ثبت نام  |   ورود
امکانات دانلود کتابکو است و همیشه خواهد ماند
کتاب دانلود کتاب و مقاله
جستجوی
پیشرفته
MENU
  • درباره ما
  • بحث و تبادل نظر
  • ارسال کتاب
  • درخواست کتاب
  • دانلود مقاله ISI
  • دسته بندی کتاب ها
  • کتاب ها
  • صفحه اصلی

کتابکو موتور جستجوی کتاب های الکترونیکی در سطح اینترنت می باشد که همانند سایر موتورهای جستجو - مثلا گوگل - می تواند کتاب ها و اطلاعات مربوط به آن ها را استخراج و ایندکس نماید. در میان جستجو و ایندکس کردن کتاب ها، ممکن است کتابکو محتوای شامل کپی رایت را نیز ایندکس نماید. این فرآیند کاملا اجتناب ناپذیر است. چرا که ربات کتابکو محتوای شامل کپی رایت را از غیر آن تشخیص نمی دهد. دقیقا مانند موتور جستجوی عکس گوگل و یا گوگل اسکلار که ممکن است شامل محتوای دارای کپی رایت نیز باشد. ما کتاب ها را اسکن و آپلود نمی کنیم. استفاده از منابع این سایت تماما با مسئولیت و اطلاع استفاده کننده خواهد بود. اگر شما محتوای خود را در کتاب یافتید و خواستار حذف آن بودید، با ارسال یک ایمیل به دپارتمان حذف آثار از طریق "این ایمیل"، درخواست خود را ارسال نمایید. کتاب شما در کمتر از یک روز کاری حذف خواهد شد.

❌ بستن

کتاب های Eds.

کتاب های نویسنده
صفحه ۱۶۷ از ۱,۵۵۸ در بین ۳۸,۹۳۱ کتاب.
    PDF
    Public Key Cryptography: Third International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000. Proceedings

    Public Key Cryptography: Third International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000. Proceedings

    Wen-Guey Tzeng (auth.), Hideki Imai, Yuliang Zheng (eds.), 2000
    PDF
    Report Advanced Cryptography Standard AES

    Report Advanced Cryptography Standard AES

    Rei Yoshida, Rie Shigetomi, Kazuki Yoshizoe, Akira Otsuka (auth.), Stefan Lucks, Ahmad-Reza Sadeghi, Christopher Wolf (eds.), 2000
    PDF
    RSA Security's official guide to cryptography

    RSA Security's official guide to cryptography

    Jan Pelzl, Thomas Wollinger, Christof Paar (auth.), Mitsuru Matsui, Robert J. Zuccherato (eds.), 2001
    PDF
    Selected Areas in Cryptography: 10th Annual International Workshop, SAC 2003, Ottawa, Canada, August 14-15, 2003. Revised Papers

    Selected Areas in Cryptography: 10th Annual International Workshop, SAC 2003, Ottawa, Canada, August 14-15, 2003. Revised Papers

    Elad Barkan, Eli Biham (auth.), Bart Preneel, Stafford Tavares (eds.), 2004
    PDF
    Selected Areas in Cryptography: 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers

    Selected Areas in Cryptography: 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers

    Eyüp Serdar Ayaz, Ali Aydın Selçuk (auth.), Eli Biham, Amr M. Youssef (eds.), 2006
    PDF
    Selected Areas in Cryptography: 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers

    Selected Areas in Cryptography: 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers

    Shahram Khazaei, Simon Fischer, Willi Meier (auth.), Carlisle Adams, Ali Miri, Michael Wiener (eds.), 2007
    PDF
    Selected Areas in Cryptography: 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers

    Selected Areas in Cryptography: 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers

    Serge Vaudenay (auth.), Stafford Tavares, Henk Meijer (eds.), 2007
    PDF
    Selected Areas in Cryptography: 5th Annual International Workshop, SAC’98 Kingston, Ontario, Canada, August 17–18, 1998 Proceedings

    Selected Areas in Cryptography: 5th Annual International Workshop, SAC’98 Kingston, Ontario, Canada, August 17–18, 1998 Proceedings

    Helena Handschuh, Serge Vaudenay (auth.), Howard Heys, Carlisle Adams (eds.), 1999
    PDF
    Selected Areas in Cryptography: 6th Annual International Workshop, SAC’99 Kingston, Ontario, Canada, August 9–10, 1999 Proceedings

    Selected Areas in Cryptography: 6th Annual International Workshop, SAC’99 Kingston, Ontario, Canada, August 9–10, 1999 Proceedings

    Muxiang Zhang, Christopher Carroll, Agnes Chan (auth.), Douglas R. Stinson, Stafford Tavares (eds.), 2000
    PDF
    Selected Areas in Cryptography: 7th Annual International Workshop, SAC 2000 Waterloo, Ontario, Canada, August 14–15, 2000 Proceedings

    Selected Areas in Cryptography: 7th Annual International Workshop, SAC 2000 Waterloo, Ontario, Canada, August 14–15, 2000 Proceedings

    Scott Fluhrer, Itsik Mantin, Adi Shamir (auth.), Serge Vaudenay, Amr M. Youssef (eds.), 2001
    PDF
    Selected Areas in Cryptography: 8th Annual International Workshop, SAC 2001 Toronto, Ontario, Canada, August 16–17, 2001 Revised Papers

