Secure Health
portes grátis
Secure Health
A Guide to Cybersecurity for Healthcare Managers
Maleh, Yassine; Ali, Gauhar; Hammad, Mohamed; El-Affendi, Mohammed A.; Abd El-Latif, Ahmed A.
Taylor & Francis Ltd
11/2024
244
Dura
9781032742656
Pré-lançamento - envio 15 a 20 dias após a sua edição
Descrição não disponível.
1 Introduction
MOHAMED HAMMAD, GAUHAR ALI, MOHAMMED A. EL-AFFENDI, YASSINE MALEH, AND AHMED A. ABD EL-LATIF
2 IoT Application, Privacy, and Security in Healthcare: A Review
AHMAD ANWAR ZAINUDDIN, MUHAMMAD HAZRIN FAHMI BIN ABD HALIM, NUR SYAFIKA BAHRUDIN, AIDA SHAHIEDUN, NIK MUHAMMD FARIS FIRDAUS BIN NORAZMAN, AND MUHAMMAD FALIKH FIKRI MOHD FAUZI
3 Securing the Future of E-health: Challenges and Key Management Strategies in Smart Healthcare Sensor Networks
YASSINE MALEH
4 Securing Digital Health: A Comprehensive Ethical Hacking Framework and Comparative Analysis Using a Novel Hybrid Quality Evaluation Model
GAUHAR ALI, MOHAMMED EL-AFFENDI, AND AHMED A. ABD EL-LATIF
5 Biometric Security and Access Management in E-health Services
MOHAMED HAMMAD
6 Investigating the Effectiveness of Different GNN Models for IoT-Healthcare Systems Botnet Traffic Classification
PHUC HAO DO, THANH LIEM TRAN, VAN DAI PHAM, ABDELHAMIED A. ATEYA, AND TRAN DUC LE
7 Addressing Unique Cybersecurity Challenges in Telehealth and Remote Physiologic Monitoring
UZMA JAFAR AND HAFIZ ADNAN HUSSAIN
8 Optimum Transportation Scheme for Healthcare Supply Chain Management
LOKESH SAKAMURI, SAI CHANDANA THIRUVURU, ROHIT GUPTA KUNALA, SIVA SWETHA VENNAPUSA, KARTHEEK PUSALA, VIJAY RAMASAMY, AMIRTHARJAN R AND PADMAPRIYA PRAVINKUMAR
9 Securing Healthcare: A Comprehensive Examination of Information Security Governance Standards and Frameworks
ABDELKEBIR SAHID
MOHAMED HAMMAD, GAUHAR ALI, MOHAMMED A. EL-AFFENDI, YASSINE MALEH, AND AHMED A. ABD EL-LATIF
2 IoT Application, Privacy, and Security in Healthcare: A Review
AHMAD ANWAR ZAINUDDIN, MUHAMMAD HAZRIN FAHMI BIN ABD HALIM, NUR SYAFIKA BAHRUDIN, AIDA SHAHIEDUN, NIK MUHAMMD FARIS FIRDAUS BIN NORAZMAN, AND MUHAMMAD FALIKH FIKRI MOHD FAUZI
3 Securing the Future of E-health: Challenges and Key Management Strategies in Smart Healthcare Sensor Networks
YASSINE MALEH
4 Securing Digital Health: A Comprehensive Ethical Hacking Framework and Comparative Analysis Using a Novel Hybrid Quality Evaluation Model
GAUHAR ALI, MOHAMMED EL-AFFENDI, AND AHMED A. ABD EL-LATIF
5 Biometric Security and Access Management in E-health Services
MOHAMED HAMMAD
6 Investigating the Effectiveness of Different GNN Models for IoT-Healthcare Systems Botnet Traffic Classification
PHUC HAO DO, THANH LIEM TRAN, VAN DAI PHAM, ABDELHAMIED A. ATEYA, AND TRAN DUC LE
7 Addressing Unique Cybersecurity Challenges in Telehealth and Remote Physiologic Monitoring
UZMA JAFAR AND HAFIZ ADNAN HUSSAIN
8 Optimum Transportation Scheme for Healthcare Supply Chain Management
LOKESH SAKAMURI, SAI CHANDANA THIRUVURU, ROHIT GUPTA KUNALA, SIVA SWETHA VENNAPUSA, KARTHEEK PUSALA, VIJAY RAMASAMY, AMIRTHARJAN R AND PADMAPRIYA PRAVINKUMAR
9 Securing Healthcare: A Comprehensive Examination of Information Security Governance Standards and Frameworks
ABDELKEBIR SAHID
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
- Fraudes com computadores e hacking
- Médico administração e gestão
- Privacidade e protecção de dados
- Ciência forense
- Gestão de rede
- Aspectos jurídicos da Tecnologia Informática
- Teoria da codificação e criptologia
- Arquitectura do computador e projecto lógico
- Empresas públicas / nacionalizações
- Indústrias de serviços
cybersecurity;health;healthcare security;management
1 Introduction
MOHAMED HAMMAD, GAUHAR ALI, MOHAMMED A. EL-AFFENDI, YASSINE MALEH, AND AHMED A. ABD EL-LATIF
2 IoT Application, Privacy, and Security in Healthcare: A Review
AHMAD ANWAR ZAINUDDIN, MUHAMMAD HAZRIN FAHMI BIN ABD HALIM, NUR SYAFIKA BAHRUDIN, AIDA SHAHIEDUN, NIK MUHAMMD FARIS FIRDAUS BIN NORAZMAN, AND MUHAMMAD FALIKH FIKRI MOHD FAUZI
3 Securing the Future of E-health: Challenges and Key Management Strategies in Smart Healthcare Sensor Networks
YASSINE MALEH
4 Securing Digital Health: A Comprehensive Ethical Hacking Framework and Comparative Analysis Using a Novel Hybrid Quality Evaluation Model
GAUHAR ALI, MOHAMMED EL-AFFENDI, AND AHMED A. ABD EL-LATIF
5 Biometric Security and Access Management in E-health Services
MOHAMED HAMMAD
6 Investigating the Effectiveness of Different GNN Models for IoT-Healthcare Systems Botnet Traffic Classification
PHUC HAO DO, THANH LIEM TRAN, VAN DAI PHAM, ABDELHAMIED A. ATEYA, AND TRAN DUC LE
7 Addressing Unique Cybersecurity Challenges in Telehealth and Remote Physiologic Monitoring
UZMA JAFAR AND HAFIZ ADNAN HUSSAIN
8 Optimum Transportation Scheme for Healthcare Supply Chain Management
LOKESH SAKAMURI, SAI CHANDANA THIRUVURU, ROHIT GUPTA KUNALA, SIVA SWETHA VENNAPUSA, KARTHEEK PUSALA, VIJAY RAMASAMY, AMIRTHARJAN R AND PADMAPRIYA PRAVINKUMAR
9 Securing Healthcare: A Comprehensive Examination of Information Security Governance Standards and Frameworks
ABDELKEBIR SAHID
MOHAMED HAMMAD, GAUHAR ALI, MOHAMMED A. EL-AFFENDI, YASSINE MALEH, AND AHMED A. ABD EL-LATIF
2 IoT Application, Privacy, and Security in Healthcare: A Review
AHMAD ANWAR ZAINUDDIN, MUHAMMAD HAZRIN FAHMI BIN ABD HALIM, NUR SYAFIKA BAHRUDIN, AIDA SHAHIEDUN, NIK MUHAMMD FARIS FIRDAUS BIN NORAZMAN, AND MUHAMMAD FALIKH FIKRI MOHD FAUZI
3 Securing the Future of E-health: Challenges and Key Management Strategies in Smart Healthcare Sensor Networks
YASSINE MALEH
4 Securing Digital Health: A Comprehensive Ethical Hacking Framework and Comparative Analysis Using a Novel Hybrid Quality Evaluation Model
GAUHAR ALI, MOHAMMED EL-AFFENDI, AND AHMED A. ABD EL-LATIF
5 Biometric Security and Access Management in E-health Services
MOHAMED HAMMAD
6 Investigating the Effectiveness of Different GNN Models for IoT-Healthcare Systems Botnet Traffic Classification
PHUC HAO DO, THANH LIEM TRAN, VAN DAI PHAM, ABDELHAMIED A. ATEYA, AND TRAN DUC LE
7 Addressing Unique Cybersecurity Challenges in Telehealth and Remote Physiologic Monitoring
UZMA JAFAR AND HAFIZ ADNAN HUSSAIN
8 Optimum Transportation Scheme for Healthcare Supply Chain Management
LOKESH SAKAMURI, SAI CHANDANA THIRUVURU, ROHIT GUPTA KUNALA, SIVA SWETHA VENNAPUSA, KARTHEEK PUSALA, VIJAY RAMASAMY, AMIRTHARJAN R AND PADMAPRIYA PRAVINKUMAR
9 Securing Healthcare: A Comprehensive Examination of Information Security Governance Standards and Frameworks
ABDELKEBIR SAHID
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
- Fraudes com computadores e hacking
- Médico administração e gestão
- Privacidade e protecção de dados
- Ciência forense
- Gestão de rede
- Aspectos jurídicos da Tecnologia Informática
- Teoria da codificação e criptologia
- Arquitectura do computador e projecto lógico
- Empresas públicas / nacionalizações
- Indústrias de serviços