Buch, Englisch, 248 Seiten, Format (B × H): 178 mm x 254 mm, Gewicht: 474 g
Reihe: HIMSS Book Series
Present and Future
Buch, Englisch, 248 Seiten, Format (B × H): 178 mm x 254 mm, Gewicht: 474 g
Reihe: HIMSS Book Series
ISBN: 978-1-032-43274-8
Verlag: Productivity Press
Healthcare cybersecurity, privacy, and data protection are foundational to modern healthcare operations. Healthcare organizations operate in complex environments that rely on trusted virtual and physical access by both human and nonhuman entities, as well as an extensive network of vendors, service providers, and third parties that support clinical, administrative, and technical functions. Despite these challenges, everyone needs to work together to safeguard patient information, systems, networks, devices, applications, data, and other resources.
This book offers practical guidance for individuals involved in healthcare cybersecurity, privacy, and data protection, as well as international stakeholders.
Zielgruppe
Professional Practice & Development
Autoren/Hrsg.
Fachgebiete
- Wirtschaftswissenschaften Betriebswirtschaft Management Qualitätsmanagement, Qualitätssicherung (QS), Total Quality Management (TQM)
- Wirtschaftswissenschaften Wirtschaftssektoren & Branchen Gesundheitswirtschaft
- Medizin | Veterinärmedizin Medizin | Public Health | Pharmazie | Zahnmedizin Medizin, Gesundheitswesen Krankenhausmanagement, Praxismanagement
- Wirtschaftswissenschaften Betriebswirtschaft Management Wissensmanagement
- Wirtschaftswissenschaften Wirtschaftssektoren & Branchen Dienstleistungssektor & Branchen
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit
- Medizin | Veterinärmedizin Medizin | Public Health | Pharmazie | Zahnmedizin Medizin, Gesundheitswesen Medizinische Mathematik & Informatik
Weitere Infos & Material
1. Introduction to Cybersecurity, 2. Overview of the Threat Landscape, 3. Identity, Authentication, and Access Management, 4. The Evolution and Impact of Malware, 5. Major Breaches, 6. Governance, 7. Board of Directors, 8. Social Engineering: Why, How, and What to Do, 9. Information Sharing, 10. Artificial Intelligence, 11. Emerging Technologies and Innovation




