1. Advanced CISSP prep guide: exam Q & A
Author: Krutz, Ronald L.
Library: Central Library and Documentation Center (Kerman)
Subject: Certification ، Electronic data processing personnel,Examinations ، Computer networks - Security measures
Classification :
QA
76
.
3
.
K76
2003


2. Cloud Security : A Comprehensive Guide to Secure Cloud Computing
Author: / Krutz, Ronald L.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: COMPUTER SCIENCE, INFORMATION TECHNOLOGY
Classification :
E-BOOK

3. Cloud securit
Author: / Ronald L. Krutz, Russell Dean Vines
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Cloud computing- Security measures,Computer security
Classification :
TK5105
.
88813
.
K787
2010


4. Cloud security
Author: / Ronald L. Krutz, Russell Dean Vines
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Cloud computing, Security measures,Computer security,Electronic books
Classification :
TK5105
.
88813
.
K788
2010


5. Cloud security :
Author: Ronald L. Krutz, Russell Dean Vines.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cloud computing-- Security measures.,Computer security.,Computer security.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Data processing.
Classification :
TK5105
.
88813
.
K788
2010eb


6. Interfacing techniques in digital design with emphasis on microprocessors
Author: Krutz, Ronald L., 8391-
Library: Library of Niroo Research Institue (Tehran)
Subject: ، Interface circuits,، Microprocessors,، Digital electronics
Classification :
TK
7868
.
I58K78
1988


7. Interfacing techniques in digital design with emphasis on microprocessors
Author: Krutz, Ronald L.
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Interface circuits,، Microprocessors,، Digital electronics
Classification :
TK
7868
.
I58
.
K78
1988


8. Major Problems in American History /
Author: edited by Elizabeth Cobbs, Texas A&M University, Edward J. Blum, San Diego State University.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: United States, History, Sources.,United States, History.,United States., 0, 0, 7
Classification :
E173
.
M246
2017


9. Microprocessors and logic design
Author: Krutz, Ronald L.
Library: Central Library of Amirkabir University of Technology (Tehran)
Subject: Microprocessors , Logic design
Classification :
QA
76
.
5
.
K79


10. Microprocessors and logic design
Author: Krutz, Ronald L., 8391-
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: ، Microprocessors,، Logic design
Classification :
QA
76
.
5
.
K77


11. Network security bible
Author: Cole, Eric.
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: ، Computer security,Security measures ، Computer networks
Classification :
QA
76
.
9
.
A25
C5985
2005


12. Network security bible
پدیدآورنده : Eric Cole, Ronald Krutz, and James W. Conley
موضوع : Computer security,Computer networks, Security measures
۲ نسخه از این کتاب در ۲ کتابخانه موجود است.
13. Network security bible /
Author: Eric Cole, Ronald Krutz, James W. Conley.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Computer networks-- Security measures.,Computer networks-- Security measures.,Computer security.,Computer security.
Classification :
QA76
.
9
.
A25
C5985
2009


14. Network security bible
Author: Cole, Eric
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: ، Computer security,Security measures ، Computer networks
Classification :
QA
76
.
9
.
A25
C5985


15. Network security bible [electronic resource]
Author: / Eric Cole, Ronald Krutz, and James W. Conley
Library: Imam Reza International University library and information center (Khorasan Razavi)
Subject: Computer security,Computer networks--Security measures
Classification :
EB
,
QA76
.
9
.
A25C5985
2005

16. Securing SCADA systems
Author: Krutz, Ronald L
Library: Library of Niroo Research Institue (Tehran)
Subject: ، Process control,، Data protection,، Computer security
Classification :
TS
156
.
8
.
K78
2005


17. Securing SCADA systems
Author: / Ronald L. Krutz
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Process control,Data protection,Computer security
Classification :
TS156
.
8
.
K78
2006


18. Securing SCADA systems
Author: / Ronald L. Krutz
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Process control,Data protection,Computer security,Supervisory control systems
Classification :
TS156
.
8
.
K78
2006


19. Security+ prep guide
Author: Krutz, Ronald L.
Library: (Semnan)
Subject: Study guides ، Electronic data processing personnel - Certification,Study guides ، Computer security - Examinations
Classification :
QA
76
.
3
.
K795
2003


20. The CEH prep guide :
Author: Ronald L. Krutz, Russell Dean Vines.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Examinations, Study guides.,Computer networks-- Security measures-- Examinations, Study guides.,Computer security-- Testing-- Examinations, Study guides.,Hackers.,Computer networks-- Examinations.,Computer networks-- Security measures-- Examinations.,Hackers.
Classification :
QA76
.
9
.
A25
K79
2007eb

