Confidentiality of Electronic Health Data: Methods for Protecting Personally Identifiable Information. Other Bibliographies


Computer security and computer viruses [bibliography]. Tolland (CT): NERAC, Inc.; 1995 Dec. Available from: NTIS, Springfield, VA; PB96-858717. Prepared from Conference Papers Index.

Jaisingh C, Fountain P, compilers. Smart cards [bibliography]. London: Institute of Electrical Engineers; 1994. 91 p. Includes information pack.

Tavani HT. A computer ethics bibliography. Comput Soc 1995 Dec;25(4):9-38. Section 7, Computers and privacy; p.18-24.