46 results.
1 2 3 [4] 5
What Does It Take to be a Healthcare Information Security Manager?
Author: Wilder, Steven S.
Source: In Confidence (newsletter)
Publication Date: March 02, 2002
Handling a Security Breach: Lessons Learned
Author: Dougherty, Michelle
Source: Journal of AHIMA
Publication Date: February 2002
Contingency Planning Guide for Information Technology Systems: Recommendations of the National Institute of Standards and Technology
Author: Swanson, Marianne; Wohl, Amy; Pope, Lucinda; Grance, Tim; Hash, Joan; Thomas, Ray
Source: Government (U.S.)
Publication Date: December 02, 2001
Are You Vulnerable to Hackers?
Author: Sardinas, Joseph L. Jr.; Muldoon, Jeannine D.
Source: Journal of AHIMA
Publication Date: November 2001
Capitalizing on Your HIM Training for Transitioning ...Risk Management Career
Author: Russell, Lynda A.
Source: AHIMA Convention
Publication Date: October 15, 2001
Enterprise Approach to Risk Management
Author: Mead, Kevin
Source: Journal of AHIMA
Publication Date: October 2001
Data Warehousing Improves Care, Demonstrates Return on Investment
Author: Mercer, Michele
Source: Journal of AHIMA
Publication Date: September 2001
Securing Your IT Environment from the Inside Out
Author: Bakman, Alex
Source: In Confidence (newsletter)
Publication Date: September 02, 2001
How To Do a Failure Mode Analysis
Author: Spath, Patrice L.
Source: Quality Resource (newsletter)
Publication Date: July 02, 2001
Systematic Approach Shortest Route to Security Incident...
Author: Sobel, David A.
Source: Journal of AHIMA
Publication Date: June 2001
1 2 3 [4] 5