Information Technology Security In Healthcare Journal Articles PdfWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Information Technology Security In Healthcare Journal Articles Pdf returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Business Process Management (BPM)
 •   Enterprise Data Protection and Privacy
 •   Network Security
 •   Security Policies
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Application Security
 •   Security Monitoring
 •   Endpoint Security
 •   Business Intelligence Solutions

Related Searches
 •   Finding Information
 •   Information Download
 •   Information Hr
 •   Information Technology Capacities
 •   Information Technology Knowledge
 •   Information Technology Sql
 •   Information Technology Web
 •   Reseller Information Technology Security
 •   Spreadsheet Information Technology
Advertisement

ALL RESULTS
1 - 25 of 492 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

McAfee Security Journal by McAfee, Inc.

December 2008 - (Free Research)
This edition of the McAfee Security Journal focuses on social engineering, the psychology of decision making, and elementary social psychology to analyze why people fall for social engineering without perceiving the deception. 
(WHITE PAPER) READ ABSTRACT |

Dirty Little Secrets: Mobile Apps Invading Your Privacy by Veracode, Inc.

July 2011 - (Free Research)
Join Tyler Shields, Senior Security Researcher at Veracode, as he discusses the evolving mobile security threat landscape and shares real-world examples of how your data is being used (or misused) in some of the most popular mobile applications. 
(WEBCAST) READ ABSTRACT |

Unlocking Information: Digital data is a hospital’s most valuable resource by Dell, Inc.

June 2012 - (Free Research)
Uncover the importance of digital data for today’s information-driven healthcare industry. Learn why this data is the key enabler of starting healthcare reform and revolutionizing how hospitals operate, collaborate, and deliver care. 
(WHITE PAPER)

Journal of Management Excellence: Business Transformation by Oracle Corporation

March 2011 - (Free Research)
This collection of journal articles focuses on the many facets of business transformation, including innovation, performance management, cultural transformation, and much more. 
(JOURNAL ARTICLE) READ ABSTRACT |

Journal of Management Excellence: Creating Options by Oracle Corporation

January 2010 - (Free Research)
Read this collection of journal articles to learn a variety of approaches to creating options for business success, even in the face of scarce resources. 
(JOURNAL ARTICLE) READ ABSTRACT |

Journal of Management Excellence - Enterprise Performance Management Innovations by Oracle Corporation

April 2010 - (Free Research)
This collection of journal articles focuses on the many facets of enterprise performance management that can help organizations thrive through the recovery, including; integrating the financial close and reporting process, managing the transition to IFRS, centralized enterprise dimension management. 
(WHITE PAPER) READ ABSTRACT |

Journal of Management Excellence: The Value of Information by Oracle Corporation

March 2011 - (Free Research)
In this issue, our authors have done an outstanding job of exploring many facets of VOI. Robert Shimp discusses the shift in the economy from that of a services economy to an information management economy. 
(WHITE PAPER) READ ABSTRACT |

Journal of Management Excellence: Creating Value, Part II by Oracle Corporation

May 2009 - (Free Research)
This collection of journal articles is focused on the concept of creating value and its importance as the key element for enterprise performance management (EPM). 
(JOURNAL ARTICLE) READ ABSTRACT |

Cloud computing for the enterprise, Part 3: Using WebSphere CloudBurst to create private clouds by IBM

May 2011 - (Free Research)
This article provides an introduction to IBM® WebSphere® CloudBurst™ and WebSphere Application Server Hypervisor Edition. 
(WHITE PAPER) READ ABSTRACT |

Best Practices for Audit and Compliance Reporting for the IBM System i (AS/400) by PowerTech

August 2008 - (Free Research)
This white paper outlines the key items that need to be reviewed on AS/400 for both configuration data and transactional log information from the audit journal, it also explains various challenges of auditing and reporting on the System i platform. 
(WHITE PAPER) READ ABSTRACT |

Business Value Analysis Study: Citizens Business Bank by Symantec Corporation

March 2009 - (Free Research)
As a result of its relationship with Symantec, Citizens is achieving substantial business value. The Alchemy Solutions Group conducted a Total Operational and Economic Impact (TOEI) analysis of the different solutions deployed and quantified business value. Read this paper to see what they found. 
(WHITE PAPER) READ ABSTRACT |

Journal of Management Excellence: Building Trust by Oracle Corporation

July 2009 - (Free Research)
It is crucial for businesses to build trust with their customers, partners, investors, and with society at large. This journal article discusses building trust through modern performance management techniques, sustainability initiatives, managing reputation risk, end-to-end approaches to financial reporting and compliance, and more. 
(JOURNAL ARTICLE) READ ABSTRACT |

