readings is a comprehensive anthology that draws together leading philosophers writing on the major themes in the philosophy of science. Sections are: Science and Philosophy; Explanation; Causation and Laws; Scientific Theories and Conceptual Change; Scientific Realism; Testing and Confirmation of Theories; and Science in Context. Each section is prefaced by an introductory essay by the editors.
Review
A remarkable collection with classic and modern selections.
–Network

The essays in this collection, many of them modern classics, illuminate some of the most central and exciting issues in the subject. The editors have provided each cluster of readings with a helpful introduction, study questions and suggestions for further reading, making this volume an excellent way into the philosophy of science.
–Peter Lipton, University of Cambridge

The selections are appropriate both for the topics to be covered and for the intended audience. The entries are good, solid, important pieces that have directed the philosophy of science. The editor’s introductions are clear and helpful. This makes a nice companion to IPhilosophy of Science: A Contemporary Introduction .
–Peter Kosso, North Arizona University

uploading.com

depositfiles.com

mirror

Yuri Balashov, “Philosophy of Science: Contemporary Readings

Yuri Balashov, “Philosophy of Science: Contemporary Readings”
Routledge | 2002 | ISBN: 0415257816 | 456 pages | PDF | 22,4 MB
Philosophy of Science: Contemporary Readings is a comprehensive anthology that draws together leading philosophers writing on the major themes in the philosophy of science. Sections are: Science and Philosophy; Explanation; Causation and Laws; Scientific Theories and Conceptual Change; Scientific Realism; Testing and Confirmation of Theories; and Science in Context. Each section is prefaced by an introductory essay by the editors.
Review
A remarkable collection with classic and modern selections.
–Network

The essays in this collection, many of them modern classics, illuminate some of the most central and exciting issues in the subject. The editors have provided each cluster of readings with a helpful introduction, study questions and suggestions for further reading, making this volume an excellent way into the philosophy of science.
–Peter Lipton, University of Cambridge

The selections are appropriate both for the topics to be covered and for the intended audience. The entries are good, solid, important pieces that have directed the philosophy of science. The editor’s introductions are clear and helpful. This makes a nice companion to IPhilosophy of Science: A Contemporary Introduction .
–Peter Kosso, North Arizona University

uploading.com

depositfiles.com

mirror

Ludwig Fahrmeir, Rita Künstler, Iris Pigeot, Gerhard Tutz, “Statistik”

Ludwig Fahrmeir, Rita Künstler, Iris Pigeot, Gerhard Tutz, “Statistik”
Springer | 2004 | ISBN: 3540212329 | 610 pages | PDF | 26,3 MB
Das Buch bietet eine integrierte Darstellung der deskriptiven Statistik, moderner Methoden der explorativen Datenanalyse und der induktiven Statistik, einschlie?lich der Regressions- und Varianzanalyse. Die Darstellung ist auf inhaltliche Motivation, Interpretation und Verst?ndnis der Methoden ausgerichtet. Zahlreiche Beispiele mit realen Daten und Graphiken veranschaulichen den Text. Texthervorhebungen zentraler Aspekte und Stichw?rter am Rand erh?hen die Lesbarkeit und ?bersichtlichkeit.

uploading.com

depositfiles.com

mirror

Proteases and Cancer: Methods and Protocols (Methods in Molecular Biology)

Proteases and Cancer

Proteases and Cancer: Methods and Protocols (Methods in Molecular Biology)
Humana Press | ISBN:1603270027 | 2009-03-13 | PDF | 222 pages | 3 MB | PDF | Rapidshare & Megaupload
Proteases decisively contribute to cancer development and promotion by regulating the activities of growth factors/cytokines and signaling receptors, as well as the composition of the extracellular matrix, thereby suppressing cell death pathways and activating cell survival pathways. In Proteases and Cancer: Methods and Protocols, expert researchers bring together a wide range of current, complimentary techniques that have been developed for the specific detection and analysis of proteases and their activities in cancer biology. The volume covers vital topics including the application of proteomics technologies for the detection of protease expression in tumors, imaging proteases by activity profiling, proteomics technologies for the identification of biological substrates, detection of cell surface proteolysis, imaging of protease activity, the use of transgenic mice to determine protease function in tumor initiation and progression, and the development of anti-protease therapies for cancer. Written in the highly successful Methods in Molecular Biology™ series format, chapters include introductions to their respective topics, lists of the necessary materials and reagents, step-by-step, readily reproducible laboratory protocols, and notes on troubleshooting and avoiding known pitfalls.

Authoritative and easy to use, Proteases and Cancer: Methods and Protocols is an ideal guide for scientists who wish to pursue the study of this important branch of cancer research and the development of unique innovative technologies to aid in that study.

Rapidshare

Megaupload

http://allfreedownloadlinks.com/free-ebooks-downloads/science-ebooks/thinking-about-life-the-history-and-philosophy-of-biology-and-other-sciences/

Thinking about Life: The history and philosophy of biology and other sciences By Paul S. Agutter, Denys N. Wheatley
Publisher: Springer 2008-12-12 | 274 Pages | ISBN: 140208865; 1402088655 | PDF | 3.45 MB
This is a “popular science” book, designed as a sequel to our About Life, though readers need not be familiar with the earlier volume. Indeed, no specialist knowledge is required. The text briefly surveys the nature of science and its emergence in post-Renaissance Europe, and investigates the similarities and differences between biology and other sciences. Major topics in the philosophy of biology (e.g. evolutionary theory, vitalism/mechanism, reductionism/holism, spontaneous generation) are considered in a little more detail.

