1. Business continuity and disaster recovery for infosec managers
Author: Rittinghouse, John W.
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Business -- Data processing -- Security measures,، Crisis management,، Computer networks -- Security measures.,، Information resources management
Classification :
HF
5548
.
37
.
R58
2005


2. Business continuity and disaster recovery for infosec managers /
Author: John W. Rittinghouse, James F. Ransome
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business-- Data processing-- Security measures,Computer networks-- Security measures,Crisis management,Information resources management
Classification :
HF5548
.
37
.
R58
2005


3. Cloud computing
Author: / John W. Rittinghouse, James F. Ransome
Library: Central Library and Documents Center of Tehran University (Tehran)
Subject: Web services,Cloud computing
Classification :
TK5105
.
88813
.
R58
2010


4. Cloud computing
Author: / John W. Rittinghouse, James F. Ransome
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Web services,Cloud computing
Classification :
E-BOOK

5. Cloud computing
Author: / John W. Rittinghouse, James F. Ransome
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Web services.,Cloud computing.
Classification :
TK5105
.
88813
.
R58
2010


6. Cloud computing
Author: / John W. Rittinghouse, James F. Ransome
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Web services.,Cloud computing.
Classification :
TK
,
5105
.
88813
,.
R58
,
2010


7. Cybersecurity operations handbook /
Author: John W. Rittinghouse, William M. Hancock
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security
Classification :
QA76
.
9
.
A25
H35
2003


8. IM, instant messaging, security
Author: Rittinghouse, John W.
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Security measures ، Instant messaging,Security measures ، Electronic mail messages,، Computer security
Classification :
TK
5105
.
73
.
R58I5


9. Instant messaging security /
Author: John W. Rittinghouse, James F. Ransome.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Electronic mail messages-- Security measures.,Instant messaging-- Security measures.,Computer security.,COMPUTERS-- Desktop Applications-- Email Clients.,COMPUTERS-- System Administration-- Email Administration.,Electronic mail messages-- Security measures.
Classification :
TK5105
.
73
.
R58
2005eb


10. Managing Software Deliverables
Author: \ John W. Rittinghouse
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer software -- Development -- Management,Computer programming -- Management,Project management,نرمافزار -- تولید -- مدیریت,برنامهنویسی رایانه -- مديريت,مدیریت طرحها
Classification :
E-Book
,

11. Managing software deliverables
Author: / by John W. Rittinghouse
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer software--Development--Management,Computer programming--Management,Project management.
Classification :
QA
,
76
.
76
,.
D47
,
R58
,
2004


12. Managing software deliverables :
Author: by John W. Rittinghouse.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject:
Classification :
QA76
.
76
.
D47
B956
2004


13. Wireless operational security
Author: Rittinghouse, John W.
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer security,، Computer networks -- Security measures
Classification :
QA
76
.
9
.
A25R58


14. Wireless operational security
Author: / John W. Rittinghouse, James F. Ransome
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Wireless LANs- Security measures,Computer security
Classification :
TK5105
.
59
.
R58
2004

