AORN JournalVolume 93, Issue 2 p. 276-281 Column Implementing Safe Computer Practices Jennifer M. Brusco BS, CNA, Jennifer M. Brusco BS, CNASearch for more papers by this author Jennifer M. Brusco BS, CNA, Jennifer M. Brusco BS, CNASearch for more papers by this author First published: 01 February 2011 https://doi.org/10.1016/j.aorn.2010.11.005Citations: 1 Editor's notes: TopTenReviews is a trademark of TopTenReviews, Inc, Ogden, UT. BitDefender is a trademark of SOFTWIN SRL, Bucharest, Romania. Kapersky is a registered trademark of Kapersky Lab, Ltd, Woburn, MA. Webroot is a trademark of Webroot Software, Inc, Boulder, CO. Norton is a trademark of Symantec Corp, Mountain View, CA. ESET is a registered trademark and Nod32 is a trademark of ESET, LLC, San Diego, CA. AVG is a registered trademark of AVG Technologies, Brno, Czech Republic. G Data is a registered trademark of G Data Software, Bochum, Germany. Avira and AntiVir are registered trademarks of Avira GmbH, Tettnang, Germany. Vipre is a registered trademark of Sunbelt Software, Clearwater, FL. Trend Micro and Titanium are trademarks of Trend Micro, Inc, Cupertino, CA. Outlook, Windows, and Internet Explorer are registered trademarks of Microsoft Corp, Redmond, WA. Java is a registered trademark of Sun Microsystems, Santa Clara, CA. Adobe is a registered trademark of Adobe Systems Inc, Seattle, WA. Yahoo! is a registered trademark of Yahoo! Inc, Sunnyvale, CA. Gmail is a trademark of Google, Inc, Mountain View, CA. Firefox is a registered trademark of Mozilla Foundation, Mountain View, CA. Publication of this article does not imply AORN endorsement of specific products. Read the full textAboutPDF ToolsRequest permissionExport citationAdd to favoritesTrack citation ShareShare Give accessShare full text accessShare full-text accessPlease review our Terms and Conditions of Use and check box below to share full-text version of article.I have read and accept the Wiley Online Library Terms and Conditions of UseShareable LinkUse the link below to share a full-text version of this article with your friends and colleagues. Learn more.Copy URL Share a linkShare onFacebookTwitterLinkedInRedditWechat Citing Literature Volume93, Issue2February 2011Pages 276-281 RelatedInformation
Read full abstract