1. Business continuity and disaster recovery for infosec managers
Author: Rittinghouse, John W.
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Business -- Data processing -- Security measures,، Crisis management,، Computer networks -- Security measures.,، Information resources management
Classification :
HF
5548
.
37
.
R58
2005


2. Business continuity and disaster recovery for infosec managers /
Author: John W. Rittinghouse, James F. Ransome
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business-- Data processing-- Security measures,Computer networks-- Security measures,Crisis management,Information resources management
Classification :
HF5548
.
37
.
R58
2005


3. Cloud computing
Author: / John W. Rittinghouse, James F. Ransome
Library: Central Library and Documents Center of Tehran University (Tehran)
Subject: Web services,Cloud computing
Classification :
TK5105
.
88813
.
R58
2010


4. Cloud computing
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Web services. ; Cloud computing. ;

5. Cloud computing
Author: / John W. Rittinghouse, James F. Ransome
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Web services,Cloud computing
Classification :
E-BOOK

6. Cloud computing
Author: / John W. Rittinghouse, James F. Ransome
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Web services.,Cloud computing.
Classification :
TK5105
.
88813
.
R58
2010


7. Cloud computing
Author: / John W. Rittinghouse, James F. Ransome
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Web services.,Cloud computing.
Classification :
TK
,
5105
.
88813
,.
R58
,
2010


8. IM, instant messaging, security
Author: Rittinghouse, John W.
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Security measures ، Instant messaging,Security measures ، Electronic mail messages,، Computer security
Classification :
TK
5105
.
73
.
R58I5


9. Instant messaging security /
Author: John W. Rittinghouse, James F. Ransome.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Electronic mail messages-- Security measures.,Instant messaging-- Security measures.,Computer security.,COMPUTERS-- Desktop Applications-- Email Clients.,COMPUTERS-- System Administration-- Email Administration.,Electronic mail messages-- Security measures.
Classification :
TK5105
.
73
.
R58
2005eb


10. VoIP security
Author: Ransome, James F.
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: Security measures ، Internet telephony
Classification :
TK
5105
.
8865
.
R36


11. Wireless operational security
Author: Rittinghouse, John W.
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer security,، Computer networks -- Security measures
Classification :
QA
76
.
9
.
A25R58


12. Wireless operational security
Author: / John W. Rittinghouse, James F. Ransome
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Wireless LANs- Security measures,Computer security
Classification :
TK5105
.
59
.
R58
2004

