Бази даних

Наукова електронна бібліотека - результати пошуку

Mozilla Firefox Для швидкої роботи та реалізації всіх функціональних можливостей пошукової системи використовуйте браузер
"Mozilla Firefox"

Вид пошуку
у знайденому
Сортувати знайдені документи за:
авторомназвоюроком видання
Формат представлення знайдених документів:
повнийстислий
 Знайдено в інших БД:Віртуальна довідка (1)Автореферати дисертацій (424)Реферативна база даних (865)Книжкові видання та компакт-диски (194)Журнали та продовжувані видання (28)
Пошуковий запит: (<.>K=JUNIPER$<.>+<.>K=NETWORKS$<.>)
Загальна кількість знайдених документів : 77
Представлено документи з 1 до 20
...

   Тип видання:   методичний посібник   
1.

Ackerley, R.
Telecommunications performance engineering [Electronic resource] / R. Ackerley. - [S. l.] : Institution of Electrical Engineers, 2004. - 288 p.
Переклад назви: Продуктивність інженерних телекомунікацій

Рубрики:

  Повний текст доступний у читальних залах НБУВ


This book provides an insight into the rich diversity of techniques, tools and knowledge used in performance engineering, covering the whole life cycle — from design through to operation — of both networks and systems



Кл.слова:
розробка -- комунікація

   Тип видання:   довідник   
2.

Allen, R.
Active directory cookbook [Electronic resource] : for Windows Server 2003 and Windows 2000 / R. Allen. - Sebastopol : O'Reilly, 2003. - 622 p
Переклад назви: Активний каталог для Windows Server 2003 і Windows 2000

Рубрики:

  Повний текст доступний у читальних залах НБУВ


Those of you who run networks on Windows 2000 know the benefits of using Active Directory for managing user information and permissions. You also know what a bear it can be. The newer version included with Windows Server 2003 has over 100 new and updated features to simplify deployment, but once it's in place many system administrators still find Active Directory challenging. If you're among those looking for practical hands-on support, help is here with our new Active Directory Cookbook for Windows Server 2003 & Windows 2000, a unique problem-solving guide that offers quick answers for both versions of the directory. The book contains hundreds of step-by-step solutions for both common and uncommon problems that you might encounter with Active Directory on a daily basis--including recipes to deal with the Lightweight Directory Access Protocol (LDAP), multi-master replication, Domain Name System (DNS), Group Policy, the Active Directory Schema, and many other features. Author Robbie Allen, a Senior Systems Architect at Cisco Systems and co-author of our Active Directory tutorial, based this collection of troubleshooting recipes on his own experience, along with input from Windows administrators throughout the industry. Each recipe includes a discussion to explain how and why the solution works, so you can adapt the problem-solving techniques to similar situations.



Кл.слова:
домен -- протокол доступу -- адміністратор

   Тип видання:   наукове видання   
3.

Barnes, D.
Cisco LAN switching [Electronic resource] / D. Barnes, B. Sakandar. - Indianapolis : Cisco Press, 2004. - 408 p.

Рубрики:

  Повний текст доступний у читальних залах НБУВ


Local-area networks (LANs) are becoming increasingly congested and overburdened because of a dramatic increase in traffic, faster CPUs and operating systems, and more network-intensive applications. Many organizations that use network and computing technology use LAN switching to take advantage of high-speed traffic forwarding and improved performance of traditional Ethernet technologies that don't require costly wiring upgrades or time-consuming host reconfiguration. Cisco LAN Switching Fundamentals provides administrators of campus networks with the most up-to-date introduction to LAN switching within a traditional Ethernet environment.



Кл.слова:
мережі -- інтернет

   Тип видання:   наукове видання   
4.

Bigus, J. P.
Data Mining with Neural Networks [Electronic resource] / J. P. Bigus. - New York : McGRAW-HILL, 1996. - 220 p.
Переклад назви: Видобуток даних за допомогою нейронних мереж

Рубрики:

  Повний текст доступний у читальних залах НБУВ


This book contains simple examples to provide illustration. The data used in the examples contains information that is not based on any real companies or people. The author and publisher of this book have used their best efforts in preparing this book. The author and publisher make no warranty of any kind, expressed or implied, with regard to the documentation and examples contained in this book. The author and publisher shall not be liable in any event for incidental or consequential damages in connection with, or arising out of the use of, information in this book. The views expressed in this book are the views of the author and do not necessarily reflect the views of the IBM Corporation. This book is not sponsored in any part, or in any manner, by IBM.



