![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
Showing 1 - 5 of 5 matches in All Departments
This updated edition explores assessing cell viability as a measure for cell fitness under conditions of physiological and patho-physiological stress as well as challenging conditions to cellular and tissue homeostasis, and accounts for the ongoing 2D-to-3D development with topics and assays that target cell viability, mobility, and functionality of tissues and organs, natural or bioartificial, in 3D. The book’s contents span a wide range of viability and functionality assays, from impedance spectroscopy to chemiluminescence, fluorescence and label-free optical detection methodologies. Written for the highly successful Methods in Molecular Biology series, chapters include introductions to their respective topics, lists of the necessary materials and reagents, step-by-step, readily reproducible laboratory protocols, and tips on troubleshooting and avoiding known pitfalls. Authoritative and up-to-date, Cell Viability Assays: Methods and Protocols, Second Edition serves as a valuable resource to the growing community in bioinspired life sciences, biomedical sciences, and biotechnology by providing more standardized protocols to probe the “wellbeing” of cells in various environments.
Take network security to the next level!This book has never before published advanced security techniques and step-by-step instructions showing how to defend against devastating vulnerabilities to systems and network infrastructure.Just about every day the media is reporting another hard-core hack against some organisation. It was reported mid-March that hackers had taken over one of Lexis Nexis' databases gaining access to the personal files of as many as 32,000 people. Extreme Exploits provides advanced methodologies and solutions needed to defend against sophisticated exploits by showing them how to use the latest advanced security tools. The book teaches you how little-known vulnerabilities have been successfully exploited in the real world and have wreaked havoc on large-scale networks.
|
You may like...
Goodnight Golda - A Handbook For Brave…
Batya Bricker, Ilana Stein
Paperback
Measures of Complexity - Festschrift for…
Vladimir Vovk, Harris Papadopoulos, …
Hardcover
Resilience Assessment and Evaluation of…
Katinka Wolter, Alberto Avritzer, …
Hardcover
R2,738
Discovery Miles 27 380
|