Sunday, September 30, 2012

The Folklore of Discworld by Terry Pratchett

Posted by Unknown On 10:28 PM | 1 comment

Book Detail 
Hardcover: 368 pages
Publisher: Doubleday UK; First Edition edition (October 7, 2008)
Language: English
ISBN-10: 0385611005
ISBN-13: 978-0385611008
File Size : 4.2 Mb | File Format : PDF + Epub + Mobi

Book Description 

Terry Pratchett joins up with a leading folklorist to reveal the legends, myths and customs of Discworld, together with helpful hints from Planet Earth.

Most of us grew up having always known when to touch wood or cross our fingers, and what happens when a princess kisses a frog or a boy pulls a sword from a stone, yet sadly some of these things are beginning to be forgotten. Legends, myths, and fairy tales: our world is made up of the stories we told ourselves about where we came from and how we got here. It is the same on Discworld, except that beings, which on Earth are creatures of the imagination — like vampires, trolls, witches and, possibly, gods — are real, alive and, in some cases kicking, on the Disc.

In The Folklore of Discworld, Terry Pratchett teams up with leading British folklorist Jacqueline Simpson to take an irreverent yet illuminating look at the living myths and folklore that are reflected, celebrated and affectionately libelled in the uniquely imaginative universe of Discworld.

Review

“One of the most interesting and critically underrated novelists we have … The Folklore of Discworld — co-authored with the eminent folklorist Jacqueline Simpson — emphasizes his irreverence and drollery.”
— The Times

“Pratchett is, like Mark Twain or Jonathan Swift, not just a great writer but also an original thinker … funny, exciting, lighthearted and, like all the best comedy, very serious.”
— Guardian

About the Author

Dr. Jacqueline Simpson’s publications include British Dragons; Folklore of Sussex; Scandinavian Folktales and (with Jennifer Westwood), The Lore of the Land: A Guide to England’s Legends.

Terry Pratchett is one of the most popular authors writing today. He is the acclaimed creator of the Discworld series, the first title in which, The Colour of Magic, was published in 1983, and the latest is Making Money. His books have been translated into 37 languages. Terry Pratchett was knighted for services to literature in 2009.

Download Ebook : The Folklore of Discworld by Terry Pratchett

The Folklore of Discworld by Terry Pratchett
Mirror :
The Folklore of Discworld by Terry Pratchett


Book Detail 
Paperback: 512 pages
Publisher: Saunders; 2 edition (August 1, 2006)
Language: English
ISBN-10: 0721604277
ISBN-13: 978-0721604275
File Size : 109 Mb | File Format : PDF
Book Description 

Now completely updated with the latest information on both adult and pediatric patients, this comprehensive book provides a link between the pathophysiology of neurologic deficits and possible rehabilitation interventions for improving movement outcomes. It introduces the structure and function of the nervous system and describes normal motor development, motor control and motor learning, pathophysiology of the nervous system and common treatment techniques used in physical therapy practice. This edition also features updated terminology from the APTA's Guide to Physical Therapist Practice, as well as new chapters on proprioceptive neuromuscular facilitation (PNF) and other neurological conditions seen in the adult. Helpful learning aids and abundant illustrations highlight key concepts and help readers quickly master the material.
  • Helpful learning aids - such as objectives, tables, illustrated intervention boxes, and review questions - reinforce important facts and concepts.
  • Review questions at the end of each chapter allow readers to test their understanding of the material.
  • 700 illustrations clearly depict procedures discussed in the text and clarify descriptions of anatomy, physiology, evaluation, pathology, and treatment.
  • Background information is provided for interventions that can be used in the rehabilitation of adults and children, promoting a complete understanding of techniques.
  • Careful documentation uses current outcomes-based research.
  • Case histories include subjective and objective observation, assessment, planning, and critical decision-making components.
  • Current language of the APTA's Guide to Physical Therapist Practice, 2nd Edition is used throughout, aligning all information with best practices put forth by the APTA.
  • A new chapter on proprioceptive neuromuscular facilitation (PNF) describes how these techniques can be used to improve performance of functional tasks by increasing strength, flexibility, and range of motion.
About the Author

Suzanne "Tink" Martin, MACT, PT, Professor, Department of Physical Therapy, University of Evansville, Evansville, IN; and Mary Kessler, MHS, PT, Associate Professor, Department of Physical Therapy, University of Evansville, Evansville, IN

Table of Contents 

Section 1: FOUNDATIONS

Chapter 01. The Role of the Physical Therapist Assistant in Neurologic Rehabilitation
Chapter 02.  Neuroanatomy
Chapter 03. Motor Control and Motor Learning
Chapter 04. Motor Development
Chapter 05. Positioning and Handling To Foster Motor Function

Section 2: CHILDREN

Chapter 06. Cerebral Palsy
Chapter 07. Myelomeningocele
Chapter 08. Genetic Disorders

Sections - 3 ADULTS

Chapter 09. Proprioceptive Neuromuscular Facilitation
Chapter 10. Cerebrovascular Accidents
Chapter Chapter 11. Traumatic Brain Injuries
Chapter 12. Spinal Cord Injuries
Chapter 13. Other Neurologic Disorders

Answers to Review Questions
Index

Download Ebook : Neurologic Interventions for Physical Therapy, Second Edition

Neurologic Interventions for Physical Therapy, Second Edition
Mirror :
Neurologic Interventions for Physical Therapy, Second Edition
Mirror :
Neurologic Interventions for Physical Therapy, Second Edition

Sherris Medical Microbiology, 5th Edition

Posted by Unknown On 8:46 PM | 1 comment

Book Detail 
Hardcover: 1040 pages
Publisher: McGraw-Hill Medical; 5 edition (January 11, 2010)
Language: English
ISBN-10: 0071604022
ISBN-13: 978-0071604024
File Size : 66 Mb | File Format : chm
Book Description 

4 STAR DOODY'S REVIEW!
"This will continue to be a popular textbook, primarily due to the well-designed figures and pictures in all chapters. It is one of the better textbooks I have seen for teaching the basics of medical microbiology."--Doody's Review Service

For more than a quarter-of-a-century Sherris has been unmatched in its ability to help you understand the nature of microorganisms and their role in the maintenance of health or causation of disease. Through a dynamic, engaging approach, this classic text gives you a solid grasp of the significance of etiologic agents, the pathogenic processes, epidemiology, and the basis of therapy for infectious diseases.

The fifth edition has been completely revised to reflect this rapidly-moving field’s latest developments and includes a host of learning aids including clinical cases, USMLE-type questions, marginal notes, and extensive new full-color art.

