Filter
676
Text search:
leprosy
treatment
Featured
96
266
Language
Document type
455
79
59
36
24
11
5
3
3
1
Countries / Regions
63
38
36
29
26
23
22
21
20
18
17
15
14
13
13
10
7
6
6
5
5
5
4
4
4
4
3
3
3
3
3
3
2
2
2
2
2
2
2
2
2
2
2
2
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
Authors & Publishers
Publication Years
Category
382
65
35
14
11
9
8
3
Toolboxes
112
108
36
22
17
14
8
6
6
6
5
4
4
4
4
3
2
2
2
1
1
1
1
1
2nd edition
This version of Field Trials of Health Interventions includes seven new chapters on conducting systematic literature reviews, trial
governance, preliminary studies and pilot testing, budgeting and accounting, intervention costing and economic analysis, and Phase IV studies. Before new interventions
...
WHO Recommended Surveillance Standards
recommended
Second editon. This document serves only as a guide to good practice and may help to harmonize surveillance activities. The purpose of this manual is to be a handy reference for key elements and contact information for all communicable diseases / syndromes associated with current WHO control program
...
The Facilitator's Guide provides instruction and suggestions for teaching the training modules for the Technical Guidelines for Integrated Disease Surveillance and Response in the Africa Region, 2nd edition. This training is intended for district level health officers who conduct IDSR activities. Th
...
Technical Guidelines for Integrated Disease Surveillance and Response in the African Region
recommended
3rd edition.
The third edition of the Integrated Disease Surveillance and Response (IDSR) Technical Guidelines was prepared by the WHO Health Emergencies (WHE) Programme with the active participation and involvement of programmes dealing with disease surveillance at the WHO Regional Office for Afri
...
Security Risk Management and Religion: Faith and secularism in humanitarian assistance examines the impact that religion has on security risk management for humanitarian agencies, and considers whether a better understanding of religion can improve the security of organisations and individuals in th
...