Difference between revisions of "Functional Security"
Jump to navigation
Jump to search
(Created page with "tbd") |
|||
Line 1: | Line 1: | ||
− | + | __TOC__ | |
+ | |||
+ | |||
+ | ==Webcast Overview== | ||
+ | Let Galen's expert EHR Consultants help you with: Functional Security: Understanding and Applying Security Components. | ||
+ | |||
+ | ==Q&A== | ||
+ | |||
+ | <b>Question</b>: | ||
+ | <i>Answer</i>: | ||
+ | |||
+ | ==Files== | ||
+ | [[Media:Functional Security.pdf|View/download powerpoint slides here]] | ||
+ | |||
+ | ==Additional Information== | ||
+ | |||
+ | See also | ||
+ | |||
+ | |||
+ | Back to [[Webcasts]] |
Revision as of 22:28, 7 November 2012
Webcast Overview
Let Galen's expert EHR Consultants help you with: Functional Security: Understanding and Applying Security Components.
Q&A
Question:
Answer:
Files
View/download powerpoint slides here
Additional Information
See also
Back to Webcasts