Narrow your search

Library

KU Leuven (4)

Odisee (2)

Thomas More Kempen (2)

Thomas More Mechelen (2)

UCLL (2)

ULiège (2)

VIVES (2)

LUCA School of Arts (1)

UGent (1)

ULB (1)

More...

Resource type

book (5)


Language

English (4)

Korean (1)


Year
From To Submit

2010 (5)

Listing 1 - 5 of 5
Sort by

Book
Border security : better usage of electronic passport security features could improve fraud detection : report to congressional requesters.
Author:
Year: 2010 Publisher: [Washington, D.C.] : U.S. Govt. Accountability Office,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Border security : better usage of electronic passport security features could improve fraud detection : report to congressional requesters.
Author:
Year: 2010 Publisher: [Washington, D.C.] : U.S. Govt. Accountability Office,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
세상에서 가장 안전한 이름 안철수연구소.
Author:
ISBN: 9788934940401 Year: 2010 Publisher: 파주 김영사

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Seven deadliest Microsoft attacks
Authors: ---
ISBN: 1282541749 9786612541742 1597495522 1597495514 9781597495523 9781282541740 9781597495516 Year: 2010 Publisher: Amsterdam ; Boston : Syngress/Elsevier,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat


Book
Electronic Healthcare Information Security
Authors: --- ---
ISBN: 0387848177 9786612980831 038784919X 1282980831 Year: 2010 Publisher: New York, NY : Springer US : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The adoption of Information and Communication Technologies (ICT) in healthcare is driven by the need to contain costs while maximizing quality and efficiency. However, ICT adoption for healthcare information management has brought far-reaching effects and implications on the spirit of the Hippocratic Oath, patient privacy and confidentiality. A wave of security breaches have led to pressing calls for opt-in and opt-out provisions where patients are free to choose to or not have their healthcare information collected and recorded within healthcare information systems. Such provisions have negative impact on cost, efficiency and quality of patient care. Thus determined efforts to gain patient trust is increasingly under consideration for enforcement through legislation, standards, national policy frameworks and implementation systems geared towards closing gaps in ICT security frameworks. The ever-increasing healthcare expenditure and pressing demand for improved quality and efficiency in patient care services are driving innovation in healthcare information management. Key among the main innovations is the introduction of new healthcare practice concepts such as shared care, evidence-based medicine, clinical practice guidelines and protocols, the cradle-to-grave health record and clinical workflow or careflow. Central to these organizational re-engineering innovations is the widespread adoption of Information and Communication Technologies (ICT) at national and regional levels, which has ushered in computer-based healthcare information management that is centred on the electronic healthcare record (EHR).

Keywords

Electronic books. -- local. --- Health services administration -- Data processing. --- Medical informatics. --- Medical Records Systems, Computerized --- Security Measures --- Information Science --- Medical Records --- Organization and Administration --- Health Services Administration --- Records as Topic --- Data Collection --- Health Care --- Epidemiologic Methods --- Investigative Techniques --- Analytical, Diagnostic and Therapeutic Techniques and Equipment --- Computer Security --- Electronic Health Records --- Medicine --- Engineering & Applied Sciences --- Health & Biological Sciences --- Medical & Biomedical Informatics --- Computer Science --- Electronic Health Record --- Electronic Medical Record --- Electronic Medical Records --- Health Record, Electronic --- Health Records, Electronic --- Medical Record, Electronic --- Medical Records, Electronic --- Record, Electronic Health --- Record, Electronic Medical --- Records, Electronic Health --- Records, Electronic Medical --- Compromising of Data --- Computer Hackers --- Computer Worms --- Cyber Security --- Cybersecurity --- Data Encryption --- Information Protection --- Computer Viruses --- Data Protection --- Data Security --- Computer Hacker --- Computer Virus --- Computer Worm --- Data Compromising --- Data Encryptions --- Encryption, Data --- Encryptions, Data --- Hacker, Computer --- Hackers, Computer --- Protection, Data --- Protection, Information --- Security, Computer --- Security, Cyber --- Security, Data --- Virus, Computer --- Viruses, Computer --- Worm, Computer --- Worms, Computer --- Investigative Technics --- Investigative Technic --- Investigative Technique --- Technic, Investigative --- Technics, Investigative --- Technique, Investigative --- Techniques, Investigative --- Epidemiologic Method --- Epidemiological Methods --- Methods, Epidemiologic --- Epidemiological Method --- Method, Epidemiologic --- Method, Epidemiological --- Methods, Epidemiological --- Epidemiology --- Community-Based Distribution --- Contraceptive Distribution --- Delivery of Healthcare --- Dental Care Delivery --- Distribution, Non-Clinical --- Distribution, Nonclinical --- Distributional Activities --- Healthcare --- Healthcare Delivery --- Healthcare Systems --- Non-Clinical Distribution --- Nonclinical Distribution --- Delivery of Dental Care --- Health Care Delivery --- Health Care Systems --- Activities, Distributional --- Activity, Distributional --- Care, Health --- Community Based Distribution --- Community-Based Distributions --- Contraceptive Distributions --- Deliveries, Healthcare --- Delivery, Dental Care --- Delivery, Health Care --- Delivery, Healthcare --- Distribution, Community-Based --- Distribution, Contraceptive --- Distribution, Non Clinical --- Distributional Activity --- Distributions, Community-Based --- Distributions, Contraceptive --- Distributions, Non-Clinical --- Distributions, Nonclinical --- Health Care System --- Healthcare Deliveries --- Healthcare System --- Non Clinical Distribution --- Non-Clinical Distributions --- Nonclinical Distributions --- System, Health Care --- System, Healthcare --- Systems, Health Care --- Systems, Healthcare --- Data Aggregation --- Data Collection Methods --- Dual Data Collection --- Aggregation, Data --- Collection Method, Data --- Collection Methods, Data --- Collection, Data --- Collection, Dual Data --- Data Collection Method --- Method, Data Collection --- Methods, Data Collection --- Forms as Topic --- Personal Identification Systems --- Travel Documents --- Document, Travel --- Documents, Travel --- Forms as Topics --- Identification System, Personal --- Identification Systems, Personal --- Personal Identification System --- Records as Topics --- System, Personal Identification --- Systems, Personal Identification --- Travel Document --- Administration, Health Services --- Health Services --- Administration and Organization --- Administrative Technics --- Administrative Techniques --- Coordination, Administrative --- Logistics --- Supervision --- Technics, Administrative --- Techniques, Administrative --- Administration --- Administrative Coordination --- Administrative Technic --- Administrative Technique --- Technic, Administrative --- Technique, Administrative --- Records, Medical --- Transcription, Medical --- Health Diaries --- Medical Transcription --- Diaries, Health --- Diary, Health --- Health Diary --- Medical Record --- Medical Transcriptions --- Record, Medical --- Transcriptions, Medical --- Information Sciences --- Science, Information --- Sciences, Information --- National Security --- Measure, Security --- Measures, Security --- Security Measure --- Security, National --- Automated Medical Record System --- Automated Medical Record Systems --- Automated Medical Records System --- Computerized Medical Record --- Computerized Medical Record System --- Computerized Medical Record Systems --- Computerized Medical Records --- Computerized Medical Records System --- Computerized Patient Medical Records --- Medical Record System, Automated --- Medical Record System, Computerized --- Medical Record Systems, Automated --- Medical Record Systems, Computerized --- Medical Record, Computerized --- Medical Records System, Automated --- Medical Records System, Computerized --- Medical Records Systems, Automated --- Medical Records, Computerized --- Automated Medical Records Systems --- Computerized Medical Records Systems --- Record, Computerized Medical --- Records, Computerized Medical --- methods --- organization & administration --- Computer science. --- Health administration. --- Computer security. --- E-commerce. --- Computer Science. --- Systems and Data Security. --- Health Administration. --- Information Systems Applications (incl. Internet). --- e-Commerce/e-business. --- Health services administration --- Data processing. --- Clinical informatics --- Health informatics --- Medical information science --- Information science --- Data processing --- Practice of medicine. --- Medical practice --- Practice of medicine --- Physician practice acquisitions --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Application software. --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software

Listing 1 - 5 of 5
Sort by