Dead-end pages
From LIMSWiki
Jump to navigationJump to searchThe following pages do not link to other pages in LIMSWiki.
Showing below up to 50 results in range #1,801 to #1,850.
View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)
- Journal:Global data quality assessment and the situated nature of “best” research practices in biology
- Journal:Molmil: A molecular viewer for the PDB and beyond
- Journal:Multilevel classification of security concerns in cloud computing
- Journal:Open data: Accountability and transparency
- Journal:Predicting biomedical metadata in CEDAR: A study of Gene Expression Omnibus (GEO)
- Journal:Requirements for data integration platforms in biomedical research networks: A reference model
- Journal:Ten simple rules for cultivating open science and collaborative R&D
- Journal:The effect of the General Data Protection Regulation on medical research
- Journal:The systems biology format converter
- Journal:Water, water, everywhere: Defining and assessing data sharing in academia
- Book:COVID-19 Testing, Reporting, and Information Management in the Laboratory/Final thoughts and additional resources/Key guidance documents
- Book:COVID-19 Testing, Reporting, and Information Management in the Laboratory/Final thoughts and additional resources/Key journal articles
- Book:COVID-19 Testing, Reporting, and Information Management in the Laboratory/Final thoughts and additional resources/Public health lab directory
- Book:COVID-19 Testing, Reporting, and Information Management in the Laboratory/Final thoughts and additional resources/Test kit and other resources
- Book:COVID-19 Testing, Reporting, and Information Management in the Laboratory/Final thoughts and additional resources/Web portals
- Book:Choosing and Implementing a Cloud-based Service for Your Laboratory/Final thoughts and additional resources/Associations, organizations, and interest groups
- Book:Choosing and Implementing a Cloud-based Service for Your Laboratory/Final thoughts and additional resources/Key reading and reference material
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Assessment, authorization, and monitoring
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Audit and accountability
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Awareness and training
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Configuration management
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Contingency planning
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Identification and authentication
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Incident response
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Maintenance
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Media protection
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Personally identifiable information processing and transparency
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Personnel security
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Physical and environmental protection
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Planning
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Program management
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Risk assessment
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Supply chain risk management
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/System and communications protection
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/System and information integrity
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/System and services acquisition
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Develop and create the cybersecurity plan/Develop a response and continuity plan
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Develop and create the cybersecurity plan/Establish how the overall cybersecurity plan will be implemented
- Book:HIPAA Compliance: An Introduction/Abbreviations, acronyms, and initialisms
- Book:HIPAA Compliance: An Introduction/Additional compliance guidance
- Book:HIPAA Compliance: An Introduction/Additional resources
- Book:HIPAA Compliance: An Introduction/Administration
- Book:HIPAA Compliance: An Introduction/Protected health information
- Book:LIMS Buyer’s Guide for Cannabis Testing Laboratories/An RFI for evaluating cannabis testing LIMS vendors/Account management and support
- Book:LIMS Buyer’s Guide for Cannabis Testing Laboratories/An RFI for evaluating cannabis testing LIMS vendors/Cloud infrastructure, security, and related policies
- Book:LIMS Buyer’s Guide for Cannabis Testing Laboratories/An RFI for evaluating cannabis testing LIMS vendors/LIMS: Interoperability and system performance
- Book:LIMS Buyer’s Guide for Cannabis Testing Laboratories/An RFI for evaluating cannabis testing LIMS vendors/LIMS: Primary cannabis testing workflow
- Book:LIMS Buyer’s Guide for Cannabis Testing Laboratories/An RFI for evaluating cannabis testing LIMS vendors/LIMS: Software security, data integrity, and related policies
- Book:LIMS Buyer’s Guide for Cannabis Testing Laboratories/An RFI for evaluating cannabis testing LIMS vendors/LIMS: Workflow and operations maintenance and support
- Book:LIMS Buyer’s Guide for Cannabis Testing Laboratories/An RFI for evaluating cannabis testing LIMS vendors/License agreements, service level agreements (SLAs), and contracts









