These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

154 related articles for article (PubMed ID: 10105269)

  • 1. Tips for personal computer security.
    Mele JA
    J Healthc Prot Manage; 1990; 6(2):119-22. PubMed ID: 10105269
    [No Abstract]   [Full Text] [Related]  

  • 2. Microcomputers--a checklist of security and recovery considerations.
    J Healthc Prot Manage; 1985; 2(1):85-92. PubMed ID: 10276195
    [No Abstract]   [Full Text] [Related]  

  • 3. Preventing laptop theft.
    Perry PM
    Case Manager; 2004; 15(4):67-9. PubMed ID: 15247900
    [No Abstract]   [Full Text] [Related]  

  • 4. Healthcare identity theft: prevention and response.
    Center for Healthcare Environmental Management
    Healthc Hazard Manage Monit; 2005 Sep; 19(1):1-8. PubMed ID: 16187575
    [No Abstract]   [Full Text] [Related]  

  • 5. Identity theft prevention in the healthcare setting.
    Warren B
    J Healthc Prot Manage; 2005; 21(1):101-11. PubMed ID: 16535940
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Making employees the first line of defense in reducing hospital theft.
    Hosp Secur Saf Manage; 2002 Feb; 22(9):9-10. PubMed ID: 11915682
    [No Abstract]   [Full Text] [Related]  

  • 7. Hospital security: an essential operation.
    Hosp Admin Curr; 1982; 26(1):1-6. PubMed ID: 10254463
    [No Abstract]   [Full Text] [Related]  

  • 8. Securing your assets.
    Food Manage; 1991 Mar; 26(3):126-33. PubMed ID: 10110048
    [No Abstract]   [Full Text] [Related]  

  • 9. C'meah, Chu-Chu: controlling patients' belongings.
    Dick T
    JEMS; 2008 Mar; 33(3):36. PubMed ID: 18328393
    [No Abstract]   [Full Text] [Related]  

  • 10. Privacy & security. Worried about stolen laptops? Help is here.
    Scott M
    Hosp Health Netw; 2007 Feb; 81(2):24-5. PubMed ID: 17373531
    [No Abstract]   [Full Text] [Related]  

  • 11. The role of an investigator in healthcare protection.
    Dacheux JL
    J Healthc Prot Manage; 1997; 13(2):7-19. PubMed ID: 10173432
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Cutting your losses.
    Beasley MA
    Food Manage; 1994 May; 29(5):53. PubMed ID: 10134020
    [No Abstract]   [Full Text] [Related]  

  • 13. Expert warns of security pitfalls of long-term care facilities.
    Hosp Secur Saf Manage; 1998 Mar; 18(11):8-9. PubMed ID: 10177874
    [No Abstract]   [Full Text] [Related]  

  • 14. Do you know who is walking into your building?
    Edgeller J
    Health Estate; 1999 Jul; 53(6):23-4. PubMed ID: 10621229
    [No Abstract]   [Full Text] [Related]  

  • 15. Long distance telephone fraud and abuse.
    Bing D
    J Healthc Prot Manage; 1993; 9(2):70-5. PubMed ID: 10129066
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Protecting your computer software from theft.
    Hosp Secur Saf Manage; 1986 Dec; 7(8):5-7. PubMed ID: 10280196
    [No Abstract]   [Full Text] [Related]  

  • 17. How secure is your pharmacy?
    Fisher C
    Tex Hosp; 1983 Apr; 38(11):27-9. PubMed ID: 10260506
    [No Abstract]   [Full Text] [Related]  

  • 18. Hospital uses cameras to nab employee suspect in computer thefts.
    Hosp Secur Saf Manage; 2000 Mar; 20(11):3-4. PubMed ID: 11067017
    [No Abstract]   [Full Text] [Related]  

  • 19. Hospitals report on usage of system for covert video surveillance.
    Hosp Secur Saf Manage; 1995 Jan; 15(9):12-4. PubMed ID: 10140147
    [No Abstract]   [Full Text] [Related]  

  • 20. Residents need to feel secure about personal possessions.
    Faber H; Rudd AD
    Provider; 1988 May; 14(5):38-9. PubMed ID: 10287337
    [No Abstract]   [Full Text] [Related]  

    [Next]    [New Search]
    of 8.