|
Showing 1 - 15 of
15 matches in All Departments
This book presents practical information on the clinical
applications of short pulse laser systems and the techniques for
optimizing these applications in a manner that will be relevant to
a broad audience, including engineering and medical students as
well as researchers, clinicians, and technicians. Short pulse laser
systems are useful for both subsurface tissue imaging and laser
induced thermal therapy (LITT), which hold great promise in cancer
diagnostics and treatment. Such laser systems may be used alone or
in combination with optically active nanoparticles specifically
administered to the tissues of interest for enhanced contrast in
imaging and precise heating during LITT. Mathematical and
computational models of short pulse laser-tissue interactions that
consider the transient radiative transport equation coupled with a
bio-heat equation considering the initial transients of laser
heating were developed to analyze the laser-tissue interaction
during imaging and therapy. Experiments were first performed to
characterize the tissue optical properties needed to optimize the
dose for thermal therapy. Experiments were then performed on animal
models to characterize the heat affected zone for LITT. The
experimental measurements were also validated using the
computational models.
Thirty-two mostly fictional stories about people who had a brief
encounter with Jesus. Provides background about the person, what
caused them to have the encounter, how they reacted to meeting and
speaking with Jesus and what it did to their subsequent lives. At
the end of each story there is a contemporary reflection to help
the reader understand how they might have reacted if they had met
Jesus face-to-face.
An intriguing collection of 20 poems inspired by the names of the
2009 Kentucky Derby thoroughbreds in the order they finished. The
poet explores the spiritual landscape of hope, loss, love,
addiction, and the mysterious bond between women and horses.
A firewall is as good as its policies and the security of its VPN
connections. The latest generation of firewalls offers a dizzying
array of powerful options; they key to success is to write concise
policies that provide the appropriate level of access while
maximizing security.
This book covers the leading firewall products: Cisco PIX, Check
Point NGX, Microsoft ISA Server, Juniper s NetScreen Firewall, and
SonicWall. It describes in plain English what features can be
controlled by a policy, and walks the reader through the steps for
writing the policy to fit the objective. Because of their
vulnerability and their complexity, VPN policies are covered in
more depth with numerous tips for troubleshooting remote
connections.
. The only book that focuses on creating policies that apply to
multiple products.
. Included is a bonus chapter on using Ethereal, the most popular
protocol analyzer, to monitor and analyze network traffic.
. Shows what features can be controlled by a policy, and walks you
through the steps for writing the policy to fit the objective at
hand"
|
|