IT application downtime, executive visibility and disaster tolerant computing MA Harper, CM Lawler, MA Thornton CITSA, 2nd International Conference on Cybernetics and Information …, 2005 | 24 | 2005 |
Components of disaster-tolerant computing: analysis of disaster recovery, IT application downtime and executive visibility CM Lawler, MA Harper, SA Szygenda, MA Thornton International Journal of Business Information Systems 3 (3), 317-331, 2008 | 19 | 2008 |
Components and analysis of disaster tolerant computing CM Lawler, MA Harper, MA Thornton 2007 IEEE International Performance, Computing, and Communications …, 2007 | 7 | 2007 |
Disaster tolerant systems engineering for critical infrastructure protection MA Harper, MA Thornton, SA Szygenda 2007 1st Annual IEEE Systems Conference, 1-7, 2007 | 7 | 2007 |
Non-Secure Communication Channels and the Future of Privacy M Harper, M Awad Encyclopedia of Cryptography, Security and Privacy, 1-5, 2021 | | 2021 |
Systems Engineering Methodology for the Development of Disaster Tolerant Networks Harper Telecommunications in Disaster Areas, 11-51, 2010 | | 2010 |
Systems Engineering Methodology for the Development of Disaster Tolerant Computer and Communication Systems M Harper | | 2008 |
A Newsletter For Professionals MA Harper | | |
Components of Disaster Tolerant Computing CM LAWLER, MA HARPER, MA THORNTON | | |
Components of Disaster Tolerant Computing: Analysis of Disaster Recovery, IT Application CM LAWLER, MA HARPER, SA SZYGENDA | | |