Advances in Digital Forensics XVII : 17th IFIP WG 11.9 International Conference, Virtual Event, February 1–2, 2021, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
| Advances in Digital Forensics XVII : 17th IFIP WG 11.9 International Conference, Virtual Event, February 1–2, 2021, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi |
| Edizione | [1st ed. 2021.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 |
| Descrizione fisica | 1 online resource (268 pages) |
| Disciplina | 005.8 |
| Collana | IFIP Advances in Information and Communication Technology |
| Soggetto topico |
Data protection
Machine learning Computer engineering Computer networks Computers - Law and legislation Information technology - Law and legislation Data and Information Security Machine Learning Computer Engineering and Networks Computer Communication Networks Legal Aspects of Computing Medicina legal Xifratge (Informàtica) Seguretat informàtica Programari d'aplicació Cibercultura |
| Soggetto genere / forma |
Congressos
Llibres electrònics |
| ISBN | 3-030-88381-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Intro -- Contents -- Contributing Authors -- Preface -- I THEMES AND ISSUES -- Chapter 1 DIGITAL FORENSIC ACQUISITION KILL CHAIN - ANALYSIS AND DEMONSTRATION -- 1. Introduction -- 2. Related Work -- 3. Digital Forensic Acquisition Kill Chain -- 3.1 Background -- 3.2 Kill Chain Overview -- 3.3 Kill Chain Phases -- 4. Case-Motivated Kill Chain Example -- 5. Conclusions -- Acknowledgement -- References -- Chapter 2 ENHANCING INDUSTRIAL CONTROL SYSTEM FORENSICS USING REPLICATION-BASED DIGITAL TWINS -- 1. Introduction -- 2. Background -- 2.1 Digital Twin -- 2.2 Digital Twin Security -- 2.3 Digital Forensics -- 3. Related Work -- 4. Replication Using Digital Twins -- 4.1 Replication and Replay Theorems -- 4.2 Conceptual Framework -- 5. Implementation and Evaluation -- 5.1 Implementation and Experimental Setup -- 5.2 Results and Evaluation -- 6. Discussion -- 7. Conclusions -- Acknowledgement -- References -- Chapter 3 COMPARISON OF CYBER ATTACKS ON SERVICES IN THE CLEARNET AND DARKNET -- 1. Introduction -- 2. Background -- 3. Common Targets and Attacks -- 4. Related Work -- 5. Honeypot Deployment -- 5.1 Security Considerations -- 5.2 Deployment Process -- 6. Implementation Details -- 6.1 Virtual Machine Architectures -- 6.2 Honeypot Services -- 7. Experiments and Results -- 7.1 Service Deployments -- 7.2 Announcements -- 7.3 Observed Web Requests -- 7.4 Observed SSH and Telnet Access -- 7.5 Observed SMTP Requests -- 7.6 Observed FTP Requests -- 7.7 Discussion -- 8. Conclusions -- Acknowledgement -- References -- II APPROXIMATE MATCHING TECHNIQUES -- Chapter 4 USING PARALLEL DISTRIBUTED PROCESSING TO REDUCE THE COMPUTATIONAL TIME OF DIGITAL MEDIA SIMILARITY MEASURES -- 1. Introduction -- 2. Previous Work -- 3. Jaccard Indexes of Similarity -- 3.1 Jaccard Index -- 3.2 Jaccard Index with Normalized Frequency -- 4. Jaccard Index with Split Files.