Кл.слова:
дані -- мережа

   Тип видання:   методичний посібник   
5.

Boney, J.
Cisco IOS in a Nutshell [Electronic resource] / J. Boney. - 2nd. ed.. - Sebastopol : O'Reilly, 2005. - 796 p.

Рубрики:

  Повний текст доступний у читальних залах НБУВ


Cisco routers are everywhere that networks are. They come in all sizes, from inexpensive units for homes and small offices to equipment costing well over $100,000 and capable of routing at gigabit speeds. A fixture in today's networks, Cisco claims roughly 70% of the router market, producing high-end switches, hubs, and other network hardware. One unifying thread runs through the product line: virtually all of Cisco's products run the Internetwork Operating System, or IOS.



Кл.слова:
мережа

   Тип видання:   методичний посібник   
6.

Bott, E.
Microsoft Windows security inside out for Windows XP and Windows 2000 [Electronic resource] / E. Bott, C. Siechert. - Redmond : Microsoft Press, 2003. - 800 p.

Рубрики:

  Повний текст доступний у читальних залах НБУВ


Hey, you know your way around a desktop -- so now dig into the Windows operating system and really put its security features to work! Covering Windows XP Professional, Windows XP Home Edition, and Windows 2000 Professional, this supremely organized reference packs hundreds of timesaving solutions, checklists, troubleshooting tips, and workarounds -- all in concise, fast-answers format. Learn the essential tools and techniques for tightening up security on your personal computer or network, including ways to fend off viruses, hackers, spam, denial-of-service attacks, and other threats. Discover how to button up your Virtual Private Networks (VPNs), remote access, and wireless networking services. And take ultimate control of security with advanced solutions such as file encryption, port blocking, Internet Protocol Security, group policies, and tamper-proofing the Registry.



Кл.слова:
безпека системи -- захист інформації

   Тип видання:   наукове видання   
7.

Callaway, Е. H.
Wireless sensor networks [Electronic resource] : architectures and protocols / Е. H. Callaway. - Boca Raton : CRC Press, 2004. - 350 p.
Переклад назви: Бездротові сенсорні мережі: архітектура і протоколи

Рубрики:

  Повний текст доступний у читальних залах НБУВ


This informative text describes how to build wireless sensor networks from the layers of the communication protocol through the design of network nodes. It also describes the design features of the wireless devices themselves.



Кл.слова:
телекомунікаційна система -- мережі

   Тип видання:   наукове видання   
8.

Campi, N.
Automating Linux and Unix System Administration [Electronic resource] / N. Campi, K. Bauer. - 2th. ed.. - New York : Apress, 2009. - 419 p.
Переклад назви: Автоматизація Linux і Unix System Administration

Рубрики:

  Повний текст доступний у читальних залах НБУВ


Whether you need a network of ten Linux PCs and a server or a datacenter with a few thousand Unix nodes, you need to know how to automate much of the installation, configuration, and standard system administration. Build your network once using cfengine, and the network build will work, without user intervention, on any hardware you prefer.Automating Linux and Unix System Administration, Second Editionis unique in its focus on how to make the system administrator's job easier and more efficient: instead of just managing the system administrator's time, the book explains the technology to automate repetitive tasks and the methodology to automate successfully. Both new and seasoned professionals will profit from industry–leading insights into the automation process. System administrators will attain a thorough grasp of cfengine, kickstart, and shell scripting for automation. After reading all chapters and following all exercises in this book, the reader will be able to set up anything from a Linux datacenter to a small office network. What you'll learn See how to make changes on many UNIX and Linux hosts at once in a reliable and repeatable manner. Learn how to automate things correctly so you only have to do it once, by leveraging the authors' experience in setting up small, medium, and large networks. Set up a Linux datacenter or a network correctly. Explore handling real–world environments where not all hosts are configured alike via a case study of a fictional new datacenter buildout. Examine real–world examples for core infrastructure services (DNS, mail, monitoring, log analysis, security, cfengine, imaging) to build on in your environment. Understand core system administration best practices, which are a key part of how cfengine and automations deployments are outlined in the book. Learn how to make changes reversible, repeatable, and correct the first time through interaction with product/application stakeholders (programmers, product managers, customers, etc.). Who this book is for This book is for Linux system administrators who want to learn about the software and methodology to automate repetitive tasks-regardless of network or datacenter size-in one place. System managers will also find it much easier to think about network technology and automation projects if they read this book. This book is also for anyone who is interested in repeatable and secure infrastructure.



