These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

138 related articles for article (PubMed ID: 9735470)

  • 21. From tangled webs to network integrity: computer security in hospital management. Part II.
    Ravella JA; Gravel JL
    Hosp Mater Manage; 1987 Feb; 12(2):6-9. PubMed ID: 10301534
    [TBL] [Abstract][Full Text] [Related]  

  • 22. An assessment of PKI and networked electronic patient record system: lessons learned from real patient data exchange at the platform of OCHIS (Osaka Community Healthcare Information System).
    Takeda H; Matsumura Y; Kuwata S; Nakano H; Shanmai J; Qiyan Z; Yufen C; Kusuoka H; Matsuoka M
    Int J Med Inform; 2004 Mar; 73(3):311-6. PubMed ID: 15066564
    [TBL] [Abstract][Full Text] [Related]  

  • 23. Managing your wireless spectrum... Making wireless technology work in your hospital.
    Gibson HM
    Biomed Instrum Technol; 2006; Suppl():30-6. PubMed ID: 16596848
    [No Abstract]   [Full Text] [Related]  

  • 24. Analyzing medical device connectivity and its effect on cyber security in german hospitals.
    Willing M; Dresen C; Haverkamp U; Schinzel S
    BMC Med Inform Decis Mak; 2020 Sep; 20(1):246. PubMed ID: 32993623
    [TBL] [Abstract][Full Text] [Related]  

  • 25. Computer network security for the radiology enterprise.
    Eng J
    Radiology; 2001 Aug; 220(2):303-9. PubMed ID: 11477230
    [TBL] [Abstract][Full Text] [Related]  

  • 26. Healthcare networks go public.
    Marietti C
    Healthc Inform; 1999 Jul; 16(7):43-6, 48. PubMed ID: 10557374
    [No Abstract]   [Full Text] [Related]  

  • 27. Medical cyber-physical systems: A survey.
    Dey N; Ashour AS; Shi F; Fong SJ; Tavares JMRS
    J Med Syst; 2018 Mar; 42(4):74. PubMed ID: 29525900
    [TBL] [Abstract][Full Text] [Related]  

  • 28. Network security vulnerabilities and personal privacy issues in Healthcare Information Systems: a case study in a private hospital in Turkey.
    Namoğlu N; Ulgen Y
    Stud Health Technol Inform; 2013; 190():126-8. PubMed ID: 23823398
    [TBL] [Abstract][Full Text] [Related]  

  • 29. Creating Web windows may leave doors to data unsecured.
    Cupito MC
    Health Manag Technol; 1997 Sep; 18(10):24-6, 28, 60. PubMed ID: 10170217
    [No Abstract]   [Full Text] [Related]  

  • 30. Making the most of e-mail.
    Askin DF
    Neonatal Netw; 2001 Oct; 20(7):57-60. PubMed ID: 12144206
    [No Abstract]   [Full Text] [Related]  

  • 31. The EDITH approach: the management of authorisations and security in healthcare information systems.
    Ferrara FM
    Stud Health Technol Inform; 1996; 27():200-13. PubMed ID: 10163735
    [TBL] [Abstract][Full Text] [Related]  

  • 32. The power of PKI (Public Key Infrastructure).
    Lovorn J
    Health Manag Technol; 2001 Dec; 22(12):20-1. PubMed ID: 11766427
    [No Abstract]   [Full Text] [Related]  

  • 33. A novel networking approach.
    Chin TL
    Health Data Manag; 1997 Jun; 5(6):44, 46-8. PubMed ID: 10167735
    [No Abstract]   [Full Text] [Related]  

  • 34. Why do people worry about computers?. Interview by Abi Berger.
    Neame R; Kluge EH
    BMJ; 1999 Nov; 319(7220):1295. PubMed ID: 10559048
    [No Abstract]   [Full Text] [Related]  

  • 35. Community health information networks: paving the country roads.
    Boll R
    J AHIMA; 1996 Apr; 67(4):61-3; quiz 64-5. PubMed ID: 10155783
    [No Abstract]   [Full Text] [Related]  

  • 36. Hacking the health system: using public key infrastructure to protect health information on the Internet.
    Pluscauskas M; Stephens A
    Healthc Inf Manage; 1997; 11(3):27-37. PubMed ID: 10175691
    [No Abstract]   [Full Text] [Related]  

  • 37. University of Iowa webergizes its mainframe system.
    Schneider P
    Healthc Inform; 1997 Oct; 14(10):25. PubMed ID: 10175670
    [No Abstract]   [Full Text] [Related]  

  • 38. Responding to Ever-Evolving Threats.
    Wirth A
    Biomed Instrum Technol; 2017; 51(3):269-273. PubMed ID: 28530860
    [No Abstract]   [Full Text] [Related]  

  • 39. PKI (public key infrastructure)--how and why it works.
    Etheridge Y
    Health Manag Technol; 2001 Jan; 22(1):20-1. PubMed ID: 11213609
    [No Abstract]   [Full Text] [Related]  

  • 40. Secure and protected network connection between medical and external networks.
    Hefler T; Beier E; Wentz B; Hergenroder G; Horbach L
    Medinfo; 1995; 8 Pt 1():679. PubMed ID: 8591297
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 7.