Features
  • 66 chapters that simply and clearly describe the strains of viruses, bacteria, fungi, and parasites that can bring about infectious diseases
  • Core sections on viral, bacterial, fungal, and parasitic diseases open with new chapters detailing basic biology, pathogenesis, and antimicrobial agents and feature a consistent presentation covering Organism (structure, replication, genetics, etc.), Disease (epidemiology, pathogenesis, immunity), and Clinical Aspects (manifestations, diagnosis, treatment, prevention)
  • Explanations of host-parasite relationship, dynamics of infection, and host response
  • USMLE-style questions and a clinical case conclude each chapter on the major viral, bacterial, fungal, and parasitic diseases
  • All tables, photographs, and illustrations are now in full color
  • Clinical Capsules cover the essence of the disease(s) caused by major pathogens
  • Marginal Notes highlight key points within a paragraph to facilitate review
Table of Contents 

Part I. The Nature of Infection
Part Editors: Kenneth J. Ryan & C. George Ray

Chapter 01 Infection
Chapter 02 Immune Response to Infection
Chapter 03 Sterilization, Disinfection & Infection Control
Chapter 04 Principles of Laboratory Diagnosis of Infectious Diseases
Chapter 05 Emergence & Global Spread of Infection

Part II. Pathogenic Viruses
Part Editors: Nafees Ahmad, C. George Ray & W. Lawrence Drew

Chapter 06 The Nature of Viruses
Chapter 07 Pathogenesis of Viral Infection
Chapter 08 Antiviral Antimicrobics & Resistance
Chapter 09 Influenza, Parainfluenza, Respiratory Syncytial Virus, Adenovirus & Other Respiratory Viruses
Chapter 10 Mumps Virus, Measles, Rubella & Other Childhood Exanthems
Chapter 11 Poxviruses
Chapter 12 Enteroviruses
Chapter 13 Hepatitis Viruses
Chapter 14 Herpesviruses
Chapter 15 Viruses of Diarrhea
Chapter 16 Arthropod-Borne & Other Zoonotic Viruses
Chapter 17 Rabies
Chapter 18 Retroviruses: Human T-Lymphotropic Virus, Human Immunodeficiency Virus & Acquired Immunodeficiency Syndrome
Chapter 19 Papilloma & Polyoma Viruses
Chapter 20 Persistent Viral Infections of the Central Nervous System

Part III. Pathogenic Bacteria
Part Editors: Kenneth J. Ryan & W. Lawrence Drew

Chapter 21 The Nature of Bacteria
Chapter 22 Pathogenesis of Bacterial Infections
Chapter 23 Antibacterial Agents & Resistance
Chapter 24 Staphylococci
Chapter 25 Streptococci & Enterococci
Chapter 26 Corynebacterium, Listeria & Bacillus
Chapter 27 Mycobacteria
Chapter 28 Actinomyces & Nocardia
Chapter 29 Clostridium, Peptostreptococcus, Bacteroides & Other Anaerobes
Chapter 30 Neisseria
Chapter 31 Haemophilus & Bordetella
Chapter 32 Vibrio, Campylobacter & Helicobacter
Chapter 33 Enterobacteriaceae
Chapter 34 Legionella
Chapter 35 Pseudomonas & Other Opportunistic Gram-negative Bacilli
Chapter 36 Plague & Other Bacterial Zoonotic Diseases
Chapter 37 Spirochetes
Chapter 38 Mycoplasma & Ureaplasma
Chapter 39 Chlamydia
Chapter 40 Rickettsia, Ehrlichia, Coxiella & Bartonella

Part IV. Pathogenic Fungi
Part Editor: Kenneth J. Ryan

Chapter 41 The Nature of Fungi
Chapter 42 Pathogenesis of Fungal Infection
Chapter 43 Antifungal Agents & Resistance
Chapter 44 Dermatophytes, Sporothrix & Other Superficial & Subcutaneous Fungi
Chapter 45 Candida, Aspergillus, Pneumocystis & Other Opportunistic Fungi
Chapter 46 Cryptococcus, Histoplasma, Coccidioides & Other Systemic Fungal Pathogens

Part V. Pathogenic Parasites
Part Editors: C. George Ray & James J. Plorde

Chapter 47 The Nature of Parasites
Chapter 48 General Principles of Pathogenesis, Immunology & Diagnosis of Parasitic Infection
Chapter 49 Antiparasitic Antimicrobics & Resistance
Chapter 50 Sporozoa
Chapter 51 Rhizopods
Chapter 52 Flagellates
Chapter 53 Intestinal Nematodes
Chapter 54 Tissue Nematodes
Chapter 55 Cestodes
Chapter 56 Trematodes

Part VI. Clinical Aspects of Infection
Part Editors: C. George Ray, Kenneth J. Ryan & W. Lawrence Drew

Chapter 57 Skin & Wound Infections
Chapter 58 Bone & Joint Infections
Chapter 59 Eye, Ear & Sinus Infections
Chapter 60 Dental & Periodontal Infections
Chapter 61 Respiratory Tract Infections
Chapter 62 Enteric Infections & Food Poisoning
Chapter 63 Urinary Tract Infections
Chapter 64 Genital Infections
Chapter 65 Central Nervous System Infections
Chapter 66 Intravascular Infections, Bacteremia & Endotoxemia

Glossary

Download Ebook : Sherris Medical Microbiology, 5th Edition

Sherris Medical Microbiology, 5th Edition
Mirror :
Sherris Medical Microbiology, 5th Edition
Mirror :
Sherris Medical Microbiology, 5th Edition

Book Detail 
Hardcover: 882 pages
Publisher: Charles C Thomas Pub Ltd; 1 edition (December 16, 2011)
Language: English
ISBN-10: 039808646X
ISBN-13: 978-0398086466
File Size : 12 Mb | File Format : PDF
No Description

Table of Contents 

PART 1: THE PHYSICS OF RADIOGRAPHY

Chapter 01. An Introduction to Radiographic Science
Chapter 02. Basic Physics for Radiography
Chapter 03. Unit Conversions and Help with Math
Chapter 04. The Atom
Chapter 05. Electromagnetic Waves
Chapter 06. Magnetism and Electrostatics
Chapter 07. Electrodynamics
Chapter 08. X-Ray Machine Circuits and Generators
Chapter 09. The X-Ray Tube
Chapter 10. X-Ray Production

PART 2: PRODUCTION OF THE RADIOGRAPHIC IMAGE

Chapter 11. Creation of the Radiographic Image
Chapter 12. Production of Subject Contrast
Chapter 13. Qualities of the Radiographic Image
Chapter 14. Milliampere-Seconds (mAs)
Chapter 15. Kilovoltage-Peak (kVp)
Chapter 16. Generators and Filtration
Chapter 17. Field Size Limitation
Chapter 18. Patient Condition, Pathology, and Contrast Agents
Chapter 19. Scattered Radiation and Grids
Chapter 20. The Anode Bevel and Focal Spot
Chapter 21. Source-to-Image Receptor Distance (SID)
Chapter 22. OID and Distance Ratios
Chapter 23. Alignment and Motion
Chapter 24. Analyzing the Radiographic Image
Chapter 25. Simplifying and Standardizing Technique
Chapter 26. Using Automatic Exposure Controls (AEC)

PART 3: DIGITAL RADIOGRAPHY

Chapter 27. Computer Basics
Chapter 28. Creating the Digital Image
Chapter 29. Digital Image Processing
Chapter 30. Postprocessing Operations in Practice
Chapter 31. Capturing the Digital Image: DR and CR
Chapter 32. Computed Radiography (CR) Applications
Chapter 33. Applying Radiographic Technique to Digital Imaging
Chapter 34. Display Systems and Electronic Images

PART 4: SPECIAL IMAGING METHODS

Chapter 35. Mobile Radiography and Tomography
Chapter 36. Digital Fluoroscopy
Chapter 37. Quality Control

PART 5: RADIATION BIOLOGY AND PROTECTION

Chapter 38. Radiation Perspectives
Chapter 39. Radiation Units and Measurement
Chapter 40. Radiation Biology: Cellular Effects
Chapter 41. Radiation Biology: Organism Effects
Chapter 42. Radiation Protection: Procedures and Policies
Index

Download Ebook : Radiography in the Digital Age: Physics - Exposure - Radiation Biology

Mirror : 
Mirror : 

Book Detail 
Hardcover: 800 pages
Publisher: Pearson IT Certification; 2 edition (December 28, 2011)
Language: English
ISBN-10: 0789748274
ISBN-13: 978-0789748270
File Size : 27 Mb | File Format : PDF
Book Description 

Learn, prepare, and practice for CompTIA Security+ SY0-301exam success with this CompTIA Authorized Cert Guide, Deluxe Edition from Pearson IT Certification, a leader in IT Certification learning and a CompTIA Authorized Platinum Partner. DVD features three complete practice exams, complete video solutions to the 25 hands-on labs, plus 25 interactive flash-based learning activities that include drag-n-drop and matching to reinforce the learning.
  • Master CompTIA’s Security+ SY0-301 exam topics
  • Assess your knowledge with chapter-ending quizzes
  • Review key concepts with exam preparation tasks
  • Practice with realistic exam questions on the DVD
  • Includes complete video solutions to the 25 hands-on labs
  • Plus 25 interactive learning activities on key exam topics
CompTIA Security+ SY0-301 Authorized Cert Guide, Deluxe Edition includes video solutions to the hands-on labs, practice tests, and interactive activities that let the reader learn by doing. Best-selling author and expert instructor David Prowse shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics.

