Skip to main content

Search results for "unauthorized person"

Viewing 1 - 20 of 132 results by relevance

Protecting Individual Privacy in Evaluation Research  (1975)

Review of a New Data Management System for the Social Security Administration  (1978)

Consensus Study Report

Scientific Communication and National Security  (1982)

Confronting AIDS: Directions for Public Health, Health Care, and Research  (1986)

Proceedings

Report From the 1986 Workshop on Integrated Data Base Development for the Building Industry  (1987)

Controlling Hydrocarbon Emissions from Tank Vessel Loading  (1987)

Protection of Federal Office Buildings Against Terrorism  (1988)

Confronting AIDS: Update 1988  (1988)

Consensus Study Report

Field Testing Genetically Modified Organisms: Framework for Decisions  (1989)

Consensus Study Report

Computers at Risk: Safe Computing in the Information Age  (1991)

Computer-Based Patient Record: An Essential Technology for Health Care  (1991)

Consensus Study Report

Health Data in the Information Age: Use, Disclosure, and Privacy  (1994)

Proceedings

Proceedings--Workshop on Needle Exchange and Bleach Distribution Programs  (1994)

Consensus Study Report

Women and Health Research: Ethical and Legal Issues of Including Women in Clinical Studies, Volume 1  (1994)

Consensus Study Report

Organizational Linkages: Understanding the Productivity Paradox  (1994)

Information Technology in the Service Society: A Twenty-First Century Lever  (1994)

Purposeful Jettison of Petroleum Cargo  (1994)

Consensus Study Report

Assessing Genetic Risks: Implications for Health and Social Policy  (1994)

Cryptography's Role in Securing the Information Society  (1996)