Encyclopedias as Topic
A phylum of the most familiar marine invertebrates. Its class Stelleroidea contains two subclasses, the Asteroidea (the STARFISH or sea stars) and the Ophiuroidea (the brittle stars, also called basket stars and serpent stars). There are 1500 described species of STARFISH found throughout the world. The second class, Echinoidea, contains about 950 species of SEA URCHINS, heart urchins, and sand dollars. A third class, Holothuroidea, comprises about 900 echinoderms known as SEA CUCUMBERS. Echinoderms are used extensively in biological research. (From Barnes, Invertebrate Zoology, 5th ed, pp773-826)
Endocrine System Diseases
Exogenous agents, synthetic and naturally occurring, which are capable of disrupting the functions of the ENDOCRINE SYSTEM including the maintenance of HOMEOSTASIS and the regulation of developmental processes. Endocrine disruptors are compounds that can mimic HORMONES, or enhance or block the binding of hormones to their receptors, or otherwise lead to activating or inhibiting the endocrine signaling pathways and hormone metabolism.
Chemical substances having a specific regulatory effect on the activity of a certain organ or organs. The term was originally applied to substances secreted by various ENDOCRINE GLANDS and transported in the bloodstream to the target organs. It is sometimes extended to include those substances that are not produced by the endocrine glands but that have similar effects.
It is a form of protection provided by law. In the United States this protection is granted to authors of original works of authorship, including literary, dramatic, musical, artistic, and certain other intellectual works. This protection is available to both published and unpublished works. (from Circular of the United States Copyright Office, 6/30/2008)
Protective measures against unauthorized access to or interference with computer operating systems, telecommunications, or data structures, especially the modification, deletion, destruction, or release of data in computers. It includes methods of forestalling interference by computer viruses or so-called computer hackers aiming to compromise stored data.