    Selected Areas in Cryptography: 8th Annual International Workshop, SAC 2001 Toronto, Ontario, Canada, August 16–17, 2001 Revised Papers

    John Malone-Lee, Nigel P. Smart (auth.), Kaisa Nyberg, Howard Heys (eds.), 2001
    PDF
    Theory of Cryptography: 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007. Proceedings

    Theory of Cryptography: 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007. Proceedings

    Carl Bosley, Yevgeniy Dodis (auth.), Salil P. Vadhan (eds.), 2007
    PDF
    Theory of Cryptography: 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings

    Theory of Cryptography: 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings

    Tal Moran, Moni Naor, Gil Segev (auth.), Omer Reingold (eds.), 2009
    PDF
    Theory of Cryptography: Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedings

    Theory of Cryptography: Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedings

    Paul Valiant (auth.), Ran Canetti (eds.), 2008
    PDF
    Theory of Cryptography: First Theory of Cryptography Conference, TCC 2004, Cambridge, MA, USA, February 19-21, 2004. Proceedings

    Theory of Cryptography: First Theory of Cryptography Conference, TCC 2004, Cambridge, MA, USA, February 19-21, 2004. Proceedings

    Omer Reingold, Luca Trevisan, Salil Vadhan (auth.), Moni Naor (eds.), 2004
    DJVU
    Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005. Proceedings

    Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005. Proceedings

    Silvio Micali, Chris Peikert, Madhu Sudan, David A. Wilson (auth.), Joe Kilian (eds.), 2005
    PDF
    Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006. Proceedings

    Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006. Proceedings

    Daniele Micciancio, Shien Jin Ong, Amit Sahai, Salil Vadhan (auth.), Shai Halevi, Tal Rabin (eds.), 2006
    PDF
    Armazenando dados com Redis

    Armazenando dados com Redis

    Foteini Andriopoulou, Dimitrios K. Lymberopoulos (auth.), Lazaros Iliadis, Ilias Maglogiannis, Harris Papadopoulos, Kostas Karatzas, Spyros Sioutas (eds.), 2014
    PDF
    Enterprise Interoperability III: New Challenges and Industrial Approaches

    Enterprise Interoperability III: New Challenges and Industrial Approaches

    S. Izza, R. Imache, L. Vincent, Y. Lounis (auth.), Professor Dr.-Ing. Kai Mertins, Dr. Rainer Ruggaber, Professor Keith Popplewell, Professor Xiaofei Xu (eds.), 2008
    PDF
    Enterprise Interoperability IV: Making the Internet of the Future for the Future of Enterprise

    Enterprise Interoperability IV: Making the Internet of the Future for the Future of Enterprise

    Jean-Pierre Lorre, Yiannis Verginadis, Nikos Papageorgiou, Nicolas Salatge (auth.), Keith Popplewell, Jenny Harding, Raul Poler, Ricardo Chalmeta (eds.), 2010
    PDF
    Information Systems Security: Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007. Proceedings

    Information Systems Security: Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007. Proceedings

    Atul Prakash (auth.), Patrick McDaniel, Shyam K. Gupta (eds.), 2007
    PDF
    Lean Enterprise Software and Systems: First International Conference, LESS 2010, Helsinki, Finland, October 17-20, 2010. Proceedings

    Lean Enterprise Software and Systems: First International Conference, LESS 2010, Helsinki, Finland, October 17-20, 2010. Proceedings

    Kieran Conboy, Vasco Duarte (auth.), Pekka Abrahamsson, Nilay Oza (eds.), 2010
    PDF
    New Approaches to Organization Design: Theory and Practice of Adaptive Enterprises

    New Approaches to Organization Design: Theory and Practice of Adaptive Enterprises

    Charles C. Snow, Doreen R. Strauss, Christopher Lettl (auth.), Anne Bøllingtoft, Dorthe Døjbak Håkonsson, Jørn Flohr Nielsen, Charles C. Snow, John Ulhøi (eds.), 2009
    PDF
    New Approaches to Organization Design: Theory and Practice of Adaptive Enterprises

    New Approaches to Organization Design: Theory and Practice of Adaptive Enterprises

    Charles C. Snow, Doreen R. Strauss, Christopher Lettl (auth.), Anne Bøllingtoft, Dorthe Døjbak Håkonsson, Jørn Flohr Nielsen, Charles C. Snow, John Ulhøi (eds.), 2009
    PDF
    New Frontiers in Enterprise Risk Management

    New Frontiers in Enterprise Risk Management

    D. L. Olson, D. Wu (auth.), Prof. David L. Olson, Prof. Desheng Wu (eds.), 2008
    |< ۱۶۲ ۱۶۳ ۱۶۴ ۱۶۵ ۱۶۶ ۱۶۷ ۱۶۸ ۱۶۹ ۱۷۰ ۱۷۱ ۱۷۲ >|

دانلود کتاب   |   کتاب ها   |   نرم افزارهای مفید

کتابکو چگونه کار می کند   |   درخواست حذف اثر   |   راهنمای کسب امتیاز   |   سیاست حفظ حریم خصوصی   |   سیاست ضد هرزنامه

کپی رایت ۲۰۱۴ تا ۲۰۲۶, ketabkoo.com (کتابکو)   |   ارتباط با ما

تمامی كالاها و خدمات این سایت، حسب مورد، دارای مجوزهای لازم از مراجع مربوطه می باشند و فعالیت‌های این سایت تابع قوانین و مقررات جمهوری اسلامی ایران است.