Кл.слова:
програмне забезпечення -- операційна система

   Тип видання:   підручник   
9.

Casad, J.
Sams teach yourself TCP/IP in 24 hours [Electronic resource] / J. Casad. - 3rd. ed.. - Indianapolis : Sams Publishing, 2003. - 450 p.
Переклад назви: Самовчитель TCP/IP за 24 години

Рубрики:

  Повний текст доступний у читальних залах НБУВ


As the Internet continues to expand its reach, more and more users, administrators, and programmers need to learn about TCP/IP--the core standard behind the Internet, and the dominant protocol for networks throughout the world. Sams Teach Yourself TCP/IP in 24 Hours provides a clear and concise introduction to TCP/IP. It is accessible enough for non-technical readers, yet specific enough for technical readers who are looking for a solid foundation in TCP/IP. This edition adds coverage of recent developments that affect TCP/IP. New topics added include: wireless networking, spam control, broadband, and peer-to-peer networking technologies.



Кл.слова:
мережевий протокол -- інтернет-протокол

   Тип видання:   науково-популярне видання   
10.

Casebeer, William D..
Natural ethical facts [Electronic resource] : evolution, connectionism, and moral cognition / William D. Casebeer. - Cambridge : A Bradford Book, 2003. - 227 p
Переклад назви: Природні етичні факти: еволюція, коннекціонізм і моральне пізнання

  Повний текст доступний у читальних залах НБУВ


In Natural Ethical Facts William Casebeer argues that we can articulate a fully naturalized ethical theory using concepts from evolutionary biology and cognitive science, and that we can study moral cognition just as we study other forms of cognition. His goal is to show that we have "softly fixed" human natures, that these natures are evolved, and that our lives go well or badly depending on how we satisfy the functional demands of these natures. Natural Ethical Facts is a comprehensive examination of what a plausible moral science would look like.Casebeer begins by discussing the nature of ethics and the possible relationship between science and ethics. He then addresses David Hume's naturalistic fallacy and G. E. Moore's open-question argument, drawing on the work of John Dewey and W. V. O. Quine. He then proposes a functional account of ethics, offering corresponding biological and moral descriptions. Discussing in detail the neural correlates of moral cognition, he argues that neural networks can be used to model ethical function. He then discusses the impact his views of moral epistemology and ontology will have on traditional ethical theory and moral education, concluding that there is room for other moral theories as long as they take into consideration the functional aspect of ethics; the pragmatic neo-Aristotelian virtue theory he proposes thus serves as a moral "big tent." Finally, he addresses objections to ethical naturalism that may arise, and calls for a reconciliation of the sciences and the humanities. "Living well," Casebeer writes, "depends upon reweaving our ethical theories into the warp and woof of our scientific heritage, attending to the myriad consequences such a project will have for the way we live our lives and the manner in which we structure our collective moral institutions."



Кл.слова:
еволюція -- теорія пізнання -- релігійна етика

   Тип видання:   методичний посібник   
11.

Chapman, D. B.
Building Internet firewalls [Electronic resource] / D. B. Chapman, E. D. Zwicky. - Sebastopol : O'Reilly, 1995. - 517 p.
Переклад назви: Побудова інтернет-фаєрволів

Рубрики:

