Muutke küpsiste eelistusi

E-raamat: Implementing Information Security in Healthcare: Building a Security Program

(Jacobs School of Music, Indiana University, USA),
  • Formaat: 312 pages
  • Sari: HIMSS Book Series
  • Ilmumisaeg: 23-Sep-2020
  • Kirjastus: Healthcare Information & Management Systems Society
  • Keel: eng
  • ISBN-13: 9781000285154
  • Formaat - PDF+DRM
  • Hind: 106,59 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Raamatukogudele
  • Formaat: 312 pages
  • Sari: HIMSS Book Series
  • Ilmumisaeg: 23-Sep-2020
  • Kirjastus: Healthcare Information & Management Systems Society
  • Keel: eng
  • ISBN-13: 9781000285154

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Implementing Information Security in Healthcare: Building a Security Program offers a critical and comprehensive look at healthcare security concerns in an era of powerful computer technology, increased mobility, and complex regulations designed to protect personal information. Featuring perspectives from more than two dozen security experts, the book explores the tools and policies healthcare organizations need to build an effective and compliant security program.

Topics include information security frameworks, risk analysis, senior management oversight and involvement, regulations, security policy development, access control, network security, encryption, mobile device management, disaster recovery, and more. Information security is a concept that has never been more important to healthcare as it is today. Special features include appendices outlining potential impacts of security objectives, technical security features by regulatory bodies (FISMA, HIPAA, PCI DSS and ISO 27000), common technical security features, and a sample risk rating chart.
Acknowledgements xiii
A Tribute to Terrell W. Herzig xv
Chapter 1 The Importance of Information Security in Healthcare
1(6)
Terrell W. Herzig
Chapter 2 Information Security Frameworks
7(12)
Joseph W. Popinski
Chapter 3 Information Security Planning
19(8)
Kim E. Sassaman
Chapter 4 Risk Analysis
27(18)
Susan Lucci
Tom Walsh
Chapter 5 Senior Management Oversight and Involvement
45(10)
Mary Anne S. Canant
Chapter 6 Information Security Regulations
55(10)
Susan Gatehouse
Chapter 7 Security Policy Development
65(6)
Judi Hofman
Michele T. Kruse
Chapter 8 The Concept of Security Controls
71(4)
Kim E. Sassaman
Chapter 9 Access Control
75(16)
Brian Evans
Chapter 10 Network Security
91(18)
Buddy Gilbert
Chapter 11 Use of Encryption
109(14)
Brian Evans
Chapter 12 Managing Mobile Devices
123(18)
Mark W. Dill
Brian Evans
Tom Walsh
Chapter 13 Application Security
141(10)
Joseph Dalton
Ander Hoaglund
Chapter 14 Information Security Operations
151(12)
Darren D. Dannen
Chapter 15 Security Considerations in Technology Contracting
163(20)
Melissa Markey
Margaret Marchak
Chapter 16 Business Continuity and Disaster Recovery
183(20)
Tom Walsh
Chapter 17 Change Control and Change Management
203(12)
Michelle Bigelow
Chapter 18 Testing Your Technical Controls
215(14)
Tom Walsh
Dennis Henderson
Chapter 19 Auditing Your Program
229(20)
Mary Anne S. Canant
Chapter 20 Incident Handling
249(18)
Shelia T. Searson
Jennifer L. Cole
Chapter 21 Information Systems Implementation
267(10)
Linda Wilson
Appendix A 277(6)
Appendix B 283(2)
Index 285
Terrell W. Herzig, MSHI, CISSP, was Information Security Officer of the University of Alabama at Birmingham (UAB) Health System, the UAB HIPAA Security Officer, and an adjunct professor of Health Informatics at the UAB. Mr. Herzig taught graduate courses in Information Engineering, Programming, Computer Networks, and Information Security in the UAB School of Health Professions. Tom Walsh, CISSP, has partnered with Brian Evans, CISSP, CISM, CISA, CGEIT, to assist healthcare organizations throughout the country with building regulatory compliant information security programs.