Acknowledgments | p. vii |
How to Use This Book | p. viii |
This book is neither a comprehensive text nor an exam-review tool | |
It is an overview of the immune system designed to give anyone who is learning immunology a feel for how the system all fits together | |
The Anytime, Anywhere Textbook | p. ix |
An Overview | p. 1 |
The immune system is a “team effort,” involving many different players who work together to provide a powerful defense against invaders | |
Focusing in on one player at a time makes it hard to understand the game | |
Here we view the action from the grandstands to get a wide-angle picture of what the immune system is all about | |
The Innate Immune System | p. 13 |
The innate immune system is a “hard-wired” defense that has evolved over millions of years to recognize pathogens that commonly infect humans | |
It provides a rapid and powerful defense against “everyday” invaders | |
B Cells and Antibodies | p. 24 |
B cells and the antibodies they produce are part of the adaptive immune system | |
This defense evolves during our own lifetime to protect us against invaders that we, personally, have never encountered before | |
The Magic of Antigen Presentation | p. 38 |
T cells, another weapon of the adaptive immune system, only recognize invaders which are “properly presented” by specialized antigen presenting cells | |
This feature keeps these important cells focused on the particular attackers which they are able to defend against | |
T Cell Activation | p. 52 |
Before they can spring into action, T cells must be activated | |
This requirement helps ensure that only useful weapons will be mobilized | |
T Cells at Work | p. 60 |
Once they have been activated, helper T cells orchestrate the immune response, and killer T cells destroy infected cells | |
Secondary Lymphoid Organs and Lymphocyte Trafficking | p. 70 |
B and T lymphocytes travel through secondary lymphoid organs looking for the invaders they can defend against | |
Once activated, B and T cells are dispatched to those areas of the body in which they can be most useful | |
Restraining the Immune System | p. 81 |
The powerful weapons of the immune system must be restrained lest they become “overexuberant.” In addition, once an invader has been defeated, the immune system must be “reset” to prepare for future attacks | |
Tolerance Induction and MHC Restriction | p. 86 |
T cells must be trained to focus on appropriately presented invaders, and B and T lymphocytes must learn not to attack our own bodies | |
Immunological Memory | p. 96 |
B and T cells remember invaders we have previously encountered, and respond much more quickly and effectively to a subsequent attack by the same invader | |
Vaccines | p. 102 |
Vaccines are used to safely mimic the attack of an invader so that our immune system will be primed and ready for a real attack | |
The Immune System Gone Wrong | p. 107 |
The immune system generally does a good job of defending us while infl icting minimal “collateral damage.” Sometimes, however, mistakes are made | |
Immunodeficiency | p. 116 |
Serious disease may result when our immune system does not operate at full strength | |
Cancer and the Immune System | p. 121 |
Because the immune system is set up to minimize the chance that its weapons will attack our own bodies, it is not very good at defending us against cells that have become cancerous | |
A Critique of the Immune System | p. 128 |
The immune system has many strengths - and a few weaknesses | |
Glossary | p. 133 |
Index | p. 136 |
Table of Contents provided by Publisher. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.