serw-MX  [xml]  
 


    
 DeCS Categories

D12 Amino Acids, Peptides, and Proteins .
D12.776 Proteins .
D12.776.167 Cell Cycle Proteins .
D12.776.167.504 Securin .
J01 Technology, Industry, and Agriculture .
J01.576 Industry .
J01.576.423 Food Industry .
J01.576.423.750 Food Supply .
L01 Information Science .
L01.224 Computing Methodologies .
L01.224.134 Computer Security .
N04 Health Services Administration .
N04.452 Organization and Administration .
N04.452.910 Security Measures .
N04.452.910.200 Computer Security .
SP6 Nutrition, Public Health .
SP6.051 Nutrition Programs and Policies .
SP6.051.187 Food and Nutrition Security .
SP6.056 Food Economics .
SP6.056.227 Food Supply .
SP9 Health Law .
SP9.020 Human Rights .
SP9.020.090 Socioeconomic Rights .
SP9.020.090.030 Food and Nutrition Security .
 
 Terms
 Synonyms & Historicals
Documents
LILACS e MDL
 
Food Supply .
Food Insecurity .
Food Security .
Food Insecurities .
Food Supplies .
Insecurities, Food .
Insecurity, Food .
Security, Food .
Supplies, Food .
Supply, Food .
Food Security .
The production and movement of food items from point of origin to use or consumption. .
1.00
 
Food and Nutrition Security .
Dietary Advocacy .
Food Advocacy .
Right to Adequate Food .
Right to Food .
Food Rights .
Nutritional Advocacy .
Nutritional Rights .
The right of everyone to have access to safe and nutritious food, consistent with the right to adequate food and the fundamental right of everyone to be free from hunger. (http://www.fao.org/DOCREP/003/W3613E/W3613E00.HTM) .
0.70
 
Securin .
PTTG Protein .
Pituitary Tumor-Transforming Gene Protein .
Pituitary Tumor-Transforming Proteins .
Pituitary Tumor Transforming Proteins .
Securin is involved in the control of the metaphase-anaphase transition during MITOSIS. It promotes the onset of anaphase by blocking SEPARASE function and preventing proteolysis of cohesin and separation of sister CHROMATIDS. Overexpression of securin is associated with NEOPLASTIC CELL TRANSFORMATION and tumor formation. .
0.64
 
Computer Security .
Compromising of Data .
Computer Hackers .
Computer Worms .
Cyber Security .
Cybersecurity .
Data Encryption .
Information Protection .
Computer Hacker .
Computer Virus .
Computer Worm .
Data Compromising .
Data Encryptions .
Encryption, Data .
Encryptions, Data .
Hacker, Computer .
Hackers, Computer .
Protection, Data .
Protection, Information .
Security, Computer .
Security, Cyber .
Security, Data .
Virus, Computer .
Viruses, Computer .
Worm, Computer .
Worms, Computer .
Data Protection .
Data Security .
Computer Viruses .
Protective measures against unauthorized access to or interference with computer operating systems, telecommunications, or accompanying data; especially the modification, deletion, destruction, or release of data in computers. It includes methods of forestalling interference by computer viruses or computer hackers aiming to compromise stored data. .
0.57