5. Results and Validation -- 6. Conclusions -- References -- Chapter 5 EVALUATION OF NETWORK TRAFFIC ANALYSIS USING APPROXIMATE MATCHING ALGORITHMS -- 1. Introduction -- 2. Foundations and Related Work -- 2.1 Current State of Approximate Matching -- 2.2 Approximate Matching Algorithms -- 3. Controlled Study -- 3.1 All vs. All Evaluation -- 3.2 Evaluation Methodology -- 4. Experimental Results and Optimizations -- 5. Conclusions -- Acknowledgement -- References -- III ADVANCED FORENSIC TECHNIQUES -- Chapter 6 LEVERAGING USB POWER DELIVERY IMPLEMENTATIONS FOR DIGITAL FORENSIC ACQUISITION -- 1. Introduction -- 2. USB Power Delivery Protocol -- 3. Research Methodology -- 4. Results -- 4.1 Information Gathering -- 4.2 Passive Monitoring -- 4.3 Firmware Files -- 4.4 Firmware Reverse Engineering -- 4.5 Apple Vendor-Defined Protocol -- 4.6 Firmware Modification and Rollback -- 5. Conclusions -- Acknowledgements -- References -- Chapter 7 DETECTING MALICIOUS PDF DOCUMENTS USING SEMI-SUPERVISED MACHINE LEARNING -- 1. Introduction -- 2. Background and Related Work -- 2.1 PDF Document Structure -- 2.2 Document Entropy -- 2.3 Malicious PDF Document Detection -- 3. Malicious PDF Document Detection Method -- 3.1 Structural Features -- 3.2 Entropy-Based Statistical Features -- 3.3 Classification -- 4. Experiments and Results. -- 4.1 Dataset Creation and Experimental Setup -- 4.2 Evaluation Metrics -- 4.3 Feature Set Analysis -- 4.4 Classifier Analysis -- 4.5 Detection Method Comparison -- 5. Conclusions -- Acknowledgement -- References -- Chapter 8 MALICIOUS LOGIN DETECTION USING LONG SHORT-TERM MEMORY WITH AN ATTENTION MECHANISM -- 1. Introduction -- 2. Related Work -- 3. Preliminaries -- 3.1 Detection Method Overview -- 3.2 Threat Model -- 4. Proposed Method -- 4.1 Host Vector Learning -- 4.2 Feature Extraction -- 4.3 Attention Mechanism. 4.4 Classification Model Optimization -- 5. Experimental Evaluation -- 5.1 Dataset Description -- 5.2 Experimental Setup -- 5.3 Evaluated Models -- 5.4 Evaluation Results -- 5.5 Optimization and Learning Rate -- 6. Conclusions -- References -- IV NOVEL APPLICATIONS -- Chapter 9 PREDICTING THE LOCATIONS OF UNREST USING SOCIAL MEDIA -- 1. Introduction -- 2. Related Work -- 3. Location Extraction from Web Forum Data -- 3.1 Web Forum Dataset -- 3.2 Dictionary-Based Semi-Supervised Learning -- 3.3 BiLSTM-CRF Model -- 3.4 n-Gram-ARM Algorithm -- 4. Experiments and Results -- 5. Conclusions -- References -- Chapter 10 EXTRACTING THREAT INTELLIGENCE RELATIONS USING DISTANT SUPERVISION AND NEURAL NETWORKS -- 1. Introduction -- 2. Related Work -- 2.1 Threat Intelligence Datasets -- 2.2 Threat Intelligence Information Extraction -- 3. Proposed Framework -- 3.1 Overview -- 3.2 Problem Specification -- 3.3 Dataset -- 3.4 Neural Network Model -- 4. Experiments and Results -- 4.1 Experiment Details -- 4.2 Comparison with Baseline Models -- 4.3 Extraction Results -- 5. Conclusions -- Acknowledgement -- References -- Chapter 11 SECURITY AUDITING OF INTERNET OF THINGS DEVICES IN A SMART HOME -- 1. Introduction -- 2. Preliminaries -- 2.1 Security Standards and Best Practices -- 2.2 Security Auditing Challenges -- 2.3 Threat Model -- 3. Security Auditing Methodology -- 3.1 Step 1: Build a Knowledge Base -- 3.2 Step 2: Translate to Security Rules -- 3.3 Step 3: Audit IoT Device Security -- 4. Auditing Smart Home Security -- 4.1 Security Rule Definition -- 4.2 Data Collection -- 4.3 Formal Language Translation -- 4.4 Verification -- 4.5 Evidence Extraction -- 5. Security Auditing Framework -- 6. Experiments and Results -- 6.1 Experimental Setup -- 6.2 Experimental Results -- 7. Discussion -- 8. Related Work -- 9. Conclusions -- References -- V IMAGE FORENSICS. Chapter 12 INDIAN CURRENCY