Listing 1 - 10 of 15 | << page >> |
Sort by
|
Choose an application
In our modern society, the drugs consumption is constantly increasing and is involving younger consumers. The Belgian lax is considering, among the drugs, compounds such as amphetamine derivatives, morphine, cocaine and cannabinoids. Many method of quantification in blood and urine are published in the scientific literature, but as the window for detection of narcotics in these biological fluids is relatively short, it is not easy to assess whether their use is chronic or occasional. Based in this observation, we developed the simultaneous determination of these drugs, with the exception of cannabinoids, in hair by LC-MSMS. Hairs are a biological matrix of interest, given the very good stability of the compounds in the hair structure. They also can allow assessing the history of consumption through growth of about 1 cm per month.
The drugs are extracted with methanol in the presence of their deuterated analogues. Then, a step clean-up is conducted through a column Solid Phase Extraction (SPE) MCX© from Waters®.
Our analytical validation reported extraction yields ranging from 59 to 157%, ions suppression or enhancement effects (matrix effect) between 1 and 55% accuracy between 70 and 115%, precision with CV≤15%, absence of carry-over, linearities with R²>0.98, and limits of detection and quantification, respectively, from 0.02273 to 0.5762 and 0.075 to 2.05 ng/mg of hair, for the different drugs tested.
The potential impact of hair treated with staining on the matrix effects and yields has been further assessed, without significant effect. Dans notre société moderne, la consommation de drogues est en perpétuelle augmentation et doit faire face à des consommateurs de plus en plus jeunes. La loi belge classe, parmi les stupéfiants, les composés tels que les dérivés amphétaminiques, morphiniques, la cocaïne ainsi que les cannabinoïdes. De nombreuses méthodes de quantification dans le sang et les urines sont publiées dans la littérature scientifique mais comme la fenêtre de détection des stupéfiants dans ces milieux est relativement courte, il n’est pas aisé d’évaluer si leur usage est chronique ou ponctuel. Partant de ce constat, nous avons mis au point le dosage simultané de ces drogues, à l’exception des cannabinoïdes, dans les cheveux par LC-MSMS. Les cheveux constituent une matrice biologique d’intérêt, vu la très bonne stabilité des substances dans la structure du cheveu. Ils permettent également d’établir un historique de consommation grâce à leur croissance d’environ 1cm par mois.
Les stupéfiants sont extraits avec du méthanol en présence de leurs homologues deutérés. Ensuite, une étape de clean-up est réalisée au moyen d’une colonne Solid Phase Extraction (SPE) MCX© de chez Waters®.
Notre validation analytique a évalué les rendements d’extraction allant de 59 à 157%, les effets de suppression ou d’augmentation d’ions (effet matrice) compris entre 1 et 55%, l’exactitude entre 70 et 115%, la précision avec des CV≤15%, une absence de carry-over, des linéarités avec des R²> à 0,98 et enfin les limites de détection et de quantification allant respectivement de 0,02273 à 0,5762 et 0,075 à 2,05 ng/mg de cheveux, pour les différentes drogues testées.
Pour compléter, nous avons aussi voulu évaluer l’impact potentiel des cheveux ayant subi un traitement par coloration sur les effets de matrice et les rendements
Narcotics --- Drug Users --- Chromatography, Liquid --- Tandem Mass Spectrometry --- Hair
Choose an application
Library and Information Sciences --- General and Others --- Libraries --- Public services (Libraries) --- Library users --- Library users. --- Automation --- Technological innovations --- Automation. --- Technological innovations. --- Libraries and readers --- Library public services --- Library services to users --- Public libraries --- Library science --- Library customers --- Library patrons --- Patrons of libraries --- Readers (Library users) --- Reading public (Library users) --- Users of libraries --- Persons --- Library automation --- Mechanization of library processes --- Documentation --- Public institutions --- Librarians --- Public services --- Services to users --- Services for --- Library & Information Science
Choose an application
Internautes --- Internet users --- Commerce électronique --- Economie numérique --- Electronic commerce --- Droit --- Legal status, laws, etc. --- Law and legislation
Choose an application
This title will help any library or information professional anywhere to take a fresh look at this area and to tackle it in their organization, so as to ensure that their users will always obtain exactly what they want.
Libraries --- Information services --- Library administration. --- Public services (Libraries) --- Libraries and readers --- Library public services --- Library services to users --- Library users --- Public libraries --- Library science --- Library management --- Management --- Information services instruction --- Orientation (Information services) --- User education (Information science) --- Information science --- Library orientation --- Patron satisfaction in libraries --- User satisfaction in libraries --- Satisfaction --- User satisfaction. --- User education. --- Public services --- Services to users --- Services for --- Administration --- Organization --- Study and teaching --- Patron satisfaction --- Bibliothèques --- Services d'information --- Satisfaction des utilisateurs --- Formation des utilisateurs
Choose an application
Computer architecture. Operating systems --- Social psychology --- Internet users --- Internet --- Cyberspace --- Social psychology. --- Internautes --- Cyberespace --- Psychologie sociale --- Psychology. --- Psychological aspects. --- Social aspects. --- Psychologie --- Aspect psychologique --- Aspect social
Choose an application
The Internet is not a one-way street in terms of library service as it challenges any traditional notion of its use for collecting or managing information. In this resource authors Charles McClure and Paul T. Jaeger speak to the ways in which the Internet has had more impact on public libraries than any other technology since the creation of the book.