The book presents you with an organized test preparation routine through the use of proven series elements and techniques. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly. Review questions help you assess your knowledge, and a final preparation chapter guides you through tools and resources to help you craft your approach to passing the exam.

The companion Deluxe Edition DVD contains the powerful Pearson IT Certification Practice Test engine, with three complete practice exams and hundreds of exam-realistic questions. The assessment engine offers you a wealth of customization options and reporting features, laying out a complete assessment of your knowledge to help you focus your study where it is needed most. The Deluxe Edition DVD also includes complete video solutions to the 25 hands-on labs in the book and 25 interactive learning activities on key exam topics to reinforce the learning by doing. Learning activities such as test password strength, match the type of Malware with its definition, find the security issues in the network map, and disallow a user access to the network on Saturday and Sunday.

Interactive Learning Activities:

2.1 Filtering Emails
2.2 Malware Types
2.3 Securing the BIOS
3.1 Stopping Services in the Command Prompt
3.2 Patch Management
5.1 Port Numbers, Part 1
5.2 Port Numbers, Part 2
5.3 Port Numbers, Part 3
5.4 Network Attacks, Part 1
5.5 Network Attacks, Part 2
5.6 Network Attacks, Part 3
5.7 Network Attacks, Part 4
6.1 Network Security
7.1 Password Strength
8.1 802.1X Components
8.2 Authentication Types
9.1 Access Control Models
9.2 Configuring Logon Hours
10.1 Risk Assessment, Part 1
10.2 Risk Assessment, Part 2
10.3 Vulnerability Management Process
11.1 Packet Analysis
12.1 Symmetric and Asymmetric Algorithms
14.1 RAID Levls
15.1 Social Engineering Types

Hands-On Labs:

2-1 Using Free Malware Scanning Programs
2-2 How to Secure the BIOS
3-1 Discerning & Updating Service Pack Level
3-2 Creating a Virtual Machine
3-3 Securing a Virtual Machine
4-1 Securing the Browser
4-2 Disabling Applications
5-1 Port Scanning Basics
6-1 Packet Filtering and NAT Firewalls
6-2 Configuring Inbound Filter on a Firewall
6-3 Enabling MAC Filtering
7-1 Securing a Wireless Device: 8 Steps
7-2 Wardriving and the Cure
8-1 Enabling 802.1X on a Network Adapter
8-2 Setting Up a VPN
9-1 Password Policies and User Accounts
9-2 Configuring User and Group Permissions
10-1 Mapping and Scanning the Network
10-2 Password Cracking and Defense
11-1 Using Protocol Analyzers
12-1 Disabling LM Hash in Windows Server 2003
13-1 A Basic Example of PKI
13-2 Making an SSH Connection
14-1 Configuring RAID 1 and 5
16-1 How to Approach Exam Questions
Well-regarded for its level of detail, assessment features, and challenging review questions and exercises, this CompTIA  authorized study guide helps you master the concepts and techniques that will enable you to succeed on the exam the first time.

The CompTIA authorized study guide helps you master all the topics on the Security+ exam, including
  • Core computer system security
  • OS hardening and virtualization
  • Application security
  • Network design elements and threats
  • Perimeter security
  • Network media and devices security
  • Physical security and authentication models
  • Access control
  • Vulnerability and risk assessment
  • Monitoring and auditing
  • Cryptography, including PKI
  • Redundancy and disaster recovery
  • Policies and procedures
Companion Deluxe Edition DVD

The Deluxe Edition DVD contains three free, complete practice exams, video solutions to the 25 hands-on labs plus 25 interactive flash-based learning activities that include drag-n-drop and matching to reinforce the learning. Includes Exclusive Offer for 70% Off Premium Edition eBook and Practice Test.

Pearson IT Certification Practice Test minimum system requirements:
Windows XP (SP3), Windows Vista (SP2), or Windows 7; Microsoft .NET Framework 4.0 Client; Pentium class 1GHz processor (or equivalent); 512 MB RAM; 650 MB hard disk space plus 50 MB for each downloaded practice exam.

Download Ebook : CompTIA Security+ SY0-301 Authorized Cert Guide, 2nd Edition

CompTIA Security+ SY0-301 Authorized Cert Guide, 2nd Edition
Mirror :
CompTIA Security+ SY0-301 Authorized Cert Guide, 2nd Edition
Mirror :
CompTIA Security+ SY0-301 Authorized Cert Guide, 2nd Edition

End-to-End Network Security: Defense-in-Depth

Posted by Unknown On 3:29 AM | 1 comment

Book Detail 
Paperback: 480 pages
Publisher: Cisco Press; 1 edition (August 24, 2007)
Language: English
ISBN-10: 1587053322
ISBN-13: 978-1587053320
File Size : 23 Mb | File Format : PDF + Epub
Book Description 

Best practices for assessing and improving network defenses and responding to security incidents
Omar Santos

Information security practices have evolved from Internet perimeter protection to an in-depth defense model in which multiple countermeasures are layered throughout the infrastructure to address vulnerabilities and attacks. This is necessary due to increased attack frequency, diverse attack sophistication, and the rapid nature of attack velocity—all blurring the boundaries between the network and perimeter.

End-to-End Network Security is designed to counter the new generation of complex threats. Adopting this robust security strategy defends against highly sophisticated attacks that can occur at multiple locations in your network. The ultimate goal is to deploy a set of security capabilities that together create an intelligent, self-defending network that identifies attacks as they occur, generates alerts as appropriate, and then automatically responds.

End-to-End Network Security provides you with a comprehensive look at the mechanisms to counter threats to each part of your network. The book starts with a review of network security technologies then covers the six-step methodology for incident response and best practices from proactive security frameworks. Later chapters cover wireless network security, IP telephony security, data center security, and IPv6 security. Finally, several case studies representing small, medium, and large enterprises provide detailed example configurations and implementation strategies of best practices learned in earlier chapters.

Adopting the techniques and strategies outlined in this book enables you to prevent day-zero attacks, improve your overall security posture, build strong policies, and deploy intelligent, self-defending networks.

“Within these pages, you will find many practical tools, both process related and technology related, that you can draw on to improve your risk mitigation strategies.”

—Bruce Murphy, Vice President, World Wide Security Practices, Cisco

Omar Santos is a senior network security engineer at Cisco®. Omar has designed, implemented, and supported numerous secure networks for Fortune 500 companies and the U.S. government. Prior to his current role, he was a technical leader within the World Wide Security Practice and the Cisco Technical Assistance Center (TAC), where he taught, led, and mentored many engineers within both organizations.
  • Guard your network with firewalls, VPNs, and intrusion prevention systems
  • Control network access with AAA
  • Enforce security policies with Cisco Network Admission Control (NAC)
  • Learn how to perform risk and threat analysis
  • Harden your network infrastructure, security policies, and procedures against security threats
  • Identify and classify security threats
  • Trace back attacks to their source
  • Learn how to best react to security incidents
  • Maintain visibility and control over your network with the SAVE framework
  • Apply Defense-in-Depth principles to wireless networks, IP telephony networks, data centers, and IPv6 networks
This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.

About the Author

Omar Santos is a senior network security engineer and Incident Manager within the Product Security Incident Response Team (PSIRT) at Cisco. Omar has designed, implemented, and supported numerous secure networks for Fortune 500 companies and the U.S. government, including the United States Marine Corps (USMC) and the U.S. Department of Defense (DoD). He is also the author of many Cisco online technical documents and configuration guidelines. Before his current role, Omar was a technical leader within the World Wide Security Practice and Cisco Technical Assistance Center (TAC), where he taught, led, and mentored many engineers within both organizations. He is an active member of the InfraGard organization. InfraGard is a cooperative undertaking that involves the Federal Bureau of Investigation and an association of businesses, academic institutions, state and local law enforcement agencies, and other participants. InfraGard is dedicated to increasing the security of the critical infrastructures of the United States of America. Omar has also delivered numerous technical presentations to Cisco customers and partners, as well as executive presentations to CEOs, CIOs, and CSOs of many organizations. He is also the author of the Cisco Press books:Cisco Network Admission Control, Volume II: NAC Deployment and Troubleshooting, and Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance.

Table of Contents 

Part 1. Introduction to Network Security Solutions

Chapter 01. Overview of Network Security Technologies

Part 2. Security Lifecycle: Frameworks and Methodologies

Chapter 02. Preparation Phase
Chapter 03. Identifying and Classifying Security Threats
Chapter 04. Traceback
Chapter 05. Reacting to Security Incidents
Chapter 06. Postmortem and Improvement
Chapter 07. Proactive Security Framework

Part 3. Defense-In-Depth Applied

Chapter 08. Wireless Security
Chapter 09. IP Telephony Security
Chapter 10. Data Center Security
Chapter 11. IPv6 Security

Part 4. Case Studies

Chapter 12. Case Studies
Index

Download Ebook : End-to-End Network Security: Defense-in-Depth

Mirror : 

Book Detail 
Paperback: 414 pages
Publisher: Packt Publishing (May 16, 2012)
Language: English
ISBN-10: 1849517746
ISBN-13: 978-1849517744
File Size : 14 Mb | File Format : PDF
Book Description 
  • Learn how to perform an efficient, organized, and effective penetration test from start to finish
  • Gain hands-on penetration testing experience by building and testing a virtual lab environment that includes commonly found security measures such as IDS and firewalls
  • Take the challenge and perform a virtual penetration test against a fictional corporation from start to finish and then verify your results by walking through step-by-step solutions
  • Detailed step-by-step guidance on managing testing results and writing clearly organized and effective penetration testing reports
  • Properly scope your penetration test to avoid catastrophe
  • Understand in detail how the testing process works from start to finish, not just how to use specific tools
  • Use advanced techniques to bypass security controls and remain hidden while testing
  • Create a segmented virtual network with several targets, IDS and firewall
  • Generate testing reports and statistics
  • Perform an efficient, organized, and effective penetration test from start to finish
Although the book is intended for someone that has a solid background in information security the step-by-step instructions make it easy to follow for all skill levels. You will learn Linux skills, how to setup your own labs, and much much more.

About the Author

Lee Allen is currently the Vulnerability Management Program Lead for one of the Fortune 500.  His journey into the exciting world of security began in the 1980s while visiting BBS's with his trusty Commodore 64 and a room carpeted with 5.25-inch diskettes.
Throughout the years, he has continued his attempts at remaining up-to-date with the latest and greatest in the security industry and the security community. He has several industry certifications including the OSWP and has been working in the IT industry for over 15 years.
His hobbies and obsessions include validating and reviewing proof of concept exploit code, programming, security research, attending security conferences, discussing technology, writing, 3D Game development, and skiing.
He is currently working on his next project which is focused on teaching penetration testing skills using a unique integrated blend of 3D Gaming and hands on learning. After all learning should be fun!

Table of Contents 

Chapter 01: Planning and Scoping for a Successful Penetration Test
Chapter 02: Advanced Reconnaissance Techniques
Chapter 03: Enumeration: Choosing  Your Targets Wisely
Chapter 04: Remote Exploitation
Chapter 05: Web Application Exploitation
Chapter 06: Exploits and  Client-Side Attacks
Chapter 07: Post-Exploitation
Chapter 08: Bypassing Firewalls and Avoiding Detection
Chapter 09: Data Collection  Tools and Reporting
Chapter 10: Setting Up Virtual Test  Lab Environments
Chapter 11: Take the Challenge – Putting It All Together
Index

Download Ebook : Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide

Mirror : 

Book Detail 
Paperback: 624 pages
Publisher: Cisco Press; 1 edition (November 21, 2006)
Language: English
ISBN-10: 1587052253
ISBN-13: 978-1587052255
File Size : 11.2 Mb | File Format : PDF
Book Description 

When most information security professionals think about threats to their networks, they think about the threat of attackers from the outside. However, in recent years the number of computer security incidents occurring from trusted users within a company has equaled those occurring from external threats. The difference is, external threats are fairly well understood and almost all companies utilize tools and technology to protect against those threats. In contrast, the threats from internal trusted employees or partners are often overlooked and much more difficult to protect against.

Network Admission Control (NAC) is designed to prohibit or restrict access to the secured internal network from devices with a diminished security posture until they are patched or updated to meet the minimum corporate security requirements. A fundamental component of the Cisco® Self-Defending Network Initiative, NAC enables you to enforce host patch policies and to regulate network access permissions for noncompliant, vulnerable systems.

Cisco Network Admission Control, Volume II, helps you understand how to deploy the NAC Framework solution and ultimately build a self-defending network. The book focuses on the key components that make up the NAC Framework, showing how you can successfully deploy and troubleshoot each component and the overall solution. Emphasis is placed on real-world deployment scenarios, and the book walks you step by step through individual component configurations. Along the way, the authors call out best practices and tell you which mistakes to avoid. Component-level and solution-level troubleshooting techniques are also presented. Three full-deployment scenarios walk you through application of NAC in a small business, medium-sized organization, and large enterprise.

“To successfully deploy and troubleshoot the Cisco NAC solution requires thoughtful builds and design of NAC in branch, campus, and enterprise topologies. It requires a practical and methodical view towards building layered security and management with troubleshooting, auditing, and monitoring capabilities.”
–Jayshree V. Ullal, Senior Vice President, Datacenter, Switching and Security Technology Group, Cisco Systems®

Jazib Frahim, CCIE® No. 5459, is a senior network security engineer in the Worldwide Security Services Practice of the Cisco Advanced Services for Network Security team. He is responsible for guiding customers in the design and implementation of their networks with a focus on network security.

Omar Santos is a senior network security engineer in the Worldwide Security Services Practice of the Cisco Advanced Services for Network Security team. He has more than 12 years of experience in secure data communications.