DATABASE FOR FORENSIC RESEARCH -- 1. Introduction -- 2. Related Work -- 3. Indian Currency Security Features -- 4. Indian Currency Database -- 4.1 Sample Collection -- 4.2 Security Feature Identification -- 4.3 Database Creation -- 5. Conclusions -- References -- Chapter 13 SECURITY AND PRIVACY ISSUES RELATED TO QUICK RESPONSE CODES -- 1. Introduction -- 2. QR Code Structure -- 3. QR Code Evolution -- 4. Key Issues -- 4.1 Authentication with QR Codes -- 4.2 Attacks Using QR Codes -- 4.3 Security and Privacy of QR Codes -- 5. Innovative Applications -- 5.1 Self-Authenticating Documents -- 5.2 Color QR Codes -- 5.3 Anti-Counterfeiting QR Codes -- 6. Conclusions -- References. |
| Record Nr. | UNINA-9910502594403321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Advances in Digital Forensics XVII : 17th IFIP WG 11.9 International Conference, Virtual Event, February 1–2, 2021, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
| Advances in Digital Forensics XVII : 17th IFIP WG 11.9 International Conference, Virtual Event, February 1–2, 2021, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi |
| Edizione | [1st ed. 2021.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 |
| Descrizione fisica | 1 online resource (268 pages) |
| Disciplina | 005.8 |
| Collana | IFIP Advances in Information and Communication Technology |
| Soggetto topico |
Data protection
Machine learning Computer engineering Computer networks Computers - Law and legislation Information technology - Law and legislation Data and Information Security Machine Learning Computer Engineering and Networks Computer Communication Networks Legal Aspects of Computing Medicina legal Xifratge (Informàtica) Seguretat informàtica Programari d'aplicació Cibercultura |
| Soggetto genere / forma |
Congressos
Llibres electrònics |
| ISBN | 3-030-88381-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Intro -- Contents -- Contributing Authors -- Preface -- I THEMES AND ISSUES -- Chapter 1 DIGITAL FORENSIC ACQUISITION KILL CHAIN - ANALYSIS AND DEMONSTRATION -- 1. Introduction -- 2. Related Work -- 3. Digital Forensic Acquisition Kill Chain -- 3.1 Background -- 3.2 Kill Chain Overview -- 3.3 Kill Chain Phases -- 4. Case-Motivated Kill Chain Example -- 5. Conclusions -- Acknowledgement -- References -- Chapter 2 ENHANCING INDUSTRIAL CONTROL SYSTEM FORENSICS USING REPLICATION-BASED DIGITAL TWINS -- 1. Introduction -- 2. Background -- 2.1 Digital Twin -- 2.2 Digital Twin Security -- 2.3 Digital Forensics -- 3. Related Work -- 4. Replication Using Digital Twins -- 4.1 Replication and Replay Theorems -- 4.2 Conceptual Framework -- 5. Implementation and Evaluation -- 5.1 Implementation and Experimental Setup -- 5.2 Results and Evaluation -- 6. Discussion -- 7. Conclusions -- Acknowledgement -- References -- Chapter 3 COMPARISON OF CYBER ATTACKS ON SERVICES IN THE CLEARNET AND DARKNET -- 1. Introduction -- 2. Background -- 3. Common Targets and Attacks -- 4. Related Work -- 5. Honeypot Deployment -- 5.1 Security Considerations -- 5.2 Deployment Process -- 6. Implementation Details -- 6.1 Virtual Machine Architectures -- 6.2 Honeypot Services -- 7. Experiments and Results -- 7.1 Service Deployments -- 7.2 Announcements -- 7.3 Observed Web Requests -- 7.4 Observed SSH and Telnet Access -- 7.5 Observed SMTP Requests -- 7.6 Observed FTP Requests -- 7.7 Discussion -- 8. Conclusions -- Acknowledgement -- References -- II APPROXIMATE MATCHING TECHNIQUES -- Chapter 4 USING PARALLEL DISTRIBUTED PROCESSING TO REDUCE THE COMPUTATIONAL TIME OF DIGITAL MEDIA SIMILARITY MEASURES -- 1. Introduction -- 2. Previous Work -- 3. Jaccard Indexes of Similarity -- 3.1 Jaccard Index -- 3.2 Jaccard Index with Normalized Frequency -- 4. Jaccard Index with Split Files.
