Pages without language links

From LIMSWiki
Jump to navigationJump to search

The following pages do not link to other language versions.

Showing below up to 50 results in range #4,651 to #4,700.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)

  1. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Maintenance
  2. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Media protection
  3. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Personally identifiable information processing and transparency
  4. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Personnel security
  5. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Physical and environmental protection
  6. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Planning
  7. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Program management
  8. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Risk assessment
  9. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Supply chain risk management
  10. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/System and communications protection
  11. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/System and information integrity
  12. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/System and services acquisition
  13. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Closing remarks/Recap and closing
  14. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Develop and create the cybersecurity plan/Define scope and responsibilities
  15. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Develop and create the cybersecurity plan/Determine resource needs
  16. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Develop and create the cybersecurity plan/Develop a communications plan
  17. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Develop and create the cybersecurity plan/Develop a response and continuity plan
  18. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Develop and create the cybersecurity plan/Develop strategic cybersecurity goals and define success
  19. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Develop and create the cybersecurity plan/Establish how the overall cybersecurity plan will be implemented
  20. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Develop and create the cybersecurity plan/Establish performance indicators and associated time frames
  21. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Develop and create the cybersecurity plan/Identify cybersecurity requirements and objectives
  22. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Develop and create the cybersecurity plan/Identify key stakeholders
  23. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Develop and create the cybersecurity plan/Review progress
  24. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Fitting a cybersecurity standards framework into a cybersecurity plan/How do cybersecurity controls and frameworks guide plan development?
  25. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Introduction
  26. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/NIST Special Publication 800-53, Revision 5 and the NIST Cybersecurity Framework/NIST Cybersecurity Framework
  27. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/What are the major regulations and standards dictating cybersecurity action?/Cybersecurity standards frameworks
  28. Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/What is a cybersecurity plan and why do you need it?/Cybersecurity planning and its value
  29. Book:HIPAA Compliance: An Introduction
  30. Book:HIPAA Compliance: An Introduction/Abbreviations, acronyms, and initialisms
  31. Book:HIPAA Compliance: An Introduction/Additional compliance guidance
  32. Book:HIPAA Compliance: An Introduction/Additional resources
  33. Book:HIPAA Compliance: An Introduction/Administration
  34. Book:HIPAA Compliance: An Introduction/Introduction
  35. Book:HIPAA Compliance: An Introduction/Protected health information
  36. Book:HIPAA Compliance: An Introduction/Security
  37. Book:HIPAA Compliance: An Introduction/Use and disclosure
  38. Book:HIPAA Compliance: An Introduction/What is HIPAA?
  39. Book:HIPAA Compliance: An Introduction/Who needs to comply?
  40. Book:HealthCloud POL User Guide
  41. Book:Health Information Technology for the Physician Office Laboratory
  42. Book:I Dream of IoT: A Brief Introduction to the Internet of Things
  43. Book:Information Competencies for Chemistry Undergraduates and Research Staff
  44. Book:Introduction to Health and Biomedical Informatics, Volume 1
  45. Book:Introduction to Health and Biomedical Informatics, Volume 2
  46. Book:Introduction to Implants, Volume 1
  47. Book:Introduction to Implants, Volume 2
  48. Book:Introduction to Medical Devices, Volume 1
  49. Book:Introduction to Medical Devices, Volume 2
  50. Book:Introduction to Nuclear Medicine and Radiation Oncology

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)