Unravelling the algae


Book Description

Acting as titans in global control of the biosphere and colonizing virtually all corners of the earth, algae, extremely diverse and numerous oxygenic, photosynthetic organisms, can be major players in and drivers of environmental change. For hundreds of years, since their evolutionary origins by endosymbiosis, when a protozoan enslaved a cyanobacte




802.11 Wireless Networks


Book Description

With transfer speeds up to 11 Mbps the 802.11 wireless network standard is set to revolutionize wireless LANs. Matthew Gast's definitive guide to the standard is aimed at administrators, architects and security professionals.




Non-canonical Cyclic Nucleotides


Book Description

The cyclic purine nucleotides 3’,5’-cAMP and 3’,5’-cGMP are well-established second messengers. cGMP has recently been covered in a volume of the Handbook of Experimental Pharmacology (volume 191). In addition to 3’,5’-cAMP and 3’,5’-cGMP, so-called non-canonical cyclic nucleotides exist. These comprise the cyclic pyrimidine nucleotides 3’,5’-cCMP and 3’,5’-cUMP, the purine nucleotide 3’,5’-cIMP, the 2’,3’-nucleoside monophosphates and cyclic dinucleotides. In this volume of the Handbook of Pharmacology, word-leading experts in the field summarize our current knowledge on these non-canonical cyclic nucleotides, discuss open questions, future research directions and the pharmacotherapeutic implications. Special emphasis will be given to the emerging roles of 3’,5’-cCMP and 3’,5’-cUMP as second messengers with regard to generators, effectors, biological functions, inactivation and bacterial toxins. The role of 3’,5’-cIMP as potential second messenger will also be critically discussed. Furthermore, we will consider transport of cyclic nucleotides and their potential role as first messengers. The role of the cyclic dinucleotide cGAMP in the immune system will covered, too. Lastly, the book will present important methodological aspects ranging from mass-spectrometric methods for cyclic nucleotide detection to the synthesis of nucleotide analogs as experimental tools and holistic methods for analysis of cyclic nucleotide effects.




Learning Kali Linux


Book Description

With hundreds of tools preinstalled, the Kali Linux distribution makes it easier for security professionals to get started with security testing quickly. But with more than 600 tools in its arsenal, Kali Linux can also be overwhelming. The new edition of this practical book covers updates to the tools, including enhanced coverage of forensics and reverse engineering. Author Ric Messier also goes beyond strict security testing by adding coverage on performing forensic analysis, including disk and memory forensics, as well as some basic malware analysis. Explore the breadth of tools available on Kali Linux Understand the value of security testing and examine the testing types available Learn the basics of penetration testing through the entire attack lifecycle Install Kali Linux on multiple systems, both physical and virtual Discover how to use different security-focused tools Structure a security test around Kali Linux tools Extend Kali tools to create advanced attack techniques Use Kali Linux to generate reports once testing is complete




Handbook on Networked Multipoint Multimedia Conferencing and Multistream Immersive Telepresence using SIP


Book Description

Handbook on Networked Multipoint Multimedia Conferencing and Multistream Immsersive Telepresence using SIP: Scalable Distributed Applications and Media Control over Internet is the first book to put together all IETF request for comments (RFCs), and the internet drafts standards related to the multipoint conferencing and immersive telepresence. This book includes mandatory and optional texts of all standards in a chronological and systematic way almost with one-to-one integrity from the beginning to end, allowing the reader to understand all aspects of the highly complex real-time applications. It is a book that network designers, software developers, product manufacturers, implementers, interoperability testers, professionals, professors, and researchers will find to be immensely useful. Practitioners and engineers in all spectrums who are concentrating on building the real-time, scalable, interoperable multipoint applications, can use this book to make informed choices based on technical standards in the market place, on all proprietary non-scalable and non-interposable products. This book will provide focus and foundation for these decision makers.




Issues in Biochemistry and Geochemistry: 2011 Edition


Book Description

Issues in Biochemistry and Geochemistry / 2011 Edition is a ScholarlyEditions™ eBook that delivers timely, authoritative, and comprehensive information about Biochemistry and Geochemistry. The editors have built Issues in Biochemistry and Geochemistry: 2011 Edition on the vast information databases of ScholarlyNews.™ You can expect the information about Biochemistry and Geochemistry in this eBook to be deeper than what you can access anywhere else, as well as consistently reliable, authoritative, informed, and relevant. The content of Issues in Biochemistry and Geochemistry / 2011 Edition has been produced by the world’s leading scientists, engineers, analysts, research institutions, and companies. All of the content is from peer-reviewed sources, and all of it is written, assembled, and edited by the editors at ScholarlyEditions™ and available exclusively from us. You now have a source you can cite with authority, confidence, and credibility. More information is available at http://www.ScholarlyEditions.com/.




Advanced Technologies for Meat Processing


Book Description

As with the first edition, the main goal of Advanced Technologies for Meat Processing is to provide the reader with recent developments in new advanced technologies for the full meat- processing chain. This book is written by distinguished international contributors with recognized expertise and excellent reputations, and brings together all the advances in a wide and varied number of technologies that are applied in different stages of meat processing. This second edition contains 21 chapters, combining updated and revised versions of several chapters with entirely new chapters that deal with new online monitoring techniques like hyperspectral imaging and Raman spectroscopy, the use of nanotechnology for sensor devices or new packaging materials and the application of omics technologies like nutrigenomics and proteomics for meat quality and nutrition. The book starts with the control and traceability of genetically modified farm animals, followed by four chapters reporting the use of online non-destructive monitoring techniques like hyperspectral imaging and Raman spectroscopy, real-time PCR for pathogens detection, and nanotechnology-based sensors. Then, five chapters describe different advanced technologies for meat decontamination, such as irradiation, hydrostatic and hydrodynamic pressure processing, other non-thermal technologies, and the reduction in contaminants generation. Nutrigenomics in animal nutrition and production is the object of a chapter that is followed by five chapters dealing with nutritional-related issues like bioactive peptides, functional meats, fat and salt reduction, processing of nitrite-free products, and the use of proteomics for the improved processing of dry-cured meats. The last four chapters are reporting the latest developments in bacteriocins against meat-borne pathogens, the functionality of bacterial starters, modified atmosphere packaging and the use of new nanotechnology-based materials for intelligent and edible packaging.







Handbook of Information Security, Threats, Vulnerabilities, Prevention, Detection, and Management


Book Description

The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare.




Linux Networking Cookbook


Book Description

This soup-to-nuts collection of recipes covers everything you need to know to perform your job as a Linux network administrator, whether you're new to the job or have years of experience. With Linux Networking Cookbook, you'll dive straight into the gnarly hands-on work of building and maintaining a computer network. Running a network doesn't mean you have all the answers. Networking is a complex subject with reams of reference material that's difficult to keep straight, much less remember. If you want a book that lays out the steps for specific tasks, that clearly explains the commands and configurations, and does not tax your patience with endless ramblings and meanderings into theory and obscure RFCs, this is the book for you. You will find recipes for: Building a gateway, firewall, and wireless access point on a Linux network Building a VoIP server with Asterisk Secure remote administration with SSH Building secure VPNs with OpenVPN, and a Linux PPTP VPN server Single sign-on with Samba for mixed Linux/Windows LANs Centralized network directory with OpenLDAP Network monitoring with Nagios or MRTG Getting acquainted with IPv6 Setting up hands-free networks installations of new systems Linux system administration via serial console And a lot more. Each recipe includes a clear, hands-on solution with tested code, plus a discussion on why it works. When you need to solve a network problem without delay, and don't have the time or patience to comb through reference books or the Web for answers, Linux Networking Cookbook gives you exactly what you need.