Pages that link to "Template:Citation/core"
From LIMSWiki
Jump to navigationJump to searchThe following pages link to Template:Citation/core:
Displayed 50 items.
View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)- Journal:Fast SARS-CoV-2 detection by RT-qPCR in preheated nasopharyngeal swab samples (transclusion) (← links)
- File:Fig1 Alcoba-Florez IntJofInfDis2020 97.jpg (transclusion) (← links)
- Vendor:Genemod Corporation (transclusion) (← links)
- File:Fig1 Heinen BMCBioinfo2020 21.png (transclusion) (← links)
- File:Fig2 Heinen BMCBioinfo2020 21.png (transclusion) (← links)
- Journal:HEnRY: A DZIF LIMS tool for the collection and documentation of biospecimens in multicentre studies (transclusion) (← links)
- File:Fig3 Heinen BMCBioinfo2020 21.png (transclusion) (← links)
- File:Fig4 Heinen BMCBioinfo2020 21.png (transclusion) (← links)
- File:Fig5 Heinen BMCBioinfo2020 21.png (transclusion) (← links)
- Journal:Existing data sources in clinical epidemiology: Laboratory information system databases in Denmark (transclusion) (← links)
- File:Tab1 Arendt ClinEpidem2020 12.jpg (transclusion) (← links)
- File:Fig1 Arendt ClinEpidem2020 12.jpg (transclusion) (← links)
- LII:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/What is a cybersecurity plan and why do you need it? (transclusion) (← links)
- LII:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/What are the major regulations and standards dictating cybersecurity action? (transclusion) (← links)
- LII:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Fitting a cybersecurity standards framework into a cybersecurity plan (transclusion) (← links)
- LII:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/NIST Special Publication 800-53, Revision 5 and the NIST Cybersecurity Framework (transclusion) (← links)
- LII:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Develop and create the cybersecurity plan (transclusion) (← links)
- Template:Develop and create the cybersecurity plan (transclusion) (← links)
- Template:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Develop and create the cybersecurity plan/Develop strategic cybersecurity goals and define success (transclusion) (← links)
- Template:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Develop and create the cybersecurity plan/Define scope and responsibilities (transclusion) (← links)
- Template:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Develop and create the cybersecurity plan/Identify cybersecurity requirements and objectives (transclusion) (← links)
- Template:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Develop and create the cybersecurity plan/Establish performance indicators and associated time frames (transclusion) (← links)
- Template:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Develop and create the cybersecurity plan/Identify key stakeholders (transclusion) (← links)
- Template:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Develop and create the cybersecurity plan/Determine resource needs (transclusion) (← links)
- Template:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Develop and create the cybersecurity plan/Develop a communications plan (transclusion) (← links)
- Template:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Develop and create the cybersecurity plan/Develop a response and continuity plan (transclusion) (← links)
- Template:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Develop and create the cybersecurity plan/Establish how the overall cybersecurity plan will be implemented (transclusion) (← links)
- Template:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Develop and create the cybersecurity plan/Review progress (transclusion) (← links)
- LII:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec (transclusion) (← links)
- Template:A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec (transclusion) (← links)
- Template:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Appendix 1.1 Access control (transclusion) (← links)
- Template:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Appendix 1.5 Configuration management (transclusion) (← links)
- Template:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Appendix 1.7 Identification and authentication (transclusion) (← links)
- Template:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Appendix 1.14 Personnel security (transclusion) (← links)
- File:An Example Cybersecurity Plan - Shawn Douglas - v1.0.pdf (transclusion) (← links)
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/What is a cybersecurity plan and why do you need it?/Cybersecurity planning and its value (transclusion) (← links)
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/What are the major regulations and standards dictating cybersecurity action?/Cybersecurity standards frameworks (transclusion) (← links)
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Fitting a cybersecurity standards framework into a cybersecurity plan/How do cybersecurity controls and frameworks guide plan development? (transclusion) (← links)
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/NIST Special Publication 800-53, Revision 5 and the NIST Cybersecurity Framework/NIST Cybersecurity Framework (transclusion) (← links)
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Develop and create the cybersecurity plan/Develop strategic cybersecurity goals and define success (transclusion) (← links)
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Develop and create the cybersecurity plan/Define scope and responsibilities (transclusion) (← links)
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Develop and create the cybersecurity plan/Identify cybersecurity requirements and objectives (transclusion) (← links)
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Develop and create the cybersecurity plan/Establish performance indicators and associated time frames (transclusion) (← links)
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Develop and create the cybersecurity plan/Identify key stakeholders (transclusion) (← links)
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Develop and create the cybersecurity plan/Determine resource needs (transclusion) (← links)
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Develop and create the cybersecurity plan/Develop a communications plan (transclusion) (← links)
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Develop and create the cybersecurity plan/Develop a response and continuity plan (transclusion) (← links)
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Develop and create the cybersecurity plan/Establish how the overall cybersecurity plan will be implemented (transclusion) (← links)
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Develop and create the cybersecurity plan/Review progress (transclusion) (← links)
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Access control (transclusion) (← links)