Pages that link to "Template:Reflist"
From LIMSWiki
Jump to navigationJump to searchThe following pages link to Template:Reflist:
Displayed 50 items.
View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)- Journal:Health care and cybersecurity: Bibliometric analysis of the literature (transclusion) (← links)
- Journal:Strengthening public health surveillance through blockchain technology (transclusion) (← links)
- LII:COVID-19 Testing, Reporting, and Information Management in the Laboratory/Workflow and information management for COVID-19 (and other respiratory diseases) (transclusion) (← links)
- Book:COVID-19 Testing, Reporting, and Information Management in the Laboratory/Workflow and information management for COVID-19 (and other respiratory diseases)/Additional benefits and challenges of informatics in disease testing and public health (transclusion) (← links)
- Journal:Institutional ELN-LIMS deployment: Highly customizable ELN-LIMS platform as a cornerstone of digital transformation for life sciences research institutes (transclusion) (← links)
- Journal:Bridging the collaboration gap: Real-time identification of clinical specimens for biomedical research (transclusion) (← links)
- Journal:Laboratory testing methods for novel severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) (transclusion) (← links)
- Journal:The regulatory landscape of precision oncology laboratory medicine in the United States: Perspective on the past five years and considerations for future regulation (transclusion) (← links)
- Journal:Enzyme immunoassay for measuring aflatoxin B1 in legal cannabis (transclusion) (← links)
- Journal:Bringing big data to bear in environmental public health: Challenges and recommendations (transclusion) (← links)
- Journal:Fast SARS-CoV-2 detection by RT-qPCR in preheated nasopharyngeal swab samples (transclusion) (← links)
- Journal:HEnRY: A DZIF LIMS tool for the collection and documentation of biospecimens in multicentre studies (transclusion) (← links)
- Journal:Existing data sources in clinical epidemiology: Laboratory information system databases in Denmark (transclusion) (← links)
- LII:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/What is a cybersecurity plan and why do you need it? (transclusion) (← links)
- LII:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/What are the major regulations and standards dictating cybersecurity action? (transclusion) (← links)
- LII:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Fitting a cybersecurity standards framework into a cybersecurity plan (transclusion) (← links)
- LII:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/NIST Special Publication 800-53, Revision 5 and the NIST Cybersecurity Framework (transclusion) (← links)
- LII:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Develop and create the cybersecurity plan (transclusion) (← links)
- Template:Develop and create the cybersecurity plan (transclusion) (← links)
- LII:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec (transclusion) (← links)
- Template:A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec (transclusion) (← links)
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/What is a cybersecurity plan and why do you need it?/Cybersecurity planning and its value (transclusion) (← links)
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/What are the major regulations and standards dictating cybersecurity action?/Cybersecurity standards frameworks (transclusion) (← links)
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Fitting a cybersecurity standards framework into a cybersecurity plan/How do cybersecurity controls and frameworks guide plan development? (transclusion) (← links)
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/NIST Special Publication 800-53, Revision 5 and the NIST Cybersecurity Framework/NIST Cybersecurity Framework (transclusion) (← links)
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Develop and create the cybersecurity plan/Develop strategic cybersecurity goals and define success (transclusion) (← links)
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Develop and create the cybersecurity plan/Define scope and responsibilities (transclusion) (← links)
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Develop and create the cybersecurity plan/Identify cybersecurity requirements and objectives (transclusion) (← links)
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Develop and create the cybersecurity plan/Establish performance indicators and associated time frames (transclusion) (← links)
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Develop and create the cybersecurity plan/Identify key stakeholders (transclusion) (← links)
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Develop and create the cybersecurity plan/Determine resource needs (transclusion) (← links)
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Develop and create the cybersecurity plan/Develop a communications plan (transclusion) (← links)
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Develop and create the cybersecurity plan/Develop a response and continuity plan (transclusion) (← links)
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Develop and create the cybersecurity plan/Establish how the overall cybersecurity plan will be implemented (transclusion) (← links)
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Develop and create the cybersecurity plan/Review progress (transclusion) (← links)
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Access control (transclusion) (← links)
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Awareness and training (transclusion) (← links)
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Audit and accountability (transclusion) (← links)
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Assessment, authorization, and monitoring (transclusion) (← links)
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Configuration management (transclusion) (← links)
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Contingency planning (transclusion) (← links)
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Identification and authentication (transclusion) (← links)
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Incident response (transclusion) (← links)
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Maintenance (transclusion) (← links)
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Media protection (transclusion) (← links)
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Physical and environmental protection (transclusion) (← links)
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Planning (transclusion) (← links)
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Personnel security (transclusion) (← links)
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Risk assessment (transclusion) (← links)
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/System and services acquisition (transclusion) (← links)