  Повний текст доступний у читальних залах НБУВ


More than a million systems are now connected to the Internet, and something like 15 million people in 100 countries on all seven continents use Internet services. More than 100 million email messages are exchanged each day, along with countless files, documents, and audio and video images. Everyone is jumping on the Internet bandwagon. Once a haven for academicians and scientists, the Net is now reaching large and small businesses, government at all levels, school children, and senior citizens. The commercial world is rushing headlong into doing business on the Internet, barely pausing while technologies and policies catch up with their desire to go online. But, too few of the seekers after Internet wisdom and riches consider whether their businesses will be safe on the Net. What kinds of security risks are posed by the Internet? Some risks have been around since the early days of networking -- password attacks (guessing them or cracking them via password dictionaries and cracking programs), denial of service, and exploiting known security holes. Some risks are newer and even more dangerous -- packet sniffers, IP (Internet Protocol) forgery, and various types of hijacking attacks. Firewalls are a very effective way to protect your system from these Internet security threats. Firewalls in computer networks keep damage on one part of the network (e.g., eavesdropping, a worm program, file damage) from spreading to the rest of the network. Without firewalls, network security problems can rage out of control, dragging more and more systems down. What is a firewall? It's a hardware and/or software solution that restricts access from your internal network to the Internet -- and vice versa. A firewall may also be used to separate two or more parts of your local network (for example, protecting finance from R&D). The firewall is installed at the perimeter of the network, ordinarily where it connects to the Internet. You can think of a firewall as a checkpoint; all traffic, incoming and outgoing, is stopped at this point. Because it is, the firewall can make sure that it is acceptable. "Acceptable" means that whatever is passing through -- email, file transfers, remote logins, NFS mounts, etc. -- conforms to the security policy of the site. Building Internet Firewalls is a practical guide to building firewalls on the Internet. If your site is connected to the Internet, or if you're considering getting connected, you need this book. It describes a variety of firewall approaches and architectures and discusses how you can build packet filtering and proxying solutions at your site. It also contains a full discussion of how to configure Internet services (e.g., FTP, SMTP, Telnet) to work with a firewall. The book also includes a complete list of resources, including the location of many publicly available firewall construction tools. The book is divided into four parts: Part I discusses Internet threats, the benefits of firewalls, overall security strategies, and a summary of Internet services and their security risks. Part II describes possible firewall designs and general terms and concepts, how to protect the bastion host in your firewall configuration, how to build proxying and packet filtering firewalls, and how to configure Internet services to operate with a firewall. Part III describes how to maintain a firewall, develop a security policy, and respond to a security incident. Part IV contains appendic



Кл.слова:
мережа -- захист

   Тип видання:   наукове видання   
12.

Clark, T.
Storage Virtualization [Electronic resource] : technologies for Simplifying Data Storage and Management / T. Clark. - Boston : Addison Wesley Professional, 2005. - 264 p.
Переклад назви: Віртуалізація систем зберігання: технології для спрощення зберігання даних і управління

Рубрики:

  Повний текст доступний у читальних залах НБУВ


Storage virtualization has come of age, offering IT professionals powerful new ways to simplify infrastructure, streamline management, improve utilization, and reduce costs. Now, the author of the best-selling storage books IP SANs and Designing Storage Area Networks presents an up-to-the-minute, vendor-neutral overview of storage virtualization in all its forms. Writing for IT managers, administrators, architects, analysts, consultants, and vendors, Tom Clark explains everything from the basics to the latest emerging standards. Storage Virtualization uses realistic examples and diagrams to explain each key concept, concluding with case studies that demonstrate real-world implementation and help you assess the technology's business value.



Кл.слова:
дані -- інформація

   Тип видання:   методичний посібник   
13.

Cohen, K.
Windows XP Networking [Electronic resource] / K. Cohen, A. Daniels. - Boston : Addison Wesley, 2004. - 544 p.
Переклад назви: Мережа Windows XP

Рубрики:

  Повний текст доступний у читальних залах НБУВ


Deploying, managing, or supporting networks with Windows XP clients? Here's all the information you need to maximize reliability, security, and performance... and minimize hassles and aggravation! Kackie Cohen and Andrew Daniels share the extraordinary experience they've gained deploying and running some of the world's largest Windows networks. They don't waste time on the "basics" you already know. Rather, they focus on the specific challenges you face as a working professional. You'll find best practices and real-world tips for everything from authentication to Internet connectivity, firewalls to wireless networking... and a whole lot more.



Кл.слова:
ОС -- мережа

   Тип видання:   науково-популярне видання   
14.
 


Cox, John M..
Circles of Resistance [Electronic resource] / John M. Cox. - New York : Peter lang, 2009. - 214 p
Переклад назви: Кола Спротиву

Рубрики:

Географічні рубрики:
  

