Greenfield's Neuropathology, Ninth Edition: 2-Volume Set

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Gaddum's Pharmacology. Ninth Edition

The ninth edition of Gaddum's Pharmacology by A.S.V. Burgen and J.F. Mitchell is a review well-suited to the medical or pharmacology student. This new edition covers the essentials of pharmacology and incorporates recent advances in areas such as the mechanism of drug receptors and neuropharmacological agents. The chapters are very brief and begin with a general description of the class of phar...

متن کامل

Janeway’s Immunobiology, Ninth Edition

respect to our microbial communities. The authors do the field a service by making it very clear that there is much to be learned, and that even their published book is not absolute by virtue of being the latest news. In addition, the hand-drawn illustrations are appealing and contribute to perception that far from being immortalized in official, unchangeable textbook figures, the microbiome is...

متن کامل

The National Formulary, Ninth Edition

357 interested in a rapid, readable survey of the field. For those interested in more limited phases of protein research, the bibliography will prove helpful.

متن کامل

IJSRP Feb 2012 Edition, Volume 2, Issue 2

Continuous deployment of antifungals in treating infections caused by dimorphic opportunistic pathogen Candida albicans has led to the emergence of drug resistance resulting in cross-resistance to many unrelated drugs, a phenomenon termed as Multi-Drug Resistance (MDR). Although there is reasonable understanding of major factors which contribute to MDR mechanisms, it appears unavoidable to cons...

متن کامل

IJSRP Feb 2012 Edition, Volume 2, Issue 2

Recursive Visual cryptography takes the idea from the basic scheme of Visual cryptography to hide multiple secrets recursively in the single image. [1] This paper proposes a scheme of recursive creation of shares using the basic scheme and embedding secrets into the shares. This results levels of share creation i.e. nsecrets equals n/2 levels. This paper also provides secured authentication for...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Neuropathology & Experimental Neurology

سال: 2015

ISSN: 0022-3069,1554-6578

DOI: 10.1093/jnen/74.12.1185