The 2008 (ISC)2 Global Information Security Workforce Study by ISC2

May 2008 - (Free Research)
Information security professionals are facing a growing amount of pressure. This survey provides detailed insight into the important trends and opportunities emerging in the information security profession worldwide. 
(WHITE PAPER) READ ABSTRACT |

Sharepoint E-zine Vol.1: Governance Implementation Management by SearchWinIT

August 2008 - (Free Research)
SearchWinIT.com's SharePoint e-zine – is a monthly Web magazine packed with in-depth articles and tips written by SharePoint to make you a SharePoint master. Our editorial focuses on three main areas: governance, management and implementation. 
(EZINE) READ ABSTRACT |

Information Security Magazine, June 2009 - SIMs: More than just a pile of logs by Information Security Magazine

June 2009 - (Free Research)
This month's issue of Information Security Magazine covers a breadth of topics. The cover story this month is about SIM and how it can boost compliance, visibility, and overall business intelligence. Other featured articles cover risk management, convergence, and even the security concerns that come with cloud computing. Read on to learn more. 
(EZINE)

Cloud computing for the enterprise: Part 1: Capturing the cloud by IBM

May 2011 - (Free Research)
This article discusses cloud computing in general, then dissects the layers of the cloud, presents the different cloud types, along with their benefits and drawbacks, and explains why this movement is important for enterprise developers. 
(WHITE PAPER) READ ABSTRACT |

Optim Data Growth Solution for Oracle E-Business Suite by IBM

Align continuous control of your E-Business Suite data with business objectives. Optim's proven archiving capabilities enable you to set desired service levels for each category of E-Business Suite data - for example, current data, reporting data and historical data. You maintain universal access to information. 
(SOFTWARE PRODUCT)

eBook: IT in the Electronic Hospital by SearchCIO.com and SearchSecurity.com

October 2009 - (Free Research)
The federal government's push for electronic healthcare records has made data security even more pressing. This eBook takes a look at where healthcare IT leaders should begin and what they should watch out for as they move to embrace the HITECH Act and other initiatives. Read on to learn more. 
(EBOOK) READ ABSTRACT |

E-Book: IT in the Electronic Hospital by Imprivata

February 2010 - (Free Research)
The federal government's push for electronic healthcare records has made data security even more pressing. This eBook takes a look at where healthcare IT leaders should begin and what they should watch out for as they move to embrace the HITECH Act and other initiatives. Read on to learn more. 
(EBOOK) READ ABSTRACT |

Cloud computing for the enterprise: Part 2: WebSphere sMash and DB2 Express-C on the Amazon EC2 public cloud by IBM

May 2011 - (Free Research)
This article looks specifically at the public cloud and how you can use the IBM® WebSphere® sMash and IBM DB2® Express-C Amazon Machine Images (AMI) to deliver Web applications hosted on the EC2 public cloud infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Readers' Choice Awards by Information Security Magazine

April 2008 - (Free Research)
Information Security and SearchSecurity.com presented more than 1,600 readers with some 360 security products, divided into 18 categories, three categories which failed to draw sufficient reader response are covered in market articles. 
(JOURNAL ARTICLE)

Optim Data Growth Solution for Oracle's PeopleSoft Enterprise by IBM

IBM's Optim™Data Growth Solution for Oracle's PeopleSoft Enterprise provides proven archiving capabilities. Now you can align continuous control of your PeopleSoft data with business objectives to optimize performance, mitigate risks and control costs. 
(SOFTWARE PRODUCT)

Making Mobility Matter in Healthcare Data Security by Dell, Inc.

June 2012 - (Free Research)
This white paper highlights the need for health care organizations to have solid encryption and risk assessment procedures and policies in place. 
(WHITE PAPER)

PCI Compliance Report: Cost Analysis Reveals Expense Justified by McAfee, Inc. [DO NOT USE]

December 2007 - (Free Research)
Fortrex, in conjunction with Solidcore and Emagined Security have compiled a PCI compliance report that reveals the cost of a breach can easily be 20 times the cost of PCI compliance, more than justifying the up-front investment. 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine, January 2009: Look Who's Coming to Dinner--the Security Steering Committee by Information Security Magazine

January 2009 - (Free Research)
This special issue of Information Security Magazine explains the ins and outs of security steering committees. Learn who needs to be there, why they need to be there, what they need to be doing, and how to help them do it. 
(EZINE)

1 - 25 of 492 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts