Dead-end pages

From LIMSWiki
Jump to navigationJump to search

The following pages do not link to other pages in LIMSWiki.

Showing below up to 50 results in range #1,801 to #1,850.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)

  1. Journal:Global data quality assessment and the situated nature of “best” research practices in biology
  2. Journal:Molmil: A molecular viewer for the PDB and beyond
  3. Journal:Multilevel classification of security concerns in cloud computing
  4. Journal:Open data: Accountability and transparency
  5. Journal:Predicting biomedical metadata in CEDAR: A study of Gene Expression Omnibus (GEO)
  6. Journal:Requirements for data integration platforms in biomedical research networks: A reference model
  7. Journal:Ten simple rules for cultivating open science and collaborative R&D
  8. Journal:The effect of the General Data Protection Regulation on medical research
  9. Journal:The systems biology format converter
  10. Journal:Water, water, everywhere: Defining and assessing data sharing in academia
  11. Book:COVID-19 Testing, Reporting, and Information Management in the Laboratory/Final thoughts and additional resources/Key guidance documents
  12. Book:COVID-19 Testing, Reporting, and Information Management in the Laboratory/Final thoughts and additional resources/Key journal articles
  13. Book:COVID-19 Testing, Reporting, and Information Management in the Laboratory/Final thoughts and additional resources/Public health lab directory
  14. Book:COVID-19 Testing, Reporting, and Information Management in the Laboratory/Final thoughts and additional resources/Test kit and other resources
  15. Book:COVID-19 Testing, Reporting, and Information Management in the Laboratory/Final thoughts and additional resources/Web portals
  16. Book:Choosing and Implementing a Cloud-based Service for Your Laboratory/Final thoughts and additional resources/Associations, organizations, and interest groups
  17. Book:Choosing and Implementing a Cloud-based Service for Your Laboratory/Final thoughts and additional resources/Key reading and reference material
  18. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Assessment, authorization, and monitoring
  19. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Audit and accountability
  20. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Awareness and training
  21. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Configuration management
  22. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Contingency planning
  23. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Identification and authentication
  24. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Incident response
  25. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Maintenance
  26. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Media protection
  27. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Personally identifiable information processing and transparency
  28. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Personnel security
  29. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Physical and environmental protection
  30. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Planning
  31. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Program management
  32. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Risk assessment
  33. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Supply chain risk management
  34. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/System and communications protection
  35. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/System and information integrity
  36. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/System and services acquisition
  37. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Develop and create the cybersecurity plan/Develop a response and continuity plan
  38. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Develop and create the cybersecurity plan/Establish how the overall cybersecurity plan will be implemented
  39. Book:HIPAA Compliance: An Introduction/Abbreviations, acronyms, and initialisms
  40. Book:HIPAA Compliance: An Introduction/Additional compliance guidance
  41. Book:HIPAA Compliance: An Introduction/Additional resources
  42. Book:HIPAA Compliance: An Introduction/Administration
  43. Book:HIPAA Compliance: An Introduction/Protected health information
  44. Book:LIMS Buyer’s Guide for Cannabis Testing Laboratories/An RFI for evaluating cannabis testing LIMS vendors/Account management and support
  45. Book:LIMS Buyer’s Guide for Cannabis Testing Laboratories/An RFI for evaluating cannabis testing LIMS vendors/Cloud infrastructure, security, and related policies
  46. Book:LIMS Buyer’s Guide for Cannabis Testing Laboratories/An RFI for evaluating cannabis testing LIMS vendors/LIMS: Interoperability and system performance
  47. Book:LIMS Buyer’s Guide for Cannabis Testing Laboratories/An RFI for evaluating cannabis testing LIMS vendors/LIMS: Primary cannabis testing workflow
  48. Book:LIMS Buyer’s Guide for Cannabis Testing Laboratories/An RFI for evaluating cannabis testing LIMS vendors/LIMS: Software security, data integrity, and related policies
  49. Book:LIMS Buyer’s Guide for Cannabis Testing Laboratories/An RFI for evaluating cannabis testing LIMS vendors/LIMS: Workflow and operations maintenance and support
  50. Book:LIMS Buyer’s Guide for Cannabis Testing Laboratories/An RFI for evaluating cannabis testing LIMS vendors/License agreements, service level agreements (SLAs), and contracts

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)