These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
2. Wireless whereabouts. Demand is growing for unfettered information access. Featherly K Healthc Inform; 2004 Jul; 21(7):22-4, 26. PubMed ID: 15311543 [No Abstract] [Full Text] [Related]
3. Vendors see a wireless revolution. Goedert J Health Data Manag; 2003 Jul; 11(7):52-3. PubMed ID: 12875019 [No Abstract] [Full Text] [Related]
4. Beefing up security. Goedert J Health Data Manag; 2008 May; 16(5):48-51. PubMed ID: 18524154 [No Abstract] [Full Text] [Related]
5. Do you need a health information security officer? Strateg Healthc Excell; 1998 Sep; 11(9):5-8. PubMed ID: 10185729 [No Abstract] [Full Text] [Related]
6. New uses, new dangers. Hospital data infrastructures expand as information security gains importance. Hoppszallern S Health Facil Manage; 2002 Nov; 15(11):28-9. PubMed ID: 12449091 [No Abstract] [Full Text] [Related]
7. Are VPNs safe for the wild wild Web? Gillespie G Health Data Manag; 2003 Sep; 11(9):54-8, 60. PubMed ID: 14503135 [No Abstract] [Full Text] [Related]
9. Wireless security: it's up to you. Lowes R Med Econ; 2006 Nov; 83(22):TCP8, TCP10, TCP13. PubMed ID: 17186882 [No Abstract] [Full Text] [Related]
10. The hospital of tomorrow. Service providers are working on creative ways to improve communication. Parker B Healthc Inform; 2004 Sep; 21(9):73. PubMed ID: 15457887 [No Abstract] [Full Text] [Related]
11. Wireless system a very good listener. Martin Z Health Data Manag; 2007 Apr; 15(4):54, 56. PubMed ID: 17500244 [No Abstract] [Full Text] [Related]
12. Dangers of a wireless world. Gandy WE Emerg Med Serv; 2006 Apr; 35(4):56-61. PubMed ID: 16649491 [No Abstract] [Full Text] [Related]
13. The role of physical security in the information security world. Carey J J Healthc Prot Manage; 2003; 19(2):1-13. PubMed ID: 12921010 [TBL] [Abstract][Full Text] [Related]
15. Roam if you want to. Offering everything from videoconferencing to security-enabled medication management, these aren't your grandfather's carts. Health Manag Technol; 2010 Aug; 31(8):8, 10, 12. PubMed ID: 20812593 [No Abstract] [Full Text] [Related]
16. Secure and silent messaging--the wireless way. Jacobus P Health Manag Technol; 2000 Sep; 21(9):18. PubMed ID: 11187249 [No Abstract] [Full Text] [Related]
17. Data security. Gabrieli ER J Clin Comput; 1992; 21(1-2):17-41. PubMed ID: 10124686 [No Abstract] [Full Text] [Related]
18. Building an enpoint security arsenal. A multi-layered approach to network security is required to reduce the risk imposed by the proliferation of removable storage devices. Israel RL Health Manag Technol; 2007 Jul; 28(7):12, 14-5, 36. PubMed ID: 17682805 [No Abstract] [Full Text] [Related]
19. Technology. To Wi-Fi or not to. Scalise D Hosp Health Netw; 2005 Dec; 79(12):26. PubMed ID: 16435670 [No Abstract] [Full Text] [Related]
20. Hotspots get cool reception. Schuerenberg BK Health Data Manag; 2003 Sep; 11(9):62, 65. PubMed ID: 14503136 [No Abstract] [Full Text] [Related] [Next] [New Search]