These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
3. Wireless whereabouts. Demand is growing for unfettered information access. Featherly K Healthc Inform; 2004 Jul; 21(7):22-4, 26. PubMed ID: 15311543 [No Abstract] [Full Text] [Related]
4. Are VPNs safe for the wild wild Web? Gillespie G Health Data Manag; 2003 Sep; 11(9):54-8, 60. PubMed ID: 14503135 [No Abstract] [Full Text] [Related]
5. The hospital of tomorrow. Service providers are working on creative ways to improve communication. Parker B Healthc Inform; 2004 Sep; 21(9):73. PubMed ID: 15457887 [No Abstract] [Full Text] [Related]
6. Vendors see a wireless revolution. Goedert J Health Data Manag; 2003 Jul; 11(7):52-3. PubMed ID: 12875019 [No Abstract] [Full Text] [Related]
7. The role of physical security in the information security world. Carey J J Healthc Prot Manage; 2003; 19(2):1-13. PubMed ID: 12921010 [TBL] [Abstract][Full Text] [Related]
8. Protecting microcomputers and microdata. Anderson SA; Smith KJ Top Health Rec Manage; 1988 Dec; 9(2):55-61. PubMed ID: 10291051 [No Abstract] [Full Text] [Related]
9. Wireless security: it's up to you. Lowes R Med Econ; 2006 Nov; 83(22):TCP8, TCP10, TCP13. PubMed ID: 17186882 [No Abstract] [Full Text] [Related]
10. Roam if you want to. Offering everything from videoconferencing to security-enabled medication management, these aren't your grandfather's carts. Health Manag Technol; 2010 Aug; 31(8):8, 10, 12. PubMed ID: 20812593 [No Abstract] [Full Text] [Related]
11. Privacy & security. Worried about stolen laptops? Help is here. Scott M Hosp Health Netw; 2007 Feb; 81(2):24-5. PubMed ID: 17373531 [No Abstract] [Full Text] [Related]
12. How to speed up your computer. Lowes R Med Econ; 2004 Feb; 81(3):28-30. PubMed ID: 14983633 [No Abstract] [Full Text] [Related]
13. Data security. Gabrieli ER J Clin Comput; 1992; 21(1-2):17-41. PubMed ID: 10124686 [No Abstract] [Full Text] [Related]
14. Building an enpoint security arsenal. A multi-layered approach to network security is required to reduce the risk imposed by the proliferation of removable storage devices. Israel RL Health Manag Technol; 2007 Jul; 28(7):12, 14-5, 36. PubMed ID: 17682805 [No Abstract] [Full Text] [Related]
15. Technology. To Wi-Fi or not to. Scalise D Hosp Health Netw; 2005 Dec; 79(12):26. PubMed ID: 16435670 [No Abstract] [Full Text] [Related]
16. New uses, new dangers. Hospital data infrastructures expand as information security gains importance. Hoppszallern S Health Facil Manage; 2002 Nov; 15(11):28-9. PubMed ID: 12449091 [No Abstract] [Full Text] [Related]
17. Hotspots get cool reception. Schuerenberg BK Health Data Manag; 2003 Sep; 11(9):62, 65. PubMed ID: 14503136 [No Abstract] [Full Text] [Related]
18. Sixties soul in the wireless personal computer: go ask Alice. Bauer JC J Healthc Inf Manag; 2005; 19(4):6-8. PubMed ID: 16266023 [No Abstract] [Full Text] [Related]
19. Access, security go hand in hand. Martin Z Health Data Manag; 2007 Feb; 15(2):102, 104. PubMed ID: 17375852 [No Abstract] [Full Text] [Related]
20. Security in the management of information systems. Huston TL; Huston JL Health Care Superv; 1998 Jun; 16(4):28-34. PubMed ID: 10179427 [TBL] [Abstract][Full Text] [Related] [Next] [New Search]