  Повний текст доступний у читальних залах НБУВ


Circles of Resistance: Jewish, Leftist, and Youth Dissidence in Nazi Germany analyzes resistance networks of young German Jews and other young dissidents during the Nazi dictatorship. Young German-Jewish radicals created an intellectually and politically vibrant subculture in Berlin, the geographical focus of this study. The youths analyzed here were reacting not only to Nazi oppression: they were also driven to develop new modes of action and politics by their estrangement not only from German society, but also from the traditional left parties and their post-1933 underground organizations, and even from large segments of Berlin's Jewish community, where radical activism was often regarded as counter-productive and needlessly provocative. At the center of this study are the Herbert Baum groups, led by members of Germany's Communist Party (KPD). While the Baum groups were the largest, they were but one of several resistance operations that were situated partially within the milieu created by Communists, Socialists, Trotskyists, and radical Jewish youths. Based on archival research in Germany, Paris, Amsterdam, and Jerusalem, and interviews with veterans of the anti-Nazi resistance, Circles of Resistance analyzes the overlap of these diverse social and political dimensions among dissident circles and offers a reconsideration of traditional thinking on leftist and Jewish resistance and youth subcultures of the Third Reich. Circles of Resistance will be useful for undergraduate as well as graduate courses on Jewish history, Nazi Germany, and the Holocaust, as well as courses devoted to the history of European socialism.



Кл.слова:
рух опору -- третій рейх -- психологія

   Тип видання:   науково-популярне видання   
15.

Crouzet, F.
A history of the European economy, 1000–2000 [Electronic resource] / F. Crouzet. - London : The University Press of Virginia, 2001. - 351 p
Переклад назви: Історія європейської економіки, 1000-2000

Рубрики:

Географічні рубрики:

  Повний текст доступний у читальних залах НБУВ


Considering Europe as a whole rather than as a mosaic of individual states, François Crouzet presents here an accessible, engaging history of the European economy during the second millennium. Stressing the common economic institutions shared over time by the different regions of Europe and the networks of relations that have linked them, Crouzet examines pan-European changes and integration rather than merely the particular experiences of individual countries. A History of the European Economy, 1000-2000 goes beyond addressing the historical ramifications of trade in the European economy to encompass problems such as the diffusion of technology, the migration of capital and labor, diasporas and minorities, and national diversity. By stressing the historical origins of the drive toward European integration and its progress all the way to the birth of the euro, Crouzet delivers an original and comprehensive overview of European economic history.



Кл.слова:
економіка -- торгівля -- історія Європи

   Тип видання:   довідник   
16.

Dayley, B.
Novell® ZENworks™ for Servers 3 [Electronic resource] : administrator's handbook / B. Dayley, L. D. Dayley, R. Tanner. - Indianapolis : Que, 2003. - 512 p
Переклад назви: Novell® ZENworks™ для Servers 3: довідник адміністратора

Рубрики:

  Повний текст доступний у читальних залах НБУВ


Novell ZENworks for Servers(ZENworks stands for Zero Effort Networking) is the cross-platform solution for server content and configuration management. It provides server consistency across Windows, Linux, Solaris and NetWare platforms, enables intelligent network automation, and increases management efficiency so everything works together as on Net. As a result, organizations get a stable server environment and significantly reduce networking costs. Novell's ZENworks for Server 3 Administrator's Handbook guides the reader through the potential rough spots. It explains how ZENworks for Server 3 functions and affects NetWare, Windows, Linux and/or Solaris networks.



Кл.слова:
мережа

   Тип видання:   підручник   
17.

Donahue, G. A.
Network warrior [Electronic resource] / G. A. Donahue. - 2nd. ed.. - Sebastopol CA : O’Reilly Media, 2011. - 757 p.
Переклад назви: Мережева війна

Рубрики:

  Повний текст доступний у читальних залах НБУВ


Pick up where certification exams leave off. With this practical, in-depth guide to the entire network infrastructure, you’ll learn how to deal with real Cisco networks, rather than the hypothetical situations presented on exams like the CCNA. Network Warrior takes you step by step through the world of routers, switches, firewalls, and other technologies based on the author's extensive field experience. You'll find new content for MPLS, IPv6, VoIP, and wireless in this completely revised second edition, along with examples of Cisco Nexus 5000 and 7000 switches throughout.



Кл.слова:
комп'ютер -- мережа

   Тип видання:   наукове видання   
18.

