Электронная книга: Georgios Danezis P. «Food Authentication. Management, Analysis and Regulation»

Food Authentication. Management, Analysis and Regulation

The determination of food authenticity is a vital component of quality control. Its importance has been highlighted in recent years by high-profile cases in the global supply chain such as the European horsemeat scandal and the Chinese melamine scandal which led to six fatalities and the hospitalisation of thousands of infants. As well as being a safety concern, authenticity is also a quality criterion for food and food ingredients. Consumers and retailers demand that the products they purchase and sell are what they purport to be. This book covers the most advanced techniques used for the authentication of a vast number of products around the world. The reader will be informed about the latest pertinent analytical techniques. Chapters focus on the novel techniques&markers that have emerged in recent years. An introductory section presents the concepts of food authentication while the second section examines in detail the analytical techniques for the detection of fraud relating to geographical, botanical, species and processing origin and production methods of food materials and ingredients. Finally, the third section looks at consumer attitudes towards food authenticity, the application of bioinformatics to this field, and the Editor’s conclusions and future outlook. Beyond being a reference to researchers working in food authentication it will serve as an essential source to analytical scientists interested in the field and food scientists to appreciate analytical approaches. This book will be a companion to under- and postgraduate students in their wander in food authentication and aims to be useful to researchers in universities and research institutions.

Издательство: "John Wiley&Sons Limited"

ISBN: 9781118810248

электронная книга

Купить за 15443.31 руб и скачать на Litres

Look at other dictionaries:

  • Verification and validation — IV V redirects here. For NASA s IV V Facility, see Independent Verification and Validation Facility. Verification and validation is the process of checking that a product, service, or system meets specifications and that it fulfills its intended… …   Wikipedia

  • Verification and Validation — Verification Validation is the process of checking that a product, service, or system meets specifications and that it fulfils its intended purpose. These are critical components of a quality management system such as ISO… …   Wikipedia

  • Europe, history of — Introduction       history of European peoples and cultures from prehistoric times to the present. Europe is a more ambiguous term than most geographic expressions. Its etymology is doubtful, as is the physical extent of the area it designates.… …   Universalium

  • Automated Tissue Image Systems — (ATIS) are computer controlled automatic test equipment (ATE) systems classified as medical device and used as pathology laboratory tools (tissue based cancer diagnostics) to characterize a stained tissue sample embedded on a bar coded glass… …   Wikipedia

  • TPRC — The annual Telecommunications Policy Research Conference (http://tprcweb.com/) (TPRC) is a non profit organization, which hosts an annual forum for scholars engaged in publishable research on policy relevant telecommunications and information… …   Wikipedia

  • Package testing — Military shipping container being drop tested Testing …   Wikipedia

  • Medical device — A medical device is a product which is used for medical purposes in patients, in diagnosis, therapy or surgery[citation needed]. Whereas medicinal products (also called pharmaceuticals) achieve their principal action by pharmacological, metabolic …   Wikipedia

  • Closure (container) — For other uses, see Closure (disambiguation). An aluminum bottle with a threaded aluminum screw closure Closures are devices and techniques used to close or seal a bottle, jug, jar, tube, can, etc. Closures can be a cap, cover, lid, plug, etc.… …   Wikipedia

  • Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… …   Wikipedia

  • List of Statutory Instruments of Scotland, 2006 — This is an incomplete list of Scottish Statutory Instruments in 2006.1 100* Public Contracts (Scotland) Regulations 2006 S.S.I. 2006/1 * Utilities Contracts (Scotland) Regulations 2006 S.S.I. 2006/2 * Food Hygiene (Scotland) Regulations 2006… …   Wikipedia

  • Spam (electronic) — An email box folder littered with spam messages A typical spam m …   Wikipedia


We are using cookies for the best presentation of our site. Continuing to use this site, you agree with this.