Books on the topic 'Computer security Medical records Data protection'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Computer security Medical records Data protection.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Eric, Johnson M., and SpringerLink (Online service), eds. The Economics of Financial and Medical Identity Theft. Boston, MA: Springer US, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

J, Schanz Stephen, Wilson Petra, Essential Drugs and Technology Program (Pan American Health Organization), Pan American Sanitary Bureau, and World Health Organization, eds. The regulation of privacy and data protection in the use of electronic health information: An international perspective and reference source on regulatory and legal issues related to person-identifiable health databases. Washington, D.C: Essential Drugs and Technology Program, Division of Health Systems and Services Development, Pan American Health Organization, Pan American Sanitary Bureau, Regional Office of the World Health Organization, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

United States. Congress. Senate. Committee on Homeland Security and Governmental Affairs. Subcommittee on Oversight of Government Management, the Federal Workforce, and the District of Columbia. State of federal privacy and data security law: Lagging behind the times? : hearing before the Oversight of Government Management, the Federal Workforce, and the District of Columbia Subcommittee of the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Twelfth Congress, second session, July 31, 2012. Washington: U.S. Government Printing Office, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

The definitive guide to complying with the HIPAA/HITECH privacy and security rules. Boca Raton, FL: CRC Press, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Privacy, confidentiality, and health research. Cambridge: Cambridge University Press, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Association, Ontario Hospital. Guidelines for managing privacy, data protection and security for Ontario hospitals. Toronto: Ontario Hospital Association, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

E-health, privacy, and security law. 2nd ed. [Chicago]: American Bar Association Health Law Section, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Fernald, Frances. HIPAA security compliance guide. Washington, D.C. (1100 17th St., NW, Suite 300, Washington 20036): Atlantic Information Services, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

E-health, privacy, and security law, second edition: 2012 supplement. [Chicago, IL]: American Bar Association Health Law Section, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

P, Mortenson Kenneth, ed. Health care privacy and security. [Eagan, MN.]: West Thomson Reuters, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Roger, Stull, Rodrigues R. J, Hernandez Antonio, and Pan American Health Organization, eds. Cybercrime, cyberterrorism, and cyberwarfare: Critical issues in data protection for health services information systems. Washington, D.C: Technology and Health Services Delivery, Health Services Organization Unit (THS/OS), Pan American Health Organization, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Association, American Medical, ed. Handbook for HIPAA-HITECH security. 2nd ed. [Chicago, Ill.]: American Medical Association, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Shoniregun, Charles A. Electronic Healthcare Information Security. Boston, MA: Springer Science+Business Media, LLC, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Ballon, Ian C. The complete state security breach notification compliance handbook. [Eagan, Minn.]: West, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Munir, Abu Bakar. Privacy and data protection: A comparative analysis with special reference to the Malaysian proposed law. Petaling Jaya, Selangor, Malaysia: Sweet & Maxwell Asia, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Institute, Pennsylvania Bar. The final HITECH regs: Dramatic impact on HIPAA privacy, security & breach notification requirements. Mechanicsburg, Pennsylvania: Pennsylvania Bar Institute, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Data breach and encryption handbook. Chicago: American Bar Association, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Christine, Hertzog, ed. Data privacy for the smart grid. Boca Raton: CRC Press, Taylor & Francis Group, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Dian nao chu li ge ren zi liao bao hu fa jie shi hui bian: Computer-processed personal data protection law. Taibei Shi: Fa wu bu, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Panetta, Rocco. Libera circolazione e protezione dei dati personali. Milano: Giuffrè, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Palazzi, Pablo Andrés, Yves Poullet, Horacio Fernández Delpech, and María Verónica Pérez Asinari. Derecho a la intimidad y protección de datos personales. Buenos Aires: Heliasta, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Berghella, Fulvio. Guida pratica alle misure di sicurezza e ai controlli per la privacy: Gli adempimenti per le banche e le finanziarie. Roma]: Bancaria, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Berghella, Fulvio. Guida pratica alle nuove misure di sicurezza per la privacy: La protezione dei dati personali e le soluzioni organizzative per la sicurezza nel nuovo codice sulla privacy. Roma: Bancaria, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Qi, Luo. Parallel and Distributed Computing and Networks: International Conference, PDCN 2010, Chongqing, China, December 13-14, 2010. Revised Selected Papers. Berlin, Heidelberg: Springer-Verlag GmbH Berlin Heidelberg, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Pötzl, Norbert F. Total unter Kontrolle: Computerausweis, Volkszählung, Verkabelung. Reinbek bei Hamburg: Rowohlt, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

India, Export-Import Bank of. Health Insurance Portability and Accountability Act. Mumbai: Export-Import Bank of India, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Schneider, Jochen, Marcus Helfrich, and Nikolaus Forgó. Betrieblicher Datenschutz: Rechtshandbuch. München: C.H. Beck, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Praxishandbuch Datenschutz im Unternehmen: Gestaltungsmöglichkeiten und Strategien für Unternehmen. Berlin: De Gruyter, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

United States. Congress. Senate. Committee on Commerce, Science, and Transportation. The need for privacy protections: Perspectives from the administration and the Federal Trade Commission : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Twelfth Congress, second session, May 9, 2012. Washington: U.S. Government Printing Office, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