David White, Jr., CCIE No. 12,021, has more than 10 years of networking experience with a focus on network security. He is currently an escalation engineer in the Cisco TAC, where he has been for more than six years.
  • Effectively deploy the Cisco Trust Agent
  • Configure Layer 2 IP and Layer 2 802.1x NAC on network access devices
  • Examine packet flow in a Cisco IOS NAD when NAC is enabled, and configure Layer 3 NAC on the NAD
  • Monitor remote access VPN tunnels
  • Configure and troubleshoot NAC on the Cisco ASA and PIX security appliances
  • Install and configure Cisco Secure Access Control Server (ACS) for NAC
  • Install the Cisco Security Agent Manage-ment Center and create agent kits
  • Add antivirus policy servers to ACS for external antivirus posture validation
  • Understand and apply audit servers to your NAC solution
  • Use remediation servers to automatically patch end hosts to bring them in compliance with your network policies
  • Monitor the NAC solution using the Cisco Security Monitoring, Analysis, and Response System (MARS)
This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.

Download This Book : Cisco Network Admission Control, Volume II: NAC Deployment and Troubleshooting

Cisco Network Admission Control, Volume II: NAC Deployment and Troubleshooting
Mirror :
Cisco Network Admission Control, Volume II: NAC Deployment and Troubleshooting

iOS Hacker's Handbook - Free Download

Posted by Unknown On 12:40 AM | 1 comment

Book Detail 
Paperback: 408 pages
Publisher: Wiley; 1 edition (May 8, 2012)
Language: English
ISBN-10: 1118204123
ISBN-13: 978-1118204122
File Size : 16 Mb | File Format : PDF + Epub
Book Description 

Discover all the security risks and exploits that can threaten iOS-based mobile devices
iOS is Apple's mobile operating system for the iPhone and iPad. With the introduction of iOS5, many security issues have come to light. This book explains and discusses them all. The award-winning author team, experts in Mac and iOS security, examines the vulnerabilities and the internals of iOS to show how attacks can be mitigated. The book explains how the operating system works, its overall security architecture, and the security risks associated with it, as well as exploits, rootkits, and other payloads developed for it.

Covers iOS security architecture, vulnerability hunting, exploit writing, and how iOS jailbreaks work
Explores iOS enterprise and encryption, code signing and memory protection, sandboxing, iPhone fuzzing, exploitation, ROP payloads, and baseband attacks
Also examines kernel debugging and exploitation
Companion website includes source code and tools to facilitate your efforts
iOS Hacker's Handbook arms you with the tools needed to identify, understand, and foil iOS attacks.

Download This Ebook : iOS Hacker's Handbook

iOS Hacker's Handbook - Free Download
Mirror :
iOS Hacker's Handbook - Free Download

Malware Analyst’s Cookbook and DVD

Posted by Unknown On 12:20 AM | 1 comment

Book Detail 
Paperback: 744 pages
Publisher: Wiley; 1 edition (November 2, 2010)
Language: English
ISBN-10: 0470613033
ISBN-13: 978-0470613030
File Size : 8 Mb | File Format : PDF
Book Description 

A computer forensics "how-to" for fighting malicious code and analyzing incidents
With our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software. Written by well-known malware experts, this guide reveals solutions to numerous problems and includes a DVD of custom programs and tools that illustrate the concepts, enhancing your skills.
  • Security professionals face a constant battle against malicious software; this practical manual will improve your analytical capabilities and provide dozens of valuable and innovative solutions
  • Covers classifying malware, packing and unpacking, dynamic malware analysis, decoding and decrypting, rootkit detection, memory forensics, open source malware research, and much more
  • Includes generous amounts of source code in C, Python, and Perl to extend your favorite tools or build new ones, and custom programs on the DVD to demonstrate the solutions
Malware Analyst's Cookbook is indispensible to IT security administrators, incident responders, forensic analysts, and malware researchers.

From the Back Cover

Powerful, step-by-step solutions to dozens of common threats
We called this a cookbook because each "recipe" presents both the ingredients and the steps you take to resolve a specific problem or research a given threat. On the DVD, you'll find supporting files and original programs that provide additional resources. You'll learn how to analyze malware using tools written by the authors as well as hundreds of other publicly available tools. If your job involves incident response, computer forensics, systems security, or antivirus research, this book will become invaluable to you.
  • Learn to conduct online investigations without revealing your identity
  • Use honeypots to collect malware being distributed by bots and worms
  • Analyze JavaScript, PDFs, and Office documents for suspicious content
  • Build a low-budget malware lab with virtualization or bare bones hardware
  • Reverse engineer common encoding and encryption algorithms
  • Set up an advanced memory forensics platform for malware analysis
  • Investigate prevalent threats such as Zeus, Silent Banker, CoreFlood, Conficker, Virut, Clampi, Bankpatch, BlackEnergy, and many more!
On the DVD

Use the files on the DVD to follow along with the recipes or to conduct your own investigations and analyses. You will find:
  • Evidence files
  • Annotated videos
  • Source code
  • Windows and Linux tools
  • Over 50 original programs in Python, C/C++, and Perl
"The most useful technical security book I've read this year. A must-have for all who protect systems from malicious software."
—Lenny Zeltser, Security Practice Director at Savvis and Senior Faculty Member at SANS Institute
"The ultimate guide for anyone interested in malware analysis."
—Ryan Olson, Director, VeriSign iDefense Rapid Response Team
"Every page is filled with practical malware knowledge, innovative ideas, and useful tools. Worth its weight in gold!"
—AAron Walters, Lead Developer of Volatility and VP of Security R&D at Terremark

About the Author

Michael Hale Ligh is a malicious code analyst at Verisign iDefense and Chief of Special Projects at MNIN Security.
Steven Adair is a member of the Shadowserver Foundation and frequently analyzes malware and tracks botnets. He also investigates cyber attacks of all kinds with an emphasis on those linked to cyber espionage.
Blake Hartstein is the author of multiple security tools and a Rapid Response Engineer at Verisign iDefense, where he responds to malware incidents.
Matthew Richard has authored numerous security tools and also ran a managed security service for banks and credit unions.

Download This Book : Malware Analyst’s Cookbook and DVD

Malware Analyst’s Cookbook and DVD
Mirror :
Malware Analyst’s Cookbook and DVD

Saturday, September 29, 2012

The CERT Guide to Insider Threats

Posted by Unknown On 11:56 PM | 1 comment

Book Detail
Hardcover: 432 pages
Publisher: Addison-Wesley Professional; 1 edition (January 24, 2012)
Language: English
ISBN-10: 0321812573
ISBN-13: 978-0321812575
File Size : 12 Mb | File Format : PDF + Epub

Book Description

Since 2001, the CERT® Insider Threat Center at Carnegie Mellon University’s Software Engineering Institute (SEI) has collected and analyzed information about more than seven hundred insider cyber crimes, ranging from national security espionage to theft of trade secrets. The CERT® Guide to Insider Threats describes CERT’s findings in practical terms, offering specific guidance and countermeasures that can be immediately applied by executives, managers, security officers, and operational staff within any private, government, or military organization.

The authors systematically address attacks by all types of malicious insiders, including current and former employees, contractors, business partners, outsourcers, and even cloud-computing vendors. They cover all major types of insider cyber crime: IT sabotage, intellectual property theft, and fraud. For each, they present a crime profile describing how the crime tends to evolve over time, as well as motivations, attack methods, organizational issues, and precursor warnings that could have helped the organization prevent the incident or detect it earlier. Beyond identifying crucial patterns of suspicious behavior, the authors present concrete defensive measures for protecting both systems and data.

This book also conveys the big picture of the insider threat problem over time: the complex interactions and unintended consequences of existing policies, practices, technology, insider mindsets, and organizational culture. Most important, it offers actionable recommendations for the entire organization, from executive management and board members to IT, data owners, HR, and legal departments.

