نتایج جستجو برای: preventive defense
تعداد نتایج: 127864 فیلتر نتایج به سال:
BACKGROUND Participation in population-based preventive health check has declined over the past decades. More research is needed to determine factors enhancing participation. The objective of this study was to examine the association between two measures of neighborhood level social capital on participation in the health check phase of a population-based lifestyle intervention. METHODS The st...
Spirochetes in the genus Borrelia are responsible for tick-borne relapsing fever and Lyme disease. Borrelia-tick interactions are highly specific as each species of Borrelia is only transmitted by one or a few closely related species of ticks. Borrelia colonize the gut or salivary glands of ticks. Several Borrelia genes required for tick colonization or transmission have been identified. Borrel...
BACKGROUND Axin1 and its homolog Axin2 are scaffold proteins essential for regulating Wnt signaling. Axin-dependent regulation of Wnt is important for various developmental processes and human diseases. However, the involvement of Axin1 and Axin2 in host defense and inflammation remains to be determined. METHODS/PRINCIPAL FINDINGS Here, we report that Axin1, but not Axin2, plays an essential ...
Tuberculosis (TB) and HIV co-infections place an immense burden on health care systems and pose particular diagnostic and therapeutic challenges. Infection with HIV is the most powerful known risk factor predisposing for Mycobacterium tuberculosis infection and progression to active disease, which increases the risk of latent TB reactivation 20-fold. TB is also the most common cause of AIDS-rel...
Cross Site Request Forgery is considered as one of top vulnerability in today’s web, where an untrusted website can force the user browser to send the unauthorized valid request to the trusted site. Cross Site Request Forgery will let the integrity of the legitimate user. So far many solutions have been proposed for the CSRF attacks such as the referrer HTTP Header, Custom HTTP header, Origin H...
Background and aims: In occupational counselling have been emphasised on effect of personality, cognitive and affective traits in genesis, development and level of motivation. Therefore, Present study aimed to predict Job Motivation of medical employers of Red Cross organization based on Defense Mechanisms and Culture Intelligence. Methods: Methodology was correlation. 180 participants were se...
Resumo Cryptographic techniques are at the center of security solutions for wireless ad hoc networks. Public key infrastructures (PKIs) are essential for their efficient operation. However, the fully distributed organization of these networks makes a challenge to design PKIs. Changes in network paradigms and the increasing dependency on technology require more dependable and sur-vivable PKIs. T...
Adversaries(are(using(clientBside(attacks(and(malware(to(bypass(traditional(perimeter( defenses(and(establish(footholds(on(internal(networks.((Preventive(controls(are(failing(to( keep(attackers(out(of(private(networks,(and(media(outlets(publicize(another(breach(at(a( major(organization(on(an(almost(regular(basis.(((More(needs(to(be(done(in(order(to(identify( and(slow(down(attackers(who(have(est...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید