Search results

From LIMSWiki
Jump to navigationJump to search
Results 1 – 27 of 134
Advanced search

Search in namespaces:

  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  

Page title matches

Page text matches

  • .../title-40/part-3 |title=Electronic Code of Federal Regulations - Title 40: Protection of Environment - Part 3: Cross-media Electronic Reporting |publisher=U.S. G ...ls for States, Tribes, and Local Governments |publisher=U.S. Environmental Protection Agency |date=August 2015 |accessdate=07 January 2022}}</ref>
    8 KB (1,078 words) - 20:45, 19 January 2022
  • ...Azure_Regions-2021.pdf |format=PDF |title=Enabling Data Residency and Data Protection in Microsoft Azure Regions |publisher=Microsoft Corporation |date=April 202 ...com/en-us/azure/security/fundamentals/threat-detection |title=Azure threat protection |author=Lanfear, T.; Mel; Wren, B. et al. |work=Microsoft Documentation |pu
    26 KB (3,472 words) - 19:33, 11 April 2024
  • ...d Laboratory Practices''' ('''GALP''') was a [[United States Environmental Protection Agency|U.S. EPA-based]] conglomeration of "regulations, policies, and guida ...|author=U.S. Environmental Protection Agency |publisher=U.S. Environmental Protection Agency |date=10 August 1995 |archivedate=21 October 2013}}</ref>
    4 KB (591 words) - 22:39, 7 January 2022
  • ...a Protection Regulation on medical research|The effect of the General Data Protection Regulation on medical research]]"''' ...on biomedical data research. ('''[[Journal:The effect of the General Data Protection Regulation on medical research|Full article...]]''')<br />
    88 KB (12,401 words) - 19:57, 3 April 2024
  • ...s from the qualitative realm|Rethinking data sharing and human participant protection in social science research: Applications from the qualitative realm]]"''' ...ot depositors. ('''[[Journal:Rethinking data sharing and human participant protection in social science research: Applications from the qualitative realm|Full ar
    77 KB (10,993 words) - 20:36, 3 April 2024
  • | services = Threat anticipation, identification, protection, detection, and response ...nge Cyberdefense describes its MSS business as being able to "offer global protection with local expertise and support our customers throughout the entire threat
    3 KB (388 words) - 22:57, 28 February 2024
  • ...its thirty-third International Conference on Informatics for Environmental Protection.<ref name="EI14">{{cite web |url=https://enviroinfo2019.org/ |title=EnviroI
    10 KB (1,261 words) - 17:42, 18 January 2022
  • ...nfo.html |title=SEDD Generator Tool Information |author=U.S. Environmental Protection Agency |date=08 November 2013 |accessdate=20 May 2014}}</ref>
    2 KB (216 words) - 16:29, 11 April 2015
  • | style="padding:5px;" |'''Fire protection''' ...hensive-Approach-To-Data-Center-Fire-Safety--14593 |title=Data Center Fire Protection |author=Tubbs, Jeffrey; DiSalvo, Garr; Neviackas, Andrew |work=FacilitiesNe
    31 KB (4,327 words) - 22:37, 27 August 2014
  • ...le=SMILES Tutorial: What is SMILES? |publisher=United States Environmental Protection Agency |date=10 February 2009 |accessdate=15 February 2013}}</ref> It has s
    3 KB (354 words) - 16:28, 22 August 2014
  • ...[[Information security|data security]] and [[Information privacy|privacy]] protection ... ('''[[Journal:Development of an integrated and comprehensive clinical t ...reliability of laboratory results, issues of financial sustainability, and protection of the environment play an important role in decision-making in both indust
    78 KB (10,739 words) - 15:33, 2 January 2024
  • ...ref name="DellEMCCloud">{{cite web |url=https://www.dell.com/en-us/dt/data-protection/powerprotect-dd-series/cloud-tier.htm |title=Dell Cloud Tier |publisher=Del ...ogies provides [https://www.delltechnologies.com/asset/sv-se/products/data-protection/briefs-summaries/H16867_data_domain_cloud_dr_sb.pdf disaster recovery as a
    18 KB (2,498 words) - 22:52, 28 February 2024
  • ...ect privacy-specific threats and assess the degree of compliance with data protection legislation. Furthermore, a privacy impact assessment (PIA) is conducted in ...s widely used in healthcare, their problems and possibilities, and the way protection mechanisms are organized and prepared when the company chooses to implement
    79 KB (10,982 words) - 23:51, 11 April 2024
  • ...associating the user with an action in the ELN. For the purposes of patent protection, this likely will include a double signature scheme where both the author a ...oof Service into OpenLAB Electronic Lab Notebook, Enhances Data Integrity, Protection |publisher=Agilent Technologies, Inc |date=20 April 2010 |accessdate=13 Feb
    61 KB (8,819 words) - 18:09, 12 April 2024
  • ...nary (DED) |work=SEDD Specification Version 5.2 |author=U.S. Environmental Protection Agency |date=March 2019 |accessdate=22 September 2022}}</ref>
    1 KB (141 words) - 21:44, 22 September 2022
  • ...nary (DED) |work=SEDD Specification Version 5.2 |author=U.S. Environmental Protection Agency |date=March 2019 |accessdate=21 September 2022}}</ref>
    714 bytes (95 words) - 22:29, 21 September 2022
  • ...nary (DED) |work=SEDD Specification Version 5.2 |author=U.S. Environmental Protection Agency |date=March 2019 |accessdate=21 September 2022}}</ref>
    780 bytes (107 words) - 23:19, 21 September 2022
  • ...lations including FISMA, [[HIPAA]], and SOX in the United States, the Data Protection Directive in the European Union, and the credit card industry's PCI DSS, us ...doption of this new model. The effectiveness and efficiency of traditional protection mechanisms are being reconsidered as the characteristics of this innovative
    40 KB (5,252 words) - 21:08, 19 September 2022
  • ...data deliverable''' (EDD) is defined by the [[United States Environmental Protection Agency]] as "a data file (or files), in a specified format, designed to tra ...onically |work=Ground Water Forum Fact Sheet |publisher=U.S. Environmental Protection Agency |date=April 2011 |accessdate=22 September 2022}}</ref>
    1 KB (160 words) - 21:05, 22 September 2022
  • ...include field-level encryption, HTTPS, and multiple other layers of Amazon protection.<ref name="AWSCloudfront">{{cite web |url=https://aws.amazon.com/cloudfront ...ce, IAM and security review, access management, managed firewall, endpoint protection, and network configuration varies depending on the plan chosen. Consult the
    29 KB (3,918 words) - 17:53, 12 April 2024

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)