With this book, you will find out how to
  • Identify hidden signs of insider IT sabotage, theft of sensitive information, and fraud
  • Recognize insider threats throughout the software development life cycle
  • Use advanced threat controls to resist attacks by both technical and nontechnical insiders
  • Increase the effectiveness of existing technical security tools by enhancing rules, configurations, and associated business processes
  • Prepare for unusual insider attacks, including attacks linked to organized crime or the Internet underground
By implementing this book’s security practices, you will be incorporating protection mechanisms designed to resist the vast majority of malicious insider attacks.

About the Author

Dawn Cappelli, CISSP, is Technical Manager of the CERT Insider Threat Center and the Enterprise Threat and Vulnerability Management Team at Carnegie Mellon University’s Software Engineering Institute (SEI). She has spent the past decade working with organizations such as the U.S. Secret Service and Department of Homeland Security in protecting the United States against insider threats. Andrew Moore is Lead Researcher in the CERT Insider Threat Center and Senior Member of Technical Staff at SEI. Randall Trzeciak is a Senior Member of Technical Staff at SEI, and Technical Team Lead for the Insider Threat Research Group at the CERT Insider Threat Center.

Table of Contents

Chapter 01. Overview
Chapter 02. Insider IT Sabotage
Chapter 03. Insider Theft of Intellectual Property
Chapter 04. Insider Fraud
Chapter 05. Insider Threat Issues in the Software Development Life Cycle
Chapter 06. Best Practices for the Prevention and Detection of Insider Threats
Chapter 07. Technical Insider Threat Controls
Chapter 08. Case Examples
Chapter 09. Conclusion and Miscellaneous Issues
Appendix A. Insider Threat Center Products and Services
Appendix B. Deeper Dive into the Data
Appendix C. CyberSecurity Watch Survey
Appendix D. Insider Threat Database Structure
Appendix E. Insider Threat Training Simulation: MERIT InterActive
Appendix F. System Dynamics Background

Download This Book : The CERT Guide to Insider Threats

Mirror : 

Computer Security Fundamentals, Second Edition

Posted by Unknown On 10:34 PM | 1 comment

Book Detail 
Paperback: 352 pages
Publisher: Pearson IT Certification; 2 edition (December 20, 2011)
Language: English
ISBN-10: 0789748908
ISBN-13: 978-0789748904
File Size : 4.8 Mb | File Format : PDF
Book Description 

Welcome to today’s most useful and practical one-volume introduction to computer security. Chuck Easttom brings together up-to-the-minute coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started in the field. Drawing on his extensive experience as a security instructor and consultant, Easttom thoroughly covers core topics, such as vulnerability assessment, virus attacks, hacking, spyware, network defense, passwords, firewalls, VPNs, and intrusion detection. Writing clearly and simply, he fully addresses crucial issues that many introductory security books ignore, from industrial espionage to cyberbullying.

Computer Security Fundamentals, Second Edition is packed with tips and examples, all extensively updated for the state-of-the-art in both attacks and defense. Each chapter offers exercises, projects, and review questions designed to deepen your understanding and help you apply all you’ve learned. Whether you’re a student, a system or network administrator, a manager, or a law enforcement professional, this book will help you protect your systems and data and expand your career options.

Learn how to
  • Identify the worst threats to your network and assess your risks
  • Get inside the minds of hackers, so you can prevent their attacks
  • Implement a proven layered approach to network security
  • Use basic networking knowledge to improve security
  • Resist the full spectrum of Internet-based scams and frauds
  • Defend against today’s most common Denial of Service (DoS) attacks
  • Prevent attacks by viruses, spyware, and other malware
  • Protect against low-tech social engineering attacks
  • Choose the best encryption methods for your organization
  • Select firewalls and other security technologies
  • Implement security policies that will work in your environment
  • Scan your network for vulnerabilities
  • Evaluate potential security consultants
  • Understand cyberterrorism and information warfare
  • Master basic computer forensics and know what to do after you’re attacked
About the Author

Chuck Easttom has been in the IT industry for many years working in all aspects including network administration, software engineering, and IT managementFor the past 10 years he has been parttime teaching at colleges and doing corporate trainingFor the past 7 years, he has also been an independent consultant working with a variety of companies and serving as an expert consultant/witness in various computer casesChuck holds more than 28 different IT industry certifications, including the CISSP, ISSAP, Certified Ethical Hacker, Certified Hacking Forensics Investigator, EC Council Certified Security Administrator, and EC Council Certified InstructorHe has served as a subject matter expert for the Computer Technology Industry Association (CompTIA) in the development or revision of four of their certification tests, including the initial creation of their Security+ certification. Most recently he worked with the EC Council to develop their new advanced cryptography course, which he is teaching around the world.

In addition to this book, Chuck has authored 12 other titles on topics such as computer security, web development, programming, Linux, and computer crimeChuck also is a frequent guest speaker for computer groups, discussing computer securityYou can reach Chuck at his website www.chuckeasttom.com or by email at chuck@chuckeasttom.com

Download This Book : Computer Security Fundamentals, Second Edition

Computer Security Fundamentals, Second Edition
Mirror :
Computer Security Fundamentals, Second Edition

Book Detail 
Hardcover: 809 pages
Publisher: Charles Scribners & Sons; 1 edition (May 20, 1998)
Language: English
ISBN-10: 0684805073
ISBN-13: 978-0684805078
File Size : 90 Mb | File Format : PDF
Book Description 

Review
Scribner has revised its college-level Ancient Writers: Greece and Rome (1982) and Civilizations of the Ancient Mediterranean: Greece and Rome (1988) to provide us with an attractive encyclopedia for younger students. With a glimpse into the relevance of Greek and Roman history and their impact on Europe and the Americas, these four volumes cover the period from 2,000 B.C. to 529 A.D. The volumes are arranged alphabetically, with volume 1 containing a table of contents that lists the maps, color plates, and entries for all four volumes.
The encyclopedia features almost 500 entries ranging from a few short paragraphs to more than 17 pages for Greece, history of. Entries provide explanations of each subject, as well as references to related topics found within the four volumes. On each page, in the left margin, one can find definitions of terms that might be unfamiliar to users, along with sidebars and time lines. Following the entries in volume 4 is a list of suggested readings grouped under 11 subject areas, including culture and society, myths and legends, biography, and fiction. A "Timeline of Ancient Greece and Rome" is repeated at the beginning of each volume.

Covering a wide range of topics, the entries provide students with a basic understanding before they move on to more in-depth sources such as Facts On File's Handbook to Life in Ancient Greece [RBB Ag 97] and Handbook to Life in Ancient Rome (1994). Most public and school libraries will want to add this set to their reference collections because of the lack of similar resources designed especially for students at the middle-to high-school level.

Download This Book : Ancient Greece and Rome: An Encyclopedia for Students

Ancient Greece and Rome: An Encyclopedia for Students
Mirror :
Ancient Greece and Rome: An Encyclopedia for Students
Mirror :
Ancient Greece and Rome: An Encyclopedia for Students


Book Detail 
Paperback: 218 pages
Publisher: National Academies Press (December 31, 2012)
Language: English
ISBN-10: 0309260981
ISBN-13: 978-0309260985
File Size : 20 Mb | File Format : PDF

Book Description 

Scientific evidence shows that most glaciers in South Asia's Hindu Kush Himalayan region are retreating, but the consequences for the region's water supply are unclear, this report finds. The Hindu Kush Himalayan region is the location of several of Asia's great river systems, which provide water for drinking, irrigation, and other uses for about 1.5 billion people. Recent studies show that at lower elevations, glacial retreat is unlikely to cause significant changes in water availability over the next several decades, but other factors, including groundwater depletion and increasing human water use, could have a greater impact. Higher elevation areas could experience altered water flow in some river basins if current rates of glacial retreat continue, but shifts in the location, intensity, and variability of rain and snow due to climate change will likely have a greater impact on regional water supplies.

Table of Contents 

1  Introduction

Study Context and Charge to the Committee
Geographic Scope
Study Approach and Methodology
Organization of the Report

2  Physical Geography

Glacier Mass Balance
Regional Climate and Meteorology
Paleoclimate
Regional Hydrology
Physical Extreme Events
Conclusions

3  Human Geography and Water Resources

Population Distribution and Migration
Patterns of Water Use
Clean Water and Sanitation Access
Measuring Water Scarcity
Water Management, Institutions, and Hydroclimatic Change
Conclusions

4  Environmental Risk and Security

Natural Hazards and Vulnerability
Security Dynamics and Water Conflict
Conclusions

5  Conclusion

References
Appendix A   Workshop Agenda and Participants
Appendix B   Summaries of Workshop Presentations
Appendix C   Glacier Measurement Methods
Appendix D   Disaster Agencies and Databases
Appendix E   Acronyms and Abbreviations
Appendix F   Institutional Oversight
Appendix G   Biographical Sketches of Committee Members

Download Ebook : Himalayan Glaciers: Climate Change, Water Resources, and Water Security

Mirror : 
Mirror : 

Organic Chemistry, 8th Edition

Posted by Unknown On 8:45 PM | 1 comment

Book Detail 
Hardcover : 1333 Pages
Publisher: 8th Edition (January 8, 2010)
Language: English
ASIN: B004GW1RR8
File Size : 70 Mb | File Format : PDF
Book Description 

From Book Cover : 
What Sets This Book Apart? 

The central message of chemistry is that the properties of a substance come from its structure. What is less obvious, but very powerful, is the corollary. Someone with training in chemistry can look at the structure of a substance and tell you a lot about its properties. Organic chemistry has always been, and continues to be, the branch of chemistry that best connects structure with properties.

The goal of this text, as it has been through seven previous editions, is to provide students with the conceptual tools to understand and apply the relationship between the structures of organic compounds and their properties. Both the organization of the text and the presentation of individual topics were designed with this objective in mind.

A Functional Group Organization

The text is organized according to functional groups—structural units within a molecule
that are most closely identiied with characteristic properties. This organization offers two major advantages over alternative organizations based on mechanisms or reaction types.

1.  The information content of individual chapters is more manageable when organized
 according to functional groups.

2.  Patterns of reactivity are reinforced when a reaction used to prepare a particular functional group reappears as a characteristic reaction of a different functional group.

Table of Contents

CHAPTER 01 Structure Determines Properties
CHAPTER 02 Alkanes and Cycloalkanes: Introduction to Hydrocarbons
CHAPTER 03 Alkanes and Cycloalkanes: Conformations and cis-trans Stereoisomers
CHAPTER 04 Alcohols and Alkyl Halides
CHAPTER 05 Structure and Preparation of Alkenes: Elimination Reactions
CHAPTER 06 Addition Reactions of Alkenes
CHAPTER 07 Stereochemistry
CHAPTER 08 Nucleophilic Substitution
CHAPTER 09 Alkynes
CHAPTER 10 Conjugation in Alkadienes and Allylic Systems
CHAPTER 11 Arenes and Aromaticity
CHAPTER 12 Reactions of Arenes: Electrophilic and Nucleophilic Aromatic Substitution
CHAPTER 13 Spectroscopy
CHAPTER 14 Organometallic Compounds
CHAPTER 15 Alcohols, Diols, and Thiols
CHAPTER 16 Ethers, Epoxides, and Sulfides
CHAPTER 17 Aldehydes and Ketones: Nucleophilic Addition to the Carbonyl Group
CHAPTER 18 Carboxylic Acids
CHAPTER 19 Carboxylic Acid Derivatives: Nucleophilic Acyl Substitution
CHAPTER 20 Enols and Enolates
CHAPTER 21 Amines
CHAPTER 22 Phenols
CHAPTER 23 Carbohydrates
CHAPTER 24 Lipids
CHAPTER 25 Amino Acids, Peptides, and Proteins
CHAPTER 26 Nucleosides, Nucleotides, and Nucleic Acids
CHAPTER 27 Synthetic Polymers
Glossary
Credits
Index

Download This Book : Organic Chemistry, 8th Edition

Mirror : 
Mirror : 

Book Detail 
Hardcover: 1184 pages
Publisher: CRC Press; 1 edition (July 7, 2008)
Language: English
ISBN-10: 0849395496
ISBN-13: 978-0849395499
File Size : 26 Mb | File Format : PDF
Book Description 

The Handbook of Membrane Separations: Chemical, Pharmaceutical, and Biotechnological Applications provides detailed information on membrane separation technologies as they have evolved over the past decades. To provide a basic understanding of membrane technology, this book documents the developments dealing with these technologies. It explores chemical, pharmaceutical, food processing and biotechnological applications of membrane processes ranging from selective separation to solvent and material recovery. This text also presents in-depth knowledge of membrane separation mechanisms, transport models, membrane permeability computations, membrane types and modules, as well as membrane reactors.

Table of Contents 

Section I: Membrane Applications in Chemical and Pharmaceutical Industries and In Coservation of Natural Resources

Chapter 01. Membrane Applications in Chemical and Pharmaceutical Industries and in Conservation of Natural Resources: Introduction
Chapter 02. Application of Membrane Contactors as Mass Transfer Devices
Chapter 03. Membrane Chromatography
Chapter 04. Membranes in Gas Separation
Chapter 05. Pervaporation: Theory, Practice, and Applications in the Chemical and Allied Industries
Chapter 06. Current Status and Prospects for Ceramic Membrane Applications
Chapter 07. Membrane Technologies and Supercritical Fluids: Recent Advances
Chapter 08. Techniques to Enhance Performance of Membrane Processes
Chapter 09. Separation and Removal of Hydrocarbons Using Polymer Membranes
Chapter 10. Zeolite Membranes: Synthesis, Characterization, Important Applications, and Recent Advances
Chapter 11. Membrane Fouling: Recent Strategies and Methodologies for Its Minimization
Chapter 12. Membrane Extraction in Preconcentration, Sampling, and Trace Analysis
Chapter 13. Hybrid Liquid Membrane Processes with Organic Water-Immiscible Carriers (OHLM): Application in Chemical and Biochemical Separations
Chapter 14. Advancements in Membrane Processes for Pharmaceutical Applications
Chapter 15. Membranes in Drug Delivery
Chapter 16. Bio-Responsive Hydrogel Membranes

Section II: Membrane Applications in Biotechnology, Food Processing, Life Sciences, and Energy Conversion

Chapter 17. Membrane Applications in Biotechnology, Food Processing, Life Sciences, and Energy Conversion: Introduction
Chapter 18. Ultrafiltration-Based Protein Bioseparation
Chapter 19. Membrane Distillation in Food Processing
Chapter 20. Applications of Membrane Separation in the Brewing Industry
Chapter 21. Developments of Bipolar Membrane Technology in Food and Bio-Industries
Chapter 22. Applications of Membrane Technology in the Dairy Industry
Chapter 23. Microporous Membrane Blood Oxygenators
Chapter 24. Transporting and Separating Molecules Using Tailored Nanotube Membranes
Chapter 25. Use of Emulsion Liquid Membrane Systems in Chemical and Biotechnological Separations
Chapter 26. Membrane Electroporation and Emerging Biomedical Applications
Chapter 27. Proton-Conducting Membranes for Fuel Cells