Internet access for library users -- United States. --- Libraries and society -- United States. --- Libraries and the Internet -- United States. --- Public libraries -- Aims and objectives -- United States. --- Public libraries -- Social aspects -- United States. --- Libraries and the Internet --- Internet access for library users --- Public libraries --- Libraries and society --- Social Sciences --- Library & Information Science --- Society and libraries --- Library Internet access for users --- Public access to the Internet in libraries --- User access to the Internet in libraries --- Library users --- Multimedia library services --- Public access computers in libraries --- Internet and libraries --- Internet --- Aims and objectives --- Social aspects
Choose an application
Written for information professionals and librarians trying to implement and manage Web 2.0 in their physical and online collections, Building Library 3.0 pays careful attention to the implementation of social web applications, mobile computing, and RFID and QR Code technology. The book details both how to make these technologies work for libraries and also explores why libraries must gain ground in the important new territories of Web 2.0. The changing relationships between information seekers, the information being sought, and the professional information gatekeepers is of great importance i
Libraries --- Library administration. --- Communication in library science --- Bibliothèques --- Communication en bibliothéconomie --- Effect of technological innovations on. --- Technological innovations. --- Effets des innovations sur les --- Administration --- Innovations --- Digital libraries. --- Internet in library reference services. --- Web 2.0. --- Librarians --- 025 --- Bibliotheekbeheer --- Libraries and the Internet --- Library administration --- Public services (Libraries) --- Web 2.0 --- Social Sciences --- Library & Information Science --- Information technology --- Technological innovations --- 025 Bibliotheekbeheer --- Bibliothèques --- Communication en bibliothéconomie --- World Wide Web --- Libraries and readers --- Library public services --- Library services to users --- Library users --- Public libraries --- Library science --- Library management --- Management --- Documentation --- Public institutions --- Internet and libraries --- Internet --- Effect of technological innovations on --- Public services --- Services to users --- Services for --- Organization --- Libraries and the Internet.
Choose an application
Librarians are now faced with marketing to a generation of students who log on rather than walk in and this cutting-edge book supplies the tools needed to keep customers coming through the door.
Academic libraries --Marketing. --- Academic libraries --Public relations. --- Academic libraries --Space utilization --Social aspects. --- Academic libraries --United States. --- Libraries and colleges. --- Public services (Libraries). --- Academic libraries --- Public services (Libraries) --- Library & Information Science --- Social Sciences --- Space utilization --- Social aspects --- Marketing --- Public relations --- Social aspects. --- Marketing. --- Public relations. --- College libraries --- Libraries, University and college --- University libraries --- Libraries --- Libraries and readers --- Library public services --- Library services to users --- Library users --- Public libraries --- Public services --- Services to users --- Services for --- Libraries and colleges --- Library science --- Services to colleges and universities
Choose an application
"PART I - Setting Up Chapter 1: Introduction Chapter 2: Ethics and Hacking Chapter 3: Hacking as a Career Chapter 4: Setting up Your Lab Chapter 5: Creating and Using PenTest Targets in Your Lab Chapter 6: Methodologies Chapter 7: PenTest Metrics Chapter 8: Management of a PenTest PART II - Running a PenTest Chapter 9: Information Gathering Chapter 10: Vulnerability Identification Chapter 11: Vulnerability Verification Chapter 12: Compromising a System and Privilege Escalation Chapter 13: Maintaining Access Chapter 14: Covering Your Tracks PART III - Wrapping Everything Up Chapter 15: Reporting Results Chapter 16: Archiving Data Chapter 17: Cleaning Up Your Lab Chapter 18: Planning for Your Next PenTest Appendix A - Acronyms Appendix B - Definitions"--Resource description page.
Computer hackers. --- Computer networks --- Security measures. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Computer hackers --- Computer programmers --- Computer users --- Information Technology --- General and Others --- Hackers.
Choose an application
Les blogs appartiennent à la troisième grande évolution dInternet, celle communément appelée le web 2.0 : un web communautaire et interactif quun grand nombre dinternautes sapproprie à travers des outils tels que le partage vidéo (Youtube, Dailymotion), les réseaux sociaux (Facebook, Viadeo), le microblogging (Twitter) et bien dautres techniques encore. Au-delà des usages personnels et ludiques, ces médias sociaux sont au cur dune petite révolution dont on évalue encore assez mal les implications. Que sait-on aujourdhui de leurs conséquences sur les médias traditionnels, les entreprises et la vie politique ? Comment évaluer linfluence des médias sociaux ? Le partage des connaissances et des idées, le développement des identités numériques, les nouveaux rapports de forces économiques, la déstabilisation politique, la remise en question du journalisme autant de sujets que ce livre aborde à partir dexemples concrets, illustrés par des entretiens avec les chroniqueurs David Abiker, Guy Birenbaum et Benoît Raphaël, ainsi que des blogueurs politiques. Sadressant aussi bien au lecteur néophyte quaux professionnels ou encore aux acteurs impliqués dans la vie politique, cet ouvrage de David Réguer, directeur du cabinet RCA et intervenant au CELSA, sappuie sur une longue pratique de veille stratégique. Le regard sémiologique de P. Couton-Wyporek et C. Legris-Desportes sur une sélection de blogs politiques, complète utilement son expertise.
Blogs --- Internet users --- Social networks --- Mass media --- Blogues --- Internautes --- Réseaux sociaux --- Médias --- Political aspects --- Social aspects --- Influence --- Aspect politique --- Aspect social --- Internet --- Digital media --- Reseaux sociaux --- Medias --- Political aspects. --- Social aspects. --- Réseaux sociaux --- Médias --- Blogs - Political aspects --- Internet - Political aspects --- Digital media - Political aspects --- Digital media - Social aspects --- Communautés virtuelles
Listing 1 - 10 of 15 | << page >> |
Sort by
|