Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule [revision 1] Author: Scholl, Matthew; Stine, Kevin; Hash, Joan; Bowen, Pauline; Johnson, Arnold; Smith, Carla; Steinberg, Daniel Source: Government (U.S.) Publication Date: October 24, 2008
Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule Author: Hash, Joan; Bowen, Pauline; Johnson, Arnold; Smith, Carla; Steinberg, Daniel Source: Government (U.S.) Publication Date: March 02, 2005
Building an Information Technology Security Awareness and Training Program Author: Wilson, Mark; Hash, Joan Source: Government (U.S.) Publication Date: October 02, 2003
Security Considerations in the Information System Development Life Cycle: Recommendations of the National Institute of Standards and Technology Author: Grance, Tim; Hash, Joan; Stevens, Marc Source: Government (U.S.) Publication Date: October 02, 2003
Contingency Planning Guide for Information Technology Systems: Recommendations of the National Institute of Standards and Technology Author: Swanson, Marianne; Wohl, Amy; Pope, Lucinda; Grance, Tim; Hash, Joan; Thomas, Ray Source: Government (U.S.) Publication Date: December 02, 2001