sâmbătă, 26 mai 2012

Apoptosis: Physiology and Pathology

Douglas R. Green, John C. Reed,
"Apoptosis: Physiology and Pathology"


...bri..e Un...rsi.. Pr... /2011-08-22 /ISBN: 0521886562 /472 pages /PDF /9,4 MB



Apoptosis, or cell death, can be pathological, a sign of disease and damage, or physiological, a process essential for normal health. This pathological dysregulation of cell death can be characterized by either too much loss of essential cells in the heart, brain, and other tissues with little regenerative capacity or by too little cell turnover in self-renewing tissues, giving rise to cancer and other maladies. This is a process of fundamental importance for development and normal health, which is altered in many disease conditions. This book, with contributions from experts in the field, provides a timely compilation of reviews of mechanisms of apoptosis. The book is organized into three convenient sections.
The first section explores the different processes of cell death and how they relate to one another.
The second section focuses on organ-specific apoptosis-related diseases.
The third section explores cell death in non-mammalian organisms, such as plants. This comprehensive text is a must-read for all researchers and scholars interested in apoptosis.

vineri, 25 mai 2012

Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats

Will Gragido, John Pirc
"Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats"

S--ess | ISBN: 1597496138 | 2011 | PDF | 272 pages | 14,3 MB

Cybercrime and Espionage provides a wealth of knowledge related to the realities seen in the execution of advanced attacks, their success from the perspective of exploitation and their presence within all industry. This book will educate you on realities of advanced, next generation threats, which take form in a variety ways. The authors, working in conjunction with strategic technology partners have key insights into the realm of what these new threats, dubbed "Subversive Multi-Vector Threats" or 'SMT's. Whether the goal is to acquire and subsequently sell intellectual property from one organization to a competitor or the international black markets, to compromise financial data and systems, or undermine the security posture of a nation state by another nation state or sub-national entity, these threats are real and growing at an alarming pace.
Includes detailed analysis and examples of the threats in addition to related anecdotal information
Authors' combined backgrounds of security, military, and intelligence, give you distinct and timely insights
Presents never-before-published information: identification and analysis of cybercrime and the psychological profiles that accompany them.


Salem Health: Psychology & Mental Health

Salem Health: Psychology & Mental Health

Salem Press | 2009-10-15 | ISBN: 158765556X | 2208 pages | PDF | 15 MB

This comprehensive five-volume set covers notable theories, people, social issues, life stages, the physiology and anatomy of the nervous system, and various mental illnesses or conditions, all in a simple, easy to use A-Z format. The printed reference includes: five volumes, including 2,560 pages; 593 Essays and 143 sidebars and charts; 169 photos & Illustrations; and, appendixes, indexes and resource listings. Features of the online subscription include: fully supported; complimentary online access; unlimited users at your library; full access from home or dorm room; immediate access via online registration; a simple, intuitive interface; user profile areas for students and patrons; sophisticated search functions; complete content, including appendixes; and, fully illustrated. Scope and coverage: The publication of this five-volume set represents a substantial revision and update of "Magill's Encyclopedia of Social Science: Psychology". The new encyclopedia covers not only the history of the field and the core aspects of behaviorism, cognitive psychology, and psychoanalytic psychology but also diagnoses, disorders, treatments, tests, notable people, and issues, including many popular concepts. Many of the newly added essays address how culture, ethnicity, and gender affect psychological theory and beliefs. They cover topics such as multicultural psychology and the effect of culture on diagnosis and look at groups as divergent as Latinos, Asian Americans/Pacific Islanders, and the gay, lesbian, bisexual, and transgender communities. Some examine gender differences, in particular gender roles and conflicts. Other essays examine important and developing issues in psychology, such as multiple intelligences, emotional intelligence, pharmaceuticals used in treatment, genetics, and the effects of hope, spirituality, and social support. Organization and format: The essays in this set range from one to eight pages in length. Every entry begins with standard information, including any relevant dates, the type of psychology and the field(s) of study. Biographical entries also include an 'Identity' line indicating nationality and specialty. The text of each article offers a clear and concise discussion of the topic. An entry on a mental illness addresses its cause, diagnosis, treatment, and impact. An entry on a theory or school examines its origin, history, and current status. "Salem Health" creates complimentary online access to all the content of "Salem Health: Psychology & Mental Health". The database is free with the purchase of the printed reference. Virtually all of the content of the printed version is online, including illustrations and sidebars, indexes, appendixes, and other back matter. A powerful and complete online database: "Salem Health" offers libraries a user-friendly interface that provides all the content of our printed resources. "Salem Health: Psychology & Mental Health" (along with "Magill's Medical Guide" and "Salem Health: Cancer") are all available online as a complimentary resource, when the print reference is purchased.

"North of Montana"

April Smith, "North of Montana"

Publisher: Vintage | ISBN: 0307390659 | edition 2009 | PDF | 598 pages | 1,43 mb

FBI Special Agent Ana Grey debuts in this electrifying thriller marked by psychological acuity and unfaltering suspense. After Ana Grey pulls off “the most amazing arrest of the year,” the squad supervisor—who doesn't like irreverent, tough-minded young women—gives her a reprimand instead of the promotion she deserves. As a test, she is assigned a high-profile case involving a beloved Hollywood movie star and an illegal supply of prescription drugs. It doesn't take Ana and her partner, Mike Donnato, long to realize "this is not a case” but “a political situation waiting to explode”—and they're holding the bomb. As the boundary between her private and professional lives begins to blur, Ana's own world collides with her investigation, and she is forced to confront the searing truth about the nature of power and identity, and the mystery of her past.

Godwin - Criminal Psychology And Forensic Technology

Godwin - Criminal Psychology And Forensic Technology: a Collaborative Approach To Effective Profiling
CRC | ISBN: 0849323584 | 29/11/2000 | English | 376 pages | PDF | 4 MB

Offender profiling has been developing slowly as a possible investigative tool since 1841 and the publication of Edgar Allen Poe's The Murder in the Rue Morgue. In this book, detective C. Auguste Dupin demonstrates the ability to follow the thought patterns of a companion while they stroll through Paris for 15 minutes without speaking a word. Today profiling is an important investigative tool. Nevertheless, it often represents a less than educated attempt to provide law enforcement agencies with detailed information about the behavior of an unknown individual who has committed a crime. Criminal Psychology and Forensic Technology: A Collaborative Approach to Effective Profiling introduces alternative approaches to improving the way crimes are investigated and offender profiles are generated. It shows forensic evidence experts how to work with profilers to combine discrete data into a more meaningful picture. The contributors address both their own specialty, such as anthropology, and then demonstrate how working in conjunction with criminal psychologists can provide more effective offender profiles. This book is unique in that it provides you with an array of articles that fuse aspects of criminal psychology and several forensic science methods in a collaborative effort to improve profiling. Written in a format that is simple and straightforward, it utilizes actual case studies to show how specific procedures relate to police investigations. The only book on the market that shows a team approach to criminal profiling, Criminal Psychology and Forensic Technology: A Collaborative Approach to Effective Profiling is a reference perfect for students interested in learning criminal profiling techniques and professionals wishing to sharpen their skills. Whatever your reason for choosing this book, it will enlighten you about alternative investigative tools.

Review
“ ...an excellent reference text for anyone with an academic interest in criminal profiling.
- Angus F. Dalley, Ph.D., in Canadian Society of Forensic Science, Vol. 35, No. 2

…gives the reader a good grasp of the truly controversial nature of profiling.
- Crime and Justice International, September 2002 ”

Stalking, Threatening, and Attacking Public Figures: A Psychological and Behavioral Analysis

J. Reid Meloy, Lorraine Sheridan, Jens Hoffmann, "Stalking, Threatening, and Attacking Public Figures: A Psychological and Behavioral Analysis"

Oxford University Press, USA | 2008-06-12 | ISBN: 0195326385 | 496 pages | PDF | 2,7 MB

Public figures require attention, whether from a constituency who votes them in or out of office, shareholders who decide their economic benefit to the corporation, or fans who judge their performances. However, on the periphery of this normal attention resides a very real risk; that of a much smaller group of individuals who lack the ability to discriminate between their own private fantasies and the figure's public behavior. They may be personally insulted by perceived betrayal, fanatically in love due to a perceived affectionate or sexual invitation, or simply preoccupied with the daily life of the public figure. Such individuals may fixate and do nothing more. Others communicate or approach in a disturbing way. A few will threaten. And on rare occasions, one will breach the public figure's security perimeter and attack.
Stalking, Threatening, and Attacking Public Figures is a comprehensive survey of the current knowledge about stalking, violence risk, and threat management towards public figures. With contributions from forensic psychologists and psychiatrists, clinicians, researchers, attorneys, profilers, and current and former law enforcement professionals, this book is the first of its kind, international in scope, and rich in both depth and complexity.
The book is divided into three sections which, in turn, focus upon defining, explaining, and risk managing this increasingly complex global reality. Chapters include detailed case studies, analyses of quantitative data, reflections from attachment theory and psychoanalytic thought, descriptions of law enforcement and protective organization activities, mental health and psychiatric categorizations and understandings, consideration of risk assessment models and variables, victim perspectives, and others.

The Sociology And Psychology Of Terrorism: Who Becomes A Terrorist And Why ?