5. Results and Validation -- 6. Conclusions -- References -- Chapter 5 EVALUATION OF NETWORK TRAFFIC ANALYSIS USING APPROXIMATE MATCHING ALGORITHMS -- 1. Introduction -- 2. Foundations and Related Work -- 2.1 Current State of Approximate Matching -- 2.2 Approximate Matching Algorithms -- 3. Controlled Study -- 3.1 All vs. All Evaluation -- 3.2 Evaluation Methodology -- 4. Experimental Results and Optimizations -- 5. Conclusions -- Acknowledgement -- References -- III ADVANCED FORENSIC TECHNIQUES -- Chapter 6 LEVERAGING USB POWER DELIVERY IMPLEMENTATIONS FOR DIGITAL FORENSIC ACQUISITION -- 1. Introduction -- 2. USB Power Delivery Protocol -- 3. Research Methodology -- 4. Results -- 4.1 Information Gathering -- 4.2 Passive Monitoring -- 4.3 Firmware Files -- 4.4 Firmware Reverse Engineering -- 4.5 Apple Vendor-Defined Protocol -- 4.6 Firmware Modification and Rollback -- 5. Conclusions -- Acknowledgements -- References -- Chapter 7 DETECTING MALICIOUS PDF DOCUMENTS USING SEMI-SUPERVISED MACHINE LEARNING -- 1. Introduction -- 2. Background and Related Work -- 2.1 PDF Document Structure -- 2.2 Document Entropy -- 2.3 Malicious PDF Document Detection -- 3. Malicious PDF Document Detection Method -- 3.1 Structural Features -- 3.2 Entropy-Based Statistical Features -- 3.3 Classification -- 4. Experiments and Results. -- 4.1 Dataset Creation and Experimental Setup -- 4.2 Evaluation Metrics -- 4.3 Feature Set Analysis -- 4.4 Classifier Analysis -- 4.5 Detection Method Comparison -- 5. Conclusions -- Acknowledgement -- References -- Chapter 8 MALICIOUS LOGIN DETECTION USING LONG SHORT-TERM MEMORY WITH AN ATTENTION MECHANISM -- 1. Introduction -- 2. Related Work -- 3. Preliminaries -- 3.1 Detection Method Overview -- 3.2 Threat Model -- 4. Proposed Method -- 4.1 Host Vector Learning -- 4.2 Feature Extraction -- 4.3 Attention Mechanism. 4.4 Classification Model Optimization -- 5. Experimental Evaluation -- 5.1 Dataset Description -- 5.2 Experimental Setup -- 5.3 Evaluated Models -- 5.4 Evaluation Results -- 5.5 Optimization and Learning Rate -- 6. Conclusions -- References -- IV NOVEL APPLICATIONS -- Chapter 9 PREDICTING THE LOCATIONS OF UNREST USING SOCIAL MEDIA -- 1. Introduction -- 2. Related Work -- 3. Location Extraction from Web Forum Data -- 3.1 Web Forum Dataset -- 3.2 Dictionary-Based Semi-Supervised Learning -- 3.3 BiLSTM-CRF Model -- 3.4 n-Gram-ARM Algorithm -- 4. Experiments and Results -- 5. Conclusions -- References -- Chapter 10 EXTRACTING THREAT INTELLIGENCE RELATIONS USING DISTANT SUPERVISION AND NEURAL NETWORKS -- 1. Introduction -- 2. Related Work -- 2.1 Threat Intelligence Datasets -- 2.2 Threat Intelligence Information Extraction -- 3. Proposed Framework -- 3.1 Overview -- 3.2 Problem Specification -- 3.3 Dataset -- 3.4 Neural Network Model -- 4. Experiments and Results -- 4.1 Experiment Details -- 4.2 Comparison with Baseline Models -- 4.3 Extraction Results -- 5. Conclusions -- Acknowledgement -- References -- Chapter 11 SECURITY AUDITING OF INTERNET OF THINGS DEVICES IN A SMART HOME -- 1. Introduction -- 2. Preliminaries -- 2.1 Security Standards and Best Practices -- 2.2 Security Auditing Challenges -- 2.3 Threat Model -- 3. Security Auditing Methodology -- 3.1 Step 1: Build a Knowledge Base -- 3.2 Step 2: Translate to Security Rules -- 3.3 Step 3: Audit IoT Device Security -- 4. Auditing Smart Home Security -- 4.1 Security Rule Definition -- 4.2 Data Collection -- 4.3 Formal Language Translation -- 4.4 Verification -- 4.5 Evidence Extraction -- 5. Security Auditing Framework -- 6. Experiments and Results -- 6.1 Experimental Setup -- 6.2 Experimental Results -- 7. Discussion -- 8. Related Work -- 9. Conclusions -- References -- V IMAGE FORENSICS. Chapter 12 INDIAN CURRENCY DATABASE FOR FORENSIC RESEARCH -- 1. Introduction -- 2. Related Work -- 3. Indian Currency Security Features -- 4. Indian Currency Database -- 4.1 Sample Collection -- 4.2 Security Feature Identification -- 4.3 Database Creation -- 5. Conclusions -- References -- Chapter 13 SECURITY AND PRIVACY ISSUES RELATED TO QUICK RESPONSE CODES -- 1. Introduction -- 2. QR Code Structure -- 3. QR Code Evolution -- 4. Key Issues -- 4.1 Authentication with QR Codes -- 4.2 Attacks Using QR Codes -- 4.3 Security and Privacy of QR Codes -- 5. Innovative Applications -- 5.1 Self-Authenticating Documents -- 5.2 Color QR Codes -- 5.3 Anti-Counterfeiting QR Codes -- 6. Conclusions -- References. |
