Oldest pages

From LIMSWiki
Jump to navigationJump to search

Showing below up to 50 results in range #651 to #700.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)

  1. Journal:From the desktop to the grid: Scalable bioinformatics via workflow conversion‏‎ (17:53, 14 June 2016)
  2. Journal:Evaluating health information systems using ontologies‏‎ (19:36, 21 June 2016)
  3. IEEE Cloud Computing‏‎ (19:49, 21 June 2016)
  4. Legal aspects of computing‏‎ (19:54, 21 June 2016)
  5. Children's Online Privacy Protection Act‏‎ (20:04, 21 June 2016)
  6. FedRAMP‏‎ (20:14, 21 June 2016)
  7. Federal Information Security Management Act of 2002‏‎ (20:26, 21 June 2016)
  8. Gramm–Leach–Bliley Act‏‎ (20:27, 21 June 2016)
  9. Sarbanes–Oxley Act‏‎ (20:28, 21 June 2016)
  10. Data Protection Directive‏‎ (20:30, 21 June 2016)
  11. General Data Protection Regulation‏‎ (20:33, 21 June 2016)
  12. AS 8015‏‎ (20:53, 21 June 2016)
  13. COBIT‏‎ (20:57, 21 June 2016)
  14. ISO/IEC 38500‏‎ (21:04, 21 June 2016)
  15. Payment Card Industry Data Security Standard‏‎ (21:07, 21 June 2016)
  16. Computer security‏‎ (21:13, 21 June 2016)
  17. Network security‏‎ (21:15, 21 June 2016)
  18. Information security‏‎ (21:21, 21 June 2016)
  19. Cloud computing security‏‎ (21:23, 21 June 2016)
  20. Attribute-based encryption‏‎ (21:30, 21 June 2016)
  21. Bring your own encryption‏‎ (21:34, 21 June 2016)
  22. Digital transaction management‏‎ (21:37, 21 June 2016)
  23. Homomorphic encryption‏‎ (21:38, 21 June 2016)
  24. Key distribution‏‎ (21:40, 21 June 2016)
  25. Secret sharing‏‎ (21:41, 21 June 2016)
  26. Vulnerability management‏‎ (21:47, 21 June 2016)
  27. Information security management‏‎ (21:49, 21 June 2016)
  28. ISO/IEC 27000‏‎ (21:53, 21 June 2016)
  29. Information technology security audit‏‎ (21:55, 21 June 2016)
  30. IT Baseline Protection Catalogs‏‎ (21:57, 21 June 2016)
  31. Business continuity planning‏‎ (22:00, 21 June 2016)
  32. Cloud Security Alliance‏‎ (22:05, 21 June 2016)
  33. Risk IT‏‎ (22:12, 21 June 2016)
  34. Incident management‏‎ (22:15, 21 June 2016)
  35. Penetration test‏‎ (22:18, 21 June 2016)
  36. Defensive computing‏‎ (22:20, 21 June 2016)
  37. XOOPS‏‎ (16:17, 5 July 2016)
  38. Journal:SUSHI: An exquisite recipe for fully documented, reproducible and reusable NGS data analysis‏‎ (18:19, 6 July 2016)
  39. Journal:Assessment of and response to data needs of clinical and translational science researchers and beyond‏‎ (20:11, 12 July 2016)
  40. LII:Radiation Oncology/Physics/Physics Basics‏‎ (17:35, 13 July 2016)
  41. LII:Radiation Oncology/Physics/Radiation Interactions‏‎ (17:36, 13 July 2016)
  42. LII:Radiation Oncology/Physics/Equations‏‎ (17:37, 13 July 2016)
  43. LII:Radiation Oncology/Physics/ICRU‏‎ (17:38, 13 July 2016)
  44. LII:Radiation Oncology/Physics/AAPM‏‎ (17:40, 13 July 2016)
  45. LII:Radiation Oncology/Physics/Dosimetry‏‎ (17:41, 13 July 2016)
  46. LII:Radiation Oncology/Physics/Isotopes‏‎ (17:43, 13 July 2016)
  47. LII:Radiation Oncology/Physics/Treatment Machines‏‎ (17:45, 13 July 2016)
  48. LII:Radiation Oncology/Contraindications‏‎ (17:46, 13 July 2016)
  49. LII:Radiation Oncology/Anatomy‏‎ (17:56, 13 July 2016)
  50. LII:Radiation Oncology/Contouring‏‎ (17:57, 13 July 2016)

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)