Rex A. Hudson, Marilyn Majeska, "The Sociology And Psychology Of Terrorism: Who Becomes A Terrorist And Why?"

Publisher: University Press of the Pacific | 2005 | ISBN 1410212777 | PDF | 186 pages | 10 MB

Report Prepared under an Interagency Agreement
by the Federal Research Division, Library of Congress

CONTENTS
 Preface Executive Summary: Mindsets of Mass Destruction New Types of Post-Cold War Terrorists -- New Forms of Terrorist-Threat Scenarios Introduction Terms of Analysis Defining Terrorism and Terrorists -- Terrorist Group Typologies Approaches to Terrorism Analysis The Multicausal Approach -- The Political Approach -- The Organizational Approach -- The Physiological Approach -- The Psychological Approach General Hypotheses of Terrorism Frustration-Aggression Hypothesis -- Negative Identity Hypothesis -- Narcissistic Rage Hypothesis The Psychology of the Terrorist Terrorist Motivation -- The Process of Joining a Terrorist Group -- The Terrorist as Mentally Ill --The Terrorist as Suicidal Fanatic -- Fanatics -- Suicide Terrorists -- Terrorist Group Dynamics -- Pressures to Conform -- Pressures to Commit Acts of Violence -- Terrorist Rationalization of Violence -- The Terrorist's Ideological or Religious Perception Terrorist Profiling Hazards of Terrorist Profiling -- Sociological Characteristics of Terrorists in the Cold War Period -- Characteristics of Female Terrorists -- Female Motivation for Terrorism Conclusion Terrorist Profiling -- Terrorist Group Mindset Profiling -- Promoting Terrorist Group Schisms -- How Guerrilla and Terrorist Groups End Appendix -- Sociopsychological Profiles: Case Studies Exemplars of International Terrorism in the Early 1970s -- Exemplars of International Terrorism in the Early 1990s -- Ethnic Separatist Groups -- Social Revolutionary Groups -- Religious Fundamentalist Groups Tables Educational Level and Occupational Background of Right-Wing Terrorists in West Germany, 1980 -- Ideological Profile of Italian Female Terrorists, January 1970-June 1984 -- Prior Occupational Profile of Italian Female Terrorists, January 1970-June 1984 -- Geographical Profile of Italian Female Terrorists, January 1970-June 1984 -- Age and Relationships Profile of Italian Female Terrorists, January 1970-June 1984 -- Patterns of Weapons Use by the Revolutionary Organization 17 November, 1975-97 Glossary Bibliography.

The purpose of this study is to focus attention on the types of individuals and groups that are prone to terrorism (see Glossary) in an effort to help improve U.S. counterterrorist methods and policies.
The emergence of amorphous and largely unknown terrorist individuals and groups operating independently (freelancers) and the new recruitment patterns of some groups, such as recruiting suicide commandos, female and child terrorists, and scientists capable of developing weapons of mass destruction, provide a
measure of urgency to increasing our understanding of the psychological and sociological dynamics of terrorist groups and individuals. The approach used in this study is twofold. First, the study examines the relevant literature and assesses the current knowledge of the subject. Second, the study seeks to develop psychological and sociological profiles of foreign terrorist individuals and selected groups to use as case studies in assessing trends, motivations, likely behavior, and actions that might deter such behavior, as well as reveal vulnerabilities that would aid in combating terrorist groups and individuals.
Because this survey is concerned not only with assessing the extensive literature on sociopsychological aspects of terrorism but also providing case studies of about a dozen terrorist groups, it is limited by time constraints and data availability in the amount of attention that it can give to the individual groups, let
alone individual leaders or other members. Thus, analysis of the groups and leaders will necessarily be incomplete. A longer study, for example, would allow for the collection and study of the literature produced by each group in the form of autobiographies of former members, group communiqués and manifestos,
news media interviews, and other resources. Much information about the terrorist mindset (see Glossary) and decision-making process can be gleaned from such sources. Moreover, there is a language barrier to an examination of the untranslated literature of most of the groups included as case studies herein.
Terrorism databases that profile groups and leaders quickly become outdated, and this report is no exception to that rule. In order to remain current, a terrorism database ideally should be updated periodically. New groups or terrorist leaders may suddenly emerge, and if an established group perpetrates a major terrorist incident, new information on the group is likely to be reported in news media.
Even if a group appears to be quiescent, new information may become available about the group from scholarly publications.
There are many variations in the transliteration for both Arabic and Persian. The academic versions tend to be more complex than the popular forms used in the news media and by the Foreign Broadcast Information Service (FBIS). Thus, the latter usages are used in this study. For example, although Ussamah bin Ladin is
the proper transliteration, the more commonly used Osama bin Laden is used in this study.