DoWnLoAd FiLe

mirror

mirror

Methods in Molecular Biology, vol.546 - Zebrafish: Methods and Protocols

Methods in Molecular Biology, vol.546 - Zebrafish: Methods and Protocols
Publisher: Humana Press | Language: English | ISBN:1603279768 | 315 pages | Data: 2009 | PDF | 4 Mb

Description: In the last 20 years, research activity using the zebrafish Danio rerio has increased dramatically, due in part to the ease of breeding and raising them, their genetic tractability, embryonic accessibility, and their imaging potential. In Zebrafish: Methods and Protocols, expert researchers provide a collection of experimental techniques for the genetic modification, manipulation, and in vivo live imaging of zebrafish. This volume collects sophisticated and practical techniques, including several not yet widely known, from laboratories around the world. Written in the highly successful Methods in Molecular Biology™ series format, chapters include brief introductions to their respective topics, lists of the necessary materials and reagents, step-by-step, readily reproducible laboratory protocols, and notes on troubleshooting and avoiding known pitfalls.

Authoritative and accessible, Zebrafish: Methods and Protocols seeks to aid and inspire scientists utilizing this versatile animal model in their research.

Download:
Ziddu
or
MegaUpload

The Theory and Applications of Harmonic Integrals: William Vallance Douglas Hodge

0521358817

The Theory and Applications of Harmonic Integrals: William Vallance Douglas Hodge
Cambridge University Press | ISBN: 0521358817 | 1941 | djvu (ocr) | pages | 5.98 Mb

From the book review by D.J. Struik Bull. Amer. Math. Soc. Volume 50, Number 1 (1944), 43-45.

This is one of those books which everyone who specializes in a particular branch of group theory, of the theory of algebraic surfaces, of the theory of Riemann surfaces, of topology or of the tensor analysis should consult. It shows how all these different fields are connected, and not connected in some superficial way or in the form of an analogy, but in an essential manner, so that interesting and profound theorems in one field cannot be understood without a thorough knowledge of other fields. In reading this book one is reminded of books like Klein’s “Ikosaeder,” which is also a blend of several important fields. The task of the reviewer of such a book is hard, because he has seldom the enviable mastery of the different branches of mathematics which the author possesses. At the same time he must praise the author for the beautiful exposition of so many and different fields. There are chapters on Riemannian manifolds, on integrals and their periods, on harmonic integrals, on their applications to algebraic varieties and on their applications to the theory of continuous groups. The first chapter, on Riemannian manifolds, is divided into a part on tensor calculus and into a part on the topology of such manifolds, All these topics are prepared in a very careful way, with precautions which will satisfy strict demands of rigor. There are references at the end of each chapter. To indicate the contents of this book by simply copying the chapter headings is to do a great injustice to the author and his work

Uploading.com
Rapidshare.com

Ferid Murad, J. Thomas August, M. W. Anders “Cyclic Gmp: Synthesis, Metabolism, and Function “

Ferid Murad, J. Thomas August, M. W. Anders “Cyclic Gmp: Synthesis, Metabolism, and Function “
Academic Press | 1994-01-15 | ISBN: 0120329263 | 335 pages | PDF | 17.1 MB
This volume is dedicated to the topic of cyclic GMP. Chapters include discussions on the guanylyl cyclase and phosphodiesterase isoenzyme families for cyclic GMP synthesis and hydrolysis, cyclic GMP-dependent protein kinases, and various hormones and ligands that regulate cyclic GMP formation and/or metabolism. Several chapters also deal with some of the effects of cyclic GMP on other second messengers such as calcium ion transport and smooth muscle relaxation. Some clinical studies with cyclic GMP and atrial natriuretic peptide are also discussed. The last chapter raises many important questions in the field that remain to be addressed.

Key Features
* Isoforms of guanylyl cyclase and phosphodiesterase isoenzyme families for cyclic GMP synthesis and hydrolysis
* Cyclic GMP-dependent protein kinase
* Hormones and ligands that regulate GMP formation and/or metabolism
* Effects of cyclic GMP on other second messengers and some functions such as smooth muscle relaxation and ion transport
* Clinical studies with cyclic GMP and atrial natriuretic peptide
* Important questions and experiments for the future

To start download click HERE:

Download

mirror

Mild Cognitive Impairment: Aging to Alzheimer’s Disease, 2003

Mild Cognitive Impairment: Aging to Alzheimer’s Disease, 2003
Publisher: Oxford University Press, USA | ISBN: 0195123425 | edition 2003-01-10 | PDF | 269 pages | 3.86 mb
What are the boundary zones between normal aging and Alzheimer’s disease (AD)? Are many elderly people whom we regard as normal actually in the early stages of AD? Alzheimer’s disease does not develop overnight; the early phases may last for years or even decades. Recently, clinical investigators have identified a transitional condition between normal aging and and very early Alzheimer’s disease that they have called mild cognitive impairment, or MCI. This term typically refers to memory impairment beyond what one would expect in individuals of a given age whose other abilities to function in daily life are well preserved. Persons who meet the criteria for mild cognitive impairment have an increased risk of progressing to Alzheimer’s disease in the near future. Though many questions about this condition and its underlying neuropathology remain open, full clinical trials are currently underway worldwide aimed at preventing the progression from MCI to Alzheimer’s disease. This book addresses the spectrum of issues involved in mild cognitive impairment, and includes chapters on clinical studies, neuropsychology, neuroimaging, neuropathology, biological markers, diagnostic approaches, and treatment. It is intended for clinicians, researchers, and students interested in aging and cognition, among them neurologists, psychiatrists, geriatricians, clinical psychologists, and neuropsychologists.

My Links

uploading.com

depositfiles.com

rapidshare.com

  © Blogger templates The Professional Template by Ourblogtemplates.com 2008

Back to TOP