United States. Congress. House. Committee on Oversight and Government Reform. Subcommittee on Government Management, Organization, and Procurement., ed. Federal IT security: The future of FISMA : joint hearing before Subcommittee on Information Policy, Census, and National Archives and the Subcommittee on Government Management, Organization, and Procurement of the Committee on Oversight and Government Reform, House of Representatives, One Hundred Tenth Congress, first session, June 7, 2007. Washington: U.S. G.P.O., 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

United States. Congress. House. Committee on Oversight and Government Reform. Subcommittee on Information Policy, Census, and National Archives. Federal IT security: A review of H.R. 4791 : joint hearing before the Subcommittee on Information Policy, Census, and National Archives and the Subcommittee on Government Management, Organization, and Procurement of the Committee on Oversight and Government Reform, House of Representatives, One Hundred Tenth Congress, second session, on H.R. 4791 to amend title 44, United States Code, to strengthen requirements for ensuring the effectiveness of information security controls over information resources that support federal operations and assets, and for other purposes, February 14, 2008. Washington: U.S. G.P.O., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

United States. Congress. House. Committee on Oversight and Government Reform. Subcommittee on Government Management, Organization, and Procurement., ed. Federal IT security: A review of H.R. 4791 : joint hearing before the Subcommittee on Information Policy, Census, and National Archives and the Subcommittee on Government Management, Organization, and Procurement of the Committee on Oversight and Government Reform, House of Representatives, One Hundred Tenth Congress, second session, on H.R. 4791 to amend title 44, United States Code, to strengthen requirements for ensuring the effectiveness of information security controls over information resources that support federal operations and assets, and for other purposes, February 14, 2008. Washington: U.S. G.P.O., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

United States. Congress. House. Committee on Energy and Commerce. Subcommittee on Oversight and Investigations. How secure is private medical information?: A review of computer security at the Health Care Financing Administration and its Medicare contractors : hearing before ... 107th Congress, 1st session, May 23, 2001. Washington, DC: U.S. G.P.O., 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

United, States Congress House Committee on Government Operations Government Information Justice and Agriculture Subcommittee. Computer Matching and Privacy Protection Amendments of 1990: Hearing before the Government Information, Justice, and Agriculture Subcommittee of the Committee on Government Operations, House of Representatives, One Hundred First Congress, second session, on H.R. 5450 ... September 11, 1990. Washington: U.S. G.P.O., 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Management, United States Congress Senate Committee on Governmental Affairs Subcommittee on Oversight of Government. Computer Matching and Privacy Protection Act of 1986: Hearing before the Subcommittee on Oversight of Government Management of the Committee on Governmental Affairs, United States Senate, Ninety-ninth Congress, second session, on S. 2756 ... September 16, 1986. Washington: U.S. G.P.O., 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Woodward, Jeannette A. What every librarian should know about electronic privacy. Westport, Conn: Libraries Unlimited, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

United States. Congress. House. Committee on Veterans' Affairs. The U.S. Department of Veterans Affairs information technology reorganization: How far has VA come? : hearing before the Committee on Veterans' Affairs, U.S. House of Representatives, One Hundred Tenth Congress, first session, September 26, 2007. Washington: U.S. G.P.O., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Investigations, United States Congress House Committee on Energy and Commerce Subcommittee on Oversight and. How secure is private medical information?: A review of computer security at the Health Care Financing Administration and its Medicare contractors : hearing before the Subcommittee on Oversight and Investigations of the Committee on Energy and Commerce, House of Representatives, One Hundred Seventh Congress, first session, May 23, 2001. Washington: U.S. G.P.O., 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

R, Dinkins Charles, ed. HIPAA in daily practice. [S.l.]: Kerlak Enterprises, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

United States. General Accounting Office. Accounting and Information Management Division. Information security: Software change controls at the Department of Interior. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

United States. General Accounting Office. Accounting and Information Management Division. Information security: Software change controls at the Department of the Treasury. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Division, United States General Accounting Office Accounting and Information Management. Information security: Software change controls at the Office of Personnel Management. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

United States. General Accounting Office. Accounting and Information Management Division. Information security: Software change controls at the National Aeronautics and Space Administration. Washington, D.C. (P.O. Box 37050, Washington 20013): The Office, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

United States. General Accounting Office. Accounting and Information Management Division. Information security: Software change controls at the Department of Health and Human Services. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Division, United States General Accounting Office Accounting and Information Management. Information security: Software change controls at the Department of Housing and Urban Development. Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013): The Office, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Anthony, Maeder, and Martin-Sanchez Fernando J, eds. Health Informatics: Building a healthcare future through trusted information ; selected papers from the 20th Australian National Health Informatics Conference (HIC 2012). Amsterdam: IOS Press Inc., 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Protecting your library's digital sources: The essential guide to planning and preservation. Chicago: American Library Association, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

The Economics Of Financial And Medical Identity Theft. Springer, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Camp, L. Jean, and M. Eric Johnson. The Economics of Financial and Medical Identity Theft. Springer, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

State agency information systems: Reviewing the Kansas Health Policy Authority's management of those systems. Topeka, Kan: Legislative Division of Post Audit, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography