| D003195 |
Computer Communication Networks |
A system containing any combination of computers, computer terminals, printers, audio or visual display devices, or telephones interconnected by telecommunications equipment or cables: used to transmit or receive information. (Random House Unabridged Dictionary, 2d ed) |
Cognitive Radio,Computer Network Management,Databases, Distributed,Distributed Systems,Extranets,Intranets,Network Communication Protocols,Telecommunication Networks,Cognitive Radios,Communication Network, Computer,Communication Networks, Computer,Communication Protocol, Network,Communication Protocols, Network,Computer Communication Network,Database, Distributed,Distributed Database,Distributed Databases,Distributed System,Extranet,Intranet,Management, Computer Network,Network Communication Protocol,Network Management, Computer,Network, Computer Communication,Network, Telecommunication,Protocol, Network Communication,Radio, Cognitive,System, Distributed,Telecommunication Network |
|
| D003219 |
Confidentiality |
The privacy of information and its protection against unauthorized disclosure. |
Patient Data Privacy,Privacy of Patient Data,Privileged Communication,Confidential Information,Secrecy,Communication, Privileged,Communications, Privileged,Data Privacy, Patient,Information, Confidential,Privacy, Patient Data,Privileged Communications |
|
| D004864 |
Equipment and Supplies |
Expendable and nonexpendable equipment, supplies, apparatus, and instruments that are used in diagnostic, surgical, therapeutic, scientific, and experimental procedures. |
Apparatus and Instruments,Devices,Medical Devices,Device, Medical,Devices, Medical,Equipment,Inventories,Medical Device,Supplies,Device,Instruments and Apparatus,Inventory,Supplies and Equipment |
|
| D016494 |
Computer Security |
Protective measures against unauthorized access to or interference with computer operating systems, telecommunications, or accompanying data; especially the modification, deletion, destruction, or release of data in computers. It includes methods of forestalling interference by computer viruses or computer hackers aiming to compromise stored data. |
Computer Viruses,Data Protection,Data Security,Compromising of Data,Computer Hackers,Computer Worms,Cyber Security,Cybersecurity,Data Encryption,Information Protection,Computer Hacker,Computer Virus,Computer Worm,Data Compromising,Data Encryptions,Encryption, Data,Encryptions, Data,Hacker, Computer,Hackers, Computer,Protection, Data,Protection, Information,Security, Computer,Security, Cyber,Security, Data,Virus, Computer,Viruses, Computer,Worm, Computer,Worms, Computer |
|
| D017216 |
Telemedicine |
Delivery of health services via remote telecommunications. This includes interactive consultative and diagnostic services. |
Tele-Care,Tele-ICU,Tele-Intensive Care,Tele-Referral,Telecare,Virtual Medicine,Mobile Health,Telehealth,eHealth,mHealth,Health, Mobile,Medicine, Virtual,Tele Care,Tele ICU,Tele Intensive Care,Tele Referral,Tele-Referrals |
|
| D059015 |
Wireless Technology |
Techniques using energy such as radio frequency, infrared light, laser light, visible light, or acoustic energy to transfer information without the use of wires, over both short and long distances. |
Technologies, Wireless,Technology, Wireless,Wireless Technologies |
|