Uncategorized pages

From LIMSWiki
Jump to navigationJump to search

Showing below up to 50 results in range #401 to #450.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)

  1. Book:Choosing and Implementing a Cloud-based Service for Your Laboratory/RFI questions for cloud providers
  2. Book:Choosing and Implementing a Cloud-based Service for Your Laboratory/Standards and security in the cloud/Security in the cloud
  3. Book:Choosing and Implementing a Cloud-based Service for Your Laboratory/Standards and security in the cloud/Standards and regulations influencing cloud computing
  4. Book:Choosing and Implementing a Cloud-based Service for Your Laboratory/What is cloud computing?/Cloud computing services and deployment models
  5. Book:Choosing and Implementing a Cloud-based Service for Your Laboratory/What is cloud computing?/History and evolution
  6. Book:Choosing and Implementing a Cloud-based Service for Your Laboratory/What is cloud computing?/The relationship between cloud computing and the open source paradigm
  7. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Access control
  8. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Assessment, authorization, and monitoring
  9. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Audit and accountability
  10. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Awareness and training
  11. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Configuration management
  12. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Contingency planning
  13. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Identification and authentication
  14. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Incident response
  15. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Maintenance
  16. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Media protection
  17. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Personally identifiable information processing and transparency
  18. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Personnel security
  19. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Physical and environmental protection
  20. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Planning
  21. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Program management
  22. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Risk assessment
  23. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Supply chain risk management
  24. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/System and communications protection
  25. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/System and information integrity
  26. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/System and services acquisition
  27. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Closing remarks/Recap and closing
  28. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Develop and create the cybersecurity plan/Define scope and responsibilities
  29. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Develop and create the cybersecurity plan/Determine resource needs
  30. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Develop and create the cybersecurity plan/Develop a communications plan
  31. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Develop and create the cybersecurity plan/Develop a response and continuity plan
  32. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Develop and create the cybersecurity plan/Develop strategic cybersecurity goals and define success
  33. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Develop and create the cybersecurity plan/Establish how the overall cybersecurity plan will be implemented
  34. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Develop and create the cybersecurity plan/Establish performance indicators and associated time frames
  35. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Develop and create the cybersecurity plan/Identify cybersecurity requirements and objectives
  36. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Develop and create the cybersecurity plan/Identify key stakeholders
  37. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Develop and create the cybersecurity plan/Review progress
  38. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Fitting a cybersecurity standards framework into a cybersecurity plan/How do cybersecurity controls and frameworks guide plan development?
  39. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Introduction
  40. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/NIST Special Publication 800-53, Revision 5 and the NIST Cybersecurity Framework/NIST Cybersecurity Framework
  41. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/What are the major regulations and standards dictating cybersecurity action?/Cybersecurity standards frameworks
  42. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/What is a cybersecurity plan and why do you need it?/Cybersecurity planning and its value
  43. Book:HIPAA Compliance: An Introduction/Abbreviations, acronyms, and initialisms
  44. Book:HIPAA Compliance: An Introduction/Additional compliance guidance
  45. Book:HIPAA Compliance: An Introduction/Additional resources
  46. Book:HIPAA Compliance: An Introduction/Administration
  47. Book:HIPAA Compliance: An Introduction/Introduction
  48. Book:HIPAA Compliance: An Introduction/Protected health information
  49. Book:HIPAA Compliance: An Introduction/Security
  50. Book:HIPAA Compliance: An Introduction/Use and disclosure

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)