Dubrawsky, I.
CCSP Self-Study CCSP CSI [Electronic resource] : exam Certification Guide / I. Dubrawsky, P. Grey. - 2-е вид.. - Indianapolis : Cisco Press, 2004. - 528 p.
Переклад назви: CCSP самовчитель CCSP CSI: Керівництво сертифікаційного іспиту

Рубрики:

  Повний текст доступний у читальних залах НБУВ


The official self-study test preparation guide for the CCSP CSI exam 642-541 This study guide helps you master all the topics on the CCSP CSI exam, including Classifying and mitigating network attacks Securing designs for small, medium-sized, remote-user, and enterprise networks Understanding the SAFE network modules Using Host IPS and the Cisco Security Agent Identifying security threats Securing a wireless network Applying the SAFE Blueprint to networks utilizing IP telephony Implementing appropriate security products to prevent or counteract vulnerabilities Defining a security policy Using the Cisco Secure product portfolio, including perimeter security, IDS, secure connectivity, security management, and Cisco AVVID Understanding the SAFE architectural overview CCSP CSI Exam Certification Guide, Second Edition, is a best-of-breed Cisco exam study guide that focuses specifically on the objectives for the CSI exam. Inside, you'll find preparation hints and test-taking tips to help you identify areas of weakness and improve both your conceptual and hands-on knowledge of network security. CCSP CSI Exam Certification Guide, Second Edition, presents you with an organized test preparation routine through the use of proven series elements and techniques. "Do I Know This Already?" quizzes open each chapter and allow you to decide how much time you need to spend on each section. Foundation Summary lists and tables make referencing easy and give you a quick refresher whenever you need it. Challenging chapter-ending review questions reinforce key concepts. An entire chapter of scenarios helps you place the exam objectives in real-world situations, thus increasing recall during exam time. New in this edition is coverage of wireless networks, IP telephony, Host Intrusion Prevention System (IPS), and enterprise networks. The companion CD-ROM contains a powerful testing engine that allows you to focus on individual topic areas or take a complete, timed exam. The assessment engine tracks your performance and provides feedback on a module-by-module basis, presenting links to the text for further review and helping you devise a complete study plan. Well-regarded for its level of detail, assessment features, challenging review questions, and hands-on exercises, this book helps you master the concepts and techniques that will enable you to succeed on the exam the first time. CCSP CSI Exam Certification Guide, Second Edition, is part of a recommended study program from Cisco Systems that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www.cisco.com/go/authorizedtraining. Companion CD-ROM The CD-ROM contains more than 200 practice questions for the CCSP CSI exam, including simulation-based questions. CD-ROM test engine powered by www.boson.com. Boson Software is a Cisco Learning Partner.



Кл.слова:
програмне забезпечення -- база даних -- електронний ресурс -- сервер -- захист даних -- CCSP CSI exam

   Тип видання:   наукове видання   
19.

Edwards, B. M.
Interdomain Multicast Routing [Electronic resource] : practical Juniper Networks and Cisco Systems Solutions / B. M. Edwards, L. A. Giuliano, B. R. Wright. - Boston : Addison Wesley, 2002. - 384 p.

Рубрики:

  Повний текст доступний у читальних залах НБУВ


Increasing numbers of ISPs have begun implementing multicast infrastructure. Soon the Internet will provide multicast connectivity between any two points on the Internet the way it provides for unicast traffic today. Long-evolving protocols are reaching maturity, and enterprise networks and ISPs around the world are ramping up their multicast infrastructure. Now, more than ever, network engineers must be ready to deal with new applications that capitalize on the simultaneous, efficient delivery of data and imagery to multiple recipients.



Кл.слова:
програмне забезпечення -- програмування -- комп’ютерна програма -- Juniper Networks -- Cisco Systems Solutions

   Тип видання:   енциклопедія   
20.


Encyclopedia of the human brain [Electronic resource] / ed. in chief V. S. Ramachandran. - San-Diego : Academic Press, 2002. - 830 p.
Переклад назви: Енциклопедія людського мозку

Рубрики:

  Повний текст доступний у читальних залах НБУВ


Ramachandran, one of the world's leading brain researchers (Phantoms in the Brain, CH, March 1999; Encyclopedia of Human Behavior, CH, October 1994) has produced the most comprehensive, current, and authoritative reference in neuroscience. More than 350 experts contributed such chapters as "Visual and Auditory Integration," "Violence and the Brain," "Brain Anatomy and Networks," and "Neurodegenerative Disorders." Chapters are arranged alphabetically by topic, each beginning with an outline and glossary. Illustrations are excellent, and there are numerous tables and appendixes. A bibliography concludes each chapter. Essential for medical libraries, life science collections, and university libraries.



Кл.слова:
нейрон -- мозок
...
 

Всі права захищені © Національна бібліотека України імені В. І. Вернадського