Anthrax initiation

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Anthrax.

Anthrax is an often fatal bacterial infection that occurs when Bacillus anthracis endospores enter the body through one of three major routes: inhalational, cutaneous, or gastrointestinal. Before the anthrax terrorist attacks in the United States in 2001, there was very little interest in anthrax as a serious human pathogen; anthrax was viewed mainly as a veterinarian problem of minor importanc...

متن کامل

[Anthrax].

Having dwelled on the etiopathogenetic, pathologic, and clinical features of human infections caused by B. anthracis, the authors review and analyze epidemiological data of the cases of anthrax registered in Italy during the last ten years. Actual possibilities for prevention are evaluated in view of the fact that enzootic foci still exist in our country which are clearly responsible for the ty...

متن کامل

Anthrax: A motor protein determines anthrax susceptibility

A new study has found that polymorphisms in the host gene kif1C, which encodes a kinesin-like motor protein, determine whether mouse macrophages are resistant or sensitive to anthrax lethal toxin. These findings may lead the way to discovering how both germ and host factors might contribute to a lethal infection.

متن کامل

Targeted silencing of anthrax toxin receptors protects against anthrax toxins.

Anthrax spores can be aerosolized and dispersed as a bioweapon. Current postexposure treatments are inadequate at later stages of infection, when high levels of anthrax toxins are present. Anthrax toxins enter cells via two identified anthrax toxin receptors: tumor endothelial marker 8 (TEM8) and capillary morphogenesis protein 2 (CMG2). We hypothesized that host cells would be protected from a...

متن کامل

Security testing of session initiation protocol implementations

The mechanisms which enable the vast majority of computer attacks are based on design and programming errors in networked applications. The growing use of voice over IP (VOIP) phone technology makes these phone applications potential targets. We present a tool to perform security testing of VOIP applications to identify security vulnerabilities which can be exploited by an attacker. Session Ini...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Genome Biology

سال: 2002

ISSN: 1474-760X

DOI: 10.1186/gb-2002-3-9-reports0051