Section III: Membrane Applications in Industrial Waste Management (Including Nuclear), Environmental Engineering, and Future Trends in Membrane Science

Chapter 28. Membrane Applications in Industrial Waste Management (Including Nuclear), Environmental Engineering, and Future Trends in Membrane Science: Introduction
Chapter 29. Treatment of Radioactive Effluents: Introduction, Fundamentals, and Scope of Different Membrane Processes
Chapter 30. Radioactive Waste Processing: Advancement in Pressure-Driven Processes and Current World Scenario
Chapter 31. Liquid Membrane-Based Separations of Actinides
Chapter 32. Reverse Osmosis-Based Treatment of Radioactive Liquid Wastes Generated in Hospital Facility and in Steel Industry: Case Studies
Chapter 33. Evaluation of Membrane-Based Processing of Radioactive Nuclear Plant Waste: Case Studies
Chapter 34. Applications of Donnan Membrane Process for Recovery of Coagulants from Water Treatment Residuals
Chapter 35. Utilization of Membrane Processes in Treating Various Effluents Generated in Pulp and Paper Industry
Chapter 36. Membrane Bioreactors for Wastewater Treatment
Chapter 37. Membrane-Assisted Solvent Extraction for the Recovery of Metallic Pollutants: Process Modeling and Optimization
Chapter 38. Membrane Contractors for Gaseous Streams Treatments
Chapter 39. Strip Dispersion Technique: Application for Strategic and Precious Metal Seperation and Treatment of Wastewater Streams
Chapter 40. Electrically Enhanced Membrane Seperations and Catalysis
Chapter 41. Membrane Processes for Treatment of Industrial Tannery Effluents: A Case Study
Chapter 42. New Developments in Nanofiltration Technology: A Case Study on Recovery of Impurity-Free Sodium Thiocyanate for Acrylic Fiber Industry
Chapter 43. Future Progresses in Membrane Engineering
Index

Download This Book : Handbook of Membrane Separations: Chemical, Pharmaceutical, Food, and Biotechnological Applications

Mirror : 
Mirror : 

Chemistry of Space, Free Ebook

Posted by Unknown On 6:47 PM | No comments

Book Detail 
Hardcover: 246 pages
Publisher: Facts on File (January 1, 2007)
Language: English
ISBN-10: 0816052743
ISBN-13: 978-0816052745
File Size : 2 Mb | File Format : PDF
No Description 

Table of Contents 

Chapter 01: The Birth of the Universe

In the Beginning
  Georges Edouard Lemaître (1894–1966)
A Cooling Universe
Particle Decay
The Formation of Compound Particles
And Then There Were Atoms
Is the Theory True?
  George Gamow (1904–1968)
Where to Next?

Chapter 02: The Chemistry of Interstellar Space

The Composition of the Interstellar Medium
Interstellar Clouds
  Robert Julius Trumpler (1886–1956)
Chemistry of the Interstellar Medium
Tools for Studying the Chemical Characteristics of the ISM
  Hendrik Christoffel van de Hulst (1918–2000)

Chapter 03: Formation of the Heavy Elements

Stellar Evolution
Classifying Stars
  Annie Jump Cannon (1863–1941)
A Star Is Born
Turning Hydrogen into Helium
Helium Burning . . . and Beyond
Bigger Stars = More Elements
  Margaret Burbidge (1919–        ) and Geoffrey Burbidge (1925–       )

Chapter 04: The Inner Planets

Studying the Chemical Composition of a Planet
Mercury
Venus
  The Hubble Space Telescope
Mars
  Asaph Hall (1829–1907)

Chapter 05: The Outer Planets

Missions to the Outer Planets
Jupiter
  S. Alan Stern (1957–     )
The Jovian Moons
Saturn
Uranus
Neptune
Pluto
  James E. Webb (1906–1992)
Kuiper Belt Objects
  Gerard Peter Kuiper (1905–1973)

Chapter 6: Comets, Meteors, Asteroids, and the Moon

Comets
  Edmund Halley (1656–1742)
Meteors, Meteoroids, and Meteorites
Asteroids
The Moon

Conclusion
Glossary
Further Reading
Index

Download This Book : Chemistry of Space (Facts on File Science Dictionary)

Mirror : 
Mirror : 

The Physics of Glaciers, Fourth Edition

Posted by Unknown On 6:03 PM | 1 comment

Book Detail 
Hardcover: 704 pages
Publisher: Academic Press; 4 edition (May 17, 2010)
Language: English
ISBN-10: 0123694612
ISBN-13: 978-0123694614
File Size : 8.5 Mb | File Format : PDF
Book Description 

Now in its 4th Edition, this classic text covers the physical principles underlying the behavior of glaciers -- terrestrial ice bodies originating as accumulations of snow -- including mountain glaciers, small ice caps, ice sheets, and shelves. New material on climate change includes interactions between ice sheets and the ocean and atmosphere, paleoclimate reconstruction using ice cores, Quaternary climate history and the ice ages, and sea level rise. The book also explores topics of interest to geologists and geophysicists, including glacial connections to geomorphology, sedimentation, isostasy, and tectonics.
-Completely updated and revised, with 30% new material including climate change
-Accessible to students, and an essential guide for researchers
-Authored by preeminent glaciologists

Review

"In the preface to the first edition of The Physics of Glaciers, published in 1969, Stan Paterson made note of the impressive observational and theoretical advances that had taken place during the preceding two decades and set the stage for his efforts to summarize the state of the field. The pace of data collection has continued to accelerate with the development of an impressive array of new tools and techniques and the added incentive of current concerns over the response and role of glaciers and ice sheets in a warming climate. Now we arrive at the fourth edition, a collaborative effort by Paterson and Kurt Cuffey to provide an updated assessment of glacier physics and related topics. The result is a major achievement, involving a comprehensive rewriting and reorganization of the material contained in earlier editions, and including a significant amount of new material that will be appreciated by both old and new audiences."--Pure and Applied Geophysics

"The interested reader will find much else to enjoy in this book. For example, by using square brackets for grouping, and curved parentheses for arguments of functions, the equations are easier to read than typical. The appendix on stress and strain will be a favorite of students in classes extending far beyond glaciology. In short, The Physics of Glaciers by Cuffey and Paterson is at once instructive and authoritative, a textbook and a reference source. It is a towering intellectual achievement that, quite simply, defines the science of glaciers. Modern students may not be as easily impressed as I was three decades ago, but I expect that in addition to bragging about talking to 'the W.S.B. Paterson', students will be celebrating meeting 'the K.M. Cuffey' for a long time to come."--Journal of Glaciology, Vol. 57, No. 202, 2011, page 383

Table of Contents 

Chapter 01. Introduction
Chapter 02. Transformation of Snow to Ice
Chapter 03. Grain-Scale Structures and Deformation of Ice
Chapter 04. Mass Balance Processes: 1. Overview and Regimes
Chapter 05. Mass Balance Processes: 2. Surface Ablation and Energy Budget
Chapter 06. Glacial Hydrology
Chapter 07. Basal Slip
Chapter 08. The Flow of Ice Masses
Chapter 09. Temperatures in Ice Masses
Chapter 10. Large-Scale Structures
Chapter 11. Reaction of Glaciers to Environmental Changes
Chapter 12. Glacier Surges
Chapter 13. Ice Sheets and the Earth System
Chapter 14. Ice, Sea Level, and Contemporary Climate Change
Chapter 15. Ice Core Studies
Appendix A: A Primer on Stress and Strain
Index

Download Ebook : The Physics of Glaciers, Fourth Edition

The Physics of Glaciers, Fourth Edition
Mirror :
The Physics of Glaciers, Fourth Edition