Back to Results
First PageMeta Content
Cyberwarfare / Computer network security / Crime prevention / National security / Information security / Computer virus / Encryption / Malware / Antivirus software / Security / Data security / Computer security


HEALTH INFORMATICS Privacy, security and confidentiality JO LUCK
Add to Reading List

Document Date: 2014-11-23 06:35:35


Open Document

File Size: 46,21 KB

Share Result on Facebook

City

Geneva / Solheim / Amsterdam / Melbourne / /

Company

CCH Australia Limited. / Prentice-Hall / Law Book Company Limited / Integrity Availability Hardware Software Data People Documentation Supplies / United Kingdom CCH Australia Limited / K.A. 1994 / M Stockton Press / Boyd & Fraser Publishing Company / Health Information Systems / /

Country

Netherlands / United States / Australia / United Kingdom / /

Event

Natural Disaster / /

Holiday

Commonwealth Day / /

IndustryTerm

secret communications / construction software / information processing / internet worm / electricity supply / insurance / shareware software / storage device / machinery / overhead sprinkler systems / clinical systems / virus specific products / personal characteristic recognition devices / security management / certain time-critical applications / food / electricity / carrier program / authentication devices / communications systems / information technology / electronic equipment / given information processing / data-technology / disaster recovery insurance / electrical equipment / encryption algorithm / medical information technology / /

OperatingSystem

Integrity / /

Organization

seventh world congress / British Government / Commonwealth government / EDP Auditors Association / /

Person

JO LUCK / Sydney Forcht / /

Position

guard / /

Product

Freedom / /

ProvinceOrState

Queensland / /

PublishedMedium

The Medical Journal / /

Technology

encryption algorithm / unix / information technology / medical information technology / smart card / Operating system / Encryption key Plaintext Encryption algorithm Decryption key Ciphertext Decryption algorithm / ALE / operating systems / encryption / Cryptography / materially based data-technology / 8.2 The encryption process Encryption / digital signature / /

SocialTag