๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Defense Against Biological Attacks: Volume II

โœ Scribed by Sunit K. Singh, Jens H. Kuhn


Publisher
Springer International Publishing
Year
2019
Tongue
English
Leaves
388
Edition
1st ed.
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


This second volume of a two-volume set focuses on specific pathogens and their mechanisms of pathogenesis as well as diagnostics, therapeutics and various strategies in the event of biological attacks. This multidisciplinary book appeals to readers from various fields, including biodefense, biosafety & biosecurity, virology, neurology, molecular biology and genetic engineering, as well as infectious disease specialists. Further, the work is of interest to basic science and applied science research scholars and experts working in the area of high-consequence or select agent virology.

โœฆ Table of Contents


Front Matter ....Pages i-xiii
Neurotropic Viruses (Michael R. Holbrook)....Pages 1-20
Overview of Human Viral Hemorrhagic Fevers (James Logue, Martin Richter, Reed F. Johnson, Jens H. Kuhn, Wade Weaver)....Pages 21-54
Variola Virus: Clinical, Molecular, and Bioterrorism Perspectives (Shane D. Falcinelli, Justine Ciric, Jason Kindrachuk)....Pages 55-102
Viral Therapeutics (Martin Richter)....Pages 103-114
Challenges Associated with Bacillus anthracis as a Bio-threat Agent (Haim Levy, Itai Glinert, Assa Sittner, Amir Ben-Shmuel, Elad Bar-David, David Kobiler et al.)....Pages 115-137
Brucella: Potential Biothreat Agent (Mehmet Doganay, Gizem Dinler-Doganay, Aysegul Ulu-Kilic, Rebecca J. Ingram)....Pages 139-159
Burkholderia mallei and Glanders (Nittaya Khakhum, Daniel Tapia, Alfredo G. Torres)....Pages 161-183
Burkholderia pseudomallei (Kathryn J. Pflughoeft, Derrick Hau, Peter Thorkildson, David P. AuCoin)....Pages 185-211
Coxiella burnetii: Hiding in Plain Sight (Patrice Newton, Miku Kuba, Bhavna Padmanabhan, Eleanor A. Latomanski, Hayley J. Newton)....Pages 213-238
Francisella tularensis: Causative Agent of Tularemia and Biothreat Agent (Monique Barel, Alain Charbit)....Pages 239-250
Yersinia pestis (Minoarisora Rajerison, Thomas Kratz)....Pages 251-269
Bacterial Therapeutics (Martin Richter)....Pages 271-280
Advances in Molecular Diagnostic Approaches for Biothreat Agents (Meghana Rastogi, Sunit K. Singh)....Pages 281-310
Next Generation Sequencing for the Detection of Foodborne Microbial Pathogens (Travis G. Wentz, Lijun Hu, Thomas S. Hammack, Eric W. Brown, Shashi K. Sharma, Marc W. Allard)....Pages 311-337
Overview on the Systematics of Biotoxins as Threat Agents (Harald Striegl)....Pages 339-357
Agrobioterrorism (Lawrence F. Roberge)....Pages 359-383

โœฆ Subjects


Biomedicine; Medical Microbiology; Health Promotion and Disease Prevention; Infectious Diseases


๐Ÿ“œ SIMILAR VOLUMES


Defense Against Biological Attacks: Volu
โœ Sunit K. Singh, Jens H. Kuhn ๐Ÿ“‚ Library ๐Ÿ“… 2019 ๐Ÿ› Springer International Publishing ๐ŸŒ English

<p><p>This first volume of a two-volume set describes general aspects, such as the historical view on the topic, the role of information distribution and preparedness of health-care systems and preparedness in emergency cases. Part two describes and discusseses in detail the pathogens and toxins tha

Defending Baltimore Against Enemy Attack
โœ Charles Osgood ๐Ÿ“‚ Library ๐Ÿ“… 2016 ๐Ÿ› Hachette Books ๐ŸŒ English

From beloved broadcaster Charles Osgood, a poignant memoir about one unforgettable childhood year during World War II.<br><I>Defending Baltimore Against Enemy Attack</I> is a gloriously funny and nostalgic slice of American life and a moving look at World War II from the perspective of a child far a

Building Secure Defenses Against Code-Re
โœ Lucas Davi, Ahmad-Reza Sadeghi (auth.) ๐Ÿ“‚ Library ๐Ÿ“… 2015 ๐Ÿ› Springer International Publishing ๐ŸŒ English

<p><p>This book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks and analyzes the effectiveness of defense techniques including address space layout randomization (ASLR) and the control-flow restrictions implemente