5 results.
Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule [revision 1]
Author: Scholl, Matthew; Stine, Kevin; Hash, Joan; Bowen, Pauline; Johnson, Arnold; Smith, Carla; Steinberg, Daniel
Source: Government (U.S.)
Publication Date: October 24, 2008
Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule
Author: Hash, Joan; Bowen, Pauline; Johnson, Arnold; Smith, Carla; Steinberg, Daniel
Source: Government (U.S.)
Publication Date: March 02, 2005
Building an Information Technology Security Awareness and Training Program
Author: Wilson, Mark; Hash, Joan
Source: Government (U.S.)
Publication Date: October 02, 2003
Security Considerations in the Information System Development Life Cycle: Recommendations of the National Institute of Standards and Technology
Author: Grance, Tim; Hash, Joan; Stevens, Marc
Source: Government (U.S.)
Publication Date: October 02, 2003
Contingency Planning Guide for Information Technology Systems: Recommendations of the National Institute of Standards and Technology
Author: Swanson, Marianne; Wohl, Amy; Pope, Lucinda; Grance, Tim; Hash, Joan; Thomas, Ray
Source: Government (U.S.)
Publication Date: December 02, 2001