Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information
Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information

Use this book to learn how to conduct a timely and thorough Risk Analysis and Assessment documenting all risks to the confidentiality, integrity, and availability of electronic Protected Health Information (ePHI), which is a key component of the HIPAA Security Rule. The requirement is a focus area for the Department of Health and Human...

Electronic Health Record: Standards, Coding Systems, Frameworks, and Infrastructures
Electronic Health Record: Standards, Coding Systems, Frameworks, and Infrastructures

Discover How Electronic Health Records Are Built to Drive the Next Generation of Healthcare Delivery

The increased role of IT in the healthcare sector has led to the coining of a new phrase "health informatics," which deals with the use of IT for better healthcare services. Health informatics applications often...

Beginning LoRa Radio Networks with Arduino: Build Long Range, Low Power Wireless IoT Networks
Beginning LoRa Radio Networks with Arduino: Build Long Range, Low Power Wireless IoT Networks
Create your own LoRa wireless projects for non-industrial use and gain a strong basic understanding of the LoRa technology, LoRa WAN, and LPWAN. 

You'll start by building your first LoRa wireless channel and then move on to various interesting projects such as setting up networks with a LoRa gateway,
...
Blockchain for Enterprise: Build scalable blockchain applications with privacy, interoperability, and permissioned features
Blockchain for Enterprise: Build scalable blockchain applications with privacy, interoperability, and permissioned features

Implement blockchain principles in your choice of domain using Ethereum

Key Features

  • Build permissioned enterprise-grade blockchain applications from scratch
  • Implement Blockchain-as-a-Service to enterprises in terms of deployment and security
  • Achieve...
Nurse's Pocket Guide: Diagnoses, Prioritized Interventions, and Rationale 10th Editions
Nurse's Pocket Guide: Diagnoses, Prioritized Interventions, and Rationale 10th Editions

The American Nurses Association (ANA) Social Policy Statement of 1980 was the first to define nursing as the diagnosis and treatment of human responses to actual and potential health problems. This definition, when combined with the ANA Standards of Practice, has provided impetus and support for the use of nursing diagnosis. Defining nursing...

Anatomy & Physiology Workbook For Dummies (Math & Science)
Anatomy & Physiology Workbook For Dummies (Math & Science)
An excellent primer for learning the human body

An anatomy and physiology course is required for medical and nursing students as well as for others pursuing careers in healthcare. Anatomy & Physiology Workbook For Dummies is the fun and easy way to get up to speed on anatomy and physiology facts and
...
Neural Networks in Healthcare: Potential and Challenges
Neural Networks in Healthcare: Potential and Challenges
Healthcare costs around the globe are on the rise, creating a strong need for new ways of assisting the requirements of the healthcare system. Besides applications in other areas, neural networks have naturally found many promising applications in the health and medicine areas. Neural Networks in Healthcare: Potential and Challenges presents...
Dealing with Child Abuse and Neglect as Public Health Problems: Prevention and the Role of Juvenile Ageism
Dealing with Child Abuse and Neglect as Public Health Problems: Prevention and the Role of Juvenile Ageism

This thought-provoking volume defines child abuse and neglect as a public health crisis, both in terms of injuries and mental health problems and as a link to poverty and other negative social outcomes. The author identifies key factors contributing to this situation?in particular juvenile ageism, the pervasive othering of children...

Cooperating Embedded Systems and Wireless Sensor Networks
Cooperating Embedded Systems and Wireless Sensor Networks

A number of different system concepts have become apparent in the broader context of embedded systems over the past few years. Whilst there are some differences between these, this book argues that in fact there is much they share in common, particularly the important notions of control, heterogenity, wireless communication, dynamics/ad hoc...

Leading in Inter-Organizational Networks: Towards a Reflexive Practice
Leading in Inter-Organizational Networks: Towards a Reflexive Practice

In view of the rising importance and prevalence of network-based collaboration, this book aims to meet the need for more theory in this area. Theoretically conceptualizing and empirically describing the practice of reflexive leadership in inter-organisational networks, it explores how member organisations approach reflexive...

Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and Prevention
Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and Prevention

Learn how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. A cyber-physical attack on building equipment pales in comparison to the damage a determined hacker can do if he/she gains access to a medical-grade network as a medical-grade network controls the diagnostic, treatment, and life support...

Artificial Intelligence. An International Perspective
Artificial Intelligence. An International Perspective

Artificial Intelligence (AI) is a rapidly growing inter-disciplinary field with a long and distinguished history that involves many countries and considerably pre-dates the development of computers. It can be traced back at least as far as Ancient Greece and has evolved over time to become a major subfield of computer science in general.

...
Result Page: 28 27 26 25 24 23 22 21 20 19 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy