000 | 03111nam a22003617a 4500 | ||
---|---|---|---|
999 |
_c29810 _d29810 |
||
001 | 64805 | ||
010 | _a 2014395656 | ||
020 | _a9781938904349 | ||
020 | _a1938904346 | ||
040 | _aTXI | ||
082 | 0 | 4 | _a005.8 |
245 | 0 | 0 |
_aImplementing information security in healthcare : _bbuilding a security program _cedited by Terrell W. Herzig, Tom Walsh, Lisa A. Gallagher |
260 |
_aChicago, IL : _bHIMSS, _cc2013. |
||
300 |
_axviii, 294 p. : _bill. ; _c26 cm. |
||
504 | _aIncludes bibliographical references and index. | ||
505 | 0 | _aThe importance of information security in healthcare -- Information security frameworks -- Information security planning -- Risk analysis -- Senior management oversight and involvement -- Information security regulations -- Security policy development -- The concept of security controls -- Access control -- Network security -- Use of encryption -- Managing mobile devices -- Application security -- Information security operations -- Security considerations in technology contracting -- Business continuity and disaster recovery -- Change control and change management -- Testing your technical controls -- Auditing your program -- Incident handling -- Information systems implementation. | |
520 | _aImplementing Information Security in Healthcare: Building a Security Program offers a critical and comprehensive look at healthcare security concerns in an era of powerful computer technology, increased mobility, and complex regulations designed to protect personal information. Featuring perspectives from more than two dozen security experts, the book explores the tools and policies healthcare organizations need to build an effective and compliant security program. Topics include information security frameworks, risk analysis, senior management oversight and involvement, regulations, security policy development, access control, network security, encryption, mobile device management, disaster recovery, and more. Information security is a concept that has never been more important to healthcare as it is today. Special features include appendices outlining potential impacts of security objectives, technical security features by regulatory bodies (FISMA, HIPAA, PCI DSS and ISO 27000), common technical security features, and a sample risk rating chart. | ||
650 | 0 |
_aMedical care _xSecurity measures _938662 |
|
650 | 0 |
_aMedical informatics _xManagement _915568 |
|
650 | 0 |
_aInformation storage and retrieval systems _xMedicine _xManagement _938663 |
|
650 | 0 |
_aMedical records _xElectronic information resources _938664 |
|
650 | 0 |
_aComputer security _9641 |
|
650 | 0 |
_aInformation networks _xSecurity measures _938665 |
|
650 | 1 | 2 |
_aHospital Administration _938666 |
650 | 2 | 2 |
_aSafety Management _912702 |
650 | 2 | 2 |
_aSecurity Measures _938641 |
650 | 2 | 2 |
_aMedical Informatics _95504 |
700 | 1 |
_aHerzig, Terrell W., _eEdited by _938667 |
|
700 | 1 |
_aWalsh, Tom, _eEdited by _938668 |
|
700 | 1 |
_aGallagher, Lisa A., _eEdited by _938669 |
|
856 |
_uhttps://uowd.box.com/s/txqrjlyxzuknfqfmikirkc6zqx0e9ip8 _zLocation Map |
||
942 |
_cREGULAR _2ddc |