| Record Nr. | UNISA-996464525303316 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Essentials of Autopsy Practice : Reviews, Updates and Advances / / edited by Guy N. Rutty
| Essentials of Autopsy Practice : Reviews, Updates and Advances / / edited by Guy N. Rutty |
| Edizione | [1st ed. 2019.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
| Descrizione fisica | 1 online resource (163 pages) |
| Disciplina |
616.07
616.0759 |
| Soggetto topico |
Autopsy - methods
Forensic Medicine Autòpsia Medicina legal Legislació |
| Soggetto genere / forma | Llibres electrònics |
| ISBN | 3-030-24330-3 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | [Contents] Deaths related to aerial sports -- 3D-printing applied to forensic investigations -- Photogrammetry -- High altitude deaths -- Paediatric Dural vessels -- Commotio Cordis -- The Cricoid Cartilage -- Emerging Infectious Diseases. |
| Record Nr. | UNINA-9910370257103321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Forensic imaging
| Forensic imaging |
| Pubbl/distr/stampa | [Oxford] : , : Elsevier Ltd., , [2020]- |
| Descrizione fisica | 1 online resource |
| Soggetto topico |
Forensic radiography
Magnetic resonance imaging Diagnostic imaging Forensic Medicine Diagnostic Imaging Autopsy Criminalística Medicina legal |
| Soggetto genere / forma |
Periodical
Periodicals. Revistes electròniques. |
| ISSN | 2666-2256 |
| Formato | Materiale a stampa |
| Livello bibliografico | Periodico |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910367658003321 |
| [Oxford] : , : Elsevier Ltd., , [2020]- | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Forensic science international Digital investigation
| Forensic science international Digital investigation |
| Pubbl/distr/stampa | Amsterdam : , : Elsevier B.V., , 2020- |
| Descrizione fisica | 1 online resource |
| Soggetto topico |
Digital forensic science
Forensic sciences - Data processing Criminal investigation - Data processing Forensic Medicine Criminalística Medicina legal |
| Soggetto genere / forma |
Periodicals.
Revistes electròniques. |
| ISSN | 2666-2817 |
| Formato | Materiale a stampa |
| Livello bibliografico | Periodico |
| Lingua di pubblicazione | eng |
| Altri titoli varianti |
FSI digital investigation
Digital investigation |
| Record Nr. | UNINA-9910370260103321 |
| Amsterdam : , : Elsevier B.V., , 2020- | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Forensic science, medicine and pathology
| Forensic science, medicine and pathology |
| Pubbl/distr/stampa | Totowa, N.J., : Humana Press, 2005- |
| Disciplina | 363.2 |
| Soggetto topico |
Medical jurisprudence
Forensic sciences Forensic pathology Forensic Medicine Forensic Sciences Medicina legal Anatomia patològica |
| Soggetto genere / forma |
Periodical
Periodicals. Revistes electròniques. |
| ISSN | 1556-2891 |
| Formato | Materiale a stampa |
| Livello bibliografico | Periodico |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910146778303321 |
| Totowa, N.J., : Humana Press, 2005- | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Forensic toxicology
| Forensic toxicology |
| Pubbl/distr/stampa | Tokyo, : Japanese Association of Forensic Toxicology, : Springer, 2006- |
| Disciplina | 614.13 |
| Soggetto topico |
Medical jurisprudence
Toxicology Forensic Medicine Médecine légale Toxicologie Gerechtelijke geneeskunde Drugs Alcohol Medicina legal Toxicologia |
| Soggetto genere / forma |
Periodicals.
Revistes electròniques. |
| ISSN | 1860-8973 |
| Formato | Materiale a stampa |
| Livello bibliografico | Periodico |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910143473303321 |
| Tokyo, : Japanese Association of Forensic Toxicology, : Springer, 2006- | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
International journal of legal medicine : official publication of the International Academy of Legal Medicine
| International journal of legal medicine : official publication of the International Academy of Legal Medicine |
| Pubbl/distr/stampa | Heidelberg, : Springer |
| Disciplina | 614.1 |
| Soggetto topico |
Medical jurisprudence
Forensic Medicine Jurisprudence Médecine légale forensic medicine Medicina legal |
| Soggetto genere / forma |
Periodical
periodicals. Periodicals. Périodiques. Revistes electròniques. |
| ISSN | 1437-1596 |
| Formato | Materiale a stampa |
| Livello bibliografico | Periodico |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | Legal medicine |
| Record Nr. | UNINA-9910147151803321 |
| Heidelberg, : Springer | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Issues in law & medicine
| Issues in law & medicine |
| Pubbl/distr/stampa | [Terre Haute, Ind.], : National Legal Center for the Medically Dependent & Disabled, and the Horatio R. Storer Foundation |
| Disciplina |
342.73/087
347.30287 |
| Soggetto topico |
People with disabilities - Legal status, laws, etc - United States
Developmentally disabled - Legal status, laws, etc - United States Medical laws and legislation - United States People with disabilities - Medical care - United States Civil Rights Disabled Jurisprudence Legislation, Medical Patient Advocacy Personnes atteintes de troubles du développement - Droit - États-Unis Personnes handicapées - Droit - États-Unis Médecine - Droit - États-Unis Personnes handicapées - Soins médicaux - États-Unis - Droit Developmentally disabled - Legal status, laws, etc Medical laws and legislation People with disabilities - Legal status, laws, etc People with disabilities - Medical care Droit médical Éthique médicale Handicapé Handicapé mental Soins médicaux Persones amb discapacitat Medicina legal Legislació civil rights people with physical disabilities people with disabilities law (discipline) |
| Soggetto genere / forma |
Periodical
Periodicals. P̌riodique ̌lectronique (Descripteur de forme) Ressource Internet (Descripteur de forme) Revistes electròniques. periodicals. Périodiques. |
| ISSN | 2377-6463 |
| Formato | Materiale a stampa |
| Livello bibliografico | Periodico |
| Lingua di pubblicazione | eng |
| Altri titoli varianti |
Issues in law and medicine
Issues L. & Med |
| Record Nr. | UNINA-9910145955703321 |
| [Terre Haute, Ind.], : National Legal Center for the Medically Dependent & Disabled, and the Horatio R. Storer Foundation | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Principles of forensic toxicology / / Barry S Levine, Sarah Kerrigan, editors
| Principles of forensic toxicology / / Barry S Levine, Sarah Kerrigan, editors |
| Edizione | [Fifth edition.] |
| Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2020] |
| Descrizione fisica | 1 online resource (XIII, 691 p. 188 illus., 23 illus. in color.) |
| Disciplina | 614.13 |
| Soggetto topico |
Forensic toxicology
Toxicologia Medicina legal |
| Soggetto genere / forma | Llibres electrònics |
| ISBN | 3-030-42917-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Part 1: Introduction -- Post Mortem Forensic Toxicology -- Human Performance Toxicology -- Drug-Facilitated Sexual Assault -- Forensic Drug Testing -- Performance enhancing Drug Testing -- Drug Testing in Pain Management -- Pharmacokinetics and Pharmacodynamics -- Part II. Specimen Preparation -- Spectrophotometry -- Chromatography -- Derivatization -- Immunoassy -- Mass Spectrometry -- Quantitation -- Method Validation -- Measurement Uncertainty and Traceability -- Statistics in Forensic Toxicology -- Part III Analytes -- Alcohol -- Benzodiazapines -- Gammahydroxybutyric acid,- Miscellaneous Central Nervous System Depressants -- Opioids -- Cocanie -- Cannabis -- Amphetamines-Sympathomimetic Amines,- Hallucinogens and Psychedelics -- Antidepressants and Neuroleptics -- Miscellaneous Therapeutic Drugs -- Carbon Monoxide/Cyanide -- Inhalants -- Metals -- Part III Special Topics -- Stability of Drugs of Abuse in Biological Systems -- Postmortem Redistribution of Drugs -- Postmortem Clinical Testing -- Pharmacogenomics -- Hair Drug Testing -- Oral Fluid Testing -- Meconium Drug Testing -- Drugs in Embalmed Tissues. |
| Record Nr. | UNINA-9910416100603321 |
| Cham, Switzerland : , : Springer, , [2020] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||